• Title/Summary/Keyword: 보안인식

Search Result 1,361, Processing Time 0.035 seconds

A Study on the Problems and Prospects of Ubiquitous Library Through Ubiquitous Computing (유비쿼터스 컴퓨팅에 기반한 유비쿼터스 도서관의 과제와 전망에 관한 연구)

  • Noh, Dong-Jo
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.2
    • /
    • pp.219-240
    • /
    • 2004
  • Ubiquitous computing technology provides anytime and anywhere accessibility to information, ubiquitous computing is adapted in the various field to increase efficiency of work. After looking into the trend of ubiquitous computing, case studies of information service using mobile service and RFID system in library were investigated in this paper. Library information service are providing retrieval of library OPAC and verifications of circulation and return date using mobile internet technology. In addition, various notice services using short me sage service(SMS) of mobile are available. Considering growing mobile service and RFID system advancement of related technology, more information service utilizing mobile service and RFID system should be developed in near future.

  • PDF

The Empirical Study on Factors of Effect of Introducing Cloud-Based Remote Education System: Focusing on Successful of Cyber University Construction (클라우드 기반 원격 교육시스템 도입 효과 요인에 관한 실증 연구: 사이버대학교 구축 성공사례 중심으로)

  • Kang, Tae-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.293-300
    • /
    • 2020
  • With constant relaxation of regulations by the government in the 4th industrial innovation era, it has brought huge changes to the education environment as it has created solutions to hindrance factors against introduction of the cloud. Universities are getting more interested in the introduction of the cloud Computing but they still remain at the level of recognition diffusion and creating ambience. The study has analyzed empirical factors of the effect of introduction of the successful case "K Cyber University's Construction of Cloud-Based Remote Education System" through the previous studies on trait factors affecting the introduction of the cloud computing and the analysis of factors in terms of expandability, agility, compatibility, economic feasibility, security, stability and institutional support. Factors drawn through this are meaningful for empirical studies on presenting strategies and the directivity to introduce the cloud computing successfully. This study can be used as the background for further studies which will require various factors prior to introducing the cloud computing.

The Development of Attendance Management System Using the RFID (RFID를 이용한 출석관리 시스템 개발)

  • Park, So-Hee;Moon, Byeong-Cheoul
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.2
    • /
    • pp.139-146
    • /
    • 2007
  • Today, using RFID(Radio Frequency Identification) card is extended in diversity as medical treatment, circulation market, military affairs, manufacture, security, etc. The RFID technology is an automatic identification method, relying on storing and remotely retrieving data for the purpose of identification using radio waves. This advantage of the RFID will be as a replacement for traditional Barcoding. Besides, book-lending system and attendance management system become the center of educational institution in interest. This paper presents a attendance management system using the RFID card which provides directly information of attendance for professors with mobile and students with web. Also, the students only have ID card that embed RFID tag which is recognized attendance through DB that storages to is received a information of student from RFID card Reader. And it is possible management or report for attendance and time table not only for professors by management program but also for students by web program.

  • PDF

Robust Real-time Face Detection Scheme on Various illumination Conditions (다양한 조명 환경에 강인한 실시간 얼굴확인 기법)

  • Kim, Soo-Hyun;Han, Young-Joon;Cha, Hyung-Tai;Hahn, Hern-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.821-829
    • /
    • 2004
  • A face recognition has been used for verifying and authorizing valid users, but its applications have been restricted according to lighting conditions. In order to minimizing the restricted conditions, this paper proposes a new algorithm of detecting the face from the input image obtained under the irregular lighting condition. First, the proposed algorithm extracts an edge difference image from the input image where a skin color and a face contour are disappeared due to the background color or the lighting direction. In the next step, it extracts a face region using the histogram of the edge difference image and the intensity information. Using the intensity information, the face region is divided into the horizontal regions with feasible facial features. The each of horizontal regions is classified as three groups with the facial features(including eye, nose, and mouth) and the facial features are extracted using empirical properties of the facial features. Only when the facial features satisfy their topological rules, the face region is considered as a face. It has been proved by the experiments that the proposed algorithm can detect faces even when the large portion of face contour is lost due to the inadequate lighting condition or the image background color is similar to the skin color.

An Implementation of Web Site Login System Using Fingerprint Identification (지문인증을 이용한 웹 사이트 로그인 시스템의 구현)

  • 최순우;김영길
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.207-213
    • /
    • 2002
  • Fingerprint has the characteristics that do not change with time and is unique to an individual. And fingerprint identification is considered the best choice for most biometric applications because of its accuracy, speed, reliability, non-intrusive interfaces and cost-effectiveness. In this paper, we applies fingerprint Identification to web site login to raise the quality of personal identification when we use e-commerce, internet banking, stock dealings, shopping mali, etc. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing system carries out fingerprint identification in the web server, but the system Implemented in this paper carries out it in client. Therefore the loads of server are reduced and the confidence of internet service is improved because login is forbidden without fingerprint identification success.

Comparative Analysis on Error Back Propagation Learning and Layer By Layer Learning in Multi Layer Perceptrons (다층퍼셉트론의 오류역전파 학습과 계층별 학습의 비교 분석)

  • 곽영태
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.1044-1051
    • /
    • 2003
  • This paper surveys the EBP(Error Back Propagation) learning, the Cross Entropy function and the LBL(Layer By Layer) learning, which are used for learning the MLP(Multi Layer Perceptrons). We compare the merits and demerits of each learning method in the handwritten digit recognition. Although the speed of EBP learning is slower than other learning methods in the initial learning process, its generalization capability is better. Also, the speed of Cross Entropy function that makes up for the weak points of EBP learning is faster than that of EBP learning. But its generalization capability is worse because the error signal of the output layer trains the target vector linearly. The speed of LBL learning is the fastest speed among the other learning methods in the initial learning process. However, it can't train for more after a certain time, it has the lowest generalization capability. Therefore, this paper proposes the standard of selecting the learning method when we apply the MLP.

Factors Affecting Information Protection Efforts for Preventing Deviant Behavior of Adolescent in Cyber Space (사이버 일탈행위 예방을 위한 개인 정보보호 노력의 영향요인 연구)

  • Um, Myoungyong;Park, Jin-Hee;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.8 no.5
    • /
    • pp.31-41
    • /
    • 2005
  • The purpose of this study is to identify the determinants of planned behavior of adolescent, toward information security and cyber crime prevention. A survey methodology was used to investigate a proposed model of influence, and regression analysis was used to analyze the results. The hypothesized model was largely supported by this analysis, and the overall results indicate that the intention to actively participate in information security and cyber crime prevention is mostly influenced by the fear for cyber crime and the perceived usefulness of information security and cyber crime prevention activity. In addition, it was found that the perceived easy of use for information-security related ICT skill, fear for cyber crime, and social norm for information security influence the level of usefulness, but that the prior experience with information leaking was statistically insignificant factor to the level of usefulness and fear for crime. Useful suggestions for promoting information security and cyber crime prevention are also provided.

  • PDF

A Secure Telemedicine System for Smart Healthcare Service (스마트 헬스케어 서비스를 위한 홍채인식기반의 원격의료시스템)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho;Kim, Min-Kang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.205-214
    • /
    • 2017
  • In this paper, we proposed an iris-based authentication for smart healthcare service in secure telemedicine system. The medical and healthcare information's are very important data in telemedicine system from privacy information. thus, the proposed system provides a secure and convenient authentication method than the traditional ID/PW authentication method to a telemedicine system for age-related chronic diseases. When considering the peculiarities of the use of age-related chronic diseases convenience and healthcare environments, the proposed approach is difficult to secure than traditional ID/PW authentication method with the appropriate means to easily change when stolen or lost to others. In addition, the telemedicine system for the smart healthcare services is one of the types of privacy sensitive medical and health data. it is very important security needs in telemedicine system. Thus we protocol are offer high confidentiality and integrity than existing ID/PW method.

A Study on Implementation of an Intelligent Video Surveillance System for Effective Education Method of Image Processing (효율적인 영상 처리 교육방법을 위한 지능형 영상 감시 시스템 구현에 관한 연구)

  • Park, Ho-Sik
    • The Journal of Korean Institute for Practical Engineering Education
    • /
    • v.2 no.1
    • /
    • pp.84-88
    • /
    • 2010
  • Recently, it is essential to have the system which can track down and identity the random object in the space in which security is a high priority. Due to the fact that we mentioned above, in this paper. We suggest the intelligent video surveillance system effective image-process-education in this paper. The experiment was conducted to check and track down the entering vehicle. And, Pan-Tilt-Zoom camera was used to obtain the enlarged image of the object while a vehicle was making stop in target area. As a result, the experiment has shown the data as following. When the object is in motion, success rate is 97.4%, while success rate is 91% when the object is motionless. By using the suggested system, effective image-process-education is should be achieved because the students who participate in the class can have simultaneous access to the system for real time image data and camera control.

  • PDF

A Study on the Industrial Revitalization through the Performance Analysis of the Korean Government's Cloud Policy in Service Consumer's Perspective (국내 클라우드 정책의 성과 분석을 통한 수요자 관점의 산업 활성화 연구)

  • Joe, Moon Jeung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.159-167
    • /
    • 2020
  • The Korean government has pursued various policies to revitalize the cloud industry since 2009. In particular, the government enacted the 'Cloud Computing and Privacy Security Act' for the first time in the world in 2015, creating institutions and support programs to boost the cloud industry. As a result, the volume of the cloud industry has increased significantly, and the number of companies and professionals have increased. In this paper, the researches analyzed the situation of Korean cloud market, usage of cloud computing in enterprises, effects and problems of cloud-enabled companies based on the industrial survey conducted from 2016 to 2019, In this study, the results showed concerns of security, uncertainty about cost savings, and IT capabilities of enterprises as problems in revitalizing the cloud industry. The researches also propose strategies, perception changes, and development processes for companies to resolve the problems.