• Title/Summary/Keyword: 분실율

Search Result 16, Processing Time 0.02 seconds

User Identification System Based on Iris Information Using a Mouse (홍채 정보 기반 마우스를 활용한 사용자 인증 시스템)

  • Kim Sin-Hong;Rho Kwang-Hyun;Moon Soon-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.143-150
    • /
    • 2006
  • Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.

  • PDF

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.

"Conlplex Pneuwlonectonly" in Lung Cancer (폐암의 "Conlplex Pneuwlonectonly")

  • Baek, Hyo-Chae;Bae, Gi-Man;Lee, Du-Yeon
    • Journal of Chest Surgery
    • /
    • v.29 no.6
    • /
    • pp.614-620
    • /
    • 1996
  • The method of treatment in lung cancer patients with invasion to parietal pleura, diaphragm, peri- cardium or vertebra is controversial, and resection of these invasion together with pneumonectomy is called "complex pneumonectomy" From March 1990 to February 1994 we performed 18 cases of "complex pneumonectomy". Seven patients had resection of chest wall, 10 patients had pericardial re- section, and one patient had resection of diaphragm Right pneumonectomy was done in 8 cases and left pneumonectomy was done in 10 cases. The age of patients were from 40 to 70 years(mean 58 years) with male to female ratio of 17 to 1. The chief complaints of the patients on admission were cough (13), dyspnea on exertion (11), chest pain (10), weight loss (9), general fatigue (9), and sputum production (4 . Postoperative pathology were 13 squamous cell carcinoma, 3 adenocarcinoma, and one case each of adenosquamous carcinoma and small cell carcinoma. The postoperative pathologic stages were 2 T3NO MO, 4 TIWIMO, 6 T3N2MO, 5 T4N2MO, and 1 TIWIMO. There was one operative mortality(5.5%). Excluding one follow up loss, 14 patients expired during the follow-up and the mean survival was 9.07 $\pm$ 4.82 months. One patient with stage TINOMO who had chest wall resection is alive at 35 months follow-up and a patient with T3N2MO who had diaphragm resection is alive at 36 months follow-up. Therefore, selection of patients for "complex pneumonec- tomy" is very important, and a long term survival is possible.ong term survival is possible.

  • PDF

An Efficient-keyword-searching Technique over Encrypted data on Smartphone Database (스마트폰 데이터베이스 환경에서 암호화된 데이터에 대한 효율적인 키워드검색 기법)

  • Kim, Jong-Seok;Choi, Won-Suk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.4
    • /
    • pp.739-751
    • /
    • 2014
  • We are using our smartphone for our business as well as ours lives. Thus, user's privacy data and a company secret are stored at smartphone. By the way, the saved data on smartphone database can be exposed to a malicous attacker when a malicous app is installed in the smartphone or a user lose his/her smartphone because all data are stored as form of plaintext in the database. To prevent this disclosure of personal information, we need a database encryption method. However, if a database is encrypted, it causes of declining the performance. For example, when we search specific data in condition with encrypted database, we should decrypt all data stored in the database or search sequentially the data we want with accompanying overhead[1]. In this paper, we propose an efficient and searchable encryption method using variable length bloom filter under limited resource circumstances(e.g., a smartphone). We compare with existing searchable symmetric encryption. Also, we implemented the proposed method in android smartphone and evaluated the performance the proposed method. As a result through the implementation, We can confirm that our method has over a 50% improvement in the search speed compared to the simple search method about encrypted database and has over a 70% space saving compared to the method of fixed length bloom filter with the same false positive rate.

A New Isolation Level in Object-Relational DBMSs (객체관계형 데이터베이스 시스템에서의 새로운 고립화 수준)

  • Seo, Hong-Suk;Chang, Ji-Woong;Moon, Yang-Sae;Whang, Kyu-Young;Hong, Eui-Kyung
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.468-483
    • /
    • 2001
  • In order to enhance the performance, cursor stability, which is a variant of isolation lvel 2 in relational DBMSs, has been widely used in place of isolation level 3, which uses strict two phase locking. However, cursor stability is much less usable in object-relational DBMSs (ORDBMSs) because navigational applications in ORDBMSs can suffer from critical inconsistency problems such as dangling pointers, lost updates, and reading inconsistent complex objects. In this paper, we propose a new isolation level, navigation stability, that prevents the inconsistency problems of cursor stability for navigational applications, while avoiding significant degradation of the concurrency of level 3. First, we analyze the inconsistency problems of cursor stability for navigational applications. Second, we define navigation stability as an extension of cursor stability and show that it solves those inconsistency problems of cursor stability in ORDBMSs. For workloads consisting of transactions of long duration, compared with level 3, the throughput of navigation stability is enhanced by up to 200%; the average response time reduced by as much as 55%; and the abort ratio reduced by as much as 77%. From these results, we conclude that navigation stability is a useful isolation level in ORDBMSs that can be used in place of isolation level 3 to improve the performance and concurrency without significantly sacrificing consistency.

  • PDF

Internet Apparel Shopping: Perception of Risk among South Korean Female College Students in the Apparel Major (한국 여대생의 인터넷을 통한 의류제품 구입시의 인지위험 - 의류학 전공자를 대상으로 -)

  • Ko, Seung-Bong;Salusso, Carol J.;Sprott, David E.;Hwang, Choon-Sup
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.869-878
    • /
    • 2007
  • The purpose of this study was to investigate perception of risks among South Korean female college students within the process of purchasing apparel products through the Internet. The study was implemented by descriptive survey method using questionnaire and subjects consisted of 324 South Korean female college students. Findings of the study showed that the purchasing process particularly regarding delivery and security issues seemed to be a strong concern. On the other hand, unique selection such as apparel brands only available through the Internet was a strong appeal to 37.7% of subjects. Factor analysis profiled risk perception as: 1) Internet Shopping Selection Preference, 2) Delivery Problems and Lack of Security 3) Product Quality and Characteristics 4) Return Policy Difficulties and 5) Fair Prices. Discriminant analysis showed Factors 1, 2 and 3 were significant in helping to differentiate among Non-Purchasers, Fewer-purchasers and Many-Purchasers. Factor 1 and 3 helped differentiate among respondents relative to age range. Across all types of purchasers, offering unique selections of cutting edge fashions and improving risk perception relative to delivery and security concerns seemed important for gaining greater market share. Being able to delivery quality products and communicate product characteristics would be a powerful competitive edge to add to the incentive of convenience in shopping for apparel on the Internet.