• Title/Summary/Keyword: 식별기술

Search Result 2,087, Processing Time 0.05 seconds

X.509 인증서내 식별번호를 이용한 본인확인기술 표준화 동향

  • 박종욱;김승주;이재일;이홍섭
    • Review of KIISC
    • /
    • v.14 no.2
    • /
    • pp.46-56
    • /
    • 2004
  • 식별번호를 이용한 본인확인기술(SIM : Subject Identification Method) 표준(안)은 국내 보안분야로는 처음으로 IETF PKIX 워킹그룹에서 논의되고 있는 순수 국내 보안기술로 연내 IETF 공식표준문서(RFC)로 채택될 가능성이 높다. 동 기술은 PKI 기반의 전자서명인증서비스에서 동일한 이름을 갖는 개인 사용자나 유사한 법인명을 갖는 법인사업자가 겪을 수 있는 본인확인의 오류를 원천적으로 방지하여 인증서 소유자의 신원을 유일하게 확인할 수 있는 방안을 제공한다. 본 고에서는 관련 국외 동향을 고려하여 SIM 표준(안)의 보안요구사항, 프로토콜, 표준화 주요 쟁점 및 진행상황을 고찰하고자 한다.

남극크릴의 초음파 산란강도 측정

  • 황두진;강돈혁;이윤호;강명희;손창환;노영수
    • Proceedings of the Korean Society of Fisheries Technology Conference
    • /
    • 2000.05a
    • /
    • pp.29-30
    • /
    • 2000
  • 최근, 전자 및 컴퓨터 기술이 눈부신 발달과 더불어 개발된 과학어군탐지기는 해양생물자원을 신속하고도 정확히 평가하는 수단으로서 인정받아 실용화 단계에 있다. 그러나, 계량어군탐지기를 이용한 자원량 추정기술을 보다 더 정도 높고, 효율적인 방법으로서 정착하기 위해서는 선결해야 할 문제점이 몇 가지 있다. 먼저 대상생물의 식별로서 조사하고자 하는 생물과 다른 해양생물과를 식별하는 것이며, 나아가 같은 생물에 있어서도 분포수심, 유영 자세 등에 의해서도 자원의 추정정도가 다르므로 이에 대한 연구가 필요 불가결하다. (중략)

  • PDF

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

The Identified Self: Location-Based Technologies, Surveillance, and Non-place (식별되는 자: 위치기반기술, 원격성과 감시의 문제, 그리고 비-장소(non-place))

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.1-31
    • /
    • 2016
  • This essay examines the recent proliferation of location-based services (LBS) within the context the expansion of the technologies of remote identification, monitoring, and tracking. Following the spatial turn in the social sciences, this essay aims to analyze LBS as a surveillance technology that can re-shape the spatial configuration of its users and their identity. The analytic focus of this essay is on LBS within the global information infrastructure, and it utilizes key LBS examples in the US and South Korea. First, as a way to discuss the technical possibilities of LBS for spatial coordination and surveillance, this essay investigates its technical architecture in terms of information flow. It then discusses the issue of privacy in LBS by analyzing some of its key legal and regulatory issues. The combination of the global information infrastructure with location-related technologies has enabled LBS companies to expand the scope of surveillance over the ever-increasing computer-mediated activities, prompting heated discussions over whether LBS is capturing "Every Moment in Your Life." This essay concludes with a discussion on how location technologies have provided a key platform for the rise of surveillance capitalism through the creation of what Marc $Aug{\acute{e}}$ called a "non-place," a place where the identified self is constituted by LBS.

Business Component Identification Based on System Component Applying Dependency Characteristics between Analysis Classes (분석 클래스 간의 종속적 특성을 적용한 시스템 컴포넌트 기반의 비즈니스 컴포넌트 식별)

  • Choi, Mi-Sook;Cho, Eun-Sook;Ha, Jong-Sung
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.7
    • /
    • pp.1009-1016
    • /
    • 2004
  • Component-based development is being generalized as the spread of software reuse technology for rapid development productivity and high quality software.In the CBD, the identification of independent and reusable component is the one of important tasks for component-based system development. Because existing methodologies providing component identification techniques provide techniques based on heuristic techniques of component developer, it is difficult for general developers to identify components using these methods. Therefore, this paper suggests new identification factors and a technique by considering dependency characteristics according to method call types and method call directions and dependency degree. Furthermore, proposed technique is verified through case study; business components based on system components are identified effectively.

  • PDF

Determination of fuel marker in petroleum products using GC-MS (GC-MS를 이용한 석유제품 중의 식별제 분석)

  • Youn, Ju Min;Doe, Jin Woo;Yim, Eui Soon;Lee, Jung Min
    • Journal of the Korean Applied Science and Technology
    • /
    • v.35 no.4
    • /
    • pp.1073-1080
    • /
    • 2018
  • There are several types of petroleum products used for the fuel oil, according to their respective quality standards, grades and usage. Depending on the degree of oil tax rate by country, even the same petroleum products will have price gap. The illegal mixing of cheap petroleum products, which are subject to the lower tax rate, with relatively expensive transportation fuel causes problems such as tax evasion, environmental pollution and vehicle breakdown. In order to prevent illicit production and mixing of these different petroleum products, a small amount of markers are legally added to specific petroleum products. In Korea, markers are introduced and used to prevent illegal activity that kerosene used as fuel for house and commercial boiler are mixed with automotive diesel fuels, and marker contents are analyzed to use UV-Vis spectrophotometer and high performance liquid chromatography (HPLC). In this study, we have developed a method to qualitatively and quantitatively determine the marker added to petroleum products by gas chromatography-mass spectrometry (GC-MS) without adding developing reagent or sample pre-treatments.

A Study on Automatic Target Recognition Using SAR Imagery (SAR 영상을 이용한 자동 표적 식별 기법에 대한 연구)

  • Park, Jong-Il;Kim, Kyung-Tae
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.11
    • /
    • pp.1063-1069
    • /
    • 2011
  • NCTR(Non-Cooperative Target Recognition) and ATR(Automatic Target Recognition) are methodologies to identify military targets using radar, optical, and infrared images. Among them, a strategy to recognize ground targets using synthetic aperature radar(SAR) images is called SAR ATR. In general, SAR ATR consists of three sequential stages: detection, discrimination and classification. In this paper, a modification of the polar mapping classifier(PMC) to identify inverse SAR(ISAR) images has been made in order to apply it to SAR ATR. In addition, a preprocessing scheme can mitigate the effect from the clutter, and information on the shadow is employed to improve the classification accuracy.

A Study on the Development of Information Systems for Digital Contents Based on Standard Digital Identifier(SDI) (식별체계기반 디지털콘텐츠 유통체제 구축방안 연구)

  • Seok, Jung-Ho
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.4 s.50
    • /
    • pp.195-210
    • /
    • 2003
  • With the rapid development of information technology and internet in these days, resources of knowledge information have been digitalized and distributed on the internet, However, the location of digital content and a change of content have generated problems for users access and services. In line with this regard, the research on the identification of digital content utilizing standardized identification system and distribution system is necessary. This study intends to contribute to the implementation of information system based on standard digital identifier for the effective management and safe distribution of digital contents. This study first tries to survey SDI outline, practical application case and distributed business model and to analyze information distribution status Finally, this study tries to draw up a plan for the establishment of KISTI's SDI. content identification system, content distribution system.

owl:sameAs Synchronization Server for Same Objects (동일 개체를 위한 owl:sameAs 관리 서버)

  • Kim, Pyung;Lee, Seung-Woo;Seo, Dong-Min;Jung, Han-Min
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2010.06c
    • /
    • pp.90-93
    • /
    • 2010
  • 시맨틱 웹은 웹 환경에서 데이터의 의미를 표준화된 방법으로 표현함으로써 데이터의 상호 운용성을 보장하고 기계가 활용 가능한 데이터의 웹을 가능하게 해준다. 온톨로지에서 데이터는 식별자(URI)를 사용해서 의미가 명확화되고, 표준 기술 방법(RDF)를 통해서 어플리케이션 간 데이터의 통합 및 재사용을 가능하게 해준다. 최근 미국과 유럽을 중심으로 링크드 데이터 프로젝트를 통해서 시맨틱 데이터들의 상호연계가 활발하게 추진하고 있다. 그러나 다양한 출처들의 데이터를 연계하는 과정에서, 동일한 객체에 서로 다른 식별자가 할당된 경우 식별자를 통한 시맨틱 정보 연계에 문제가 발생할 수 있다. OWL에서는 동일 객체에 대한 2개 이상의 식별자가 부여된 경우 owl:sameAs를 이용해서 식별자들이 동일 객체를 가리키고 있음을 명시한다. 본 연구에서는 서로 다른 식별자를 가진 객체들이 owl:sameAs를 사용해서 동일 객체로 표현되었을 경우, 동일 객체에 부여된 식별자 정보를 효과적으로 관리하고, 이를 서비스에 활용하기 위한 관리 서버를 설계하였다. 관리 서버를 통해 동일 객체에 대한 식별자들의 체계적인 관리는 물론, 동일 객체를 찾기 위한 질의 횟수를 감소시켜서 서비스 소요시간을 줄일 수 있다.

  • PDF

Radar Target Recognition Using a Fusion of Monostatic/Bistatic ISAR Images (모노스태틱/바이스태틱 ISAR 영상 융합을 통한 표적식별 연구)

  • Cha, Sang-Bin;Yoon, Se-Won;Hwang, Seok-Hyun;Kim, Min;Jung, Joo-Ho;Lim, Jin-Hwan;Park, Sang-Hong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.16 no.12
    • /
    • pp.93-100
    • /
    • 2018
  • Inverse Synthetic Aperture Radar(ISAR) image is 2-dimensional radar cross section distributions of a target. For target approaching along radar's line of sight(LOS), the bistatic ISAR can compensate for the weakness of the monostatic ISAR which can not obtain the vertical resolution of the image. However, bistatic ISAR have longer processing times and variability in scattering mechanisms than monostatic ISAR, so target identification using only bistatic ISAR images can be inefficient. Therefore, this paper analyzes target identification performance using monostatic and bistatic ISAR images of targets approaching along radar's LOS and proposes a method of target identification through fusion of two radars. Simulation results demonstrate that identification performance through fusion is more efficient than identification performance using only monostatic, bistatic ISAR images.