• Title/Summary/Keyword: 출입통제시스템

Search Result 129, Processing Time 0.03 seconds

Usability Test and Analysis of Fingerprint Recognition Systems with Environmental and Human Factors (환경과 인간요인을 고려한 지문인식시스템의 사용성 평가 및 분석)

  • Cho, Ung-Keun;Hong, Jin-Hyuk;Cho, Sung-Bae
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.437-442
    • /
    • 2006
  • 최근 많은 관심을 끌고 있는 지문인식시스템은 사용자의 지문영상을 입력 받아 사전에 등록된 템플릿과 비교하여 사용자 여부를 확인하는 사용자 인증 도구이다. 지문을 입력 받기 위한 센서와 매칭 알고리즘 등이 활발히 개발되고 있으며, 실제로 전자상거래나 출입통제시스템 등의 많은 분야에 적용되고 있다. 지문인식시스템에 대한 기존의 평가는 수집된 지문 DB 에 대해 인식 성능이 얼마인지, 쌍둥이들을 잘 구분하는지, 위조 지문을 파악할 수 있는지 등 주로 지문인식 자체의 성능에 초점이 맞추어져 있었다. 하지만 지문인식은 사용자나 환경과 관련된 많은 요인에 영향을 받기 때문에, 시스템을 효과적으로 적용하기 위해서는 이들에 대한 분석이 필요하다. 지문인식시스템에 대한 사용성 평가는 시스템이 대상환경에 효과적으로 적용되도록 하고, 사용성 분석을 통해 보다 편리하고 효율적인 사용자 인터페이스의 개발을 유도한다. 본 논문에서는 지문인식에 영향을 주는 요인을 사용자와 시스템 측면에서 분석하고, 사용성 평가를 통해 효과적인 지문인식시스템 인터페이스 구축을 위한 가이드라인을 제시한다.

  • PDF

A Study on Access Control System Using Biometrics (생체인식을 이용한 출입통제 시스템에 대한 연구)

  • Jeon, Ha-rin;Im, Hyun-Ji;Ye, Sa;Lee, Byong-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.1043-1045
    • /
    • 2017
  • 기존 아이디-패스워드 방식의 사용자 인증에서 망각, 도난, 분실, 복제의 피해가 증가하자, 그러한 문제가 보완된 새로운 인증 수단인 생체 인증 시스템이 주목을 받기 시작했다. 본 연구에서는 생체 인증 시스템 중 얼굴 인식을 통해 등록된 사용자를 인증, 출입문을 통제하는 방법에 대해 다루었다.

A study on the environment-controlling system by members on the basis of HNS (HNS기반의 구성원별 자동 환경 제어 시스템에 관한 연구)

  • 황선주;조대제;임한규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.720-723
    • /
    • 2003
  • So far the study of digital home has mainly been made up of the network technology and the sorority system, but the application to consider the discriminatory characteristics of the individual family members has been interested in comparison with the necessity. The system proposed in this study is to get the information of the internal users through the access-controlling system. The controller offers the discriminatory environment by activating the database of the internal users and controls the sub-system of the home-network. The suggested system can automatically offer the discriminatory environment among the family members by limiting TV programs or channels according to the users' age, by offering other internet environment according to the users, by putting restrictions on telephone numbers, or by restricting the settling right of the home-shopping companies.

  • PDF

The Improving Method of Facial Recognition Using the Genetic Algorithm (유전자 알고리즘에 의한 얼굴인식성능의 향상 방안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.95-105
    • /
    • 2005
  • As the security system using facial recognition, the recognition performance depends on the environments (e. g. face expression, hair style, age and make-up etc.) For the revision of easily changeable environment, it's generally used to set up the threshold, replace the face image which covers the threshold into images already registered, and update the face images additionally. However, this usage has the weakness of inaccuracy matching results or can easily active by analogous face images. So, we propose the genetic algorithm which absorbs greatly the facial similarity degree and the recognition target variety, and has excellence studying capacity to avoid registering inaccuracy. We experimented variable and similar face images (each 30 face images per one, total 300 images) and performed inherent face images based on ingredient analysis as face recognition technique. The proposed method resulted in not only the recognition improvement of a dominant gene but also decreasing the reaction rate to a recessive gene.

  • PDF

Development of Non-Face-To-Face Heat Sensor Module for AI Automated Access Control System and Linkage with Education Program (AI 자동화 출입통제 시스템을 위한 비대면 발열 감지기 모듈 개발 및 교육 프로그램 연계)

  • Lee, Hyo-Jai;Kim, Eungsuk;Hong, Chang-Ho
    • Journal of Practical Engineering Education
    • /
    • v.13 no.2
    • /
    • pp.301-304
    • /
    • 2021
  • In this study, we developed a module that can perform two functions at the same time through interworking between a personal recognition module and a heat detection module in the era of COVID-19. This can simultaneously solve the problem of compatibility of the personal recognition module that occurs in the existing system and the problem of secondary infection that can occur during congestion due to the separate implementation of heat detection. Therefore, in this study, NFC and Bluetooth motherboards were developed, and an array-type non-contact temperature sensor was applied to detect heat. The developed system is expected to be able to realize both access control of floating population and effective quarantine at the same time in public institutions or private companies that require AI automated access control. In addition, it is judged that it is possible to link the embedded programming and web programming implementation method using the module of the development system to the educational program.

Face Tracking and Recognition Algorithm Based On Object Segmentation and PCA (객체 분할 및 주성분 분석 기반의 얼굴 추적 인식 알고리즘)

  • 성민영;김대현;이응주
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.435-440
    • /
    • 2003
  • 본 논문에서는 실시간 출입통제시스템에 적용이 가긍한 복잡한 배경에서의 다중 얼굴 영역 검출과 추적을 통한 얼굴 인식 알고리즘을 제안하였다. 제안된 알고리즘에서는 배경영상과 입력된 연속적인 프레임간의 차영상을 적용함으로써 물체의 움직임을 감지한 후. IISI컬러 좌표모델을 이용하여 얼굴의 1차 후보 영역을 검출하고, 잡음제거를 위해 모폴로지 연산을 수행하였다 또한 Line Projection을 이용한 객체 분할법(Object Segmentation)으로 객체를 분할함으로써 다중 얼굴 영역을 추출하였다. 또한 추출된 얼굴영역에서 눈 영역 검출을 통해 각각의 얼굴 영역들을 검증하였으며 검증된 얼굴들의 최외각 4개의 좌표를 이용하여 얼굴 추적율을 높였다. 마지막으로 얼굴 인식은 추출된 얼굴 영역으로부터 주성분 분석(PCA : Principle Component Analysis)방법을 이용함으로써 97~98%의 높은 인식율을 보였다.

  • PDF

A Trend of Face Recognition System Technologies and Standards (얼굴인식 기술 및 표준화 동향)

  • Ahn, Ye-Chan;Lee, Jae-Wook;Lee, Keun-Ho;Jeon, You-Boo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.737-739
    • /
    • 2015
  • 최근 생체인식 기술을 응용하여 적용되는 분야들이 다양하게 증가함에 따라 생체인식에 대한 적용도 모바일 결제 시스템, 지능형 CCTV, 출입국심사, 출입통제 등 다양하게 시도되고 있다. 생체인식에는 지문인식에 이어 얼굴인식에 대한 연구가 활발히 이루어지고 있는 가운데 얼굴인식 기술에 설명과 동향 및 시장동향과 국내외 표준화 현황에 대해 알아보고자 한다.

Volume Holographic Optical Fingerprint Identification for Secure Entry System (안전 출입 시스템을 위한 체적 홀로그래픽 광지문인식)

  • Lee, S.H.;Park, M.S.;Shim, W.S.
    • Journal of the Korean Society of Safety
    • /
    • v.14 no.4
    • /
    • pp.204-210
    • /
    • 1999
  • We propose an optical fingerprint identification system using volume hologram for database of matched filter. Matched filters in VanderLugt correlator are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference fingerprint photographs of database are prerecorded in a photorefractive material in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database is achieved by controlling the reference directions with a step motor. Experimental results show that the proposed system can be used for secure entry systems to identify individuals for access to a restricted area, security verification of credit cards, passports, and other IDs.

  • PDF

A Study on Convergence of Cyber Security Monitoring and Industrial Security (기밀유출방지를 위한 융합보안 관리 체계)

  • Lee, Chang-Hun;Ha, Ok-Hyun
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.61-67
    • /
    • 2010
  • Information communication the dazzling development life was convenient with to join in and planned an industrial technical advance. Not only the nation with technical security of the enterprise between the description competition keenly in the present point of view which rushes to technical competitive time of the nation between is become accomplished. The damage which is caused by with outflow of industrial secrecy that company prevents this effectively because is threatening at the degree which will threaten the existence of the nation and the technique which manages is become accomplished with the domestic foreign enemy. Prevents an industrial secret outflow the research for on a large scale with physical security technique and information security to be divided, is researched.

A Study of the Implementation of Wireless Sensor Network based Entrance Control Management Systems on the Hazard Area (무선센서네트워크 기반의 위험지역 출입통제관리 시스템 구축에 관한 연구)

  • Kim, Dae-Soek;Lee, Kyung-Ho;Lee, Jung-Min;Nam, Byeong-Wook;Park, Kae-Myoung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.597-603
    • /
    • 2014
  • The cargo of ships and offshore structures is the number of oil of combustibility and volatile, oil processing cargo. Furthermore heavy cargo of the vehicle or container box or bulk cargo are occupied the remainder of cargo. In addition, there is a possibility to move the location of the cargo and the vessel because it is received periodic / non-periodic a load of wave and ocean current. Therefore a shipboard hazard is much greater than onshore industry hazard. Monitoring and preparation for safety are necessary things because there is always risk of accidents arise from the impact of the freight and cargo of ships and offshore structures. In this study, we conducted a study with respect to the introduction of the wireless sensor network monitoring system to ensure the safety of the crew and workers on shipboard.