• 제목/요약/키워드: Card Identification

검색결과 117건 처리시간 0.025초

RF-ID 시스템을 이용한 지하철 무개찰 시스템에 대한 연구 (A Study On Gateless Fare Collection System in the Subway Using RF-ID System)

  • 김현;류형선;진인수;김양모
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 추계학술대회 논문집 학회본부 D
    • /
    • pp.729-731
    • /
    • 2000
  • RF-ID system is being used in such diverse applications as access control, highway toll collection, personnel identification, and subway system. Especially for subway system that typically see high volumes of passenger at specific times of the days. it's critical to find a way to collect fares without unnecessarily delaying passengers. In the study, we discuss the possibility of removing all ticket gate machines in stations. This paper presents the discrimination method of card group for subway station without enter and exit gates using RF-ID system.

  • PDF

퍼스널 컴퓨터용 데이타베이스 프로그램을 이용한 목재 재감의 효율적 이용 (Utilization of Wood Collections Using a Database Program for Personal Computers)

  • 이경은;박원규
    • Journal of the Korean Wood Science and Technology
    • /
    • 제20권4호
    • /
    • pp.43-48
    • /
    • 1992
  • A database system for retrieving the information on wood collections was developed using the D-BASE III Plus program for personal computers. Basic information of biological, physical, chemical and technological properties was added to the data which used to be employed in simple card systems, such as identification number, species name and collection site. All information was fast and reliably retrievable. This paper also discussed the results of a survey on wood collections housed at domestic colleges and research institutes.

  • PDF

A Hybrid Algorithm for Identifying Multiple Outlers in Linear Regression

  • Kim, Bu-yong;Kim, Hee-young
    • Communications for Statistical Applications and Methods
    • /
    • 제9권1호
    • /
    • pp.291-304
    • /
    • 2002
  • This article is concerned with an effective algorithm for the identification of multiple outliers in linear regression. It proposes a hybrid algorithm which employs the least median of squares estimator, instead of the least squares estimator, to construct an Initial clean subset in the stepwise forward search scheme. The performance of the proposed algorithm is evaluated and compared with the existing competitor via an extensive Monte Carlo simulation. The algorithm appears to be superior to the competitor for the most of scenarios explored in the simulation study. Particularly it copes with the masking problem quite well. In addition, the orthogonal decomposition and Its updating techniques are considered to improve the computational efficiency and numerical stability of the algorithm.

A Historical Study on the Parcel Number and Numbering System in Korea.

  • Kim, Uk-Nam
    • 한국측량학회:학술대회논문집
    • /
    • 한국측량학회 2000년도 추계학술발표 논문집
    • /
    • pp.51-65
    • /
    • 2000
  • Among legal unit of land registration, the minimum unit of land is one parcel. We give the parcel number according to numbering system to confirm the specification of the parcel. In Korea, this parcel number is used for daily life such as the sign of fixed place(address) and the property, of the place of register, of identification card and of legal action. It also plays the important role as a key item connecting the layer of other information system in organizing Land Information System. It is also valued as the sources looking for the process of developing of the country. This study will devote to cadastral history, reform and reestablishment of the country.

  • PDF

진동 큐를 이용한 스마트폰 사용자 인증 방식 (User Authentication Method using Vibration Cue on Smartphone)

  • 이종혁;최옥경;김강석;예홍진
    • 정보처리학회논문지C
    • /
    • 제19C권3호
    • /
    • pp.167-172
    • /
    • 2012
  • 스마트폰의 특성상 이용자의 부주의로 인해 기기 및 메모리카드 등을 도난, 분실 할 수 있으며, 이에 따른 개인 정보 유출과 기업의 기밀정보 유출의 위험성이 높다. 현재 널리 사용되고 있는 스마트폰 사용자 인증방법은 개인 식별 번호 입력 방법 또는 패스워드 입력 방법이며 이것은 엿보기 공격(Shoulder Surfing Attack: SSA)에 안전하지 않기 때문에 공격자는 쉽게 사용자의 정보를 얻을 수 있다. 기존의 엿보기 공격을 막기 위한 방법으로 키스트로크 인증 방식들이 제안되어 왔으나 사용 편의성이 떨어지고 모바일 환경에서 사용하기 힘든 단점이 있다. 본 논문에서는 이러한 키스트로크 인증의 단점을 보안하기 위해 모바일 환경에 적합할 수 있도록 패스워드와 리듬 즉, 보이지 않는 null 문자를 입력하여 모바일 사용자 인증을 제안함으로써 보다 강화된 사용자 인증 서비스를 제공한다. 인증의 정확성을 높이기 위해 패턴의 규칙을 인지시켜 줄 수 있는 시각 큐와 청각 큐를 본인만 알 수 있는 템포 큐인 진동 큐를 제안하여 보안성을 강화시킨다. 마지막으로 실험평가를 수행하여 본 연구의 효율성 및 타당성을 입증하였다.

COMPUTER를 이용(利用)한 한국산(韓國産) 목재(木材)의 식별(識別)에 관(關)한 연구(硏究) (Computer - Aided Korean Wood Identification)

  • 이원용;전수경
    • Journal of the Korean Wood Science and Technology
    • /
    • 제18권2호
    • /
    • pp.49-66
    • /
    • 1990
  • In order to identify an unknown wood sample native to Korea. the softwood databases(KSWCHUN; Korean SoftWood CHUN) and the hardwood databases(KHWCHUN; Korean HardWood CHUN) had been built. and the new computer searching programs(IDINEX; IDentification INformation EXpress) has been written in Turbo Pascal(V.5.0) and in Macro Assembly(V.5.0). The characters of the data were based on the 74 features of softwood and on the 148 features of hardwood which are a part of new "IAWA list of microscopic features for hardwood identification" published in 1989. For the purpose of this investigation the wood anatomical nature of 25 species of softwood(13 genera of 5 families) and of 112 species of hardwood(57 genera of 31 families) were observed under a scanning electron microscope and light microscope. and a lot of literature used. The IDINEX programs are based on edge-punched card keys. with several improvements. The maximum number of features in the IDINEX is 229. but that is fixed for a given database. Large numbers of taxa are handled efficiently and new taxa easily added. A search may be based on sequence numbers of features. Comparisons are made sequentially by feature and taxon using the entire suite of features specified to produce the list of possible matching taxa. The results are followings. (1) The databases of Korean wood and the searching programs(IDINEX) had been built. (2) The databases of Korean wood could be an information to search an unknown wood. (3) The databases would be valuable. for the new features, which were not mentioned in Korean wood up to the present. were observed in details. (4) The ultrastructures of the cell walls(warty layer) and crystals observed under a scanning electron microscope will be helpful to search an unknown wood in particular. (5) The searching process is more quick and accurate than the others. 6) We can obtain the information on the differences of a species from the other and search an unknown wood using probability. in IDINEX, (7) The IDINEX will be utilized to identify and classify an animal life, vegetable world, mineral kingdom, and so on.

  • PDF

Automatic Person Identification using Multiple Cues

  • Swangpol, Danuwat;Chalidabhongse, Thanarat
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2005년도 ICCAS
    • /
    • pp.1202-1205
    • /
    • 2005
  • This paper describes a method for vision-based person identification that can detect, track, and recognize person from video using multiple cues: height and dressing colors. The method does not require constrained target's pose or fully frontal face image to identify the person. First, the system, which is connected to a pan-tilt-zoom camera, detects target using motion detection and human cardboard model. The system keeps tracking the moving target while it is trying to identify whether it is a human and identify who it is among the registered persons in the database. To segment the moving target from the background scene, we employ a version of background subtraction technique and some spatial filtering. Once the target is segmented, we then align the target with the generic human cardboard model to verify whether the detected target is a human. If the target is identified as a human, the card board model is also used to segment the body parts to obtain some salient features such as head, torso, and legs. The whole body silhouette is also analyzed to obtain the target's shape information such as height and slimness. We then use these multiple cues (at present, we uses shirt color, trousers color, and body height) to recognize the target using a supervised self-organization process. We preliminary tested the system on a set of 5 subjects with multiple clothes. The recognition rate is 100% if the person is wearing the clothes that were learned before. In case a person wears new dresses the system fail to identify. This means height is not enough to classify persons. We plan to extend the work by adding more cues such as skin color, and face recognition by utilizing the zoom capability of the camera to obtain high resolution view of face; then, evaluate the system with more subjects.

  • PDF

A new damage identification approach based on impedance-type measurements and 2D error statistics

  • Providakis, Costas;Tsistrakis, Stavros;Voutetaki, Maristella;Tsompanakis, Yiannis;Stavroulaki, Maria;Agadakos, John;Kampianakis, Eleftherios;Pentes, George
    • Structural Monitoring and Maintenance
    • /
    • 제2권4호
    • /
    • pp.319-338
    • /
    • 2015
  • The electro-mechanical impedance (EMI) technique makes use of surface-bonded lead zirconate titanate (PZT) patches as impedance transducers measuring impedance variations monitored on host structural components. The present experimental work further evaluate an alternative to the conventional EMI technique which performs measurements of the variations in the output voltage of PZT transducers rather than computing electromechanical impedance (or admittance) itself. This paper further evaluates a variant of the EMI approach presented in a previous work of the present authors, suitable, for low-cost concrete structures monitoring applications making use of a credit card-sized Raspberry Pi single board computer as core hardware unit. This monitoring approach is also deployed by introducing a new damage identification index based on the ratio between the area of the 2-D error ellipse of specific probability of EMI-based measurements containment over that of the 2-D error circle of equivalent probability. Experimental results of damages occurring in concrete cubic and beam specimens are investigated under increasing loading conditions. Results illustrate that the proposed technique is an efficient approach for identification and early detection of damage in concrete structures.

The Biometric based Mobile ID and Its Application to Electronic Voting

  • Yun, Sung-Hyun;Lim, Heui-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권1호
    • /
    • pp.166-183
    • /
    • 2013
  • It requires a lot of costs and manpower to manage an election. The electronic voting scheme can make the election system economic and trustful. The widespread use of smart phones causes mobile voting to be a major issue. The smart phone can be used as a mobile voting platform since it can carry out many services in addition to basic telephone service. To make mobile voting practical and trustful, we analyzed two subjects of study. Firstly, the way to make a biometric based mobile ID, which has legal binding forces. In mobile voting, user identification is accomplished on line since the voter should be able to vote wherever they go. The digital ID conducts a similar role to the need for a resident card. The user's identity is bound to the resident card legally. To bind the user's identity to the smart phone, we use USIM. Biometric recognition is also needed to authenticate the user, since the user cannot prove him or her on line face-to-face. The proposed mobile ID can be reissued by means of introducing a random secret value. Secondly, the mobile voting scheme is proposed where candidates can accept election results without doubt. The goal of an election is to select a leader among two or more candidates. Existing electronic voting schemes mainly focus on the study of ballot verification accomplished by voters. These approaches are not safe against collusion attacks where candidates and the election administration center are able to collude to fabricate election results. Therefore, a new type of voting and counting method is needed where candidates can directly take part in voting and counting stages. The biometric based multi-signature scheme is used to make the undeniable multi-signed ballot. The ballot cannot be verified without the help of all candidates. If candidates accept election results without a doubt, the fairness of the election is satisfied.

TCP/IP 기반 보안통제 RFID 멀티리더 시스템 개발 (An RFID Multi-Reader System Development for TCP/IP Based Security Control)

  • 조성목
    • 한국정보통신학회논문지
    • /
    • 제13권8호
    • /
    • pp.1587-1592
    • /
    • 2009
  • Ubiquitous 시대의 도래와 함께 RFID는 Ubiquitous 기술의 핵심적인 역할을 담당하고 있으며, RFID를 읽고 판독하는 단말기의 개발 역시 매우 중요한 기술개발 분야로 대두되고 있다. 본 논문에서는 RFID중 현재 교통카드, 신용카드 등에서 많이 사용되고 있는 13.56Mhz RFID와 보안회사에서 사용하고 있는 125Khz의 인프라를 그대로 사용할 수 있고, TCP/IP 통신을 통해 위치파악, 출입통제, 보안통제 등의 응용이 가능한 하드웨어 시스템을 개발하였다. 기존의 로컬 RFID 방식은 기업체 내에 별도의 서버를 두어 운영하기 때문에 관리문제, 기술문제 등의 애로사항이 빈번하게 발생하는 문제점이 있다. 따라서 본 논문에서는 이러한 문제점을 해소할 수 있도록 TCP/IP로 중앙관리 서버에 연결되는 RFID multi reader를 개발하여 보안통제가 가능하도록 하였고, RFID 인프라의 설치, 이전 및 관리 등이 용이하도록 하였다.