• Title/Summary/Keyword: Characteristic database

Search Result 299, Processing Time 0.129 seconds

Establishment of ACE-Asia atmospheric environmental Database & development of analysing method (ACE-Asia 대기환경 측정자료 DB구축 및 분석기법 개발)

  • 김영준;이권호
    • Proceedings of the Korea Air Pollution Research Association Conference
    • /
    • 2002.04a
    • /
    • pp.325-326
    • /
    • 2002
  • 대기에어로졸은 직ㆍ간접적인 복사강제효과를 나타내어 지구기후변화를 유도할 수 있으며, 지역적인 특성에 따라 변화하여 대기환경변화에 불확실성을 초래한다. ACE(Aerosol Characteristic Experiment)-Asia는 에어로졸의 발생량이 많은 동아시아와 북서 태평양지역에서의 집중 관측 및 연구를 위해 계획되었으며 한국에서는 제주도 고산이 Super-site로 지정되어 2001년 봄철에 집중관측이 수행되었다. (중략)

  • PDF

Implementation of Voice Awareness Security Sytems (음성인식 보안 시스템의 구현)

  • Lee, Moon-Goo
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.799-800
    • /
    • 2006
  • This thesis implemented security systems of voice awareness which is higher accessible than existing security system using biological authentication system and is inexpensive in module of security device, and has an advantage in usability. Proposed the security systems of voice awareness implemented algorithm for characteristic extraction of inputted speaker's voice signal verification, and also implemented database of access control that is founded on extractible output. And a security system of voice awareness has a function of an authority of access control to system.

  • PDF

An implementation methodology for CALS/EC system using IDEF0 and conceptual design in logistics industry (IDEF0와 개념적 설계를 이용한 물류 CALS/EC 구축 방안 연구)

  • 장기진;김성희
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.37-58
    • /
    • 1999
  • In this paper, we suggest the system analysis method that links IDEF0 and conceptual analysis. Based on the method, we propose the implementation methodology that can be used to build CALS/EC systems in logistics industry. This paper presents data characteristic derived using ICAM DEFinition(IDEF0) and conceptual data modeling. Modeling methodology has been widely used for analysis and design of an enterprise information system. Further IDEF has been considered appropriate for developing functional and database models for the logistics environment.

  • PDF

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.

Model Verification Algorithm for ATM Security System (ATM 보안 시스템을 위한 모델 인증 알고리즘)

  • Jeong, Heon;Lim, Chun-Hwan;Pyeon, Suk-Bum
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.3
    • /
    • pp.72-78
    • /
    • 2000
  • In this study, we propose a model verification algorithm based on DCT and neural network for ATM security system. We construct database about facial images after capturing thirty persons facial images in the same lumination and distance. To simulate model verification, we capture four learning images and test images per a man. After detecting edge in facial images, we detect a characteristic area of square shape using edge distribution in facial images. Characteristic area contains eye bows, eyes, nose, mouth and cheek. We extract characteristic vectors to calculate diagonally coefficients sum after obtaining DCT coefficients about characteristic area. Characteristic vectors is normalized between +1 and -1, and then used for input vectors of neural networks. Not considering passwords, simulations results showed 100% verification rate when facial images were learned and 92% verification rate when facial images weren't learned. But considering passwords, the proposed algorithm showed 100% verification rate in case of two simulations.

  • PDF

Performance Analysis of Flash Translation Layer using TPC-C Benchmark (플래시 변환 계층에 대한 TPC-C 벤치마크를 통한 성능분석)

  • Park, Sung-Hwan;Jang, Ju-Yeon;Suh, Young-Ju;Park, Won-Joo;Park, Sang-Won
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.2
    • /
    • pp.201-205
    • /
    • 2008
  • The flash memory is widely used as a main storage of embedded devices. It is adopted as a storage of database as growing the capacity of the flash memory. We run TPC-C benchmark on various FTL algorithms. But, the database shows poor performance on flash memory because the characteristic of I/O requests is full random. In this paper, we show the performance of all existing FTL algorithms is very poor. Especially, the FTL algorithm known as good at small mobile equipment shows worst performance. In addition, the chip-inter leaving which is a technique to improve the performance of the flash memory doesn't work well. In this paper, we inform you the reason that we need a new FTL algorithm and the direction for the database in the future.

A pilot implementation of Korean in Database Semantics: focusing on numeral-classifier construction (데이터베이스 의미론을 이용한 한국어 구현 시론: 수사-분류사 구조를 중심으로)

  • Choe, Jae-Woong
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.4
    • /
    • pp.457-483
    • /
    • 2007
  • Database Semantics (DBS) attempts to provide a comprehensive and integrated approach to human communication which seeks theory-implementation transparency. Two key components of DBS are Word bank as a data structure and left-Associative Grammar (LAG) as an algorithm. This study aims to provide a pilot implementation of Korean in DBS. First, it is shown how the three separate modules of grammar in DBS, namely, Hear, Think, and Speak, combine to form an integrated system that simulates a cognitive agent by making use of a simple Korean sentence as an example. Second, we provide a detailed analysis of the structure in Korean that is a characteristic of Korean involving numerals, classifiers, and nouns, thereby illustrating how DBS can be applied to Korean. We also discuss an issue raised in the literature concerning a problem that arises when we try to apply the LAG algorithm to the analysis of head-final language like Korean, and then discuss some possible solution to the problem.

  • PDF

A Design of Model For Interoperability in Multi-Database based XMDR on Distributed Environments (분산환경에서 XMDR 기반의 멀티데이터 베이스 상호운영 모델 설계)

  • Jung, Kye-Dong;Hwang, Chi-Gon;Choi, Young-Keun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1771-1780
    • /
    • 2007
  • The necessity of Information integration has emphasized by advancement of internet and change of enterprise environment. In enterprises, it usually integrates the multi-database constructing by M&A. For this integration of information it must guarantee interpretation and integration which is stabilized with solving heterogeneous characteristic problem. In this paper, we propose the method that change the global XML query to local XML query for interpretation. It is based on XMDR(eXtended Meta-Data Registry) which expresses the connection between the standard and the local for solve the interoperability problem in heterogeneous environment. Thus, we propose the legacy model that can search and modify by one Query with creating global XML Query by XMDR. and for his, we use the 2PC technique which is the distributed transaction control technique of existing.

Decryption of KakaoTalk Database for macOS (macOS용 카카오톡 데이터베이스 복호화 방안)

  • Beomjun Park;Sangjin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.753-760
    • /
    • 2023
  • KakaoTalk has the highest market share among domestic messengers. As such, KakaoTalk's conversation content is an important evidence in digital forensics, and the conversation is stored in the form of an encrypted database on a user's device. In addition, macOS has the characteristic that it is difficult to access because the disk encryption function is basically activated. The decryption method of the KakaoTalk database for Windows has been studied, but the decryption method has not been studied for KakaoTalk for macOS. In this paper, research the decryption method of the KakaoTalk database for macOS and a way to Brute-Force plan using the characteristics of KakaoTalk's UserID and compare it with KakaoTalk for Windows to examine the commonalities and differences. The results of this paper are expected to be used to analyze users' actions and events when investigating crimes using macOS.

Various Quality Fingerprint Classification Using the Optimal Stochastic Models (최적화된 확률 모델을 이용한 다양한 품질의 지문분류)

  • Jung, Hye-Wuk;Lee, Jee-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.143-151
    • /
    • 2010
  • Fingerprint classification is a step to increase the efficiency of an 1:N fingerprint recognition system and plays a role to reduce the matching time of fingerprint and to increase accuracy of recognition. It is difficult to classify fingerprints, because the ridge pattern of each fingerprint class has an overlapping characteristic with more than one class, fingerprint images may include a lot of noise and an input condition is an exceptional case. In this paper, we propose a novel approach to design a stochastic model and to accomplish fingerprint classification using a directional characteristic of fingerprints for an effective classification of various qualities. We compute the directional value by searching a fingerprint ridge pixel by pixel and extract a directional characteristic by merging a computed directional value by fixed pixels unit. The modified Markov model of each fingerprint class is generated using Markov model which is a stochastic information extraction and a recognition method by extracted directional characteristic. The weight list of classification model of each class is decided by analyzing the state transition matrixes of the generated Markov model of each class and the optimized value which improves the performance of fingerprint classification using GA (Genetic Algorithm) is estimated. The performance of the optimized classification model by GA is superior to the model before the optimization by the experiment result of applying the fingerprint database of various qualities to the optimized model by GA. And the proposed method effectively achieved fingerprint classification to exceptional input conditions because this approach is independent of the existence and nonexistence of singular points by the result of analyzing the fingerprint database which is used to the experiments.