• Title/Summary/Keyword: Computing technology

Search Result 4,189, Processing Time 0.032 seconds

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

A Design of Multiplier Over $GF(2^m)$ using the Irreducible Trinomial ($GF(2^m)$의 기약 3 항식을 이용한 승산기 설계)

  • Hwang, Jong-Hak;Sim, Jai-Hwan;Choi, Jai-Sock;Kim, Heung-Soo
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.38 no.1
    • /
    • pp.27-34
    • /
    • 2001
  • The multiplication algorithm using the primitive irreducible trinomial $x^m+x+1$ over $GF(2^m)$ was proposed by Mastrovito. The multiplier proposed in this paper consisted of the multiplicative operation unit, the primitive irreducible operation unit and mod operation unit. Among three units mentioned above, the Primitive irreducible operation was modified to primitive irreducible trinomial $x^m+x+1$ that satisfies the range of 1$x^m,{\cdots},x^{2m-2}\;to\;x^{m-1},{\cdots},x^0$ is reduced. In this paper, the primitive irreducible polynomial was reduced to the primitive irreducible trinomial proposed. As a result of this reduction, the primitive irreducible trinomial reduced the size of circuit. In addition, the proposed design of multiplier was suitable for VLSI implementation because the circuit became regular and modular in structure, and required simple control signal.

  • PDF

The Effect of Cloud Service Risks on the Intention of Purchasing Real Options: Focusing on Public Cloud Service of Small and Medium-sized Enterprises (클라우드 서비스 위험이 실물옵션 채택의도에 미치는 영향: 중소기업의 퍼블릭 클라우드 서비스를 중심으로)

  • Kim, Jeong-eun;Yang, Hee-dong
    • Information Systems Review
    • /
    • v.17 no.1
    • /
    • pp.117-140
    • /
    • 2015
  • Cloud Computing has drawn attention as one of 10 IT strategic technology trends and has various advantages such as cost reduction and enhancing business flexibility. However, corporations hesitate to adopt the service because of unexpected risks. Especially compared to large firm, medium and small ones use public cloud that security risk is high. Meanwhile, real option strategy has drawn attention as the method to hedge uncertainty in IT projects. Therefore, in this study causal relationships among technical, security, relational, and economic risks of cloud service will be investigated. Eventually, this study investigates how those risks influence the intention to choose the real option about the cloud service. For this study, five hypotheses is drawn, and a survey is conducted about the medium and small firms which are currently using cloud service to examine hypotheses. Since the study is at organizational level, 287 questionnaire replies are recalculated to 120 firms. For statistical analysis, Smart PLS and SPSS Statistics18 are used. As a result, technical risk of cloud service has significantly positive influence on security risk. Second, security risk and relational risk of cloud service has significantly positive influence on economic risk. Third, economic risk of cloud service has significantly positive influence on the intention to purchase the delay option or abandon option. Based on this result, this research discussed practical and academic implications and the limitations.

Utilization of Social Media Analysis using Big Data (빅 데이터를 이용한 소셜 미디어 분석 기법의 활용)

  • Lee, Byoung-Yup;Lim, Jong-Tae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.211-219
    • /
    • 2013
  • The analysis method using Big Data has evolved based on the Big data Management Technology. There are quite a few researching institutions anticipating new era in data analysis using Big Data and IT vendors has been sided with them launching standardized technologies for Big Data management technologies. Big Data is also affected by improvements of IT gadgets IT environment. Foreran by social media, analyzing method of unstructured data is being developed focusing on diversity of analyzing method, anticipation and optimization. In the past, data analyzing methods were confined to the optimization of structured data through data mining, OLAP, statics analysis. This data analysis was solely used for decision making for Chief Officers. In the new era of data analysis, however, are evolutions in various aspects of technologies; the diversity in analyzing method using new paradigm and the new data analysis experts and so forth. In addition, new patterns of data analysis will be found with the development of high performance computing environment and Big Data management techniques. Accordingly, this paper is dedicated to define the possible analyzing method of social media using Big Data. this paper is proposed practical use analysis for social media analysis through data mining analysis methodology.

Authentication and Key Management Techniques for Secure Communication in IP Camera (IoT 환경에서 IP카메라의 효율적 운용을 위한 키 관리 및 보안 설계 프로토콜)

  • Min, So-Yeon;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.602-608
    • /
    • 2020
  • Development of Internet technology and the spread of various smart devices provide a convenient computing environment for people, which is becoming common thanks to the Internet of Things (IoT). However, attacks by hackers have caused various problems, such as leaking personal information or violating privacy. In the IoT environment, various smart devices are connected, and network attacks that are used in the PC environment are occurring frequently in the IoT. In fact, security incidents such as conducting DDoS attacks by hacking IP cameras, leaking personal information, and monitoring unspecified numbers of personal files without consent are occurring. Although attacks in the existing Internet environment are PC-oriented, we can now confirm that smart devices such as IP cameras and tablets can be targets of network attacks. Through performance evaluation, the proposed protocol shows 11% more energy efficiency on servers than RSA, eight times greater energy efficiency on clients than Kerberos, and increased efficiency as the number of devices increases. In addition, it is possible to respond to a variety of security threats that might occur against the network. It is expected that efficient operations will be possible if the proposed protocol is applied to the IoT environment.

Computation of the Shortest Distance of Container Yard Tractor for Multi-Cycle System (다중 사이클 시스템을 위한 실시간 위치 기반 컨테이너 야드 트랙터 최단거리 계산)

  • Kim, Han-Soo;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.17-29
    • /
    • 2010
  • A container terminal productivity is maximized by a minimized time for processing containers. So, we have been elevated the container terminal productivity through an improvement of computing system, but there are a limitation because of problems for transportation management and method. A Y/T(Yard Tractor), which is a representative transportation, is able to do only one process, loading or unloading, at one time. So if the Y/T can do loading and unloading step by step at a same time, the processing time would be shortened. In this paper, we proposed an effective operating process of Y/T(Yard Tractor) Multi-Cycle System by applying RTLS(Real Time Location System) to Y/T(Yard Tractor) in order to improve the process of loading and unloading at the container terminal. For this, we described Multi-Cycle System. This system consists of a real time location of Y/T based on RTLS, an indicating of Y/T location in real time with GIS technology, and an algorithm(Dijkstra's algorithm) of the shortest distance. And we used the system in container terminal process and could improve the container terminal productivity. As the result of simulation for the proposed system in this paper, we could verify that 9% of driving distance was reduced compared with the existing rate and 19% of driving distance was reduced compared with the maximum rate. Consequently, we could find out the container performance is maximized.

Design and Implementation of Process Management Model applying Agent Technology (헬스케어 홈 서비스를 위한 데이터베이스 및 응용 서비스 구현)

  • Lee, Chung-Sub;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.8 no.1
    • /
    • pp.57-70
    • /
    • 2007
  • This paper is to construct a healthcare database using information obtained from healthcare home environments, and use this one for healthcare home services, Especially, our researching focus in this paper is how to design healthcare database scheme and how to use this constructed database on the Framework for Supporting Healthcare Integrated Service(FSHIS) we developed previously. Healthcare information is designed to database schemes in accordance to the specific save types of the data collected from various typed-sensors. The healthcare database constructed by using this information for the purpose of healthcare home services is divided into the base information with real schemes and the context based information with view schemes. Firstly, the base information includes low data obtained from physical sensors relevant to locations, healths, environments, and the personnel healthy profiles. The other is the context based information that is produced and fused by using the based information. This context based information might be got via various view schemes according to healthcare application services. Finally, for verifying the practical use of healthcare database constructed in this paper, Via interconnecting this database to our FSHIS, we show an example of healthcare home monitoring service using information (basic and context based information), emergency call, home appliance control, and so on needed from living activity area for elderly living alone.

  • PDF

A Study on the Clearance Level(draft) for the Steel Scrap from the KRR-1 & 2 Decommissioning (연구로 1,2호기 해체 철재폐기물의 규제해제농도기준(안) 도출을 위한 연구)

  • 홍상범;이봉재;정운수
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.2 no.1
    • /
    • pp.60-67
    • /
    • 2004
  • The exposure dose form recycling of a large amount of the steel scrap from the KRR-1&2 decommissioning activities was evaluated, and also the clearance level(draft) was derived. The maximum individual dose and collective dose were evaluated by modifying internal dose conversion factor which was based on the concept of effective dose in ICRP 60, applied to the RESRAD-RECYCLE ver 3.06 computing code, IAEA Safety Series 111-P-1.1 and NUREG-1640 as the assessment tool. The result of assessment for individual dose and collective dose is 23.9 $\mu$Sv per year and 0.11 man$.$Sv per year respectively. The clearance levels were ultimately determined by extracting the most conservative value form the results of the generic assessment and specific assessment methodologies. The result of clearance level for radionuclides( $Co^{60}$ , C $s^{l37}$) is less than 1.14${\times}$10$^{-1}$ Bq/g to comply with the clearance criterion(maximum individual dose : 10 $\mu$Sv per year, collective dose : 1 man$.$Sv per year) provided for Korea Atomic Energy Act and relevant regulations.s.

  • PDF

Related Factors to Visual Display Terminal Syndrome in Employees of A General Hospital in one Metropolitan City (한 광역시 종합병원 근로자의 VDT 증후군 자각증상에 대한 관련요인 연구)

  • Yoo, Se-Jong;Hong, Jee-Young;Bae, Seok-Hwan
    • Journal of radiological science and technology
    • /
    • v.34 no.4
    • /
    • pp.297-303
    • /
    • 2011
  • The existing studies of VDT syndrome have been researched only about for nurse groups without radiological technologists. The target of this study was workers who perform VDT task in general hospital placed in Daejun City such as insurance judgement, patient affairs, medical record management, medical computing service, hospital administration, and radiological sections. This study was conducted at October 15, 2009 to November 2, 2009 using structured questionnaire. Results of group A (age 20-29, less than 5 years experience at clinical site, normal staff, and unmarried group) showed significant skin and psychological conditions among recognition symptoms of VDT syndrome. Group B (age 30-39, 6-10 years experience at clinical site, managing staff, and married group) tends to be similar at orbital, whole body and muscles' frame response among recognition symptoms of VDT syndrome. Results of "Multiple Linear Regression" with dependent variable that is scores of recognition symptoms of VDT syndrome are as follows. The factors which influences for orbital-related problem is gender, health cares and obstacles during daily life. The factors which influences for whole body-related is exercise, stress and recognition for health condition and the factors which influences muscles' frame-related is 6-10 years experience at clinical site, human relationship, health cares and obstacles during daily life. These are proved to be similar by statistic analysis. There is small difference at recognition symptom of VDT syndrome between the radiological technologist and other groups in general hospital. Yet, as the working circumstance of radiological technologist gradually changes to VDT environment, the recognition symptom of VDT syndrome became conscious. This can be prevented by regular job rotation, which will escape the continuous repetition of working pattern.

A Study on Validity Analysis of Observation-Recommendation Admission System of the Gifted Children in IT to Lead Software-oriented Society (소프트웨어 중심사회를 선도할 정보영재아동의 관찰추천 입학제도 타당성 분석연구)

  • Jun, Woo-chun
    • Journal of Internet Computing and Services
    • /
    • v.17 no.3
    • /
    • pp.87-93
    • /
    • 2016
  • In the current information-based society, information and communication technology(ICT) is very important for an individual, a society, and a nation. Especially, for a nation, ICT-related industries are forming an important part of a nation's economy. Also, unlike other industries, ICT-related industries do not require various infrastructures, and have an advantage of being developed with a few talented persons in a short period of time. In this sense, identification and education of gifted children in IT become an essential task of a nation's future. In the past, selection of the gifted children was based on paper tests. However, paper tests incurred various side effects such as private education. Since 2013, observation-recommendation system instead of paper tests has been fully adopted. The purpose of this paper is to analyze the validity of observation-recommendation admission system of the gifted children in IT. For this research purpose, the gifted children in gifted science education center attached in a university at Seoul become the focus of the samples. Their entrance score ranking and graduation record raking are compared for analysis of validity of admission system. After statistical analysis, there is a meaningful correlation between entrance score ranking and graduation record ranking for the gifted children in IT. It means that the higher entrance score ranking, the higher graduation record ranking. The analysis results are expected to be valuable baseline data for deciding usefulness of observation-recommendation admission system.