• Title/Summary/Keyword: ID method

Search Result 695, Processing Time 0.028 seconds

A Secure Telemedicine System for Smart Healthcare Service (스마트 헬스케어 서비스를 위한 홍채인식기반의 원격의료시스템)

  • Cho, Young-bok;Woo, Sung-Hee;Lee, Sang-Ho;Kim, Min-Kang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.205-214
    • /
    • 2017
  • In this paper, we proposed an iris-based authentication for smart healthcare service in secure telemedicine system. The medical and healthcare information's are very important data in telemedicine system from privacy information. thus, the proposed system provides a secure and convenient authentication method than the traditional ID/PW authentication method to a telemedicine system for age-related chronic diseases. When considering the peculiarities of the use of age-related chronic diseases convenience and healthcare environments, the proposed approach is difficult to secure than traditional ID/PW authentication method with the appropriate means to easily change when stolen or lost to others. In addition, the telemedicine system for the smart healthcare services is one of the types of privacy sensitive medical and health data. it is very important security needs in telemedicine system. Thus we protocol are offer high confidentiality and integrity than existing ID/PW method.

An User Authorization Mechanism using an Attribute Certificate in the IPSec-VPN System (IPSec-VPN 시스템에서의 속성 인증서를 이용한 사용자 접근 제어 방안)

  • 강명희;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.11-21
    • /
    • 2004
  • To authorize IPSec-VPN Client in Client-to-Gateway type of the IPSec-VPN system, it can be normally used with ID/Password verification method or the implicit authorization method that regards implicitly IPSec-VPN gateway as authorized one in case that the IPSec-VPN client is authenticated. However, it is necessary for the Client-to-Gateway type of the IPSec-VPN system to have a more effective user authorization mechanism because the ID/Password verification method is not easy to transfer the ID/Password information and the implicit authorization method has the vulnerability of security. This paper proposes an effective user authorization mechanism using an attribute certificate and designs a user authorization engine. In addition, it is implemented in this study. The user authorization mechanism for the IPSec-VPN system proposed in this study is easy to implement the existing IPSec-VPN system. Moreover, it has merit to guarantee the interoperability with other IPSec-VPN systems. Furthermore, the user authorization engine designed and implemented in this paper will provide not only DAC(Discretional Access Control) and RBAC(Role-Based Access Control) using an attribute certificate, but also the function of SSO(Single-Sign-On).

Positioning Mechanism Using GPS and Pico-cell ID Access Probability (GPS와 Pico-cell ID접속 확률을 이용한 위치 추정 방법)

  • Jeong, Won-Young;Lee, Tae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1459-1467
    • /
    • 2011
  • Cell-ID based positioning solution is cheaper and easier to implement than other wireless positioning solutions. However, its accuracy is relatively low. So we propose a novel approach to improve its accuracy. Our approach uses the probability that an MS will connect to each of BSs among several BSs to which an MS can access in a pico-cell network, and Cell-ID based positioning method is applied. The simulation result shows that performance of the proposed approach is improved compared to the other positioning solutions.

FPGA Design of Adaptive Digital Receiver for Wireless Identification (무선인식을 위한 적응적 디지털 수신기의 FPGA 설계)

  • Seo Young-Ho;Kim Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.4
    • /
    • pp.745-752
    • /
    • 2005
  • In this paper we propose and implement a digital part of a receiver system for identifying a moving object and its tracking position in wireless environment. We assumed UWB(Ultra Wide Band)-based communication system for target application and used serial communication method(RS-232). The proposed digital receiver consists of RS-232-type1/RS-232-type2 for input and output of serial communication, ID Detector for detecting IDs, and PISO&Buffer circuit to buffer input signals for appropriate operation of ID Detector. We implemented the digital receiver with minimal hardware(H/W) resource according to target application of UWB-based communication system. So it correlates input patterns with pre-stored patterns though repeated detecting method for multiple IDs. Since it has reference panerns in the Ve-stored form, it can detect various IDs instantly. Also we can program content and size of reference patterns considering compatibility with other systems .The implemented H/W was mapped into XC2S100PQ208-5 FPGA of Xilinx, occupied 727($30\%$) cells, and stably operated in the clock frequency of 75MHz(13.341ns).

Segmentation Algorithm for Wafer ID using Active Multiple Templates Model

  • Ahn, In-Mo;Kang, Dong-Joong;Chung, Yoon-Tack
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.839-844
    • /
    • 2003
  • This paper presents a method to segment wafer ID marks on poor quality images under uncontrolled lighting conditions of the semiconductor process. The active multiple templates matching method is suggested to search ID areas on wafers and segment them into meaningful regions and it would have been impossible to recognize characters using general OCR algorithms. This active template model is designed by applying a snake model that is used for active contour tracking. Active multiple template model searches character areas and segments them into single characters optimally, tracking each character that can vary in a flexible manner according to string configurations. Applying active multiple templates, the optimization of the snake energy is done using Greedy algorithm, to maximize its efficiency by automatically controlling each template gap. These vary according to the configuration of character string. Experimental results using wafer images from real FA environment are presented.

  • PDF

A Token-Ring-Based MAC Protocol in IEEE 802.11 WLANs (IEEE 802.11 무선 랜에서의 토큰링 기반의 매체 접속 제어 프로토콜)

  • Lee, Eun Guk;Rhee, Seung Hyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.38-40
    • /
    • 2014
  • In this paper, proposed method achieves delay reduction and throughput improvement by utilizing token-ring method in infrastructure network. Access Point gives token passing effect by successively transmitting ACK frame including a node's Association ID. Not only can this method considerably reduce time for medium access, but also improve throughput. Furthermore, AP offers more frequent medium access opportunity to node having highest data queue among nodes associated by AP. these method can evenly offer medium access opportunity according to Queue's volumes.

The Case Report of Tinea Pedis with Id Reaction (이드반응이 동반된 족부백선 환자 치험 1례)

  • Kwon, Kang;Kim, Chul-Yun;Lee, Dong-Jin;Kim, Nam-Kwen;Seo, Hyung-Sik
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.28 no.1
    • /
    • pp.134-142
    • /
    • 2015
  • Objective : This study was carried out to find out the effect of Korean medical treatments on tinea pedis with id reaction. Method : We treated a 33-year-old man was afflicted with tinea pedis complicating id reaction with herbal medicine, acupuncture, ointment, wet-dressing and steam treatment. After treatments, we measured the status of scales, fissures and the degree of pruritus. We followed up symptom changes by taking pictures and compared before and after. Result & Conclusion : Three days after admission, erythema occurred at upper and lower limbs and the degree of pruritus increased by id reaction. As tinea pedis improved, id reaction decreased, too. Consequently, both sites of primary lesions of tinea pedis and secondary id reactions were significantly improved, and accompanied symptoms were resolved simultaneously.

Electricity Consumption Information Transmission Protocol with ID-based Key Distribution Method (ID 기반 키 분배 기법을 활용한 전력사용량 정보 전송 프로토콜)

  • Jung, Su-Young;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.4
    • /
    • pp.709-716
    • /
    • 2012
  • Recently, smartgrid has interested in enable to existing electrical grid to supplying stably and efficient energy management. Smartgrid environment using PLC is transmit PLC module collected electricity consumption information in each house from PLC module to server. This communication process can occurred security threats such as personal information leak of consumer, electrical grid paralysis. In this paper, we propose efficient electricity consumption information transmission protocol with ID-based key distribution method for respond to security threats.

Abbreviated ID Allocation Method for Efficient Data Forwarding of IoT Devices (사물인터넷 장치의 효율적인 데이터 전달을 위한 축약 ID 기법)

  • Son, Sanghyun;Jung, Yeonsu;Park, Heejin;Baek, Yunju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.230-231
    • /
    • 2016
  • Era of Internet of Things was opened according to developing wireless communication technology and highly integrated electronic devices. A variety of devices that are applied to the IoT have limited power and communication performance. Thus, there is a need for efficient data transfer for the connection of each device and the Internet. In this paper, we proposed an abbreviated ID allocation method to improve the efficiency of communication in the IoT based multi-hop communication environment.

  • PDF

Recognition of Object ID marks in FA process from Active Template Model

  • Kang, Dong-Joong;Ahn, In-Mo;Lho, Tae-Jung;An, Hyung-Keun;Yoo, Dong-Hun;Kim, Mun-Jo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2486-2491
    • /
    • 2003
  • This paper presents a method to segment object ID marks on poor quality images under uncontrolled lighting conditions of FA inspection process. The method is based on multiple templates and normalized gray-level correlation (NGC) method. We propose a multiple template method, called as ATM (Active Template Model) which uses combinational relation of multiple templates from model templates to match and segment several characters of the inspection images. Conventional Snakes algorithm provides a good methodology to model the functional of ATM. To increase the computation speed to segment the ID mark regions, we introduce the Dynamic Programming based algorithm. Experimental results using images from real FA environment are presented.

  • PDF