• Title/Summary/Keyword: Identification Number

Search Result 1,884, Processing Time 0.029 seconds

A Reform Measure of the Structure and Transaction Process for the Safety Improvement of a Credit Card (신용카드의 안전성 향상을 위한 구조 및 거래절차 개선방법)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.63-74
    • /
    • 2011
  • Credit cards are more convenient than cash of heavy. Therefore, credit cards are used widely in on_line (internet) and off_line in nowadays. To use credit cards on internet is commonly secure because client identification based security card and authentication certificate. However, to use in off_line as like shop, store, department, restaurant is unsecure because of irregular accident. As client identification is not used in off_line use of credit cards, the irregular use of counterfeit, stolen and lost card have been increasing in number recently. Therefore, client identification is urgently necessary for secure card using in off_line. And the method of client identification must be simple, don't take long time, convenient for client, card affiliate and card company. In this paper, we study a reform measure of the structure and transaction process for the safety improvement of a credit cards. And we propose several authentication method of short-and long-term for client identification. In the proposal, the client authentication method by OTP application of smart-phone is efficient nowadays.

Crack identification based on Kriging surrogate model

  • Gao, Hai-Yang;Guo, Xing-Lin;Hu, Xiao-Fei
    • Structural Engineering and Mechanics
    • /
    • v.41 no.1
    • /
    • pp.25-41
    • /
    • 2012
  • Kriging surrogate model provides explicit functions to represent the relationships between the inputs and outputs of a linear or nonlinear system, which is a desirable advantage for response estimation and parameter identification in structural design and model updating problem. However, little research has been carried out in applying Kriging model to crack identification. In this work, a scheme for crack identification based on a Kriging surrogate model is proposed. A modified rectangular grid (MRG) is introduced to move some sample points lying on the boundary into the internal design region, which will provide more useful information for the construction of Kriging model. The initial Kriging model is then constructed by samples of varying crack parameters (locations and sizes) and their corresponding modal frequencies. For identifying crack parameters, a robust stochastic particle swarm optimization (SPSO) algorithm is used to find the global optimal solution beyond the constructed Kriging model. To improve the accuracy of surrogate model, the finite element (FE) analysis soft ANSYS is employed to deal with the re-meshing problem during surrogate model updating. Specially, a simple method for crack number identification is proposed by finding the maximum probability factor. Finally, numerical simulations and experimental research are performed to assess the effectiveness and noise immunity of this proposed scheme.

Review on the Development State and Utilization of Pattern Identification Questionnaire in Korean Medicine by U Code of Korean Classification of Disease (한국표준질병·사인분류에 따른 한의 변증 설문지 개발 및 활용현황 고찰)

  • Jang, Eunsu;Kim, Yunyoung;Lee, Eun Jung;Yoo, Ho Ryong;Jung, In chul
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.30 no.2
    • /
    • pp.124-130
    • /
    • 2016
  • The aim of this study was to suggest the future direction of diagnostic and evaluative pattern identification questionnaire (PIQ) by reviewing the state of development and utilization of PIQ according to Korean classification of disease-U (KCD-U). We surveyed the database of OASIS, NDSL, KISS, DBPIA, and Pub-med to know the kinds of developed and developing PIQ of Korean medicine. We used 'Pattern Identification' and 'Questionnaire' to find suitable papers. The inclusion criteria met 47 cases. The number of PIQ before 2000yrs, between 2001 to 2005, 2006-2010, 2011-2015 were 2, 5, 18, 22cases. The number of PIQ belonged to the disease of Korean medicine, the pathological symptom of korean medicine, the Sasang constitutional pattern identification and etc according to KCD-U were 20(42.6%), 8(17%), 9(19.1%) and 10(21.3%). Twenties among forty seven PIQ were validated, and the rest of them were not validated. The distribution of the numbers of PIQ were significantly different according to KCD-U (p=0.003). The direction of Utilization of PIQ was 36 questionnaires in diagnosing PI, 14 cases in evaluating health state, 4cases in evaluating effects of a treatment and 8 ones in diagnosing Sasang constitutional types. This study reveals the status on validated and non-validated PIQ of Korean medicine and suggests the basic information for the direction of developing PIQ in the future.

Identification of Fuzzy Inference System Based on Information Granulation

  • Huang, Wei;Ding, Lixin;Oh, Sung-Kwun;Jeong, Chang-Won;Joo, Su-Chong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.575-594
    • /
    • 2010
  • In this study, we propose a space search algorithm (SSA) and then introduce a hybrid optimization of fuzzy inference systems based on SSA and information granulation (IG). In comparison with "conventional" evolutionary algorithms (such as PSO), SSA leads no.t only to better search performance to find global optimization but is also more computationally effective when dealing with the optimization of the fuzzy models. In the hybrid optimization of fuzzy inference system, SSA is exploited to carry out the parametric optimization of the fuzzy model as well as to realize its structural optimization. IG realized with the aid of C-Means clustering helps determine the initial values of the apex parameters of the membership function of fuzzy model. The overall hybrid identification of fuzzy inference systems comes in the form of two optimization mechanisms: structure identification (such as the number of input variables to be used, a specific subset of input variables, the number of membership functions, and polyno.mial type) and parameter identification (viz. the apexes of membership function). The structure identification is developed by SSA and C-Means while the parameter estimation is realized via SSA and a standard least square method. The evaluation of the performance of the proposed model was carried out by using four representative numerical examples such as No.n-linear function, gas furnace, NO.x emission process data, and Mackey-Glass time series. A comparative study of SSA and PSO demonstrates that SSA leads to improved performance both in terms of the quality of the model and the computing time required. The proposed model is also contrasted with the quality of some "conventional" fuzzy models already encountered in the literature.

Anti-Collision Algorithm for Fast Tag Identification in RFID Systems (RFID 시스템에서 고속 태그 식별을 위한 충돌방지 알고리즘)

  • Lim, In-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.287-292
    • /
    • 2007
  • In this paper, a QT_ecfi algorithm is proposed for identifying all the tags within the identification range. The proposed QT_ecfi algorithm revises the QT algorithm, which has a memoryless property. In the QT_ecfi algorithm, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. When the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. While the tags are sending their identification codes, if the reader detects a collision bit, it will send a signal to the tags to stop sending. According to the simulation results, the QT_ecfi algorithm outperforms the QT algorithm in terms of the number of queries and the number of response bits.

Mediating Effect of Organizational Identification between CSR and Job Satisfaction: Focusing on Casino Employees (사회적 책임활동(CSR)과 직무만족도의 관계 -카지노직원의 조직동일시에 대한 매개효과 검증-)

  • Park, Ene-Kyung;Park, Seo-Young
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.571-580
    • /
    • 2018
  • This study aims to verify the mediating effects of organizational identification in the relationship between CSR and job satisfaction of casino employees. For this purpose, we conducted a questionnaire survey of 354 employees of four casinos in Korea and conducted a multiple regression analysis and a Sobel test. The number of CSR participation by employees, the amount of donation by employees, the number of CSR implementations of the organization, and the authenticity of the organization's CSR are categorized into the CSR participation. As a result of analyzing the relationship between organizational identification and job satisfaction, organizational identification showed a partial mediation effect in the relationship between organizational CSR authenticity and job satisfaction.

A Study on the Linkage and integration of UCI (Universal Content Identifier) between ICN (Integrated Copyright Number) (디지털콘텐츠 식별체계 UCI (Universal Content Identifier)와 통합저작권 관리번호 ICN (Integrated Copyright Number)간의 연계와 통합에 관한 연구)

  • Kim, Yoon-Ho;Cho, Seong-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.27-33
    • /
    • 2014
  • As UCI (Universal Content Identifier) identification system becomes a national standard for content distribution, many digital contents are distributed through UCI identification system. However, problems associated with copyright infringement and copyright contracts occur due to lack of copyright information. ICN (Integrated Copyright Number), a code system developed for copyright management, includes copyright-related information for the purposes of usage settlement and accounting, illegal usage monitoring, and content filtering. ICN, however, has no information about distribution and content properties. Therefore, the linkage and integration between UCI and ICN can be a basis for the transparent and effective distribution of digital contents. In this paper, we propose a model for linking and integrating UCI and ICN, developing the efficiency in the value chain of each identified system by analyzing political factors and key technical elements between the two identification systems.

Identification of the Age of Fresh Ginseng Root According to Number of Stem Vestiges in Rhizome (경흔적 수에 의한 수삼의 연근판별)

  • Lee, Jang-Ho;Ahn, In-Ok;Kim, Young-Chang;Bang, Kyong-Hwan;Hyun, Dong-Yun;Lee, Sung-Sik
    • Journal of Ginseng Research
    • /
    • v.31 no.3
    • /
    • pp.142-146
    • /
    • 2007
  • This experiment was conducted to find identification of ginseng root's age using the number of stem vestiges in rhizome. The number of stem vestiges in rhizome is a useful key to confirm the age of ginseng root as follow : 4-year-old root has two, 5-year-old root has three, 6-year-old root has four. The distribution of stem vestiges in rhizome each year root are as follow : 2 stem vestiges in 4-year-old root is 89.5%, 3 stem vestiges in 5-year-old root is 79.7%, 4 stem vestiges in 6-year-old root is 46.3%. However, the limiting factors of identification of ginseng root's age using the number of stem vestiges in rhizome is appearance of multi-stem per plant and appearance of destroyed stem vestige in rhizome. The ratio of appearance of multi-stem per plant and destroyed stem vestige in rhizome are increased according to root age.

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

A Study on the Covert Channel Detection in the TCP/IP Header based on the Support Vector Machine (Support Vector Machine 기반 TCP/IP 헤더의 은닉채널 탐지에 관한 연구)

  • 손태식;서정우;서정택;문종섭;최홍민
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.1
    • /
    • pp.35-45
    • /
    • 2004
  • In explosively increasing internet environments, information security is one of the most important consideration. Nowadays, various security solutions are used as such problems countermeasure; IDS, Firewall and VPN. However, basically internet has much vulnerability of protocol itself. Specially, it is possible to establish a covert channel using TCP/IP header fields such as identification, sequence number, acknowledge number, timestamp and so on. In this Paper, we focus cm the covert channels using identification field of IP header and the sequence number field of TCP header. To detect such covert channels, we used Support Vector Machine which has excellent performance in pattern classification problems. Our experiments showed that proposed method could discern the abnormal cases(including covert channels) from normal TCP/IP traffic using Support Vector Machine.