• Title/Summary/Keyword: Identifier System

Search Result 264, Processing Time 0.02 seconds

An Intelligent System for Recognition of Identifiers from Shipping Container Images using Fuzzy Binarization and Enhanced Hybrid Network

  • Kim, Kwang-Baek
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.349-356
    • /
    • 2004
  • The automatic recognition of transport containers using image processing is very hard because of the irregular size and position of identifiers, diverse colors of background and identifiers, and the impaired shapes of identifiers caused by container damages and the bent surface of container, etc. In this paper we propose and evaluate a novel recognition algorithm for container identifiers that effectively overcomes these difficulties and recognizes identifiers from container images captured in various environments. The proposed algorithm, first, extracts the area containing only the identifiers from container images by using CANNY masking and bi-directional histogram method. The extracted identifier area is binarized by the fuzzy binarization method newly proposed in this paper. Then a contour tracking method is applied to the binarized area in order to extract the container identifiers which are the target for recognition. In this paper we also propose and apply a novel ART2-based hybrid network for recognition of container identifiers. The results of experiment for performance evaluation on the real container images showed that the proposed algorithm performs better for extraction and recognition of container identifiers compared to conventional algorithms.

Automatic Client Authentication Method in All-In-One Services (올인원 서비스에서 자동적인 고객 인증 기법)

  • Kim, Namyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.1-5
    • /
    • 2016
  • The all-in-one service, for example, mobile wallet enables users to have credit card, membership card, and coupon in one place. It has been one of important o2o services with offline payment. In order to take advantage of mobile commerce, it is necessary to authenticate clients automatically without entering their passwords. This paper proposes an automatic client authentication method in all-in-one service. At registration, clients receives and stores an authentication ticket from a company, which contains an user's identifier and password encrypted by company's symmetric key. Client can be authenticated by transferring authentication tickets to companies at service requests.

Content Distribution Framework and UCI Application Process (콘텐츠 유통 프레임워크와 UCI 응용 프로세스)

  • Cho Kwang-Moon;Lee Seong-Hoon
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.627-632
    • /
    • 2005
  • The online distribution systems under the wireless environment include many different factors from the conventional offline and wired networks. Furthermore, the multimedia content may be propagated more easily and illegally. The scheme to protect the rights and profits of people related to the copyrights of digital content Is needed. In this paper a framework for content distribution under the wireless environment based on MPEG-21 and UCI application process are proposed. This model can be applied to the digital rights management system and utilized to protect the rights of trading entities in online distribution of electronic commerce.

  • PDF

Unconstrained Handwritten Numeral Sti-ing Recognition by Using Decision Value Generator (결정값 발생기를 이용한 무제약 필기체 숫자 열의 인식)

  • 김계경;김진호;박희주
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.82-89
    • /
    • 2001
  • This paper presents recognition of unconstrained handwritten numeral strings using decision value generator, which is combined with both isolated digit identifier and recognizer designed with structural characteristics of digits. Numerical string recognition system is composed of three modules, which are pre-segmentation, segmentation and recognition. Pre-segmentation module classifies a numeral string into sub-images, which are isolated digit, touched digits or broken digit, using confidence value of decision value generator. Segmentation module segments touched digits using reliability value of decision value generator that will separate the leftmost digit from touched string of digits. Segmentation-based and segmentation-free methods have used for classification and segmentation, respectively. To evaluate proposed method, experiments have carried out with handwritten numeral strings of NIST SD19 and higher recognition performance than previous works has obtained with 96.7%.

  • PDF

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

In vitro Estimation of Cardiac Output for the TAH using an Adaptive Fuzzy Identifier

  • Choi, W.W.;Jo, Y.H.;Ahn, J.M.;Park, S.K.;Choi, J.S.;Om, K.S.;Lee, J.J.;Choi, J.H.;Kim, H.C.;Min, B.G.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1996 no.11
    • /
    • pp.263-267
    • /
    • 1996
  • An estimation algorithm based on training of fuzzy logic system using back-propagation is proposed, in this paper, for determining cardiac output in the TAH. The proposed estimation utilizes only a motor current waveform generated from the moving actuator of the electromechanical TAH without using any extra transducers as an information source for estimation. In in vitro tests, the resultant estimation performance was acceptable to alppy the proposed algorithm to animal experiments and further clinical applications.

  • PDF

Dynamic DNS design for HIP (HIP을 적용한 동적 DNS 설계)

  • Jung-Soo Park;In-June Jo
    • The Journal of Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2004
  • In the current Internet, IP addresses does not support Mobility and Multi-homming because it depend on their topological location. To resolve these problems, IETF hip WG introduces Host Identity Protocol that separates the endpoint identifier and locator roles of IP addresses. However the DNS that was presented for the HIP had only a part of the expansion design from the existing DNS function, so it was not an absolute complete method. This paper propose how the dymanic DNS has been designed so that it support the HIP completely. We added the Host Identity Namespace and the Rendezvous Server Namespace, defined the new PRs in DNS.

  • PDF

Efficient K-Anonymization Implementation with Apache Spark

  • Kim, Tae-Su;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.17-24
    • /
    • 2018
  • Today, we are living in the era of data and information. With the advent of Internet of Things (IoT), the popularity of social networking sites, and the development of mobile devices, a large amount of data is being produced in diverse areas. The collection of such data generated in various area is called big data. As the importance of big data grows, there has been a growing need to share big data containing information regarding an individual entity. As big data contains sensitive information about individuals, directly releasing it for public use may violate existing privacy requirements. Thus, privacy-preserving data publishing (PPDP) has been actively studied to share big data containing personal information for public use, while preserving the privacy of the individual. K-anonymity, which is the most popular method in the area of PPDP, transforms each record in a table such that at least k records have the same values for the given quasi-identifier attributes, and thus each record is indistinguishable from other records in the same class. As the size of big data continuously getting larger, there is a growing demand for the method which can efficiently anonymize vast amount of dta. Thus, in this paper, we develop an efficient k-anonymity method by using Spark distributed framework. Experimental results show that, through the developed method, significant gains in processing time can be achieved.

Research on Secure IoT Lightweight Protocols (사물인터넷용 경량 프로토콜 비교 연구)

  • Sunghyuck Hong
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • The use of Internet of Things(IoT) in smart cities and smart homes is essential. The security of the sensor nodes, which are the core of the IoT, is weak and hacking attacks are severe enough to have a fatal impact on real life. This research is conducted to improve the security of the Internet of Things by developing a lightweight secure communication protocol for the Internet of Things, and to build a safe Internet of Things environment suitable for the era of the 4th Industrial Revolution. It contributes to building a safe and convenient smart city and smart home by proposing key management and identifier development to increase the confidentiality of communication and the establishment of an Internet authentication system.

An Implementation of Forwarding Engine supporting Various Physical Interfaces based on Network Processor (다양한 물리 접속을 지원하는 네트워크 프로세서 기반 포워딩 엔진 구현)

  • Park Wanki;Kim Daeyoung
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.5 s.335
    • /
    • pp.23-28
    • /
    • 2005
  • Recently, new concept, NP(Network Processor) was emerged into communication systems to cope with the various service requirements from Internet users. NP is an unique promising technique to capable of implementing of the packet processing in wire-speed and providing the flexibility for supporting the newly network services, having satisfied with implementation using hardware and software respectively in past, This paper deals with the implementation techniques and evaluation results of the line card capable to do packet forwarding function with packet processing power of wire-speed and applicable to various physical interfaces. There are several interfaces of POS, Gigabit ethernet and EPON in E-OLT(EPON Optical Line Terminal) system of PATH(Photonic Access To Home) network. Therefore, the E-OLT's packet forwarding engine have to support various subscriber's interface in wire speed. Our system is implemented the subscriber's card in daughter board and the setup procedure is done by system firmware based on the module's identifier acquired from installed physical board.