• Title/Summary/Keyword: Integrated ID

Search Result 79, Processing Time 0.024 seconds

A study on development of RGB color variable optical ID module considering smart factory environment (스마트 팩토리 환경을 고려한 RGB 컬러 가변형 광 ID 모듈개발 연구)

  • Lee, Min-Ho;Timur, Khudaybergenov;Lee, Beom-Hee;Cho, Ju-Phil;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.623-629
    • /
    • 2018
  • Smart Factory is a concept of automatic production system of machines by the fusion of ICT and manufacturing. As a base technology for realizing such a smart factory, there is an increasing interest in a low-power environmentally friendly LED lighting system, and researches on so-called optical ID related application technologies such as communication using a LED and position recognition are actively underway. In this paper, We have proposed a system that can reliably identify logistics location and additional information without being affected by electromagnetic interference such as high voltage, high current, and generator in the plant. Through the basic experiment, we confirmed the applicability of the color ID recognition rate from 98.8% to 93.8% according to the eight color variations in the short distance.

Case Study : Integrated Approach for Prioritization in Automobile Development Process

  • Goel, Parveen;Lim, Ik-Sung;Koo, Il-Seob;Kim, Tae-Sung
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.3
    • /
    • pp.139-149
    • /
    • 2002
  • A successful product development process can not be achieved without a proper focus and prioritization. For this research, the priority is defined as the relative urgency of a system compared to other system in order to develop and launch a successful product. The process of integrated approach for prioritization using ID and Goal Programming is developed. The development of a mid-size car by an internationally reputed automotive company is described as a case study.

Demonstration Study of 10kW Poly Metal Panel integrated PV Module (10kW급 지붕재용 태양전지모듈 실증연구)

  • Yi, So-Mi;Noh, Ji-Hee;Joo, Man-Sic
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.246-249
    • /
    • 2007
  • The application of photovoltaics into building as integrated building components has been paid more attention worldwide. Photovoltaics or solar electric modules are sol id state devices, directly converting solar radiation into electricity; the process does not require fuel and any moving parts, and produce no pollutants. And the prefab building method is very effective because the pre- manufactured building components is simply assembled to making up buildings in the construction fields especially the sandwich panel. So, this paper describes a design and performance test of the 10kW poly metal pv module(pmpp) system. It is concluded that the prediction of BIPV system's performance should be based on the more accurate PV module installation.

  • PDF

A Study of the Standardization Model for the National Knowledge and Information Resource (지식정보자원 표준화 모델 연구)

  • Lee, Chang-Yeol;Jeong, Eui-Suk
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.4 s.62
    • /
    • pp.165-177
    • /
    • 2006
  • National Knowledge and Information Resources of KADO(Korea Agency for Digital Opportunity and Promotion) were distributed to the several data centers. The metadata for the resources was the conceptual level recommended standard. It was not for the integration, but the retrieval. So it is not easy to integrate to the central metadata DB or connect metadata among the data centers. In this paper, we analysed the metadata of the several data centers and provided the integrated standard model for the central metadata DB.

Dynamic Sensitivity Level Measurement for Privacy Protection (개인정보보호 강화를 위한 동적 보안수준 결정)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.1
    • /
    • pp.137-150
    • /
    • 2012
  • For social demand and technological development, systematic private information management and security guidance have been enhanced; however, the issue of leakage and invasion of private information is shown in many ways. In the management of such private information, the issue of how to protect such information is one of the sensitive key elements. As a criterion to decide the management policy of each property information consisting of private information, this article suggests Dynamic-Security-Level-Measurement for property information. DSLM adopts the variable characteristics of property information as the element of measurement. By applying this method, it is possible to provide information management functions to cope with the changes of each property information security level of an individual actively. It is expected that this will improve the security of previous information management methods even more and also contribute to the improvement of security in integrated systems such as the integrated ID management system and electronic wallet.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.

One-Time Virtual Card Number Generation & Transaction Protocol using Integrated Authentication Center (통합인증센터를 활용한 일회용 가상카드번호 생성 및 결제서비스 프로토콜)

  • Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.9-21
    • /
    • 2010
  • Recently, famous online shopping websites were hit by hacking attack, and many users' personal information such as ID, password, account number, personal number, credit card number etc. were compromised. Hackers are continuing to attack online shopping websites, and the number of victims of these hacking is increasing. Especially, the exposure of credit card numbers is dangerous, because hackers maliciously use disclosed card numbers to gain money. In 2007 Financial Cryptography Conference, Ian Molly et al. firstly proposed dynamic card number generator, but it doesn't meet reuse resistant. In this paper, we analyzed security weaknesses of Ian Molly's scheme, and we proposed a new one-time virtual card number generator using a mobile device which meets security requirements of one-time virtual card numbers. Then, we propose one-time credit card number generation and transaction protocol using Integrated Authentication Center for user convenience and security enhancement.

Intelligent Digital Public Address System using Agent Based on Network

  • Kim, Jung-Sook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.23 no.1
    • /
    • pp.87-92
    • /
    • 2013
  • In this paper, we developed a digital and integrated PA(Public Address) system with speech recognition and sensor connection based on IP with an ID using agent. It has facilities such as an external input, a microphone and a radio for a PA system and has speech recognition. If "fire" is spoken to the PA system then it can recognize the emergency situation and will broadcast information to the appropriate agency immediately. In addition to that, many sensors, such as temperature, humidity, and infrared, etc., can be connected to the PA system and can be integrated with the context awareness which contains many types of information about internal statuses using inference agent. Also, developed the digital integrated PA system will make it possible to broadcast the message to adaptable places using network IP based on IDs. Finally, the digital PA system is designed for operation from a PC, which makes installation and setting of operating parameters very simple and user-friendly. For implementation details, we implemented thread based concurrent processing for the events which occur concurrently from many sensors or users.

Development of Integrated Public Address System for Intelligent Building (지능형 빌딩을 위한 디지털 통합 전관 방송 시스템 개발)

  • Kim, Jung-Sook;Song, Chee-Won
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.2
    • /
    • pp.212-217
    • /
    • 2011
  • In this paper, we developed an intelligent minimized integrated digital public address which can provide context awareness of various events occurring in future intelligent buildings. It is able to recognize both voices and sounds, such as a fire bell and a disaster bell, which signal to escape in emergence situations and it can sense information which is sent from various sensors, for example, the inner temperature, humidity, and environment status in an intelligent building. Also, the intelligent digital integrated public address can broadcast information to individual places, according to context awareness that is from sensing information, by using network with an ID. And we are developing a minimized integrated digital public address system that has facilities such as external input, Mic., CD, MP3 and Radio. Developing an integrated digital public address system with operational MICOM will make it possible to control the facilities of digital devices centrally. The operational MICOM is composed of 3 layers which are a control layer, a processing layer and a user interface layer.

Electronic Payment Protocol using GDHP Blind Signature Scheme (GDHP 은닉서명기법을 이용한 전자지불 프로토콜)

  • Lee, Hyun-Ju;Rhee, Chung-Sei
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.12-20
    • /
    • 2006
  • In this paper, we propose electronic payment protocol using GDHP blind signature scheme to activate e-business in the wire/wireless integrated environment. The protocol applied elliptic curve algorithm on the GDHP base and improved the efficiency of the existing blind signature technique on the basis of communication frequency and calculation number. And the protocol accelerated speed and strengthened safety against man-in-the-middle attacks and forward secrecy because the certification between individuals is performed by the session key created by Weil paring using elliptic curve cryptosystem in the limited entity $F_q$ instead of the certification used in the existing PayWord protocol.

  • PDF