• Title/Summary/Keyword: One Card System

Search Result 209, Processing Time 0.028 seconds

A Development of DCS Binding Delay Analysis System based on PC/Ethernet and Realtime Database

  • Gwak, Kwi-Yil;Lee, Sung-Woo;Lim, Yong-Hun;Lee, Beom-Seok;Hyun, Duck-Hwa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1571-1576
    • /
    • 2005
  • DCS has many processing components and various communication elements. And its communication delay characteristic is affected diverse operating situation and context. Especially, binding signal which traversed from one control-node to another control-node undergo all sort of delay conditions. So its delay value has large deviation with the lapse of time, and the measurement of delay statistics during long time is very difficult by using general oscilloscope or other normal instruments. This thesis introduces the design and implementation of PC-based BDAS(Binding Delay Analysis System) System developed to overcomes these hardships. The system has signal-generator, IO-card, data-acquisition module, delay-calculation and analyzer module, those are implemented on industrial standard PC/Ethernet hardware and Windows/Linux platforms. This system can detect accurate whole-system-wide delay time including io, control processing and network delay, in the resolution of msec unit, and can analyze each channel's delay-historic data which is maintained by realtime database. So, this system has strong points of open system architecture, for example, user-friendly environment, low cost, high compatibility, simplicity of maintenance and high extension ability. Of all things, the measuring capability of long-time delay-statistics obtained through historic-DB make the system more valuable and useful, which function is essential to analyze accurate delay performance of DCS system. Using this system, the verification of delay performance of DCS for nuclear power plants is succeeded in KNICS(Korea Nuclear Instrumentation & Control System) projects

  • PDF

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

Design of Geo-fence-based Smart Attendance System (지오펜스 기반 스마트 출결시스템 설계)

  • Hong, Seong-Pyo;Kim, Tae-Yeun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.496-502
    • /
    • 2020
  • The electronic attendance management system is being introduced and operated on a pilot basis by some universities and educational institutions. However, most of the related systems have installed and operated the existing barcode and magnetic card systems. Classroom attendance is managed by introducing RF cards, but it causes problems such as recognition distance (less than 5cm) and the need for a check process in which students have to read the card each time with a reader for attendance. Also, it is not possible to respond in real time to the situation of midterm (early leave, absence from the second lecture time, etc.) because it is used in the lecture time of one subject with the record checked once. In order to solve these problems, the various mobile attendance systems proposed to solve these problems are also unable to fundamentally solve problems such as interim attendance and proxy attendance because they check attendance using only the application of a smartphone. In this paper, we use geofencing technology, which is a positioning-based technology that detects the entry and exit of people, objects, etc. in areas separated by virtual boundaries. The proposed system solves the problem of intermediate attendance and alternate attendance by setting the student to automatically record the access record when entering and leaving the classroom set as a geofence with a smartphone. In addition, it also provides a function to prevent unintentional mistakes that occur through the smartphone by limiting some of the functions of the smartphone such as silence, vibration, and Internet use when entering the classroom.

Computerized Order Communication System for Out-patient's Clinic Using Personal Computer and Local Area Network (PC 및 LAN을 이용한 외래처방 전달 시스템)

  • 김남현;김원기
    • Journal of Biomedical Engineering Research
    • /
    • v.14 no.4
    • /
    • pp.321-326
    • /
    • 1993
  • Recently, microcomputer technology has been developed rapidly and it provides not only graphic user interface that can be fraendly accessable but also large storage capacity to han- dle much hospital information. Almost all the order communication system for hospital has been developed under the concept of host and terminal environment since last 20 years. However, host-terminal system has not been successful in korea simply because most of physicians prescibe for rrlany patients a day(sometimes more than 150 patients a day). Also, under the host-terminal environment, programs are not friendly implemented for users. Since March 1991, we had developed order communication system for out-patients(named YONSEI-PC) using personal computer(PC) and local area network(LAN) . Since September 1992, we has applied succesfully in the Yonsei Cardiovascular Center, Sevrance Hospital, Yonsei University College of Medicine. This system consisted with Server and Clients which is communicated through LAN(Ethernet). The system also use the Host computer(IBM 9221 170) as a data bank and communicates to the Server with emulation card(3270 emulator, Interlink Inc., Korea) . After introducing this system, it enables patients to receive drugs witllin 20 minutes after prescription of 300-400 patients per day and it seemed to be effective system not to reduce waiting time for the patients but also to remove charge-troubling(due to His-entry of prescription) . This system also seems to be effective in terms of office automatism for hospital management. However users, usually physitions, required more friendly and easy system to operate and we thought that the most important one to successfully introduce order communication computer system in the hospital is user interface.

  • PDF

Facial Feature Verification System based on SVM Classifier (SVM 분류기에 의한 얼굴 특징 식별 시스템)

  • Park Kang Ryoung;Kim Jaihie;Lee Soo-youn
    • The KIPS Transactions:PartB
    • /
    • v.11B no.6
    • /
    • pp.675-682
    • /
    • 2004
  • With the five-day workweek system in bank and the increased usage of ATM(Automatic Toller Machine), it is required that the financial crime using stolen credit card should be prevented. Though a CCTV camera is usually installed in near ATM, an intelligent criminal can cheat it disguising himself with sunglass or mask. In this paper, we propose facial feature verification system which can detect whether the user's face can be Identified or not, using image processing algorithm and SVM(Support Vector Machine). Experimental results show that FAR(Error Rate for accepting a disguised man as a non-disguised one) is 1% and FRR(Error Rate for rejecting a normal/non-disguised man as a disguised one) is 2% for training data. In addition, it shows the FAR of 2.5% and the FRR of 1.43% for test data.

Development of Management Performance Index Building BSC System for Hotels (BSC 시스템 구축을 위한 호텔기업의 성과지표 개발)

  • Chung, Tae-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.234-241
    • /
    • 2008
  • The feature of the hotel business as a labor intensive industry and its heavy dependence on man power is relatively bigger than other industries. the important factors influencing the customer`s decision making are tangible facilities and intangible service qualities. however, the changes in economic situation are also seriously influencing them. So hotels are started to find other IT(information technology) systems. BSC which has been recognized as one of barometers to establish management performance is one of them. The purpose of this study was to develop KPI(key performance indicator) by using the BSC(Balanced Scorecard) for evaluating hotel management performance. This thesis presents customer performance, inner process performance, learning and growing performance as non-financial factors and tries to examine the cause and effect in the hotel industry. Hotels have to know nonfinancial performance which has positively relate to financial performance. To introduce BSC system is not to lead increasing income and bettermenting service quality, satisfacting customer needa for hotels, But to lead developing value enhancement to hotel enterprises and present process.

Multiple User Authentication based on SecuROS/FreeBSD (SecuROS/FreeBSD 기반 다단계 사용자 인증 시스템)

  • Doo, So-Young;Kim, Jong-Nyeo;Kong, Eun-Bae
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.11-16
    • /
    • 2003
  • This paper implements Multiple User Authentication System to which the system authenticating with password only has been upgraded. The 4-staged authentication including user ID, password, smart card and access control information, etc. is used at the suggested Multiple User Authentication System. The user authentication system that this paper suggests has been developed based on SecuROS/FreeBSD with the function of access control added to FreeBSD kernel. It provides both the function to limit accost range to the system to each user and the function to check that when inputting important information the demand is the one if the system ; thus, the reliability becomes increased. In the SecuROS/FreeBSD system, MAC and RBAC are being used. So, in the case of users accessing to the system, the Information about the policies of MAC and RBAC to which users would access is used in the authentication. At the time, the access to system if permitted only when the access control information that users demanded satisfies all the access control rules which have been defined In the system.

Computerized Order Communication System for Out-patients' Clinic Using Personal Computer and Local Area Network(II) (PC 및 LAN을 이용한 외래처방 전달 시스템(II))

  • Huh, Jae-Man;Kim, Ji-Hae;Kim, Nam-Hyun;Kim, Won-Ki;Kim, Do-Nyun;Chang, Byung-Chul;Cho, Bum-Koo
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.11
    • /
    • pp.97-99
    • /
    • 1992
  • After development of order communication system for out-patients using PC and LAN in May 1992, this system had been tested for 2 months. The system also use Host computer(IBM 9221-170) as a data bank and communicats wi th emulation card(3270 emulator. Interlink Inc., Korea). Since September 1992, this system(named YOUSEI-PC) has been running successfully in the Yonsei Cardiovascular Center of the Severance Hospital, Yonsei University College of Medicine. After introducing this system, it enables patients to receive drugs wi thin 30 minutes after prescription and revealed effective system not to reduce waiting time for the patients but also to remove charge-troubling(due to mis-entry of prescription). This system also seems to be effective in terms of office automatism for hospital management. However users, usually physitions, required more friendly and easy system to operate and we thought that the most important one to successfully introduce order communication computer system in the hospital is user interface.

  • PDF

A Study on the RFID Biometrics System Based on Hippocampal Learning Algorithm Using NMF and LDA Mixture Feature Extraction (NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에 관한 연구)

  • Oh Sun-Moon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.46-54
    • /
    • 2006
  • Recently, the important of a personal identification is increasing according to expansion using each on-line commercial transaction and personal ID-card. Although a personal ID-card embedded RFID(Radio Frequency Identification) tag is gradually increased, the way for a person's identification is deficiency. So we need automatic methods. Because RFID tag is vary small storage capacity of memory, it needs effective feature extraction method to store personal biometrics information. We need new recognition method to compare each feature. In this paper, we studied the face verification system using Hippocampal neuron modeling algorithm which can remodel the hippocampal neuron as a principle of a man's brain in engineering, then it can learn the feature vector of the face images very fast. and construct the optimized feature each image. The system is composed of two parts mainly. One is feature extraction using NMF(Non-negative Matrix Factorization) and LDA(Linear Discriminants Analysis) mixture algorithm and the other is hippocampal neuron modeling and recognition simulation experiments confirm the each recognition rate, that are face changes, pose changes and low-level quality image. The results of experiments, we can compare a feature extraction and learning method proposed in this paper of any other methods, and we can confirm that the proposed method is superior to the existing method.

A Study of Pervasive Roaming Services with Security Management Framework (퍼베이시브 로밍 서비스를 위한 보안 관리 프레임워크)

  • Kim, Gwan-Yeon;Hwang, Zi-On;Kim, Yong;Uhm, Yoon-Sik;Park, Se-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.115-129
    • /
    • 2007
  • The ubiquitous and autonomic computing environments is open and dynamic providing the universal wireless access through seamless integration of software and system architectures. The ubiquitous computing have to offer the user-centric pervasive services according to the wireless access. Therefore the roaming services with the predefined security associations among all of the mobile devices in various networks is especially complex and difficult. Furthermore, there has been little study of security coordination for realistic autonomic system capable of authenticating users with different kinds of user interfaces, efficient context modeling with user profiles on Smart Cards, and providing pervasive access service by setting roaming agreements with a variety of wireless network operators. This paper proposes a Roaming Coordinator-based security management framework that supports the capability of interoperator roaming with the pervasive security services among the push service based network domains. Compared to traditional mobile systems in which a Universal Subscriber Identity Module(USIM) is dedicated to one service domain only, our proposed system with Roaming Coordinator is more open, secure, and easy to update for security services throughout the different network domains such as public wireless local area networks(PWLANs), 3G cellular networks and wireless metropolitan area networks(WMANs).