• Title/Summary/Keyword: OpenID

Search Result 91, Processing Time 0.041 seconds

Smartphone Color-Code based Gate Security Control

  • Han, Sukyoung;Lee, Minwoo;Mariappan, Vinayagam;Lee, Junghoon;Lee, Seungyoun;Lee, Juyoung;Kim, Jintae;Cha, Jaesang
    • International journal of advanced smart convergence
    • /
    • v.5 no.3
    • /
    • pp.66-71
    • /
    • 2016
  • Smart building gate security control system using smartphone integrated with near field communication (NFC) has become part of daily life usage these days. The technology change in replacing RF NFC device using visible light communication technology based approach growing faster in recent days. This paper propose a design and development of gate security control system using color code based user authentication ID generation as part of an intelligent access control system to control automatic door open and close. In this approach gate security access control use the recent visible light communication technology trends to transfer the user specific authentication code to door access control system using color code on smartphone screen. Using a camera in the door access control system (ACS), color codes on smartphone screens are detected and matched to the database of authenticated user to open the door automatically in gate security system. We measure the visual light communication technology efficiency as a part of the research and the experiments have revealed that more than 95% users authenticated correctly at the suggested experiment environment on gate security control system.

Vision-based Authentication and Registration of Facial Identity in Hospital Information System

  • Bae, Seok-Chan;Lee, Yon-Sik;Choi, Sun-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.59-65
    • /
    • 2019
  • Hospital Information System includes a wide range of information in the medical profession, from the overall administrative work of the hospital to the medical work of doctors. In this paper, we proposed a Vision-based Authentication and Registration of Facial Identity in Hospital Information System using OpenCV. By using the proposed security module program a Vision-based Authentication and Registration of Facial Identity, the hospital information system was designed to enhance the security through registration of the face in the hospital personnel and to process the receipt, treatment, and prescription process without any secondary leakage of personal information. The implemented security module program eliminates the need for printing, exposing and recognizing the existing sticker paper tags and wristband type personal information that can be checked by the nurse in the hospital information system. In contrast to the original, the security module program is inputted with ID and password instead to improve privacy and recognition rate.

Classification of Security Checklist Items based on Machine Learning to Manage Security Checklists Efficiently (보안 점검 목록을 효율적으로 관리하기 위한 머신러닝 기반의 보안 점검 항목 분류)

  • Hyun Kyung Park;Hyo Beom Ahn
    • Smart Media Journal
    • /
    • v.11 no.11
    • /
    • pp.75-83
    • /
    • 2022
  • NIST in the United States has developed SCAP, a protocol that enables automated inspection and management of security vulnerability using existing standards such as CVE and CPE. SCAP operates by creating a checklist using the XCCDF and OVAL languages and running the prepared checklist with the SCAP tool such as the SCAP Workbench made by OpenSCAP to return the check result. SCAP checklist files for various operating systems are shared through the NCP community, and the checklist files include ID, title, description, and inspection method for each item. However, since the inspection items are simply listed in the order in which they are written, so it is necessary to classify and manage the items by type so that the security manager can systematically manage them using the SCAP checklist file. In this study, we propose a method of extracting the description of each inspection item from the SCAP checklist file written in OVAL language, classifying the categories through a machine learning model, and outputting the SCAP check results for each classified item.

SPECTRAL EVOLUTION OF NOVAE IN THE NEAR-INFRARED BASED ON AKARI OBSERVATIONS

  • Sakon, Itsuki;Onaka, Takashi;Usui, Fumihiko;Shimamoto, Sayaka;Ohsawa, Ryou;Wada, Takehiko;Matsuhara, Hideo;Arai, Akira
    • Publications of The Korean Astronomical Society
    • /
    • v.32 no.1
    • /
    • pp.101-103
    • /
    • 2017
  • We have carried out the near-infrared spectroscopic observations of recent classical novae (e.g., V2468Cyg, V1280Sco) within a few years from the outburst with AKARI as a part of AKARI Open Time Observing Program for Phase 3-II "Spectral Evolution of Novae in the Near-Infrared based on AKARI Observations (Proposal ID: SENNA)". The homogeneous datasets of near-infrared spectra from $2.5{\mu}m$ to $5{\mu}m$ with AKARI/IRC collected in this program are useful to infer the physical conditions of the shell formed by the ejected materials, to examine the chemical properties of the ejecta gas, and to examine the properties of dust formed in the nova ejecta.

A Designing Method of Digital Forensic Snort Application Model (Snort 침입탐지 구조를 활용한 디지털 Forensic 응용모델 설계방법)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.2
    • /
    • pp.1-9
    • /
    • 2010
  • Snort is an open source network intrusion prevention and detection system (IDS/IPS) developed by Sourcefire. Combining the benefits of signature, protocol and anomaly-based inspection, Snort is the most widely deployed IDS/IPS technology worldwide. With millions of downloads and approximately 300,000 registered users. Snort identifies network indicators by inspecting network packets in transmission. A process on a host's machine usually generates these network indicators. This means whatever the snort signature matches the packet, that same signature must be in memory for some period (possibly micro seconds) of time. Finally, investigate some security issues that you should consider when running a Snort system. Paper coverage includes: How an IDS Works, Where Snort fits, Snort system requirements, Exploring Snort's features, Using Snort on your network, Snort and your network architecture, security considerations with snort under digital forensic windows environment.

A Study on the 3D model Automatic formation using form measurement data (형상측정 데이터를 이용한 3차원 모텔 자동생성에 관한 연구)

  • Kim, M.J.;Lee, S.S.;Kim, T.H.;Park, J.B.;Jeon, E.C.
    • Proceedings of the KSME Conference
    • /
    • 2001.06c
    • /
    • pp.152-157
    • /
    • 2001
  • This paper is to model a 3D-shape product applying mathematically the data acquired from a 30 scanner and using an Automatic Design Program. The research studied in th reverse engineering up to now has been developed continuously and surprisingly. However, forming 3D-shape sol id models in CAE and CAM. based on the research, the study leaves much to be desired. Especially, analyses and studies reverse-designing automatically using measured data after manufacturing. Consequently, we are going to acquire geometric data using an 30 scanner in this study with which we will open a new field of reverse engineering by a program which can design a 3D-shape solid model in a CDA-based program automatically. Utilization of this program make it possible to minimize time in designing a product and establish a ADS(Automatic design system) program library to using all of the data from reverse engineering.

  • PDF

Purification and Backbone Assignment of the Hypothetical Protein MTH1821 from Methanobacterium Thermoautotrophicum H

  • Kwak, Soo-Young;Lee, Woong-Hee;Shin, Joon;Ko, Sung-Geon;Lee, Weon-Tae
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.11 no.2
    • /
    • pp.73-84
    • /
    • 2007
  • MTH1821 (UniProtKB/TrEMBL ID O27849) is a 96-residue hypothetical protein from the open reading frame of Methanobacterium thermoautotrophicum H one of the target organisms of structural genomics pilot project. Proteins which contain conserved sequence compared with MTH1821 have not been discovered yet and the functional and structural information for MTH1821 is not available. Here, we present the sequence-specific backbone resonance using multidimensional heteronuc1ear NMR spectroscopy and propose the secondary structure using GetSBY software. The backbone resonances of N, HN, $C_{\alpha}$, $C_{\beta}$, CO and $H_{\alpha}$ which are necessary for a prediction of secondary structure by GetSBY were assigned about 98% (557/568). The secondary structure of MTH1821 confirmed that it is comprised of four strand regions and two helical regions. This report will provide a valuable resource for the calculation solution structure of MTH1821 and for the other hypothetical protein that is targeted for structural-based functional discovery.

  • PDF

Linear SVM-Based Android Malware Detection and Feature Selection for Performance Improvement (선형 SVM을 사용한 안드로이드 기반의 악성코드 탐지 및 성능 향상을 위한 Feature 선정)

  • Kim, Ki-Hyun;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.738-745
    • /
    • 2014
  • Recently, mobile users continuously increase, and mobile applications also increase As mobile applications increase, the mobile users used to store sensitive and private information such as Bank information, location information, ID, password on their mobile devices. Therefore, recent malicious application targeted to mobile device instead of PC environment is increasing. In particular, since the Android is an open platform and includes security vulnerabilities, attackers prefer this environment. This paper analyzes the performance of malware detection system applying linear SVM machine learning classifier to detect Android malware application. This paper also performs feature selection in order to improve detection performance.

Solid-state Supramolecular polymer electrolytes containing double hydrogen bonding sites for high efficiency dye-sensitized solar cells(DSSCs) (초분자 고체전해질을 이용한 고효율 염료감응형 태양전지)

  • Kim, Sun-Young;Jeon, La-Sun;Lee, Yong-Gun;Kang, Yong-Soo
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.309-311
    • /
    • 2007
  • Supramolecules containing double hydrogen bonding sites at their both chain ends were self-polymerized to become solid state polymer and were utilized to improve the efficiency of solid state DSSCs. Hydrogen bonding sites were attached at the chain ends of PEG of Mw=2000, such as pyrimethamine and glutaric acid. The solar cell with the solid state supramolecular polymer electrolyte resulted in the overall energy conversion efficiency of 4.63 % with a short circuit current density $(J_{sc})$ of 10.41 $mAcm^{-2}$, an open circuit voltage $V_{oc}$, of 0.71 V and a fill factor (FF) of 0.62 at one sun condition ([oligomer]:[1-methyl-3-propyl imidazolium iodide (MPII)]:$[I_2]$ = 20 : 1 : 0.19, active area = 0.16 $cm^2$, $TiO_2$ layer thickness = 10 ${\mu}m$). The ionic conductivity of the sol id state electrolyte was $5.11{\times}10^{-4}$ (S/cm). The cell performance was characterized by electrochemical impedance spectroscopy and ionic conductivity.

  • PDF

EC-ELGAMAL Homomorphic Cryptography based E-voting System (EC-ELGAMAL 준동형 암호화기반 전자투표)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.4
    • /
    • pp.909-916
    • /
    • 2013
  • Since realization of E-voting system expands participation of voters and efficient count of voting, political and social and technical revolution is possible. However, without secure e-voting system, practical usages are infeasible. In the paper, we propose an e-voting system which is able to open votes in server without decryption during midst process using EC-ELGAMAL homomorphic cryptography. Users ensure anonymity with pseudo id from server and check their voting with Bloom Filter technology. Furthermore, we combine attributes and voters' information, so we can collect information of voter under the condition of anonymity.