• Title/Summary/Keyword: Passport

Search Result 63, Processing Time 0.028 seconds

The Marrakesh Treaty and the Tasks of Library Services for Persons with Disabilities (마라케시 조약과 도서관 장애인서비스 과제)

  • 윤희윤
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.3
    • /
    • pp.73-91
    • /
    • 2022
  • For everyone, books are not only a passage to break down temporal and spatial barriers, but also a passport to the world. However, books are neither a passage nor a passport for persons with print disabilities. They are suffering from a severe book famine, with only 1-7% of alternative materials in accessible formats. The Marrakesh Treaty is an international agreement promoted by the WBU and WIPO to reduce such access gaps and inequalities. Accordingly, this study intensively analyzed and linked the global book famine and the Marrakesh Treaty for the persons with print disabilities including the blind and visually impaired, and suggested strategic tasks and implementation plans to strengthen the services of the disabled in domestic libraries. The government and libraries should concentrate all their competencies on improving awareness, inducing standardization of alternative materials in the publishing industry, amending and supplementing the copyright act and related laws, strengthening the digital file collection and service of the National Library for the disabled, and developing and applying library guidelines to implement the Marrakesh Treaty. This is because if food supports the body of the disabled, reading fosters their spirit. In order to solve the global book famine for persons with print disabilities, it is necessary to improve the publishing industry's cartels, copyright holders' barricades, and the weak platform of the library industry. All copyright holders, publishers, and libraries should participate in reducing the 95% gap in access between non-disabled and disabled people. That is the mantra of the book famine.

A Study on the Recognition of Face Based on CNN Algorithms (CNN 알고리즘을 기반한 얼굴인식에 관한 연구)

  • Son, Da-Yeon;Lee, Kwang-Keun
    • Korean Journal of Artificial Intelligence
    • /
    • v.5 no.2
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Non-linear incidental dynamics of frame structures

  • Radoicic, Goran N.;Jovanovic, Miomir Lj.;Marinkovic, Dragan Z.
    • Structural Engineering and Mechanics
    • /
    • v.52 no.6
    • /
    • pp.1193-1208
    • /
    • 2014
  • A simulation of failures on responsible elements is only one form of the extreme structural behavior analysis. By understanding the dynamic behavior in incidental situations, it is possible to make a special structural design from the point of the largest axial force, stress and redundancy. The numerical realization of one such simulation analysis was performed using FEM in this paper. The boundary parameters of transient analysis, such as overall structural damping coefficient, load accelerations, time of load fall and internal forces in the responsible structural elements, were determined on the basis of the dynamic experimental parameters. The structure eigenfrequencies were determined in modal analysis. In the study, the basic incidental models were set. The models were identified by many years of monitoring incidental situations and the most frequent human errors in work with heavy structures. The combined load models of structure are defined in the paper since the incidents simply arise as consequences of cumulative errors and failures. A feature of a combined model is that the single incident causes the next incident (consecutive timing) as well as that other simple dynamic actions are simultaneous. The structure was observed in three typical load positions taken from the crane passport (range-load). The obtained dynamic responses indicate the degree of structural sensitivity depending on the character of incident. The dynamic coefficient KD was adopted as a parameter for the evaluation of structural sensitivity.

Investigating factors influencing the usage of Korea Immigration Smart Service (공항이용객의 자동출입국심사 시스템 사용의도에 관한 연구)

  • Choi, Jin-Ho;Park, Jin-Woo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2011.05a
    • /
    • pp.277-278
    • /
    • 2011
  • Traditionally airport users have presented their passport themselves to immigration for entering and leaving countries. To improve the inefficiency of this traditional immigration system, Incheon International Airport (IIA) has introduced automatic immigration system called Korea Immigration Smart Service (KISS). This research investigates airport users' behavioral intentions of KISS. To achieve the research purpose, the conceptual model is developed on the basis of the technology acceptance model. The result from this research can be used for improvement of KISS system.

  • PDF

Development of Data Fusion Human Identification System Based on Finger-Vein Pattern-Matching Method and photoplethysmography Identification

  • Ko, Kuk Won;Lee, Jiyeon;Moon, Hongsuk;Lee, Sangjoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.149-154
    • /
    • 2015
  • Biometric techniques for authentication using body parts such as a fingerprint, face, iris, voice, finger-vein and also photoplethysmography have become increasingly important in the personal security field, including door access control, finance security, electronic passport, and mobile device. Finger-vein images are now used to human identification, however, difficulties in recognizing finger-vein images are caused by capturing under various conditions, such as different temperatures and illumination, and noise in the acquisition camera. The human photoplethysmography is also important signal for human identification. In this paper To increase the recognition rate, we develop camera based identification method by combining finger vein image and photoplethysmography signal. We use a compact CMOS camera with a penetrating infrared LED light source to acquire images of finger vein and photoplethysmography signal. In addition, we suggest a simple pattern matching method to reduce the calculation time for embedded environments. The experimental results show that our simple system has good results in terms of speed and accuracy for personal identification compared to the result of only finger vein images.

Passport Recognition using PCA-based Face Verification and SOM Algorithm (PCA 기반 얼굴 인증과 SOM 알고리즘을 이용한 여권 인식)

  • Lee Sang-Soo;Jang Do-Won;Kim Kwang-Baek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.285-290
    • /
    • 2006
  • 본 논문에서는 출입국자 관리의 효율성과 체계적인 출입국 관리를 위하여 여권 코드를 자동으로 인식하고 위조 여권을 판별할 수 있는 여권 인식 및 얼굴 인증 방법을 제안한다. 본 논문의 구성은 여권 인식과 얼굴 인증 부분으로 구성되며, 여권 인식 부분에서는 소벨 연산자, 수평 최소값 필터 등을 적용한 후, 8 방향 윤곽선 추적 알고리즘을 적용하여 코드의 문자열 영역을 추출하고 기울기를 보정한다. 추출된 문자열은 반복 이진화 방법을 적용하여 코드의 문자열 영역을 이진화 한다. 이진화된 문자열 영역에 대해 8 방향 윤곽선 추적 알고리즘을 적용하여 개별 코드를 추출한 후에 SOM(Self-Organizing Maps) 알고리즘을 적용하여 여권 코드를 인식한다. 얼굴 인증 부분에서는 여권 사진 영역의 특징을 이용하여 얼굴 후보 영역을 추출한 후, RGB와 YCbCr 색공간에서 피부색 정보를 이용하여 얼굴 영역을 추출한다. 추출된 얼굴 영역은 PCA(Principal Component Analysis) 알고리즘을 적용하여 특징 벡터를 구하고 여권 코드가 인식된 결과를 바탕으로 여권 소지자의 데이터 베이스에 있는 얼굴 영상의 특징벡터와의 거리 값을 계산하여 사진 위조 여부를 판별한다. 제안된 여권 인식 및 얼굴 인증 방법의 성능 평가를 위하여 원본 여권의 얼굴 부분을 위조한 여권과 기울어진 여권 영상을 대상으로 실험한 결과, 제안된 방법이 여권의 코드 인식 및 얼굴 인증에 있어서 우수한 성능이 있음을 확인하였다.

  • PDF

A Study on Interface Design of Plant Passport System for Seedling Industry (종묘 산업 활성화를 위한 식물여권 시스템 설계에 대한 연구)

  • Kim, Hong-geun;Chouwdhury, Olly Roy;Cho, Yongyun;Park, Jangwoo;Shin, Changsun;Seo, Jongbun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.148-149
    • /
    • 2015
  • 최근 ICT/IoT 기술이 농업분야에 적용되면서 노동집약적인 농업에 노동력 감소 및 생산 효율성 및 품질 향상 등 고부가가치를 창출하고 있다. 이러한 농업의 전초 단계로 생산의 성패를 좌우할 수 있는 중요한 요소로 육묘를 들 수 있다. 육묘는 재배의 분업화/전문화를 유도할 수 있는 원천산업으로 정밀산업인 동시에 미래 성장동력산업으로 양질의 균일한 육묘 생산 및 보급이 필요하다. 본 연구에서는 육묘 품질인증의 프로세스를 기반으로 식물여권 시스템의 인터페이스를 설계하였다. 원예 종묘에 대한 품질관리 체계를 기반으로 한 인증기관을 통해 관리하여 우량묘 생산 및 공급체계의 기반으로 한 인증기관을 통해 관리하여 우량묘 생산 및 공급체계의 가반을 갖출 수 있을 것이다.

Safety Education Programs for Patients and Families in Overseas Institutions (국외 환자대상의 환자안전 교육 사례)

  • Kim, Yoon-Sook;Kwak, Mi-Jeong;Kim, Moon-Sook;Kim, Hyun-Ah;Kim, Hyuo-Sun;Chun, Ja-Hae;Hwang, Jee-In
    • Quality Improvement in Health Care
    • /
    • v.25 no.1
    • /
    • pp.2-10
    • /
    • 2019
  • Purpose: The purpose of this study was to share program and/or resource on patient safety education for patients and families conducted overseas agency. This study will help the patient safety officer establish and implement an educational plan for patients and families. Methods: We searched the Internet for patient safety related organizations. We chose an institution that provided education for patients and families. Results: Most of the program and/or resource was about patient and family involvement; Taking Care of Myself, My Questions for This Visit, Patient Prep Card, 20 Tips to Help Prevent Medical Errors, Ask Me 3(R), Health and Safety Passport, My Medication log etc. Conclusions: It is necessary to distribute educational materials for patients and families in the country through the results of this study. For patient safety, education and publicity are needed so that developed educational materials can be actively used.

Handwritten Indic Digit Recognition using Deep Hybrid Capsule Network

  • Mohammad Reduanul Haque;Rubaiya Hafiz;Mohammad Zahidul Islam;Mohammad Shorif Uddin
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.89-94
    • /
    • 2024
  • Indian subcontinent is a birthplace of multilingual people where documents such as job application form, passport, number plate identification, and so forth is composed of text contents written in different languages/scripts. These scripts may be in the form of different indic numerals in a single document page. Due to this reason, building a generic recognizer that is capable of recognizing handwritten indic digits written by diverse writers is needed. Also, a lot of work has been done for various non-Indic numerals particularly, in case of Roman, but, in case of Indic digits, the research is limited. Moreover, most of the research focuses with only on MNIST datasets or with only single datasets, either because of time restraints or because the model is tailored to a specific task. In this work, a hybrid model is proposed to recognize all available indic handwritten digit images using the existing benchmark datasets. The proposed method bridges the automatically learnt features of Capsule Network with hand crafted Bag of Feature (BoF) extraction method. Along the way, we analyze (1) the successes (2) explore whether this method will perform well on more difficult conditions i.e. noise, color, affine transformations, intra-class variation, natural scenes. Experimental results show that the hybrid method gives better accuracy in comparison with Capsule Network.

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.