• Title/Summary/Keyword: Permission System

Search Result 277, Processing Time 0.027 seconds

Implementation of Speech Recognition Security System Using Speaker Defendent Algorithm (화자 종속 알고리즘을 이용한 음성 인식 보안 시스템 구현)

  • 김영현;문철홍
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.65-68
    • /
    • 2003
  • In this paper, a speech recognition system using a speaker defendant algorithm is implemented on the PC. Results are loaded on a LDM display system that employs Intel StrongArm SA-1110. This research has completed so that this speech recognition system may correct its shortcomings. Sometimes a former system is operated by similar speech, not a same one. To input a vocalization is processed two times to solve mentioned defects. When references are creating, variable start-point and end-point are given to make efficient references. This references and new references are changed into feature parameter, LPC and MFCC. DTW is excuted using feature parameter. This security system will give user permission under fore execution have same result.

  • PDF

Design and Implementation of Medical Education System using Mesh-Up Meta-Search Program (메쉬업을 통한 의학교육 메타검색시스템의 설계 및 구현)

  • Jung, Yong-Gyu;Choi, Jae-Kwan;Choi, Young-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.119-123
    • /
    • 2011
  • In recent years, several technologies have brought many changes in the field of education. Nonetheless, it is difficult to get freely medical and professional knowledge in the educational environment. In this paper, we study a free medical education system for medical education through service to the Mashup offers a meta-search system. Received permission to use the system API to retrieve the content API, data retrieval systems and video content via the API to design a system, based on this medical education, meta-search system is implemented.

Performance Analysis of Multimedia CDMA Mobile Communication System Considering Diverse Qos Requirements (멀티미디어 CDMA 이동통신 시스템에서의 다양한 QoS 요구조건을 고려한 성능 분석)

  • Kim, Baek-Hyun;Shin, Seung-Hoon;Kwak Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.1B
    • /
    • pp.1-12
    • /
    • 2002
  • In the multimedia CDMA mobile communication service, it is required to support various applications, such as voice, video, file transfer, e-mail, and Internet access, with guaranteed QoS. In the mixed traffic environment ,which consists of voice, stream data, and packet data, we analyze the network where preemptive priority is granted to delay-intolerant voice service and a buffer is offered to delay-tolerant stream data service. And, for best-effort packet data service, the access control by transmission permission probability is applied to obtain prominent throughput. To analyze the multimedia CDMA mobile communication system, we build a 2-dimensional markov chain model about prioritized-voice and stream data services and accomplish numerical analysis in combination with packet data traffic based on residual capacity equation.

Design of Efficient Adult Authentication Model for prevent of illegal Service of Child in IPTV Service Environment (IPTV 서비스를 이용하는 사용자의 효율적인 성인인증 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.68-75
    • /
    • 2013
  • Recently IPTV that transmits multimedia contents in real time through internet, cable TV net and satelite net gets the limelight. But IPTV service that gives service to users by various media has a problem of not supporting user certification fully. This paper suggests a certification model which prevents getting access permission of IPTV service by sending illegal certification information by adolescent through integrating mobile communication technique with RFID(Radio Frequency IDentification) technique which is a key technique of Ubiquitous environment. This model performs the process of adult certification by keeping synchronization with user's certificaiton information that is saved in data-base of certification server and contents server after getting the system of class categorization in contents server to overcome disadvantage of simple adult certification system that is popular in the existing internet. Also, it adapts double hash chain technique not to down load illegally contents without the permission of manager even if an adolescent gets manager's approval key.

Technique of Maximum Span Length Calculation for 350km/h High Speed Catenary System (최고운행속도 350km/h급 전차선로 최대경간길이 계산 기법)

  • Chang, Sang-Hoon;Lee, Ki-Won;Ryoo, Hyang-Bok
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.924-931
    • /
    • 2011
  • This paper deal with maximum span calculation technique for 350km/h high speed catenary system. Considers a geometric interaction, possible maximum span length is between two pole. Wind condition and the train current collector is moving even to being pantograph does not escape while operating. Uses like this justice and possible maximum span length is follow next condition. (i) Operating range of pantograph fan head, (ii) The wind velocity which assumes from system, (iii) Width in pantograph from operation height moving, (iv) Type of processing Catenary system, specially tensile strength of overhead contact wire and messenger wire etc. When accurately calculates the maximum permission span, the dropper between of overhead contact wire and messenger wire and must consider the correlation.

  • PDF

Development of Tool selection System for Machining Model Part of Injection Mold (사출금형 형상부 가공을 위한 공구 선정 시스템 개발)

  • 양학진;김성근;허영무;양진석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.569-574
    • /
    • 2002
  • As consumer's desire becomes various, agility of mold manufacturing is most important factor for competence of manufacturer. In common works to use commercial CAM system to generate tool path, some decision making process is required to produce optimal result of CAM systems, The paper proposes a methodology for computer-assisted tool selection procedures for various cutting type, such as rough, semi-rough and finish cuts. The system provides assist-tool-items for machining of design model part of injection meld die by analyzing sliced CAD model of die cavity and core. Also, the generating NC-code of the tool size is used to calculate machining time. The system is developed with commercial CAM using API. This module will be used for optimization of tool selection and planning process.

  • PDF

Development of Tool Selection System Aiding CAM Works for Injection Mold (사출금형 CAM 작업 지원용 공구 선정 시스템 개발)

  • 양학진;김성근;허영무;양진석
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.175-179
    • /
    • 1997
  • As consumer's desire becomes various, agility of mold manufacturing is most important factor for competence of manufacturer. In common works to use commercial CAM system to generate tool path, some decision making process is required to produce optimal result of CAM systems. We propose tool selection procedures to aid the decision making process. The system provides available tool size for machining of design model part of injection mold die by analyzing sliced CAD model of die cavity and core. Also, the tool size information is used to calculate machining time. The system is developed with commercial CAM using API. This module will be used for optimization of tool selection and planning process.

  • PDF

Study on unique code by each 3D model for broadcast communication harmony service. (방송통신융합 서비스를 위한 3D 모델별 고유 코드에 관한 연구)

  • Park, In-Gyu;Park, Jun-Yeol;Kim, Joon-Won
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.49-50
    • /
    • 2007
  • We are now using separate ID Database, Permission System, OS and Standard Data Format in PC, Cell phone, IPTV service and these are not good in many kind of usage, data sharing, contents servicing and supervising efficiency To merge these multiple services into one system we need to make a single ID systems for all and this paper will gide you to the new ID system that was much better than the old one. This new type of ID system is made with 3D Data and this will give fantastic visual effect & rich information data to the ID users in 3D way which is much better than 2D image & Text information technology.

  • PDF

A Study on Emergency Response Plan for Manless Light Rail Transit(LRT) (무인 경량전철 운영을 위한 비상대응 계획 수립에 관한 연구)

  • Park, Min-Kyu;Shin, Jong-Hyun;Kim, Yeon-Woong
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.915-923
    • /
    • 2011
  • Our country is promoting the introduction of new means of transportation due to insufficient supply according to the existing demand of road traffic. Among them, manless light railroad transit is settled down as the most definite alternative. However, new traffic systems such as manless light railroad have certain difference between characteristics of hardware and software and subway system. Therefore, there will be many differences compared to the existing contingency system when accidents occur. Railway management organization has to establish railway contingency plan and acquire permission from the minister of the Ministry of Land, Transport, and Maritime Affairs. However, as commercial transportation is available, a new traffic system also should establish contingency plan. Therefore, the establishment of systematic contingency plan is suggested in order to analyze characteristics of manless light railroad in the beginning of introduction and to make contingency response available.

  • PDF

A MATHEMATICAL MODEL FOR HISTORY-BASED ACCESS CONTROL

  • Kim, Hee-Young
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.8 no.1
    • /
    • pp.11-30
    • /
    • 2004
  • Access Control is one of essential branches to provide system's security. Depending on what standards we apply, in general, there are Role-based access control, History-based access control. The first is based on subject's role, The later is based on subject's history. In fact, RBAC has been implemented, we are using it by purchasing some orders through the internet. But, HBAC is so complex that there will occur some errors on the system. This is more and more when HBAC is used with other access controls. So HBAC's formalization and model which are general enough to encompass a range of policies in using more than one access control model within a given system are important. To simplify these, we design the mathematical model called non-access structure. This Non-access structure contains to historical access list. If it is given subjects and objects, we look into subject grouping and object relation, and then we design Non-access structure. Then we can determine the permission based on history without conflict.

  • PDF