• Title/Summary/Keyword: Personal Identification System

Search Result 209, Processing Time 0.025 seconds

Performance Improvement Using an Automation System for Segmentation of Multiple Parametric Features Based on Human Footprint

  • Kumar, V.D. Ambeth;Malathi, S.;Kumar, V.D. Ashok;Kannan, P.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1815-1821
    • /
    • 2015
  • Rapid increase in population growth has made the mankind to delve in appropriate identification of individuals through biometrics. Foot Print Recognition System is a new challenging area involved in the Personal recognition that is easy to capture and distinctive. Foot Print has its own dimensions, different in many ways and can be distinguished from one another. The main objective is to provide a novel efficient automated system Segmentation using Foot Print based on structural relations among the features in order to overcome the existing manual method. This system comprises of various statistical computations of various foot print parameters for identifying the factors like Instep-Foot Index, Ball-Foot Index, Heel- Index, Toe- Index etc. The input is naked footprint and the output result to an efficient segmentation system thereby leading to time complexity.

Eigen Palmprint Identification Algorithm using PCA(Principal Components Analysis) (주성분 분석법을 이용한 고유장문 인식 알고리즘)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.3 s.309
    • /
    • pp.82-89
    • /
    • 2006
  • Palmprint-based personal identification system, as a new member in the biometrics system family, has become an active research topic in recent years. Although lots of methods have been made, how to represent palmprint for effective classification is still an open problem and conducting researches. In this paper, the palmprint classification and recognition method based on PCA (Principal Components Analysis) using the dimension reduction of singular vector is proposed. And the 135dpi palmprint image which is obtained by the palmprint acquisition device is used for the effectual palmprint recognition system. The proposed system is consists of the palmprint acquisition device, DB generation algorithm and the palmprint recognition algorithm. The palmprint recognition step is limited 2 times. As a results GAR and FAR are 98.5% and 0.036%.

Palmprint Identification Algorithm using Hu Invariant Moments (Hu 불변 모멘트를 이용한 장문인식 알고리즘)

  • SHIN Kwang Gyu;RHEE Kang Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.2 s.302
    • /
    • pp.31-38
    • /
    • 2005
  • Recently, Biometrics-based personal identification is regarded as an effective method of person's identity with recognition automation and high performance. In this paper, the palmprint recognition method based on Hu invariant moment is proposed. And the low-resolution(750dpi) palmprint image$(5.5Cm\times5.5Cm)$ is used for the small scale database of the effectual palmprint recognition system. The proposed system is consists of two parts: firstly, the palmprint fixed equipment for the acquisition of the correctly palmprint image and secondly, the algorithm of the efficient processing for the palmprint recognition. And the palmprint identification step is limited 3 times. As a results, when the coefficient is 0.001 then FAR and GAR are $0.038\%$ and $98.1\%$ each other. The authors confirmed that FAR is improved $0.002\%$ and GAR is $0.1\%$ each other compared with [3].

Remote Devices Data Monitoring System based on Wireless PDA (무선 PDA 기반의 원격 장치 데이터 모니터링 시스템)

  • Seo, Jung-Hee;Kim, Kil-Young;Park, Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.611-614
    • /
    • 2007
  • This paper suggests a TCP/IP-based remote data monitoring system, which combines PDA (Personal Digital Assistant) and WLAN (Wireless Local Area Network) technologies. Wireless PDA devices are used for remote monitoring of wireless communication by continuously collecting remote device data transmitted from servers such as temperature, humidity and device status, and displaying them on mobile devices. Therefore, remote data monitoring systems that integrate wireless and wired services provide data collection adaptive to administrators and efficient identification of device status.

  • PDF

The Study on Improved Disaster Management System in Case of Large-scale Mass Casualties (대규모 인명피해 발생에 따른 재난관리체계 개선 방안)

  • Yoo, Byungtae;Ko, Jae Wook
    • Journal of the Korean Society of Safety
    • /
    • v.30 no.2
    • /
    • pp.77-82
    • /
    • 2015
  • When accidents that relate to a large numbers of people occur, such as disasters involving group tours by ship or aircraft, or large-scale chemical leakages, it is very important to know the personal identification of victims and to determine their locations and status. It is true that there will be serious damage or injury to people who engaged especially when information does not transfer properly or people get inaccurate one. In this study, therefore, we analysed the disaster response management system for rescued people of the Sewo ferry sinking accident. Based on the analysis we proposed to improve the real-time disaster management system with ICT(Information & Communication Technology).

The Potential to Upgrade the Thai Innovation System by University- industry Linkages

  • Schiller Daniel
    • Journal of Technology Innovation
    • /
    • v.14 no.2
    • /
    • pp.67-91
    • /
    • 2006
  • This paper discusses the potential to upgrade the Thai innovation system by university-industry linkages. Our results are structured into three parts. First, the identification of potentials for university-industry linkages (UIL) within the Thai innovation system shows that the re is a wide gap between absorptive capacities of private companies and knowledge production of universities. Second, we present survey results for individual departments at Thai universities showing that UIL are mostly limited to consulting and technical services, hampered by mutual distrust, and maintained to receive an extra personal income. Third, case studies on four typical modes of UIL allow us to discuss various ways to upgrade the Thai IS by UIL in future.

  • PDF

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Private Blockchain and Biometric Authentication-based Chronic Disease Management Telemedicine System for Smart Healthcare (스마트 헬스케어를 위한 프라이빗 블록체인과 생체인증기반의 만성질환관리 원격의료시스템)

  • Young-Ae Han;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.1
    • /
    • pp.33-39
    • /
    • 2023
  • As the number of people with chronic diseases increases due to an aging society, it is urgent to prevent and manage their diseases. Although biometric authentication methods and Telemedicine Systems have been introduced to solve these problems, it is difficult to solve the security problem of medical information and personal authentication. Since smart healthcare includes personal medical information of subjects, the security of personal information is the most important field. Therefore, in this paper, we tried to propose a Telemedicine System using a smart wearable device ECG in the form of a wristband and face personal authentication in a private blockchain environment. This system targets various medical personnel and patients with chronic diseases in all regions, and uses a private blockchain that can increase data integrity and transparency, ECG and face authentication that are difficult to forge and alter and have high personal identification to provide a system with high security and reliability. composed. Through this, it is intended to contribute to increasing the efficiency of chronic disease management by focusing on disease prevention and health management for patients with chronic diseases at home.

The Recommendation of Controls for Hospital Information System Using CRAMM: Case Studies of Two Korean Hospitals

  • Moon, Song-Chul;Han, In-Goo;Lee, Sang-Jae
    • Korean Management Science Review
    • /
    • v.17 no.1
    • /
    • pp.145-158
    • /
    • 2000
  • The medical records of diagnostic and testing information include sensitive personal information that reveals some of the most intimate aspects of an individual's life. The hospital information system (HIS) operates in a state of high risk which may lead to the possible loss to the IS resources caused by various threats. This research addresses twofold : (1) to perform asset identification ad valuation and (2) to recommend countermeasures for secure HIS network using case studies This paper applied a risk management tool CRAMM (Central Computer and Tele-communications Agency's Risk Analysis and Management Method) to assess asset values and suggest countermeasures for the security of computerized medical information of two large hospitals in Korea. CRAMM countermeasures are recommended at the reference sites from the network security requirements of system utilized for the diagnosis and treatment of patients. The results of the study will enhance the awareness of IS risk management by IS managers.

  • PDF

The Design and Implementation of the Data Link System based on the Off-the-shelf Ultra Mobile Personal Computer for Network Centric Warfare(NCW) (네트워크중심전(NCW)을 위한 UMPC 기반 데이터 링크 시스템 설계 및 구축)

  • Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.175-181
    • /
    • 2009
  • All of the military aircrafts in Korea Air Force are administered and operated together in the same system regardless of whether they are equipped with the data communication capability or not. The absence of the data communication capability in some of the aircrafts might increase whole kill chain hour at the point of the Network Centric Warfare achievement. Network synergy effects cannot also be desired if the section which is not connected to the network influences to the whole tactical network. Equipping aircrafts with the data communication capability could be done by upgrading the aircrafts, but resulting in high costs and long updating time. This paper is a research about the design and implementation of the UMPC based Data Link System to aircrafts that do not have the data communication capability. The proposed system grafts the UHF-based wireless modem technology and the aircraft flight mission support software onto the off-the-shelf UMPC and GPS system. The employed UHF radio equipment allows communicating tactic data with another aircrafts on the air, the ground control point, and even the Tactical Air Control Party(TACP) control vehicle that achieve missions with aircrafts. It thereby increases such capabilities as navigation aid, situation awareness, quick target identification and attack. We also applied Closed Air Support(CAS) scenarios, which is very close to the real environment, to the experiments of the proposed system. The experimental results show that the proposed system could support the data communication capability effectively and the flight mission at low costs of money and time.