• Title/Summary/Keyword: Personal Identification System

Search Result 209, Processing Time 0.027 seconds

Utilization of Wood Collections Using a Database Program for Personal Computers (퍼스널 컴퓨터용 데이타베이스 프로그램을 이용한 목재 재감의 효율적 이용)

  • Lee, Kyoung-Eun;Park, Won-Kyu
    • Journal of the Korean Wood Science and Technology
    • /
    • v.20 no.4
    • /
    • pp.43-48
    • /
    • 1992
  • A database system for retrieving the information on wood collections was developed using the D-BASE III Plus program for personal computers. Basic information of biological, physical, chemical and technological properties was added to the data which used to be employed in simple card systems, such as identification number, species name and collection site. All information was fast and reliably retrievable. This paper also discussed the results of a survey on wood collections housed at domestic colleges and research institutes.

  • PDF

Blockchain-based DID Problem Analysis Research (블록체인 기반의 DID 문제점 분석 연구)

  • Lee, Kwangkyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.25-32
    • /
    • 2022
  • DID(Decentralized Identity Identification) is a system in which users voluntarily manage their identity, etc., and control the scope and subject of submission of identity information based on a block chain. In the era of the 4th industrial revolution, where the importance of protecting personal information is increasing day by day, DID will surely be positioned as the industrial center of the Internet and e-business. However, when managing personal information, DID is highly likely to cause a large amount of personal information leakage due to electronic infringement, such as hacking and invasion of privacy caused by the concentration of user's identity information on global service users. Therefore, there are a number of challenges to be solved before DID settles into a stable standardization. Therefore, in this paper, we try to examine what problems exist in order to positively apply the development of DID technology, and analyze the improvement plan to become a stable service in the future.

Evaluation of a multi-stage convolutional neural network-based fully automated landmark identification system using cone-beam computed tomography-synthesized posteroanterior cephalometric images

  • Kim, Min-Jung;Liu, Yi;Oh, Song Hee;Ahn, Hyo-Won;Kim, Seong-Hun;Nelson, Gerald
    • The korean journal of orthodontics
    • /
    • v.51 no.2
    • /
    • pp.77-85
    • /
    • 2021
  • Objective: To evaluate the accuracy of a multi-stage convolutional neural network (CNN) model-based automated identification system for posteroanterior (PA) cephalometric landmarks. Methods: The multi-stage CNN model was implemented with a personal computer. A total of 430 PA-cephalograms synthesized from cone-beam computed tomography scans (CBCT-PA) were selected as samples. Twenty-three landmarks used for Tweemac analysis were manually identified on all CBCT-PA images by a single examiner. Intra-examiner reproducibility was confirmed by repeating the identification on 85 randomly selected images, which were subsequently set as test data, with a two-week interval before training. For initial learning stage of the multi-stage CNN model, the data from 345 of 430 CBCT-PA images were used, after which the multi-stage CNN model was tested with previous 85 images. The first manual identification on these 85 images was set as a truth ground. The mean radial error (MRE) and successful detection rate (SDR) were calculated to evaluate the errors in manual identification and artificial intelligence (AI) prediction. Results: The AI showed an average MRE of 2.23 ± 2.02 mm with an SDR of 60.88% for errors of 2 mm or lower. However, in a comparison of the repetitive task, the AI predicted landmarks at the same position, while the MRE for the repeated manual identification was 1.31 ± 0.94 mm. Conclusions: Automated identification for CBCT-synthesized PA cephalometric landmarks did not sufficiently achieve the clinically favorable error range of less than 2 mm. However, AI landmark identification on PA cephalograms showed better consistency than manual identification.

Analyses of Security Issues for Internet of Things in Healthcare Application (헬스캐어 시스템에서의 사물 인터넷 통신을 위한 보안 문제 분석)

  • Shin, Yoon-gu;Kim, Hankyu;Kim, Sujin;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.699-700
    • /
    • 2014
  • The use of Radio Frequency Identification technology (RFID) in medical context enables not only drug identification, but also a rapid and precise identification of patients, physicians, nurses or any other healthcare giver. The combination of RFID tag identification with structured and secured Internet of Things (IoT) solutions enables ubiquitous and easy access to medical related records, while providing control and security to all interactions. This paper defines a basic security architecture, easily deployable on mobile platforms, which would allow to establish and manage a medication prescription service in mobility context making use of electronic Personal Health Records. This security architecture is aimed to be used with a mobile e-health application (m-health) through a simple and intuitive interface, supported by RFID technology. This architecture, able to support secured and authenticated interactions, will enable an easy deployment of m-health applications. The special case of drug administration and ubiquitous medication control system, along with the corresponding Internet of Things context, is presented.

  • PDF

Conceptual Design of Crew Support System Based on Wireless Sensor Network and Power Line Communication for Cruise Ship (전력선통신(Power Line Communication) 기반 센서네트워크를 이용한 크루즈선 승무원 지원 시스템 개념연구)

  • Kang, Hee-Jin;Lee, Dong-Kon;Park, Beom-Jin;Paik, Bu-Geun;Cho, Seong-Rak
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.46 no.6
    • /
    • pp.631-640
    • /
    • 2009
  • The highest priority of the cruise trip is the safety and comfort of its passengers. Though the cruise lines take every appropriate measure to ensure that their Passengers are safe and experience enjoyable vacations it is hard to fulfill all passenger's personnel requirement with limited number of crews. Generally, each passenger is issued an identification card which contains their digital photo and personal identification information on a magnetic strip that he or she must present when entering or leaving the ship. This technology allows the ship to know which Passengers and crew members are on board and which are not. However, this system has some limitations of functions and usage. To support each passenger as his or her personal liking, additional number of crews or some kind of new system is needed. In this paper, the crew support system based on sensor network using wireless and wired communication technologies was studied. To design the system, PLC(Power Line Communication) system and ZigBee based passenger location recognition, classification system has studied experimentally. By using this system, crews can serve passengers more closely and personally with less effort.

A Personal Memex System Using Uniform Representation of the Data from Various Devices (다양한 기기로부터의 데이터 단일 표현을 통한 개인 미멕스 시스템)

  • Min, Young-Kun;Lee, Bog-Ju
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.309-318
    • /
    • 2009
  • The researches on the system that automatically records and retrieves one's everyday life is relatively actively worked recently. These systems, called personal memex or life log, usually entail dedicated devices such as SenseCam in MyLifeBits project. This research paid attention to the digital devices such as mobile phones, credit cards, and digital camera that people use everyday. The system enables a person to store everyday life systematically that are saved in the devices or the deviced-related web pages (e.g., phone records in the cellular phone company) and to refer this quickly later. The data collection agent in the proposed system, called MyMemex, collects the personal life log "web data" using the web services that the web sites provide and stores the web data into the server. The "file data" stored in the off-line digital devices are also loaded into the server. Each of the file data or web data is viewed as a memex event that can be described by 4W1H form. The different types of data in different services are transformed into the memex event data in 4W1H form. The memex event ontology is used in this transform. Users can sign in to the web server of this service to view their life logs in the chronological manner. Users can also search the life logs using keywords. Moreover, the life logs can be viewed as a diary or story style by converting the memex events to sentences. The related memex events are grouped to be displayed as an "episode" by a heuristic identification method. A result with high accuracy has been obtained by the experiment for the episode identification using the real life log data of one of the authors.

A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor (광학식 지문센서에서의 위조 지문 검출 방법)

  • Lee, Ji-Sun;Kim, Jae-Hwan;Chae, Jin-Seok;Lee, Byoung-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.4
    • /
    • pp.492-503
    • /
    • 2008
  • With the recent development and increasing importance of personal identification systems, biometric technologies with less risk of loss or unauthorized use are being popularized rapidly. In particular, because of their high identification rate and convenience, fingerprint identification systems are being used much more commonly than other biometric systems such as iris recognition, face recognition and vein pattern recognition. However, a fingerprint identification system has the problem that artificially forged finger-prints can be used as input data. Thus, in order to solve this problem, the present study proposed a method for detecting forged fingerprints by measuring the degree of attenuation when the light from an optical fingerprint sensor passes through the finger and analyzing changes in the transmission of light over stages at fixed intervals. In order to prove improvement in the performance of the proposed system, we conducted an experiment that compared the system with an existing multi-sensor recognition system that measures also the temperature of fingerprint. According to the results of the experiment, the proposed system improved the forged fingerprint detection rate by around 32.6% and this suggests the possibility of solving the security problem in fingerprint identification systems.

  • PDF

Implementation of Real Time System for Personal Identification Algorithm Utilizing Hand Vein Pattern (정맥패턴을 이용한 개인식별 알고리즘의 고속 하드웨어 구현)

  • 홍동욱;임상균;최환수
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.560-563
    • /
    • 1999
  • In this paper, we present an optimal hardware implementation for preprocessing of a person identification algorithm utilizing vein pattern of dorsal surface of hand. For the vein pattern recognition, the computational burden of the algorithm lies mainly in the preprocessing of the input images, especially in lowpass filtering. we could reduce the identification time to one tenth by hardware design of the lowpass filter compared to sequential computations. In terms of the computation accuracy, the simulation results show that the CSD code provided an optimized coefficient value with about 91.62% accuracy in comparison with the floating point implementation of current coefficient value of the lowpass filter. The post-simulation of a VHDL model has been performed by using the ModelSim$^{TM}$. The implemented chip operates at 20MHz and has the operational speed of 55.107㎳.㎳.

  • PDF

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF