• Title/Summary/Keyword: Real Security

Search Result 1,826, Processing Time 0.026 seconds

A Study on Enhancing VMS Services by FM Car Radio (차량 내 FM라디오를 이용한 VMS서비스 개선 연구)

  • Park, Bum-Jin;Moon, Byeong-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.6
    • /
    • pp.22-32
    • /
    • 2010
  • Increasingly advanced Information Technology (IT) has changed the operator so as to create more diversified and advanced traffic information demand. To deal with the changing demand in private sector, a concept of on-demand traffic information has been rapidly introduced. However VMS, a product of the first generation of ITS, which was designed to provide the unspecified individuals during driving the car with the basic level of traffic information by the public failed to actively change itself in such a changing pattern. This study was intended to describe the VMS system (tentatively, FM-VMS) which was further developed to accommodate the needs favoring the sophisticated PDA with the public role of providing the unspecified individuals with the equal information. FM-VMS introduced in this study is the device designed to transmit the voice and message to the drivers through the radio information device mounted on a car. A core technology is, unlike FM-DARC and RDS, the Water Making technology which directly inserts the digital signal into FM frequency in use. It's been currently used for broadcasting and security purpose. A detection rate as a result of testing FM-VMS system using Water Making technology was 90% or more in voice and message within 20m from test VMS. When a public-developed VMS information could be transmitted using FM frequency to the relatively vulnerable users (vulnerable to traffic information) in voice on a real-time basis to provide the regional traffic information, and furthermore, VMS message could be received through radio liquid using FM frequency only, it would obviously bring about the innovation in ITS as well as pave the way for creating the new added value down the road.

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

Effect of e-servicescape on Trust and Purchase Intentions (e-서비스스케이프가 신뢰와 구매의도에 미치는 영향)

  • Shin, Jin-Hee;Jeong, Yong-Gil
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.815-828
    • /
    • 2013
  • Recently internet shopping malls provide newer and more varied goods and services to meet the demand of their customers. And as new companies enter the on-line shopping mall business, competition in this specific market is getting stiffer. Therefore, to keep a more sustained relationship with their customers, internet shopping malls need to satisfy their customers with their goods and services and to make them loyal customers. Unlike bricks-and-mortar stores in real life, This study also aims to propose an on-line physical environment model, and to develop the existing on-line research into a physical environment. The physical environment is measured on the four dimensions and 4 measurement units and the on-line physical environment, trust, and purchasing decisions are also explained. This study makes contributions as follows. First, online physical environments contain theoretical syntheses and operational definition. Second, this study finds that trust is an important part of an on-line transaction. Third, this study provides an insight into some of the factors preceding purchasing decisions. Lastly, this study finds that the consumer's comprehension of the on-line environment has a considerable influence on trust and purchasing decisions.

A Risk Factor Detour Multi-Path Routing Scheme in Wireless Multimedia Sensor Networks (무선 멀티미디어 센서 네트워크 환경에서 위험요소 우회 다중 경로 라우팅 기법)

  • Hwang, Donggyo;Son, In-Goog;Park, Junho;Seong, Dong-Ook;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.1
    • /
    • pp.30-39
    • /
    • 2013
  • In recent years, with the development of devices to collect multimedia data such as small CMOS camera sensor and micro phone, studies on wireless multimedia sensor network technologies and their applications that extend the existing wireless sensor network technologies have been actively done. In such applications, various basic schemes such as the processing, storage, and transmission of multimedia data are required. Especially, a security for real world environments is essential. In this paper, in order to defend the sniffing attack in various hacking techniques, we propose a multipath routing scheme for physically avoiding the data transmission path from the risk factors. Our proposed scheme establishes the DEFCON of the sensor nodes that are geographically close to risk factors and the priorities according to the importance of the data. Our proposed scheme performs risk factor detour multipath routing through a safe path considering the DEFCON and data priority. Our experimental results show that although our proposed scheme takes the transmission delay time by about 5% over the existing scheme, it reduces the eavesdropping rate that can attack and intercept data by the risk factor by about 18%.

Analyzing the Importance and Priority of Safety Information in Walking Tourism: Focusing on Open Data Utilization (도보여행 안전정보의 유형별 중요도 및 우선순위 도출: 오픈데이터 활용을 중심으로)

  • Ham, Juyeon;Choi, Sujeong;Koo, Chulmo
    • Knowledge Management Research
    • /
    • v.19 no.1
    • /
    • pp.59-77
    • /
    • 2018
  • The tourism industry is now changing to smart tourism, which maximizes tourists' overall tourism experience with the use of advanced mobile technologies and emphasizes the utilization of tourism information. Despite the quantitative expansion of the tourism industry, there is a lack of academic and practical discussion on tourism safety. Especially, in the context of walking tourism, tourists are more likely to be exposed to natural or social disasters and emergencies. Therefore, it is necessary to build a system that can provide walking tourists with safety information not only on dangerous factors which are anticipated to be confronted during a walking trip in advance but also on specific dangers in real time. Under the circumstances, this study seeks to identify the types of tourism safety information that can be offered by using publicly available open data, drawing on the safety information framework on the walking tourism that is presented in Choi et al. (2017)'s study. More specifically, this study focuses on the use of open data which is provided by the Korean government. Furthermore, this study verifies the types of safety information that are most urgently needed in walking travel situations. Specifically, this study aims to derive the importance and priority of each type of safety information for a walking trip by applying the analytic hierarchy process (AHP) analysis. For this, we collected 35 questionnaires from walking tour operators (practitioners) and walking tourists. The main results are as follows. First, natural disaster information is the most important factor in the top-level factor of safety information for walking tourists, followed by social disaster, life safety, and exhibition (security crisis) information. Second, information on natural disasters, environmental pollution, and weather is considered to be important at the sub-level factor. Lastly, the noteworthy result of this study is that the importance of each type of safety information varies depending on the walking tour operators (practitioners) and the walking tourists. That is, there is a recognition difference between the operator (practitioner) and the user in the importance and priority of the safety information of the walking trip. Therefore, it is necessary to develop policies and services reflecting the opinions of potential users when providing safety information so that the most importantly recognized information can be provided first.

An Adaptive Colorimetry Analysis Method of Image using a CIS Transfer Characteristic and SGL Functions (CIS의 전달특성과 SGL 함수를 이용한 적응적인 영상의 Colorimetry 분석 기법)

  • Lee, Sung-Hak;Lee, Jong-Hyub;Sohng, Kyu-Ik
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.5
    • /
    • pp.641-650
    • /
    • 2010
  • Color image sensors (CIS) output color images through image sensors and image signal processing. Image sensors that convert light to electrical signal are divided into CMOS image sensor and CCD image sensor according to transferring method of signal charge. In general, a CIS has RGB output signals from tri-stimulus XYZ of the scene through image signal processing. This paper presents an adaptive colorimetric analysis method to obtain chromaticity and luminance using CIS under various environments. An image sensor for the use of colorimeter is characterized based on the CIE standard colorimetric observer. We use the method of least squares to derive a colorimetric characterization matrix between camera RGB output signals and CIE XYZ tristimulus values. We first survey the camera characterization in the standard environment then derive a SGL(shutter-gain-level) function which is relationship between luminance and auto exposure (AE) characteristic of CIS, and read the status of an AWB(auto white balance) function. Then we can apply CIS to measure luminance and chromaticity from camera outputs and AE resister values without any preprocessing. Camera RGB outputs, register values, and camera photoelectric characteristic are used to analyze the colorimetric results for real scenes such as chromaticity and luminance. Experimental results show that the proposed method is valid in the measuring performance. The proposed method can apply to various fields like surveillant systems of the display or security systems.

Hardware Implementation of Real-Time Blind Watermarking by Substituting Bitplanes of Wavelet DC Coefficients (웨이블릿 DC 계수의 비트평면 치환방법에 의한 실시간 블라인드 워터마킹 및 하드웨어 구현)

  • 서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.398-407
    • /
    • 2004
  • In this paper, a blind watermarking method which is suitable to the video compression using 2-D discrete wavelet transform was proposed and implemented into the hardware using VHDL(VHSIC Hardware Description Language). The goal of the proposed watermarking algorithm is the authentication about the manipulation of the watermark embedded image and the detection of the error positions. Considering the compressed video image, the proposed watermarking scheme is unrelated to the quantization and is able to concurrently embed or extract the watermark. We experimentally verified that the lowest frequency subband(LL4) is not sensitive to the change in the spatial domain, so LL4 subband was selected for the mark space. And the combination of the bitplanes which has the properties of both the minimum degradation of the image and the robustness was chosen as the embedded Point in the mark space in LL4 subband. Since we know the watermark embedded positions and the watermark is embedded by not varying the value but changing the value, the watermark can be extracted without the original image. Also, for the security when exposing the watermark embedded position, we embed the encrypted watermark by the block cipher. The proposed watermark algorithm shows the robustness against the general image manipulation and is easily transplanted into the image or video compressor with the minimal changing in the structure. The designed hardware has 4037 LABs(24%) and 85 ESBs(3%) in APEX20KC EP20K400CF672C7 FPGA of Altera and stably operates in 82MHz clock frequency.

Dynamic Predicate: An Efficient Access Control Mechanism for Hippocratic XML Databases (동적 프레디킷 : 허포크라테스 XML 데이타베이스를 위한 효율적인 액세스 통제 방법)

  • Lee Jae-Gil;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.5
    • /
    • pp.473-486
    • /
    • 2005
  • The Hippocratic database model recently proposed by Agrawal et at. incorporates privacy protection capabilities into relational databases. The authors have subsequenty proposed the Hippocratic XML daかabase model[4], an extension of the Hippocratic database model for XML databases. In this paper, we propose a new concept that we cail the dynamic predicate(DP) for effective access control in the Hippocratic XML database model. A DP is a novel concept that represents a dynamically constructed rendition that tan be adapted for determining the accessibility of elements during query execution. DPs allow us to effectively integrate authorization checking into the query plan so that unauthorized elements are excluded in the process of query execution. Using synthetic and real data, we have performed extensive experiments comparing query processing time with those of existing access control mechanisms. The results show that the proposed access control mechanism improves the wall clock time by up to 219 times over the top-down access control strategy and by up to 499 times over the bottom-up access control strategy. The major contribution of our, paper is enabling effective integration of access control mechanisms with the query plan using the DP under the Hippocratic XML database model.

Expert System-based Context Awareness for Edge Computing in IoT Environment (IoT 환경에서 Edge Computing을 위한 전문가 시스템 기반 상황 인식)

  • Song, Junseok;Lee, Byungjun;Kim, Kyung Tae;Youn, Hee Yong
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.21-30
    • /
    • 2017
  • IoT(Internet of Things) can enable networking and computing using any devices is rapidly proliferated. In the existing IoT environment, bottlenecks and service delays can occur because it processes data and provides services to users using central processing based on Cloud. For this reason, Edge Computing processes data directly in IoT nodes and networks to provide the services to the users has attracted attention. Also, numerous researchers have been attracted to intelligent service efficiently based on Edge Computing. In this paper, expert system-based context awareness scheme for Edge Computing in IoT environment is proposed. The proposed scheme can provide customized services to the users using context awareness and process data in real-time using the expert system based on efficient cooperations of resource limited IoT nodes. The context awareness services can be modified by the users according to the usage purpose. The three service modes in the security system based on smart home are used to test the proposed scheme and the stability of the proposed scheme is proven by a comparison of the resource consumptions of the servers between the proposed scheme and the PC-based expert system.

Preconcentration and Determination of Trace Cobalt and Nickel by the Adsorption of Metal-PDC Complexes on the Anion-Exchange Resin Suspension (금속-PDC 착물의 음이온교환 수지 상 흡착에 의한 흔적량 코발트와 니켈의 동시 예비농축 및 정량)

  • Han, Chul-Woo;In, Gyo;Choi, Jong-Moon;Kim, Sun Tae;Kim, Young-Sang
    • Analytical Science and Technology
    • /
    • v.13 no.5
    • /
    • pp.608-615
    • /
    • 2000
  • A determination method of trace nickel and cobalt in water samples was studied and developed by adsorbing their complexes on ion exchange resin suspension. The analytical ions were formed as complexes with a ligand of APDC (ammonium pyrrolidinedithiocarbamate) and adsorbed on anion exchange resin of Dowex 2-X8. After the suspension was filtered out with membrane filter, the complexes were dissolved in HCl solution by an ultrasonic vibrator for ET-AAS determination. Several conditions were optimized as followings. pH of sample solution: 5.0, amount of ligand APDC: more than 430 times in mole ratio, the type and concentration of acid: 0.1 M HCl, and vibration time: 7 minutes. The addition of palladium in the HCl solution could improve the reproducibility and sensitivity by a matrix modification in the absorbance measurement. This procedure was applied for the analysis of three kinds of real water samples. The detection limits equivalent to 3 times standard deviation of blank were Co 0.36 ng/mL and Ni 0.27 ng/mL and recoveries in spiked samples were 99-102% for cobalt and 100-105% for nickel.

  • PDF