• Title/Summary/Keyword: Registering

Search Result 226, Processing Time 0.026 seconds

Occlusion Processing in Simulation using Improved Object Contour Extraction Algorithm by Neighboring edge Search and MER (이웃 에지 탐색에 의한 개선된 객체 윤곽선 추출 알고리즘과 MER을 이용한 모의훈련에서의 폐색처리)

  • Cha, Jeong-Hee;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.206-211
    • /
    • 2008
  • Trainee can enhance his perception of and interaction with the real world by displayed virtual objects in simulation using image processing technology. Therefore, it is essential for realistic simulation to determine the occlusion areas of the virtual object produces after registering real image and virtual object exactly. In this paper, we proposed the new method to solve occlusions which happens during virtual target moves according to the simulated route on real image using improved object contour extraction by neighboring edge search and picking algorithm. After we acquire the detailed contour of complex objects by proposed contour extraction algorithm, we extract the three dimensional information of the position happening occlusion by using MER for performance improvement. In the experiment, we compared proposed method with existed method and preyed the effectiveness in the environment which a partial occlusions happens.

Study on IoT Controller for Smart Home Service (스마트홈 서비스를 위한 사물인터넷 컨트롤러에 관한 연구)

  • Kwon, Dong-hyun;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.590-591
    • /
    • 2017
  • In the existing smart home, a separate platform was set up for each manufacturer to provide services through terminals. However, due to the development of Internet technology, various Internet devices and services have been launched, and there is a limit to the existing closed platforms for each manufacturer. Therefore, in this paper, we propose an object internet controller that integrates control of Internet devices in a smart home environment and provides various services through IFTTT. The proposed Internet controller is connected to the server via WiFi, and can control the Internet device and service of objects through the button input event. In addition, we expect to be able to provide a service environment that can create various smart home services by registering DIY products through open platform of oneM2M standard method.

  • PDF

JMoblet : A Jini-based Mobile Agent System (JMoblet:Jini 기반의 이동에이전트 시스템)

  • Kim, Jin-Hong;Koo, Hyeong-Seo;Yun, Hyeong-Seok;An, Geon-Tae;Yu, Yang-U;Lee, Myeong-Jun
    • The KIPS Transactions:PartB
    • /
    • v.8B no.6
    • /
    • pp.641-650
    • /
    • 2001
  • Jini architecture's Network Plug and Work provides simple and flexible network environment for distributed applications. Through the Jini technology, facilities for dynamically registering and locating mobile agent services can be easily supported, as well as the services useful for activities of mobile agents can be dynamically supported. In this paper, we describe a Jini-based mobile agent system named JMoblet, which provides the basic functions of a mobile agent system such as creation, control, transfer, location and communication among agents. To increase the reliability of the system, it also provides exception handling and persistence of the mobile agent systems for reliability.

  • PDF

Development of Regulation System for Off-Label Drug Use (의약품 허가외사용 관리 체계 발전 방안)

  • Lee, Iyn-Hyang;Seo, Mikyeong;Lee, Young Sook;Kye, Seunghee;Kim, Hyunah;Lee, Sukhyang
    • YAKHAK HOEJI
    • /
    • v.58 no.2
    • /
    • pp.112-124
    • /
    • 2014
  • This study aimed to develop a regulation system for off-label drug use to secure the safe use of marketed drugs. We searched governmental documents for national and global regulating systems of off-label drug uses and a body of academic literature to explore current regulating trends. We included European Union, United Kingdom, United States of America, Australia and Japan, and critically reviewed the regulation of off-label drug use in four issues, which were a regulatory structure, safety control before and after off-label use, and information management. The findings of the present investigation called for several measures in off-label drug uses: enhancing prescribers' self-regulation, providing up-to-date information to prescribers for evidence-based practice and to patients for their informed consent, making evidence with scientific rigor, building an official registering process for off-label use in good quality and extending the role of pharmaceutical industry in pharmacovigilance. At last, we proposed a new system so as to regulate and evaluate off-label drug uses both at national and institutional level. In the new system, we suggested a clear-cut definition for clinical evidence that applicants would submit. We newly introduced an official 'Off-Label Drug Use Report' to evaluate the safety and clinical efficacy of a given off-label drug use. In addition, we developed an algorism of the regulation of off-label drug use within an institution to help set up the culture of evidence-based practices in off-label drug uses.

A study on legal improvement on Online P2P financial loan

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.141-147
    • /
    • 2017
  • Along with the recent growth of Fintech industry and low interest rate basis, one of the alternative investment technique for expecting higher investment profit, P2P loan using P2P financial system is greatly increasing. P2P loan can be referred to as a type of Crowdfunding that the law of Crowdfunding (adopted to revised Capital Market Act) enacted on January 25th 2016 only allows investment type Crowdfunding so that it can be used as a tool of raising fund for startup and venture companies. Also, it is true that Korean government could not make any legislative foundation related to P2P loan. At this moment, those online platform companies mediating P2P loan are not included as financial companies, expected to cause various legal arguments. Financial Services Commission has released a guideline in February of this year saying that limit of P2P loan is 10 million Korean Won per arbitrating company and 5 million Korean Won per borrower. However, what is more important is to make a law supporting this institutional system. If legislation on P2P loan is implemented without care, it may disturb growth of the field but it may result in the damage of investors if not clearly defined by law. As this is the case, first, "revision of execution regulations for loan business" should take place as soon as possible to intensify inspection of loan companies by registering them to Financial Services Commission. Second, saving customer fund separately in the their organization. Third, making law on protecting investors such as regulating exaggerative advertisement. Fourth, to have transparent and fair public announcement system, standardized agreement and guideline describing clear understanding on autonomous public information publication of P2P loan online platform business and information on the borrower.

Mutual Authentication Protocol for Preserving Privacy of Mobile RFID User using Random Key Division (랜덤 키 분할을 이용한 모바일 RFID 사용자의 프라이버시를 보호하는 상호 인증 프로토콜)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.3B
    • /
    • pp.220-230
    • /
    • 2011
  • Mobile RFID which integrates mobile network with RFID technique is the technique to get the information of products by transmitting the identifier through mobile network after reading the identifier of RFID tag. It attached on the equipment as the mobile phone. However, mobile RFID has the privacy-related problem among requested secure problems required from the existing RFID. In this paper, the random key created by mobile RFID reader and Tag during the inter-certificating and initialization procedure for mobile RFID users to receive tag information from backend server securely is divided into random sizes and any information on the tag which requires the protection of privacy shouldn't be provided to anyone. In performance analysis, previous protocol used modulo operation in registration and login computation. But the proposed protocol has higher efficiency in saving space and computation volume than MARP scheme and Kim. et. al scheme because our protocol is accomplished by mutual authentication and registering user information through one-way hash function.

Performance Evaluation of Improved Fast PMIPv6-Based Network Mobility for Intelligent Transportation Systems

  • Ryu, Seonggeun;Choi, Ji-Woong;Park, Kyung-Joon
    • Journal of Communications and Networks
    • /
    • v.15 no.2
    • /
    • pp.142-152
    • /
    • 2013
  • The network mobility basic support (NEMO BS) protocol has been investigated to provide Internet connectivity for a group of nodes, which is suitable for intelligent transportation systems (ITS) applications. NEMO BS often increases the traffic load and handover latency because it is designed on the basis of mobile Internet protocol version 6 (MIPv6). Therefore, schemes combining proxy MIPv6 with NEMO (P-NEMO) have emerged to solve these problems. However, these schemes still suffer from packet loss and long handover latency during handover. Fast P-NEMO (FP-NEMO) has emerged to prevent these problems. Although the FP-NEMO accelerates handover, it can cause a serious tunneling burden between the mobile access gateways (MAGs) during handover. This problem becomes more critical as the traffic between the MAGs increases. Therefore, we propose a scheme for designing an improved FP-NEMO (IFP-NEMO) to eliminate the tunneling burden by registering a new address in advance. When the registration is completed before the layer 2 handover, the packets are forwarded to the new MAG directly and thereby the IFP-NEMO avoids the use of the tunnel between the MAGs during handover. For the evaluation of the performance of the IFP-NEMO compared with the FP-NEMO, we develop an analytical framework for fast handovers on the basis of P-NEMO. Finally, we demonstrate that the IFP-NEMO outperforms the FP-NEMO through numerical results.

A Study on the Unified Method of Coordinate Registration in Cadastral Map Information (지적도면정보 좌표등록의 통일화 방안 연구)

  • Hong, Sung-Eon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.7855-7862
    • /
    • 2015
  • Cadastral map information is created by registering parcel information such as location, lot number, land category and boundary through the cadastral survey. However, with regard to boundary point coordinate, computerized cadastral information data was registered to either two decimal places (unit in centimeter) or three decimal places (unit in millimeter) so that a confusion in cadastral administration and cadastral survey has been caused. Therefore, the purpose of this study is to look for a method of matching two different coordinate systems through the consideration of registration of cadastral information data and area calculation. In conclusion, the result of the investigation not only shows that areal change and the creation of minute polygons resulted from land alteration could be solved by changing boundary point coordinate from two decimal places to three decimal places, but also suggests that the related laws and regulations to register boundary point coordinate to three decimal places should be institutionally corrected and applied.

Disambiguation of Homograph Suffixes using Lexical Semantic Network(U-WIN) (어휘의미망(U-WIN)을 이용한 동형이의어 접미사의 의미 중의성 해소)

  • Bae, Young-Jun;Ock, Cheol-Young
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.1
    • /
    • pp.31-42
    • /
    • 2012
  • In order to process the suffix derived nouns of Korean, most of Korean processing systems have been registering the suffix derived nouns in dictionary. However, this approach is limited because the suffix is very high productive. Therefore, it is necessary to analyze semantically the unregistered suffix derived nouns. In this paper, we propose a method to disambiguate homograph suffixes using Korean lexical semantic network(U-WIN) for the purpose of semantic analysis of the suffix derived nouns. 33,104 suffix derived nouns including the homograph suffixes in the morphological and semantic tagged Sejong Corpus were used for experiments. For the experiments first of all we semantically tagged the homograph suffixes and extracted root of the suffix derived nouns and mapped the root to nodes in the U-WIN. And we assigned the distance weight to the nodes in U-WIN that could combine with each homograph suffix and we used the distance weight for disambiguating the homograph suffixes. The experiments for 35 homograph suffixes occurred in the Sejong corpus among 49 homograph suffixes in a Korean dictionary result in 91.01% accuracy.

One-Time Password Authentication Scheme Based on Cryptographic Hash Chain without Re-Registration (재등록이 필요 없는 암호 해시체인 기반의 일회용 패스워드 인증기법)

  • Shin, Dong-jin;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1251-1259
    • /
    • 2017
  • One-time password has been proposed for the purpose of addressing the security problems of the simple password system: fixed passwords and pre-shared passwords. Since it employs the consecutive hash values after a root hash value is registered at the server, the security weakness of the fixed passwords has been addressed. However, it has a shortcoming of re-registering a new root hash value when the previous hash chain's hash values are exhausted. Even though several one-time password systems not requiring re-registration have been proposed, they all have several problems in terms of constraint conditions and efficiency. In this paper, we propose the one - time password scheme based on a hash chain that generates one - time passwords using only two cryptographic hash functions at each authentication and satisfies the existing constraints without re-registration, Security requirements and efficiency.