• Title/Summary/Keyword: Security Devices

Search Result 1,621, Processing Time 0.026 seconds

Distinction of Real Face and Photo using Stereo Vision (스테레오비전을 이용한 실물 얼굴과 사진의 구분)

  • Shin, Jin-Seob;Kim, Hyun-Jung;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.17-25
    • /
    • 2014
  • In the devices that leave video records, it is an important issue to distinguish whether the input image is a real object or a photo when securing an identifying image. Using a single image and sensor, which is a simple way to distinguish the target from distance measurement has many weaknesses. Thus, this paper proposes a way to distinguish a simple photo and a real object by using stereo images. It is not only measures the distance to the target, but also checks a three-dimensional effect by making the depth map of the face area. They take pictures of the photos and the real faces, and the measured value of the depth map is applied to the learning algorithm. Exactly through iterative learning to distinguish between the real faces and the photos looked for patterns. The usefulness of the proposed algorithm was verified experimentally.

Perception of Patient Safety Risk Factors and Performance Level of Safety Care Activities among Hospital Nurses (환자안전 위험요인에 대한 병원간호사의 인식수준과 안전간호활동 수행정도)

  • Son, Young Shin;Lee, Young Whee;Kim, Young Shin;Song, Eun Jeong;Lee, Hye Ryun;Lee, Ju Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.2
    • /
    • pp.190-200
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the level of perception of safety risk factors and the degree of performance of safety nursing activities in order to develop an education program to improve the safety of patients. Methods: The subjects were 217 nurses from 3 university hospitals in Incheon. Data were collected with structured questionnaires and analyzed using descriptive analysis, t-test, and ANOVA using SPSS 22.0. Results: The level of perception of patient's safety risk factors and safety care activities was 2.93 and 4.68, respectively. Perception of patient safety risk factors which belonging to the risk type of therapeutic devices, equipment, service and infrastructure all scored below average; also in addition, behavior, performance, and violence risk type and work system, information and communication risk type showed relatively low perception levels. Safety nursing activities showed a low level of performance in accurate communication among medical teams, management of fire and disaster, security management, use of restraints, identification of patients, and correct performance of operations and procedures. Conclusion: Based on these results, it is necessary to improve the safety of patients by taking proper management measures along with education.

A hierarchical property-based multi-level approach method for improves user access control in a cloud environment (클라우드 환경에서 사용자 접근제어를 향상시킨 계층적 속성 기반의 다단계 접근 방법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Choel
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.7-13
    • /
    • 2017
  • In recent years, cloud computing technology has been socially emerged that provides services remotely as various devices are used. However, there are increasing attempts by some users to provide cloud computing services with malicious intent. In this paper, we propose a property - based multi - level hierarchical approach to facilitate authentication access for users accessing servers in cloud environment. The proposed method improves the security efficiency as well as the server efficiency by hierarchically distributing a set of attribute values by replacing the order of the user 's attribute values in the form of bits according to a certain rule. In the performance evaluation, the proposed method shows that the accuracy of authentication according to the number of attributes is higher than that of the existing method by an average of 15.8% or more, and the authentication delay time of the server is decreased by 10.7% on average. As the number of attributes increases, the average overhead change is 8.5% lower than that of the conventional method.

Construction of Complemented Hybrid Group Cellular Automata with Maximum Equal Lengths (최대 동일 길이를 갖는 여원 HGCA구성)

  • Cho S.J.;Choi U.S.;Hwang Y.H.;Kim J.G.;Pyo Y.S.;Kim H.D.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1565-1572
    • /
    • 2006
  • Recently with the ever increasing growth of data communication, the need for security and privacy has become a necessity. The advent of wireless communication and other handheld devices like Personal Digital Assistants and smart cards have made the implementation of cryptosystems a major issue. The Cellular Automata(CA) can be programmed to implement hardware sharing between the encryption and decryption. In this paper, we give conditions for a linear hybrid cellular automata with 60, 102 or 204 to be a linear hybrid group cellular automata C. And we present the conditions which the complemented hybrid group cellular automata C' with complement vectors derived from C has maximum equal lengths in the state transition diagram of C' Also we analyze the relationship among cycles of C' These results generalize Mukhopadhyay's results.

Analysis of patent trends of computerized tongue diagnosis systems (설진 시스템 특허동향 분석)

  • Jung, Chang Jin;Lee, Yu Jung;Kim, Jaeuk U.;Kim, Keun Ho
    • The Journal of the Society of Korean Medicine Diagnostics
    • /
    • v.17 no.2
    • /
    • pp.77-89
    • /
    • 2013
  • Objectives Tongue diagnosis is an important diagnostic method in traditional Eastern medicine, and it has a high potential to be used in the future healthcare because of easy, quick, and non-contact measuring features. Recently, research and development efforts on computerized tongue diagnosis systems (CTDS) have been active that led to the technical advancements in the field of photographing techniques, image extraction and classification algorithms. In this study, we analyzed the trends in the CTDS patents. Using the WIPS search engine (www.wipsglobal.com), quantitative and qualitative patent analyses were performed through Korea, China, Japan, U.S.A and Europe. Methods For a systematic search and data analysis, we defined patent categories based on the application area and technical details. By applying thus-obtained categorical key words, we obtained 360 relevant patents on photographing techniques, image extraction and classification algorithms for the purpose of diagnosis or security. Results As a result, companies related to image acquisition, medical imaging and mobile devices and research groups of universities in East Asia were major patent applicants. In all the five countries, the number of patents have been increasing since 1980. In particular, technology related to color correction and image segmentation were most actively patented categories, and expected to continue a high application rate.

Influence of Mobile Bookstore Application Service Quality on User Satisfaction and Reuse Intention (모바일 서점 애플리케이션 서비스 품질이 고객만족과 재사용 의도에 미치는 영향)

  • Kim, Sun-Young;Oh, Kyung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.535-546
    • /
    • 2015
  • Using mobile bookstore application is increasing in accordance with the proliferation of internet and mobile devices. In this circumstances, the purpose of this study is to explore the factors regarding to mobile bookstore application quality evaluation are effecting to customer satisfaction and reuse intention. Thus information, transaction, design, communication, ubiquitous access, personalization, safety are set as a quality evaluation factor. And it is analyzed the effect of these factors to customer satisfaction and reuse intention with path analysis method. As the result, transaction, ubiquitous access, personalization, safety factors effected customer satisfaction and customer satisfaction effected reuse intention. These results show that user mainly access mobile bookstore application for purchasing book. Thus it is important for mobile bookstore operator to keep the application accessed anytime, and serve personalized information, and simplify transaction process, and intensify security for protecting personal or transaction information.

Design of High-Speed VPN for Large HD Video Contents Transfer (대용량 HD 영상콘텐츠 고속전송 VPN(Virtual Private Network)의 설계)

  • Park, Hyoungy-Ill;Shin, Yong-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.111-118
    • /
    • 2012
  • When broadcasters want immediately a variety of VOD files in a distributed server of them data centers and away contents provider, CPs of different platform to exchange high-quality HD, 3DTV video and other video files over the IP networks of high-performance that can be transferred quickly and must be configured quickly. This paper, by using an optional encryption method to complement a QoS and security of public network, suggests high speed and secure content transmission protocol such as VPN(Virtual Private Network) for large video files and big data. As configured high performance VPN, end to end devices use the best of available resources over public network by parallel transfer protocol and the secure content delivery network.

Development of a Real-time Simulation Technique for Cyber-physical System (사이버 물리 시스템을 위한 실시간 시뮬레이션 기술 개발)

  • Kim, Jiyeon;Kim, Hyung-Jong;Kang, Sungjoo
    • Journal of the Korea Society for Simulation
    • /
    • v.23 no.4
    • /
    • pp.181-188
    • /
    • 2014
  • Heterogeneous physical systems and computational devices are incorporated on a large-scale in a CPS (cyber-physical system) environment. Simulations can be useful for the reliable behaviors of CPSs. Time synchronization is one of major technical issues for the simulations. In the CPS, distributed systems control themselves by interacting with each other during runtime. When some simulation models have high complexity, wrong control commands as well as incorrect data can be exchanged due to the time error. We propose a time synchronization algorithm for the hybrid model that has characteristics of both continuous time systems and discrete event systems. In addition, we develop a CPS simulator based on our algorithm. For the verification of the algorithm and the execution of the simulator, we develop an example hybrid model and simulate considering user controls as well as interactions among the distributed systems.

A Study on Amplification DRDoS Attacks and Defenses (DRDoS 증폭 공격 기법과 방어 기술 연구)

  • Choi, Hyunsang;Park, Hyundo;Lee, Heejo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.5
    • /
    • pp.429-437
    • /
    • 2015
  • DDoS attacks have been used for paralyzing popular Internet services. Especially, amplification attacks have grown dramatically in recent years. Defending against amplification attacks is challenging since the attacks usually generate extremely hugh amount of traffic and attack traffic is coming from legitimate servers, which is hard to differentiate from normal traffic. Moreover, some of protocols used by amplification attacks are widely adopted in IoT devices so that the number of servers susceptible to amplification attacks will continue to increase. This paper studies on the analysis of amplification attack mechanisms in detail and proposes defense methodologies for scenarios where attackers, abused servers or victims are in a monitoring network.

Study on Component-Based Middleware for IoT Service Scalability (IoT 서비스 확장성을 고려한 컴포넌트 기반의 미들웨어에 관한 연구)

  • Shin, Seung-Hyeok
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.4
    • /
    • pp.330-337
    • /
    • 2015
  • A service in the environments of internet of things (IoT) exist various types with automation facilities and sensors. There can configure so many communication protocols to networking facilities and sensors. To provide efficient various kind of service, a middleware platform, is based on the internet protocol network, is needed a unified access with devices, controlling and monitoring huge kind of facilities and sensors, to provide a efficient IoT service and application configurations. In this paper, we propose a middleware that an application and service interact with automation facilities and monitor sensors. The proposed middleware is designed with adapter pattern that one of the software engineering design pattern. The adapter pattern is to ensure communication with each sensor and to make sure of service scalability. Finally, the proposed component middleware shows that variety sensors can be easily configure the service in the IoT environment.