• Title/Summary/Keyword: User Identification

Search Result 576, Processing Time 0.023 seconds

Measurement of Human Behavior and Identification of Activity Modes by Wearable Sensors

  • Kanasugi, Hiroshi;Konishi, Yusuke;Shibasaki, Ryosuke
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1046-1048
    • /
    • 2003
  • Recently, various researches in respect of the positioning technologies using satellites and the other sensors have made location-based services (LBS) more common and accurate. Consequently, concern about position information has been increasing. However, since these positioning systems only focus on user's position, it is difficult to know the user's attitude or detailed behaviors at the specific position. It is worthy to study on how to acquire such human attitude or behavior, because those information is useful to know the context of the user. In this paper, the sensor unit consisting of three dimensional accelerometer was attached to human body, and autonomously measured the perpendicular acceleration of ordinary human behaviors including activity modes such as walking, running, and transportation mode using transportation such as a train, a bus, and an elevator. Subsequently, using the classified measurement results, the method to identify the human activity modes was proposed.

  • PDF

Mobile Subscriber Roaming n Different Mobile Networks Using UIM and PASM

  • Park, Jeong-Hyun;Yang, Jeong-Mo
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.445-448
    • /
    • 2003
  • During a time when cellular systems are being deployed in massive scale worldwide, international roaming is becoming increasingly important. This paper presents UIM (User Identification Module) for mobility support, authentication, and service portability between different mobile systems. We also introduce network model based on PASM(Portable Authentication and Mobility Service Machine) which will support signaling protocol and user information conversions with database for roaming between different mobile networks. Stored data types and elements in UIM, logical data structure and configuration, and registration procedures are described here in the case of DCN (Digital CDMA (Code Division Multiple Access) Network System) and GSM (Global System for Mobile Communications).

  • PDF

Identification of Key Nodes in Microblog Networks

  • Lu, Jing;Wan, Wanggen
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.52-61
    • /
    • 2016
  • A microblog is a service typically offered by online social networks, such as Twitter and Facebook. From the perspective of information dissemination, we define the concept behind a spreading matrix. A new WeiboRank algorithm for identification of key nodes in microblog networks is proposed, taking into account parameters such as a user's direct appeal, a user's influence region, and a user's global influence power. To investigate how measures for ranking influential users in a network correlate, we compare the relative influence ranks of the top 20 microblog users of a university network. The proposed algorithm is compared with other algorithms - PageRank, Betweeness Centrality, Closeness Centrality, Out-degree - using a new tweets propagation model - the Ignorants-Spreaders-Rejecters model. Comparison results show that key nodes obtained from the WeiboRank algorithm have a wider transmission range and better influence.

A Method of Risk Assessment for Multi-Factor Authentication

  • Kim, Jae-Jung;Hong, Seng-Phil
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.187-198
    • /
    • 2011
  • User authentication refers to user identification based on something a user knows, something a user has, something a user is or something the user does; it can also take place based on a combination of two or more of such factors. With the increasingly diverse risks in online environments, user authentication methods are also becoming more diversified. This research analyzes user authentication methods being used in various online environments, such as web portals, electronic transactions, financial services and e-government, to identify the characteristics and issues of such authentication methods in order to present a user authentication level system model suitable for different online services. The results of our method are confirmed through a risk assessment and we verify its safety using the testing method presented in OWASP and NIST SP800-63.

Security Threat Identification and Prevention among Secondary Users in Cognitive Radio Networks

  • Reshma, CR.;Arun, kumar B.R
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.168-174
    • /
    • 2021
  • The Cognitive radio (CR) is evolving technology for managing the spectrum bandwidth in wireless network. The security plays a vital role in wireless network where the secondary users are trying to access the primary user's bandwidth. During the allocation the any malicious user either he pretends to be primary user or secondary user to access the vital information's such as credentials, hacking the key, network jam, user overlapping etc. This research paper discusses on various types of attack and to prevent the attack in cognitive radio network. In this research, secondary users are identified by the primary user to access the primary network by the secondary users. The secondary users are given authorization to access the primary network. If any secondary user fails to provide the authorization, then that user will be treated as the malicious user. In this paper two approaches are suggested one by applying elliptic curve cryptography and the other method by using priority-based service access.

Location-Based Device Identification Algorithm for Device-to-Device Communication (기기간 직접통신을 위한 위치 정보 기반의 기기 식별 방법)

  • Park, Eunhye;Kang, Joonhyuk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.10
    • /
    • pp.893-897
    • /
    • 2013
  • Recently the interest on device-to-device (D2D) communication has been increased due to the growing popularization of smart phones and tablet PCs. However, existing device identification mechanisms of D2D communication provide a text-based long list of possible devices, which leads the users to avoid to use D2D techniques. In this paper, we propose a location-based device identification technique for D2D communication. This paper describes the algorithm, analyzes its accuracy using analytical models, and verifies the results using computer simulations. The proposed algorithm is more user-friendly and intuitive way than existing D2D techniques.

Contactless User Identification System using Multi-channel Palm Images Facilitated by Triple Attention U-Net and CNN Classifier Ensemble Models

  • Kim, Inki;Kim, Beomjun;Woo, Sunghee;Gwak, Jeonghwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.3
    • /
    • pp.33-43
    • /
    • 2022
  • In this paper, we propose an ensemble model facilitated by multi-channel palm images with attention U-Net models and pretrained convolutional neural networks (CNNs) for establishing a contactless palm-based user identification system using conventional inexpensive camera sensors. Attention U-Net models are used to extract the areas of interest including hands (i.e., with fingers), palms (i.e., without fingers) and palm lines, which are combined to generate three channels being ped into the ensemble classifier. Then, the proposed palm information-based user identification system predicts the class using the classifier ensemble with three outperforming pre-trained CNN models. The proposed model demonstrates that the proposed model could achieve the classification accuracy, precision, recall, F1-score of 98.60%, 98.61%, 98.61%, 98.61% respectively, which indicate that the proposed model is effective even though we are using very cheap and inexpensive image sensors. We believe that in this COVID-19 pandemic circumstances, the proposed palm-based contactless user identification system can be an alternative, with high safety and reliability, compared with currently overwhelming contact-based systems.

A Study on Development of Commercial PIV Utilizing Multimedia (멀티미디어 대응 상용 PIV의 국산화개발에 관한 연구)

  • 최장운
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.22 no.5
    • /
    • pp.652-659
    • /
    • 1998
  • The present study is aimed to develop a new PIV operating software through optimization of vector tracking identification including versatile pre-processings and post-processing techniques. And the result exhibits an improved version corresponding various input and output multimedia compared to previous commercial software developed by other makers. An upgraded identification method called grey-level cross correlation coefficient method by direct calculation is suggested and related user-friendly pop-up menu are also represented. Post-processings comprising turbulence statistics are also introduced with graphic output functions.

  • PDF

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Variable Impedance Control and Fuzzy Inference Based Identification of User Intension for Direct Teaching of a Mobile Robot (이동로봇의 직접교시를 위한 가변 임피던스제어와 퍼지추론 기반 사용자 의도 파악)

  • Ko, Jong Hyeon;Bae, Jang Ho;Hong, Daehie
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.33 no.8
    • /
    • pp.647-654
    • /
    • 2016
  • Controlling a mobile robot using conventional control devices requires skill and experience, and is not intuitive, especially in complex environments. For human-mobile robot cooperation, the direct-teaching method with impedance control has been used most frequently in complex environments. This thesis proposes a new direct-teaching method for a mobile robot utilizing variable impedance control. This includes analysis of user intention, which is changed by force and moment. A fuzzy inference technique is proposed in this thesis for identification of user intension. The direct teaching of a mobile robot based on variable impedance control through fuzzy inference is experimentally verified by comparing its efficiency to that of the conventional impedance control-based direct teaching of a mobile robot. Experimental data, such as the total time consumed, path error time, and the total energy used by the user, were recorded. The results showed that the efficiency of variable impedance control was increased.