• Title/Summary/Keyword: User recognition

Search Result 1,342, Processing Time 0.03 seconds

User Recognition Method using Human Body Impulse Response Signals (인체의 임펄스 응답 신호를 이용한 사용자 인식 방법)

  • Park, Beom-Su;Kang, Eun-Jung;Kang, Taewook;Lee, Jae-Jin;Kim, Seong-Eun
    • Journal of IKEEE
    • /
    • v.24 no.1
    • /
    • pp.120-126
    • /
    • 2020
  • We present a user recognition method using human body impulse response signals. The body compositions vary from person to person depending on the portion of water, muscle, and fat. In the body communication study, the body has been interpreted circuit models using capacitance and resistances, and its characteristics are determined by the body compositions. Therefore, the individual body channel is unique and can be used for user recognition. In this paper, we applied pseudo impulse signals to the left hand and recorded received signals from the right hand. The empirical mode decomposition (EMD) method removed noise from the received signals and 10 peak values are extracted. We set the differences between peak amplitudes as a key feature to identify individuals. We collected data from 6 subjects and achieved accuracy of 97.71% for the user recognition application.

A Study on the effects of Career Development Center Website Users' recognition on Contents Characteristics on User Responses (취업정보센터 웹사이트 이용자의 컨텐츠 특성에 대한 지각이 이용자 반응에 미치는 영향)

  • Seo, Da-hye;Kang, Hye-young
    • Journal of Practical Engineering Education
    • /
    • v.6 no.2
    • /
    • pp.111-117
    • /
    • 2014
  • The purpose of this study aims to examine the effects of Career Development Center website users' recognition on contents characteristics (User Convenience, Information, Customer Service) on user responses (User Satisfaction, User Loyalty). According to the research result, first, Career Development Center of website contents characteristics explained 36.4% User satisfaction, it was affected significantly Information, User Convenience, and Customer Service in order. Second, Career Development Center of website contents characteristics explained 36.2% User loyalty, it was affected significantly Information, Customer Service, and User Convenience in order. Thus, it was important that Web site contents was improved the Users satisfaction and loyalty of Career Development Center Web site.

A Study on the Symbolic Recognition Structure System of Space Design of a Hotel (호텔 공간디자인의 상징적 인식구조체계에 관한 연구)

  • Kim, Jeong-Ah;Kim, Uk
    • Korean Institute of Interior Design Journal
    • /
    • v.17 no.4
    • /
    • pp.92-101
    • /
    • 2008
  • A new paradigm of design lays stress on the world of metaphysical concepts, and various attempts are being made to give meaning to psychological values. Hotel is a memorable place to remind of a special moment in one's life such as travel, marriage, meeting and so on. It also contains even more symbolism than other spaces as it is the place where the most primary and private act takes place apart from one's residence. As a result, it is also possible to communicate the message which a designer intends to convey through the user's recognition in the form of various symbolic expressions in space design. The designer communicates a meaning into a space through a symbolic system and creates a mutual consensus by means of the understanding structure of "designer-space-user". The user's diverse interpretations through a symbol are based on epistemology and consist of the primary, the secondary and the tertiary recognition structure system in the aspect of their contents. The primary structure depends on sensual perception, impressive idea and transcendental recognition based on metaphysical and perceptional association. The secondary structure includes casualty, continuous deduction and rational(integral) recognition. Finally, the tertiary structure is sublimation to the transcendental mental world beyond the boundary of emotion and it is classified into fundamental recognition structure on an object and archetypical recognition structure on an ego. These characteristics can derive systematic understandings and diverse interpretations on the symbol from the space of a hotel through the frame of analysis based on the artistic form of monosemous, polysemous and multidimensional frameworks and symbols. The framework of this analysis includes all the cases, and various methods which haven't been attempted in practice are presented. Therefore this study is not just a simple analysis of space but rather it will serve as a methodological tool for design that allows for various attempts of symbolic design concepts in the recognition structure system.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

The interaction between emotion recognition through facial expression based on cognitive user-centered television (이용자 중심의 얼굴 표정을 통한 감정 인식 TV의 상호관계 연구 -인간의 표정을 통한 감정 인식기반의 TV과 인간의 상호 작용 연구)

  • Lee, Jong-Sik;Shin, Dong-Hee
    • Journal of the HCI Society of Korea
    • /
    • v.9 no.1
    • /
    • pp.23-28
    • /
    • 2014
  • In this study we focus on the effect of the interaction between humans and reactive television when emotion recognition through facial expression mechanism is used. Most of today's user interfaces in electronic products are passive and are not properly fitted into users' needs. In terms of the user centered device, we propose that the emotion based reactive television is the most effective in interaction compared to other passive input products. We have developed and researched next generation cognitive TV models in user centered. In this paper we present a result of the experiment that had been taken with Fraunhofer IIS $SHORE^{TM}$ demo software version to measure emotion recognition. This new approach was based on the real time cognitive TV models and through this approach we studied the relationship between humans and cognitive TV. This study follows following steps: 1) Cognitive TV systems can be on automatic ON/OFF mode responding to motions of people 2) Cognitive TV can directly select channels as face changes (ex, Neutral Mode and Happy Mode, Sad Mode, Angry Mode) 3) Cognitive TV can detect emotion recognition from facial expression of people within the fixed time and then if Happy mode is detected the programs of TV would be shifted into funny or interesting shows and if Angry mode is detected it would be changed to moving or touching shows. In addition, we focus on improving the emotion recognition through facial expression. Furthermore, the improvement of cognition TV based on personal characteristics is needed for the different personality of users in human to computer interaction. In this manner, the study on how people feel and how cognitive TV responds accordingly, plus the effects of media as cognitive mechanism will be thoroughly discussed.

Mobile Game Control using Gesture Recognition (제스처 인식을 활용한 모바일 게임 제어)

  • Lee, Yong-Cheol;Oh, Chi-Min;Lee, Chil-Woo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.629-638
    • /
    • 2011
  • Mobile game have an advantage of mobility, portability, and simple interface. These advantages are useful for gesture recognition based game which should not have much content quantity and complex interface. This paper suggests gesture recognition based mobile game content with user movement could be applied directly to the mobile game wherever recognition system is equipped. Gesture is recognized by obtaining user area in image from the depth image of TOF camera and going through SVM(Support Vectorn Machine) using EOH(Edge Of Histogram) features of user area. And we confirmed that gesture recognition can be utilized to user input of mobile game content. Proposed technique can be applied to a variety of content, but this paper shows a simple way of game contents which is consisted of moving and jumping newly.

An Implementation of the Web Service for Authorization and Speech Recognition in the Mobile Environment (모바일 환경에서 인증과 음성인식을 위한 웹 서비스 구현)

  • Oh Jee-Young;Kim Yoon-Joong;Ko You-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.2
    • /
    • pp.225-232
    • /
    • 2005
  • A PDA has limitation of storage space and inconvenience of Pen-based equipment to input. To solve these problems, this paper implemented that previous Speech Recognition provides using XML(extensile Markup Language) Web Service and PDA Client is possible to use speech command by request Speech Recognition Web Service. This system consists of Mobile Client and Speech Recognition Web Service Provider. The Mobile Client transmits user information and speech data to the Speech Recognition Web Service Provider using DIME(Direct Internet Message Encapsulation). The Speech Recognition Web Service Provider returns recognition results and user name only to an authorized Mobile Client. So We are able to use speech service without installing Speech Recognition or Speech DB in PDA.

  • PDF

Development Strategy for Utilization of ECVAM using the User Survey (사용자 만족도 조사를 통한 국토환경성평가지도 발전방안 연구)

  • Song, Wonkyong;Kim, Eunyoung;Jeon, Seong-Woo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.15 no.4
    • /
    • pp.111-118
    • /
    • 2012
  • The purpose of this study is to work out strategy for utilization of Environmental Conservation Value Assessment Map (ECVAM) using the user survey. It surveyed system users of ECVAM about its recognition and satisfaction. The results of the survey, the ECVAM became more popular and were highly satisfied with updated data. Especially, the study found a relationship between the satisfaction of ECVAM and accuracy, utilization, and convenience of the system. However, the satisfaction has a difference between user groups, a government official and a agent for EIA including researchers. The satisfaction of the agent group was affected by the convenience, the accuracy, and the utilization in order. In the other hand, the satisfaction of the government official group was affected by the utilization, the convenience, the accuracy, and recognition in order. Therefore, we need to adopt different strategies for educations of ECVAM and publicity activities depending on user groups. To increase the satisfaction of ECVAM, we should research not only to attain pinpoint accuracy, but also to suggest the guideline to utilize the map for a government official.

An Implementation of User Identification System Using Hrbrid Biomitic Distances (복합 생체 척도 거리를 이용한 사용자 인증시스템의 구현)

  • 주동현;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper we proposed the user identification system using hybrid biometric information and non-contact IC card to improve the accuracy of the system. The hybrid biometric information consists of the face image, the iris image, and the 4-digit voice password of user. And the non-contact IC card provides the base information of user If the distance between the sample hybrid biometric Information corresponding to the base information of user and the measured biometric information is less than the given threshold value, the identification is accepted. Otherwise it is rejected. Through the result of experimentation, this paper shows that the proposed method has better identification rate than the conventional identification method.

  • PDF

Secure User Authentication Scheme Based on Facial Recognition for Smartwork Environment (스마트워크 환경에 적합한 얼굴인식 기반 사용자 인증 기법)

  • Byun, Yun-Sang;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.3
    • /
    • pp.314-325
    • /
    • 2013
  • Smartwork is future-oriented work-environment to bring swift business transaction and convenient for users. In domestic and foreign various countries, It's already prompting introduction of smartwork. Users process work to access frequently from the outside in smartwork that's a similar client/server environment to existing Cloud Computing environment. Necessary of user authentication is increasing to be solvable to security vulnerability because there is possibility that malware flows in and leaks company's confidential information by unauthorized users especially in smartwork environment. Therefore we propose User Authentication scheme based face recognition is applicable to smartwork environment to analyze established User Authentication scheme. environment.