• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.028 seconds

The Effect on the Contents of Self-Disclosure Activities using Ubiquitous Home Robots (자기노출 심리를 이용한 유비쿼터스 로봇 콘텐츠의 효과)

  • Kim, Su-Jung;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.57-63
    • /
    • 2008
  • This study uses the identification which is one of the critical components of psychological mechanism and enables replacing one's own self because of the needs of self-expression(disclosure) and creation. The study aims to improve educational effects using the realistic by increasing sense of the virtual reality and the attention. After the computer-based contents were developed and converted to be applied into robot, and then the contents were combined the student's photo and the avatar using automatic loading. Finally each one of the contents was applied to the students. The results of the investigation indicated that there were significant effects of the contents based on identification. In other words, the contents effect on student's attention, but not their academic achievement. The study could find the effect of the identification's application using the educational robot. We suggested that improving technical ability of the augmented virtuality as a face-detection and sensitive interaction may lead to the specific suggestions for educational effects for further research.

  • PDF

GIS Application for 1-1-9 Caller Location Information System (GIS를 이용한 신고자 위치표시 시스템 개발)

  • Hahm, Chang-Hahk;Jeong, Jae-Hu;Ryu, Joong-Hi;Kim, Eung-Nam
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.8 no.1 s.15
    • /
    • pp.97-103
    • /
    • 2000
  • The main purpose of 1-1-9 Caller Location Information System is to identify and display the precise location of emergency incidents such as natural or man - made fires, medical emergencies and accidents. The state - of- the - art technologies such as Am (Automatic Number Identification), GIS(Geographical Information System) and GPS (Global Positioning System) were applied and integrated in the system for efficient and effective location identification. It displays a radius of 25M, 50M and 100M on the map after location identification. The system can also provide the shortest path to an incident location from a fire station or a fire engine. In case of a fire breakout in or near a building, the attribute information of the building, called a building attribute card, is displayed along with the map location. The system then matches the information with the fire situation and sends an alert to a responsible fire station by phone or fax in order to help promptly react to the problem. An attribute card includes the critical information of a premise such as building's location, number of stories, floor plans, capacity, construction history, indoor fire detection and Prevention facilities, etc.

  • PDF

A Fingerprint Identification System using Large Database (대용량 DB를 사용한 지문인식 시스템)

  • Cha, Jeong-Hee;Seo, Jeong-Man
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.203-211
    • /
    • 2005
  • In this paper, we propose a new automatic fingerprint identification system that identifies individuals in large databases. The algorithm consists of three steps; preprocessing, classification, and matching, in the classification. we present a new classification technique based on the statistical approach for directional image distribution. In matching, we also describe improved minutiae candidate pair extraction algorithm that is faster and more accurate than existing algorithm. In matching stage, we extract fingerprint minutiaes from its thinned image for accuracy, and introduce matching process using minutiae linking information. Introduction of linking information into the minutiae matching process is a simple but accurate way, which solves the problem of reference minutiae pair selection in comparison stage of two fingerprints quickly. This algorithm is invariant to translation and rotation of fingerprint. The proposed system was tested on 1000 fingerprint images from the semiconductor chip style scanner. Experimental results reveal false acceptance rate is decreased and genuine acceptance rate is increased than existing method.

  • PDF

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

An adaptive load balancing method for RFID middlewares based on the Standard Architecture (RFID 미들웨어 표준 아키텍처에 기반한 적응적 부하 분산 방법)

  • Park, Jae-Geol;Chae, Heung-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.73-86
    • /
    • 2008
  • Because of its capability of automatic identification of objects, RFID(Radio Frequency Identification) technologies have extended their application areas to logistics, healthcare, and food management system. Load balancing is a basic technique for improving scalability of systems by moving loads of overloaded middlewares to under loaded ones. Adaptive load balancing has been known to be effective for distributed systems of a large load variance under unpredictable situations. There are needs for applying load balancing to RFID middlewares because they must efficiently treat vast numbers of RFID tags which are collected from multiple RFID readers. Because there can be a large amount of variance in loads of RFID middlewares which are difficult to predict, it is desirable to consider adaptive load balancing approach for RFID middlewares, which can dynamically choose a proper load balancing strategy depending on the current load. This paper proposes an adaptive load balancing approach for RFID middlewares and presents its design and implementation. First we decide a performance model by a experiment with a real RFID middleware. Then, a set of proper load balancing strategies for high/medium/low system loads is determined from a simulation of various load balancing strategies based on the performance model.

Study on the Swine Farming Facilities by Survey for the Development of the Optimum Production System Models (최적화 생산시스템 모델 개발을 위한 양돈시설의 조사 연구)

  • 장동일;이봉덕;조한근;장홍희
    • Journal of Animal Environmental Science
    • /
    • v.2 no.1
    • /
    • pp.1-11
    • /
    • 1996
  • This study was conducted to analyze the present status and the levels of mechanization and automation for raising, feeding, water supply, propagation, health management, ventilation and heat control, data analysis, and etc, and to establish the guide of the future study on development of the optimum production system models of swine facility from the results of this analysis. The scheme of the future study on the development of the optimum production system model of swine facility was established as follows : 1. A Korean and environmental control type slatted windowless swine housing model would be developed according to the following basis : \circled1 Boars, gilts and sows, delivery sows should be raised individually and piglets, growing pigs, and finishing pigs should be raised in group. \circled2 The arrangement of furrowing house were two rows of furrowing crates facing the center aisle. 2. The environmental control system and waste management system that are suitable to Korean and environmental control type slatted windowless swine housing model would be developed. 3. An electronic identification device would be developed. 4. The automatic individual wet feeding system by electronic identification device and computers would be developed. 5. The individual management system would be developed, which could manage individually the breeding pigs by the electronic identification device. 6. An expert system would be developed, which could manage the health and data base of pigs.

  • PDF

A Design and Implementation of 2.4GHz Active RFID Reader Protocol using Channel Switching (채널 스위칭을 이용한 2.4GHz 능동형 RFID 리더 프로토콜 설계 및 구현)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.95-98
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the informatin and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. there is ISO/IEC 18000-7 as typical standard of active RFID. it is single channel system of 433.92MHz and has limitation of collection of a number of tags. to overcome limitation of collection of many tags, we propose the new 2.4GHz active RFID technology which can use the multi-channel. if reader has multi-interface and uses another channel in each, reader could fast collect the tags. but, if a reader which has many interfaces collects tags through the specific interface, the performance may not improve any more comparing with a reader using single interface. in this paper, we show the fast collection through design and implementation of protocol for load balancing between interfaces in multi-interface RFID reader.

  • PDF

A Channel Allocation Protocol for Collision Avoidance between Reader in 2.4GHz Multiple Channel Active RFID System (2.4GHz 다중채널 능동형RFID시스템에서 리더간 충돌회피를 위한 채널 할당 프로토콜)

  • Kim, Dong-Hyun;Lee, Chae-Suk;Kim, Jong-deok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.139-142
    • /
    • 2009
  • RFID(Radio Frequency IDentification) technology is an automatic identification method using radio frequencies between RFID reader which collects the information and tag which transmits the information. RFID technology develops passive RFID which transmit the only ID to active RFID which transmit the additional information such as sensing information. However, ISO/IEC 18000-7 as active RFID standard has a problem which cannot use multiple channel. To solve this problem, we use the 2.4GHz bandwidth technology and we propose the dynamic channel allocation method which can efficiently allot a channel. we show the operation of the dynamic channel allocation method through design and implement with CC2500DK of Taxas Instrument.

  • PDF

Design and Implementation of Machine Learning-based Blockchain DApp System (머신러닝 기반 블록체인 DApp 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, we developed a web-based DApp system based on a private blockchain by applying machine learning techniques to automatically identify Android malicious apps that are continuously increasing rapidly. The optimal machine learning model that provides 96.2587% accuracy for Android malicious app identification was selected to the authorized experimental data, and automatic identification results for Android malicious apps were recorded/managed in the Hyperledger Fabric blockchain system. In addition, a web-based DApp system was developed so that users who have been granted the proper authority can use the blockchain system. Therefore, it is possible to further improve the security in the Android mobile app usage environment through the development of the machine learning-based Android malicious app identification block chain DApp system presented. In the future, it is expected to be able to develop enhanced security services that combine machine learning and blockchain for general-purpose data.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.