• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.03 seconds

Preliminary semi-quantitative evaluation of developed latent fingerprints on non-porous surface with natural powders using a densitometric image analysis (비 다공성 표면에서 천연분말로 현출된 잠재지문의 농도계 이미지분석을 이용한 예비적인 반 정량적 평가)

  • Kim, Eun-Mi;Heo, Bo-Reum;Ok, Yun-Seok;Kim, Jin-Kyung;Joung, In-Nam;Choi, Sung-Woon
    • Analytical Science and Technology
    • /
    • v.29 no.6
    • /
    • pp.283-292
    • /
    • 2016
  • Conventional fingerprint powders used during crime scene investigations pose potential health hazards. Thus, multiple natural replacement powders, including squid ink powder, indigo and rice powder were used to develop (visualize) latent fingerprints on non-porous surfaces (e.g., glass, plastic and tile). Fingerprints developed using the natural powders were compared using the Automatic Fingerprint Identification System (AFIS) with those developed with traditional black powder. The peak areas of ridges were also compared using densitometric image analyses. Collectively, objective and quantitative evaluation methods were developed. The effectiveness of natural powders varied depending on the surface but, in general, squid ink powder performed well on most surfaces. Indigo powder performed well on tile surfaces, while rice powder performed well on glass surfaces. Plastic was the most difficult surface from which to develop fingerprints. Image analysis using Field Emission Scanning Electron Microscopy (SEM) demonstrated the importance of the size and shape of natural powder particles to properly adhere to the ridges. Although densitometric image analyses did not correlate the number of minutiae and ridge peak areas, an unbiased, objective evaluation method would be possible using image analyses with a reference image. Additional experimentation will yield safe and cost-effective natural powders with which adequate fingerprint development can be performed.

A Secure AIS Protocol Suggestion with Analyses of the Standard AIS Protocol (표준 AIS 프로토콜 분석을 통한 보안 AIS 프로토콜 제안)

  • Lee, Jung-Su;Heo, Ouk;Kim, Jae-Hwan;Chung, Sung-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.49-57
    • /
    • 2016
  • Recently, marine accidents such as the sinking accident Mongol freighter ship and the sinking accident of Sewol ferry in Jindo continuously happen. In order to decrease the number of these marine accidents, Korean ships are obliged to follow the AIS(Automatic Identification System) system. The AIS protocol includes all information for sailing ships. However, the standard AIS protocol does not provide any security function, In addition, it is possible to hijack the standard AIS protocol in case of using a satellite communication device called FUNcuve Dongle Pro+. Therefore, this paper analyzes weak points of the security in the standard AIS protocol. Furthermore, this paper ensures reliability by marking the MAC Address of sender and receiver for secure communication and suggests the protocol that can securely send data, using the VPN Tunnelling method. Therefore, the suggested AIS protocol provides the secure communication to the AIS protocol and protect the messages in the AIS protocol, which can serve safe voyages by decreasing the marine accidents.

Design and Implementation of Mobile Medical Information System Based Radio Frequency IDentification (RFID 기반의 모바일 의료정보시스템의 설계 및 구현)

  • Kim, Chang-Soo;Kim, Hwa-Gon
    • Journal of radiological science and technology
    • /
    • v.28 no.4
    • /
    • pp.317-325
    • /
    • 2005
  • The recent medical treatment guidelines and the development of information technology make hospitals reduce the expense in surrounding environment and it requires improving the quality of medical treatment of the hospital. That is, with the new guidelines and technology, hospital business escapes simple fee calculation and insurance claim center. Moreover, MIS(Medical Information System), PACS(Picture Archiving and Communications System), OCS(Order Communicating System), EMR(Electronic Medical Record), DSS(Decision Support System) are also developing. Medical Information System is evolved toward integration of medical IT and situation si changing with increasing high speed in the ICT convergence. These changes and development of ubiquitous environment require fundamental change of medical information system. Mobile medical information system refers to construct wireless system of hospital which has constructed in existing environment. Through RFID development in existing system, anyone can log on easily to Internet whenever and wherever. RFID is one of the technologies for Automatic Identification and Data Capture(AIDC). It is the core technology to implement Automatic processing system. This paper provides a comprehensive basic review of RFID model in Korea and suggests the evolution direction for further advanced RFID application services. In addition, designed and implemented DB server's agent program and Client program of Mobile application that recognized RFID tag and patient data in the ubiquitous environments. This system implemented medical information system that performed patient data based EMR, HIS, PACS DB environments, and so reduced delay time of requisition, medical treatment, lab.

  • PDF

A Study on Displaying the Flag for Indicating the Nationality of Ships (선박 국적 표시를 위한 국기 게양에 대한 고찰)

  • Yun, Gwi-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.4
    • /
    • pp.465-473
    • /
    • 2021
  • Since the past, ships have hoisted national flags as a means of indicating their nationality. Both domestically and internationally, laws and conventions related to the nationality and hoisting of the flag have been enacted because it is significant that the nationality of a ship is a matter of the jurisdiction of the ship. Nevertheless, there are differences in domestic and international regulations related to the hoisting of the flag of a ship, and if the flag is not hoisted irrespective of the intention, there may be a difference in interpretation as to whether or not the ship will be regarded unconditionally as a stateless ship. However, there is no disagreement locally or abroad about the necessity of indicating the nationality of ships. Therefore, I would like to propose a method to indicate and confirm the nationality of the ship by using wireless communication equipment with hoisting the flag as the only way to express its nationality, reflecting the situation of the era such as high-speed, larger and unmanned ship. Representatively, the method utilizes the automatic identification system(AIS), which is one of the equipment legally installed in the ship, and includes the ship's nationality in its information. If the nationality information is included in the AIS, nationality can be identified earlier and even from a distance, and there will not be instances of nationality not being identified because the flag is not hoisted or the flag is damaged. In addition, it is expected that the problem of nationality indication can be solved even when vessels are unmanned in future.

Analysis of the Generation Amount of Abandoned Marine Waste from Ships in the Northwest Sea of Jeju Island (제주 북서해역 선박기인 해양폐기물 발생량 분석)

  • Kim, Byung-Yeob;Joo, Hye-Min;Lee, Chang-Heon;Kim, Kwang-Il
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.1
    • /
    • pp.81-87
    • /
    • 2021
  • Many merchant ships sail in the waters surrounding Jeju Island and many fishing vessels catch fish using gill nets, trolling lines, and so on. Meanwhile, marine waste has collected in the coastal waters of Jeju Island. However, there has been little research on the collection of marine waste in coastal waters. In this study, marine waste deposited in Jeju Island's northwest sea was collected using Jeju National University's training ship, and related vessels were analyzed for each gear type. According to the results, most coastal waters had abandoned fishing grounds, which were from fishing vessels, and a large proportion of them was gill net and trap fishing gear. To analyze how much marine waste is accumulating in a certain area and ship's stay time, we use automatic identification system (AIS) data to extract the time spent in the target sea, and the amount of marine waste per hour was analyzed in a unit distance of 1 ㎢. The average amount of marine waste generated per hour in the unit area was found to be 0.94 kg for gillnet fishing gear, 3.49 kg for trap fishing gear, 0.10 kg for trawl fishing gear, 0.11 kg for longline fishing gear, and 0.02 kg for other fishing gear.

A Study on Estimating Ship's Emission in the Port Area of Mokpo Port (목포항 항만구역 내 선박 배기가스 배출량 산정에 대한 연구)

  • Bui, Hai-Dang;Kim, Hwayoung
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.3
    • /
    • pp.47-60
    • /
    • 2023
  • A thorough inventory of ship emissions, particularly ship's emission of in-port area is necessary to identify significant sources of exhaust gases such as NOx, SOx, PM, and CO2 and trends in emission levels over time, and reduce their serious effects on the environment and human health. Therefore, the goal of this study is to assess the volume of emissions from ships in Mokpo port, which serves as a gateway to the southwest coast of Korea, using a bottom-up methodology and data from the automatic identification system (AIS) and the Korean Port Management Information System (Port-MIS). In this work, an analysis of ship movement utilizing AIS data and an actual set of data on ship specification were gathered. By examining ship movement using AIS data, We also proposed a new approach for identifying cruising/maneuvering mode. Finally, the results were classified by ship operating mode, by exhaust gas, by ship type, and by berth, which provides a thorough and in-depth analysis of the air pollution caused by ships in Mokpo port.

Automation of Bio-Industrial Process Via Tele-Task Command(I) -identification and 3D coordinate extraction of object- (원격작업 지시를 이용한 생물산업공정의 생력화 (I) -대상체 인식 및 3차원 좌표 추출-)

  • Kim, S. C.;Choi, D. Y.;Hwang, H.
    • Journal of Biosystems Engineering
    • /
    • v.26 no.1
    • /
    • pp.21-28
    • /
    • 2001
  • Major deficiencies of current automation scheme including various robots for bioproduction include the lack of task adaptability and real time processing, low job performance for diverse tasks, and the lack of robustness of take results, high system cost, failure of the credit from the operator, and so on. This paper proposed a scheme that could solve the current limitation of task abilities of conventional computer controlled automatic system. The proposed scheme is the man-machine hybrid automation via tele-operation which can handle various bioproduction processes. And it was classified into two categories. One category was the efficient task sharing between operator and CCM(computer controlled machine). The other was the efficient interface between operator and CCM. To realize the proposed concept, task of the object identification and extraction of 3D coordinate of an object was selected. 3D coordinate information was obtained from camera calibration using camera as a measurement device. Two stereo images were obtained by moving a camera certain distance in horizontal direction normal to focal axis and by acquiring two images at different locations. Transformation matrix for camera calibration was obtained via least square error approach using specified 6 known pairs of data points in 2D image and 3D world space. 3D world coordinate was obtained from two sets of image pixel coordinates of both camera images with calibrated transformation matrix. As an interface system between operator and CCM, a touch pad screen mounted on the monitor and remotely captured imaging system were used. Object indication was done by the operator’s finger touch to the captured image using the touch pad screen. A certain size of local image processing area was specified after the touch was made. And image processing was performed with the specified local area to extract desired features of the object. An MS Windows based interface software was developed using Visual C++6.0. The software was developed with four modules such as remote image acquisiton module, task command module, local image processing module and 3D coordinate extraction module. Proposed scheme shoed the feasibility of real time processing, robust and precise object identification, and adaptability of various job and environments though selected sample tasks.

  • PDF

A Study on the RFID Biometrics System Based on Hippocampal Learning Algorithm Using NMF and LDA Mixture Feature Extraction (NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에 관한 연구)

  • Oh Sun-Moon;Kang Dae-Seong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.4 s.310
    • /
    • pp.46-54
    • /
    • 2006
  • Recently, the important of a personal identification is increasing according to expansion using each on-line commercial transaction and personal ID-card. Although a personal ID-card embedded RFID(Radio Frequency Identification) tag is gradually increased, the way for a person's identification is deficiency. So we need automatic methods. Because RFID tag is vary small storage capacity of memory, it needs effective feature extraction method to store personal biometrics information. We need new recognition method to compare each feature. In this paper, we studied the face verification system using Hippocampal neuron modeling algorithm which can remodel the hippocampal neuron as a principle of a man's brain in engineering, then it can learn the feature vector of the face images very fast. and construct the optimized feature each image. The system is composed of two parts mainly. One is feature extraction using NMF(Non-negative Matrix Factorization) and LDA(Linear Discriminants Analysis) mixture algorithm and the other is hippocampal neuron modeling and recognition simulation experiments confirm the each recognition rate, that are face changes, pose changes and low-level quality image. The results of experiments, we can compare a feature extraction and learning method proposed in this paper of any other methods, and we can confirm that the proposed method is superior to the existing method.

Automatic generation of higher level design diagrams (상위 수준 설계 도면의 자동 생성)

  • Lee, Eun-Choul;Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.11
    • /
    • pp.23-32
    • /
    • 2005
  • The automatic generation of circuit diagrams has been practically used in the HDL based design for decades. Nevertheless, the diagrams became too complicated for the designers to identify the signal flows in the RTL and system level designs. In this paper, we propose four techniques to enhance the roadability of the complicated diagrams. They include i) the transformation of repetitive instances and terminals into vector forms, ii) an improved loop breaking algorithm, iii) a flat tap which simplifies the two level bus ripping structure that is required for the connection of a bundle net to multiple buses, and iv) the identification of block strings, and alignment of the corresponding blocks. Towards validating the proposed techniques, the diagrams of an industrial strength design m generated. The complexity of the diagrams has been reduced by up to $90\%$ in terms of the number of wires, the aggregate wire length, and the area.

A Study on Deobfuscation Method of Android and Implementation of Automatic Analysis Tool (APK에 적용된 난독화 기법 역난독화 방안 연구 및 자동화 분석 도구 구현)

  • Lee, Se Young;Park, Jin Hyung;Park, Moon Chan;Suk, Jae Hyuk;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1201-1215
    • /
    • 2015
  • Obfuscation tools can be used to protect android applications from reverse-engineering in android environment. However, obfuscation tools can also be misused to protect malicious applications. In order to evade detection of anti-virus, malware authors often apply obfuscation techniques to malicious applications. It is difficult to analyze the functionality of obfuscated malicious applications until it is deobfuscated. Therefore, a study on deobfuscation is certainly required to address the obfuscated malicious applications. In this paper, we analyze APKs which are obfuscated by commercial obfuscation tools and propose the deobfuscation method that can statically identify obfuscation options and deobfuscate it. Finally, we implement automatic identification and deobfuscation tool, then show the results of evaluation.