• Title/Summary/Keyword: identity based

Search Result 2,344, Processing Time 0.035 seconds

Performance Analysis of Face Recognition by Face Image resolutions using CNN without Backpropergation and LDA (역전파가 제거된 CNN과 LDA를 이용한 얼굴 영상 해상도별 얼굴 인식률 분석)

  • Moon, Hae-Min;Park, Jin-Won;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.24-29
    • /
    • 2016
  • To satisfy the needs of high-level intelligent surveillance system, it shall be able to extract objects and classify to identify precise information on the object. The representative method to identify one's identity is face recognition that is caused a change in the recognition rate according to environmental factors such as illumination, background and angle of camera. In this paper, we analyze the robust face recognition of face image by changing the distance through a variety of experiments. The experiment was conducted by real face images of 1m to 5m. The method of face recognition based on Linear Discriminant Analysis show the best performance in average 75.4% when a large number of face images per one person is used for training. However, face recognition based on Convolution Neural Network show the best performance in average 69.8% when the number of face images per one person is less than five. In addition, rate of low resolution face recognition decrease rapidly when the size of the face image is smaller than $15{\times}15$.

A Secure Protocol for Location-Aware Services in VANETs (VANET에서 안전한 위치인지 서비스를 위한 보안 프로토콜)

  • Sur, Chul;Park, Youngho;Rhee, Kyung Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.495-502
    • /
    • 2013
  • In this paper, we present an anonymous authentication and location assurance protocol for secure location-aware services over vehicular ad hoc networks (VANETs). In other to achieve our goal, we propose the notion of a location-aware signing key so as to strongly bind geographic location information to cryptographic function while providing conditional privacy preservation which is a desirable property for secure vehicular communications. Furthermore, the proposed protocol provides an efficient procedure based on hash chain technique for revocation checking to effectively alleviate communication and computational costs on vehicles in VANETs. Finally, we demonstrate comprehensive analysis to confirm the fulfillment of the security objectives, and the efficiency and effectiveness of the proposed protocol.

A new satellite CAS using password-based protocol (패스워드 기반 프로토콜을 이용한 새로운 위성 한정 수신 시스템)

  • Kim, Young-Soo;Sohn, Ki-Wook;Yang, Hyung-Kyu;Won, Dong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3597-3605
    • /
    • 1999
  • We introduce a new satellite Conditional Access System(CAS) that a subscriber could watch a pay-TV knowing only his or her identity and password, without using a smart card. For this new system, two password-based protocols are presented which not only share a session key and authenticate each other but also download an authorization key. This system has some merits: First, compared with current systems, it reduces the amount of computations by eliminating the AK-encryption module in SMS(Subscriber Management System) and simplifying the receiver's CW-decryption process. Second, since this system does not need an expensive Card Adaptive Device(CAD), it can reduce costs. finally it provides descrambler independence allowing it to be used through any TV set-top box that includes a descrambler, unlike the current system that a descrambler is linked with a smart card.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Exploring the Dilemma and Improvement Strategies for the Integrated Management of Extracurricular Education Programs at Duksung Women's University

  • Kim, Young-Jun;Kwon, Ryang-Hee
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.8-15
    • /
    • 2021
  • This study was conducted with the purpose of exploring the dilemma and improvement strategies for the integrated management of extracurricular education programs at Duksung Women's University. The research method was finally composed of a procedure with a meeting of experts based on the procedure of collecting and analyzing the previous research literature. As for the contents of the study, the dilemma of the integrated management of the extracurricular education program at Duksung Women's University was presented first. Examples of dilemmas include difficulties in organizing and operating programs from the perspective of a roadmap customized for each grade level, difficulties in establishing a foundation for balanced mapping of core competencies and cultivating programs, difficulties in managing the performance of regular program monitoring and feedback improvement, and activating the linkage system between subjects and extracurricular education programs difficulties and difficulties in establishing a support system for the operation of the extracurricular education integrated management system were reflected. In addition, a strategy to complement and improve this dilemma was presented in a linkage. As a result of the study, the integrated management dilemma of Duksung Women's University's extracurricular education programs needs to be resolved in the long term through formal infrastructure such as external expert advice and expert exchange, and the development and use of related manuals should be considered aspects were analyzed. In addition, the content of this study was analyzed not only in the educational case of Duksung Women's University, but also in that it deals with cases that can be usefully referenced in most universities that develop and operate extracurricular education programs. Finally, this study presents an evidence-based practices that can be referenced in promoting the integrated management of extracurricular education programs in university sites, and the position and identity of extracurricular education throughout the university curriculum. It is judged that the significance and expected effect of the study can be obtained in that it provides an opportunity to improve from the management point of view.

Public Preferences for Allocation Principles for Scarce Medical Resources in the COVID-19 Pandemic in Korea: Comparisons With Ethicists' Recommendations

  • Lee, Ji-Su;Kim, Soyun;Do, Young Kyung
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.5
    • /
    • pp.360-369
    • /
    • 2021
  • Objectives: The purpose of this study was to investigate public preferences regarding allocation principles for scarce medical resources in the coronavirus disease 2019 (COVID-19) pandemic, particularly in comparison with the recommendations of ethicists. Methods: An online survey was conducted with a nationally representative sample of 1509 adults residing in Korea, from November 2 to 5, 2020. The degree of agreement with resource allocation principles in the context of the medical resource constraints precipitated by the COVID-19 pandemic was examined. The results were then compared with ethicists' recommendations. We also examined whether the perceived severity of COVID-19 explained differences in individual preferences, and by doing so, whether perceived severity helps explain discrepancies between public preferences and ethicists' recommendations. Results: Overall, the public of Korea agreed strongly with the principles of "save the most lives," "Koreans first," and "sickest first," but less with "random selection," in contrast to the recommendations of ethicists. "Save the most lives" was given the highest priority by both the public and ethicists. Higher perceived severity of the pandemic was associated with a greater likelihood of agreeing with allocation principles based on utilitarianism, as well as those promoting and rewarding social usefulness, in line with the opinions of expert ethicists. Conclusions: The general public of Korea preferred rationing scarce medical resources in the COVID-19 pandemic predominantly based on utilitarianism, identity and prioritarianism, rather than egalitarianism. Further research is needed to explore the reasons for discrepancies between public preferences and ethicists' recommendations.

Vest Design Development of Fashion Culture Products based on Korean Style - Application of Traditional Lattice Pattern of Doors - (한국적 디자인을 기본으로 한 패션문화상품 조끼디자인 개발 - 전통 창살문양 응용 -)

  • Choi, Eunjoo
    • Fashion & Textile Research Journal
    • /
    • v.21 no.4
    • /
    • pp.412-419
    • /
    • 2019
  • This study is to help maintain the identity of traditional Korean culture and develop fashion culture products by applying images and composition forms of traditional lattice patterns for vest designs. Lattice can be distinguished as a shape created through intersecting vertical and horizontal lines, in the form of oblique lines in vertical and horizontal structures, and in the form of an oblique line. Lattice patterns represent the overall unity and order as well as the beauty of small spaces created by simple lines. Traditional lattice patterns of the Joseon Dynasty were examined theoretically through the literature. Based on theoretical grounds, there is study illustrates vest designs using Adobe Illustrator CS6 as well as works on a 3D virtual costume using CLO Trial 4.2, a 3D virtual dressing system of CLO Virtual Fashion. This study developed an easy to wear vest design categorized as clothes for both men and women. The geometric formality of the lattice pattern has been applied to fashion culture products. In this study, the design was developed focusing on lattice, kotsal (flower pattern), sosulbitsal (diagonal), sotdaesal, tisal (horizontal & vertical). This study can be used as basic data in the domestic fashion cultural product market that can help maintain the originality of Korean culture in the global era that also assists in the successful promotion of Korean culture and traditions.

The Characteristics, Preservation and Utilization Plan of Namwon Area Tombs (남원지역 고분군의 성격과 보존 및 활용 방안)

  • Kim, Nak-Jung
    • Korean Journal of Heritage: History & Science
    • /
    • v.51 no.2
    • /
    • pp.58-77
    • /
    • 2018
  • The tomb is an important clue for understanding the ancient society of Namwon (南原). In order to establish local identity through the burial mounds and appropriately preserve and utilize it, basic investigation should be conducted to grasp the current situation of the burials. Additionally, excavation surveys and research are needed to understand the nature of the tombs. Based on this activity, local people should be informed about the importance of the tombs and participate in the preservation and utilization activities together. Preservation and utilization should be of the complex type. However, it should be improved systematically based on the fact that the tombs have not been properly investigated. In order to do this, the related organizations and budgets should be allocated at all times in Namwon City.

The Effect of Compassion on Job Performance: Focusing on the Creating Research Model through Qualitative Research (공감(compassion)이 업무성과에 미치는 영향 : 질적 연구를 통한 연구모형 개발을 중심으로)

  • Ko, Sung-Hoon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.6
    • /
    • pp.65-74
    • /
    • 2019
  • The purpose of this study is to reveal the causal relationship between core categories experienced by firefighters in the organization based on the grounded theory as a method of qualitative research. In this study, we interviewed 50 firefighter information providers who work in Seoul in 2014, 2017, and 2018, and conducted a research model that shows the causal relationship of core categories through open coding, axial coding, and selective coding. As a result, compassion experienced by information providers is revealed as a core category, and this compassion has a positive effect on positive work related identity, collective self esteem, and job performance. Therefore, the theoretical implication of this study is that it has derived a research model that shows the causal relationship between compassion and job performance based on grounded theory as a qualitative research methodology. This study will contribute to the formation of the organizational culture that enables firefighters who desperately need compassion in the fire department organization to more actively exchange compassionate actions.

Seeking for Underlying Meaning of the 'house' and Characteristics in Music Video - Analyzing Seotaiji and Boys and BTS Music Video in Perspective of Generation - ( 뮤직비디오에 나타난 '집'의 의미와 성격 - 서태지와 아이들, 방탄소년단 작품에 대한 세대론적 접근 -)

  • Kil, Hye Bin;Ahn, Soong Beum
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.24-34
    • /
    • 2019
  • This study compares in depth the song performed by two groups, one by 'Seo Taiji And His Boys'(X Generation) and the other by 'BTS'(C Generation) based on the discourse about the 'X Generation' in the 1990s and the 'C Generation' in the 2010s. It will specifically focus on the nature of 'home' that has great significance in the music video and will find the sociocultural meaning of it. Based on the analysis, the original performance by 'Seo Taiji and The Boys' demonstrated the vertical structure of enlightenment and discipline and narrated the story with the plot of 'maturity'. The meaning of 'home' in the original version shifts from a target of resistance to a subject of internalization. The remake music video of BTS demonstrated a horizontal structure of empathy and solidarity and narrated the story with the plot of 'pursuit/discovery'. The 'home' here can be considered the life itself of a person who maintains one's self identity.