• Title/Summary/Keyword: security information

Search Result 17,850, Processing Time 0.042 seconds

PCA 알고리즘과 개선된 퍼지 신경망을 이용한 여권 인식 및 얼굴 인증

  • Jung Byung-Hee;Park Choong-Shik;Kim Kwang-Baek
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2006.06a
    • /
    • pp.336-343
    • /
    • 2006
  • 본 논문에서는 여권 영 상에서 PCA 알고리즘을 이용한 얼굴 인증과 개선된 퍼지 신경망을 이용한 여권 코드 인식 방법을 제안한다. 본 논문에서는 여권영상에 대해 소벨 연산자를 이용하여 에지를 추출하고 에지가 추출된 영상을 수평 스미어링하여 여권코드 영역을 추출한다. 추출된 여권 코드 영역의 기울기를 검사하여 기울기 보정을 하고, 여권 코드 영역을 이진화 한다. 이진화된 여권 코드 영역에 대하여 8방향윤곽선 추적 알고리즘을 적용하여 여권 코드를 추출한다. 추출된 여권 코드는 퍼지 신경망을 개선하여 여권 코드 인식에 적용한다. 개선된 퍼지 신경 망은 입력층과 중간층 사이의 학습 구조로는 FCM 클러스터링 알고리즘을 적용하고 중간층과 출력층 사이의 학습은 일반화된 델타학습 방법을 적용한다. 그리고 학습 성능을 개선하기 위하여 중간층과 출력층의 가중치 조정에 적용되는 학습률을 동적으로 조정하기 위해 퍼지 제어 시스템을 적용한다. 제안된 퍼지 신경망은 목표값과 출력값의 차이에 대한 절대값이 ${\epsilon}$ 보다 적거나 같으면 정확으로 분류하고 크면 부정확으로 분류하여 정확의 총 개수를 퍼지 제어 시스템에 적용하여 학습률과 모멘텀을 동적으로 조정한다. 여권의 주어진 규격에 근거하여 사진 영역을 추출하고 추출된 사진 영역에 대하여 YCbCr와 RGB 정보를 이용하여 얼굴영역을 추출한다. 추출된 얼굴 영역을 PCA 알고리즘과 스냅샷(Snap-Shot) 방법을 적용하여 얼굴 영역의 위조를 판별한다. 제안된 방법의 여권 코드 인식과 얼굴 인증의 성능을 평가하기 위하여 실제 여권 영상에 적용한 결과, 기존의 방법보다 여권 코드 인식과 얼굴 인증에 있어서 효율적인 것을 확인하였다.s, whereas AVs provide much better security.크는 기준년도부터 2031년까지 5년 단위로 계획된 장래도로를 반영하여 구축된다. 교통주제도 및 교통분석용 네트워크는 국가교통DB구축사업을 통해 구축된 자료로서 교통체계효율화법 제9조의4에 따라 공공기관이 교통정책 및 계획수립 등에 활용할 수 있도록 제공하고 있다. 건설교통부의 승인절차를 거쳐 제공하며 활용 후에는 갱신자료 및 활용결과를 통보하는 과정을 거치도록 되어있다. 교통주제도는 국가의 교통정책결정과 관련분야의 기초자료로서 다양하게 활용되고 있으며, 특히 ITS 노드/링크 기본지도로 활용되는 등 교통 분야의 중요한 지리정보로서 구축되고 있다..20{\pm}0.37L$, 72시간에 $1.33{\pm}0.33L$로 유의한 차이를 보였으므로(F=6.153, P=0.004), 술 후 폐환기능 회복에 효과가 있다. 4) 실험군과 대조군의 수술 후 노력성 폐활량은 수술 후 72시간에서 실험군이 $1.90{\pm}0.61L$, 대조군이 $1.51{\pm}0.38L$로 유의한 차이를 보였다(t=2.620, P=0.013). 5) 실험군과 대조군의 수술 후 일초 노력성 호기량은 수술 후 24시간에서 $1.33{\pm}0.56L,\;1.00{\ge}0.28L$로 유의한 차이를 보였고(t=2.530, P=0.017), 술 후 72시간에서 $1.72{\pm}0.65L,\;1.33{\pm}0.3L$로 유의한 차이를 보였다(t=2.540, P=0.016). 6) 대상자의 술 후 폐환기능에 영향을 미치는 요인은 성별로 나타났다. 이에 따

  • PDF

An Empirical Study on the Influencing Factors of Intention to Adoption of Mobile Government Service (모바일 전자정부 서비스 수용의도의 영향요인에 관한 연구)

  • Han, Kihun;Kim, Jinsoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.77-104
    • /
    • 2013
  • Mobile technology is accelerating innovative changes across all fields of our society as well as business environments. Especially, demands on mobile government (M-government) services have been increased gradually since e-government has improved national administration services dramatically. However, high-quality services which are acceptable to may users are not actually supplied because technical issues such as security on mobile e-government services have not solved and governance policy was not established yet. Previous studies show that most researches are devoted to technical ones or limited to theoretical exploratory study. As a result, developing useful guidelines which are practically and theoretically proved is one of the very important research issues. This study reviews the previous research works such as concept of mobile, e-government, M-government, technical trends of mobile, market situations, present status, and various case studies. And then we develop a research model with five factors, twenty four variables and seventy six measurement for measuring the influencing factors to adoption of M-government services. The model is composed of total 16 hypotheses, 22 variables, and 76 measurements. The model is analyzed by using statistical package SPSS (18.0) and AMOS (18.0) together with structural equation method based on 294 samples. The results show that the model is valid and there are statistically significant influence between ease of use and usefulness, ease of use and user's satisfactions, usefulness and intent of re-use, and user's satisfactions and intent of re-use, excepting usefulness and user's satisfaction, ease of use and intent of re-use did not affect significant influences. Especially, service quality, system quality, and relationship quality are identified as influencing factors to adaption of M-government service. The results are expected to provide a theoretical research framework which generate new research issues in M-government service area. It also can provide an useful guidelines to practical experts in successfully implementing M-government services. Further research directions are as follows. User's intents have to be studied in details by classifying users by individual, enterprise, and government as well as developing a new hypothetical model. Since M-government service is at the initial stage, longitudinal studies have to be conducted to trace the peoples' need in order to develop new high-quality mobile services.

Discovery of Active Nodes and Reliable Transmission of Active Packets in IP Networks (IP 망에서의 액티브 노드 발견 및 액티브 패킷의 신뢰성 전송 기법)

  • Kim, Bang-Eun;Chae, Ki-Joon;Kim, Dong-Young;Na, Jung-Chan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.361-370
    • /
    • 2004
  • All active nudes which have no physically direct connection with each other in If network must be able to compose and manage network topology Informations. Besides one active program can be performed by the active nodes when every active packet for this program is transmitted without any loss of packets. Also the active packets should be transmitted effectively to minimize the transmission delay and securely from threatens. In this thesis, the discovery scheme of active nodes is adapted for active nodes in IP networks to compose and manage the topology information. The scheme for the efficient, reliable and secure transmission of active packets is also proposed. The sequence number is assigned to every active packet. If a receiver detects the loss of active packet checking the sequence number, the receiver requests the retransmission of the lost packet to the previous active node. kiter receiving an active packet and adapting security and reliability schemes, intermediate active nodes not only copy and send the Packet Instantly but also apply some suity mechanisms to it. And the active packet transmission engine is proposed to provide these transmission schemes The simulation of the adapted active node discovery scheme and the proposed active packet transmission engine is performed. The simulation results show that the adapted active node discovery scheme is efficient and the proposed active engine has the low latency and the high performance.

Hardware Implementation of Real-Time Blind Watermarking by Substituting Bitplanes of Wavelet DC Coefficients (웨이블릿 DC 계수의 비트평면 치환방법에 의한 실시간 블라인드 워터마킹 및 하드웨어 구현)

  • 서영호;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.3C
    • /
    • pp.398-407
    • /
    • 2004
  • In this paper, a blind watermarking method which is suitable to the video compression using 2-D discrete wavelet transform was proposed and implemented into the hardware using VHDL(VHSIC Hardware Description Language). The goal of the proposed watermarking algorithm is the authentication about the manipulation of the watermark embedded image and the detection of the error positions. Considering the compressed video image, the proposed watermarking scheme is unrelated to the quantization and is able to concurrently embed or extract the watermark. We experimentally verified that the lowest frequency subband(LL4) is not sensitive to the change in the spatial domain, so LL4 subband was selected for the mark space. And the combination of the bitplanes which has the properties of both the minimum degradation of the image and the robustness was chosen as the embedded Point in the mark space in LL4 subband. Since we know the watermark embedded positions and the watermark is embedded by not varying the value but changing the value, the watermark can be extracted without the original image. Also, for the security when exposing the watermark embedded position, we embed the encrypted watermark by the block cipher. The proposed watermark algorithm shows the robustness against the general image manipulation and is easily transplanted into the image or video compressor with the minimal changing in the structure. The designed hardware has 4037 LABs(24%) and 85 ESBs(3%) in APEX20KC EP20K400CF672C7 FPGA of Altera and stably operates in 82MHz clock frequency.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Comparative Study of the Effects of the Intermodal Freight Transport Policies (인터모달 추진 정책과 효과에 관한 비교연구)

  • Woo, Jung-Wouk
    • Journal of Distribution Science
    • /
    • v.13 no.10
    • /
    • pp.123-133
    • /
    • 2015
  • Purpose - The Korean government has devised intermodal transportation policies and granted subsidies to shippers and logistics companies that made a conversion of transportation means through the policies. This provides support by expanding the complex uniform railroad transportation and overhauling the deteriorated railroad facilities. As for 2013, however, the freight transportation percentage of railroad was 4.5% in tons and 8.5% in ton kilometers. Meanwhile, since the 1990s, developed countries such as the U.S. and Europe have been trying to expand intermodal freight transport with a legal and institutional support to build a logistics system corresponding with social and economic environmental changes. In this study, I set out to examine the effects of the intermodal freight transport policies in the EU and the U.S., and to explore the direction of setting up a rail intermodal transport system in South Korea. Research design, data, and methodology - The paper used a qualitative research methodology through the literature review. First, was an overview of Intermodal transportation in the EU, U.S. and UN. Second, it describes the development of transport in Europe and the U.S. with particular emphasis on intermodal freight transport. Third, it explores the direction of setting up a intermodal freight transport in South Korea. The last section contains concluding remarks. Results - As for the EU, it has been promoting integration between transport and intermodal logistics network designs while utilizing ITS or ICT and supports for rail freight intermodal by giving reduction to a facilities fee or subsidizing for rail freight in order to minimize the cost of external due to freight transport. On the other hand, as for the U.S., it has been made up of an industrial-led operating project and has been promoting it to improve accessibility between intermodal hubs and cargo terminals through intermodal corridor program, and an intermodal cargo hub access corridor projects, etc. Moreover, it has tried to construct intermodal transport system using ITS or ICT and to remove Barrier. As a result, in these countries, the proportion of intermodal freight transport is going to be the second significant transport compared with rail and maritime transport. An Effective rail intermodal transport system is needed in South Korea, as seen in the case of these countries. In order to achieve this object, the following points are required to establish radical infrastructure policy; diversify investment financing measures taken under public-private partnerships, legal responsibilities, improvement of utilization of existing facilities to connect the railway terminal and truck terminal, and enhancement service competitiveness through providing cargo tracking and security information that combines the ITS and ICT. Conclusions - This study will be used as a basis for policy and support for intermodal freight transport in South Korea. In the future, it is also necessary to examine from the perspective of the shipper companies using the rail intermodal transport, ie, recognition of shipper, needed institutional supports, and transportation demand forecasting and cost-effective analysis of the railway infrastructure systems improvement.

A study on the constitution of S box and G function in SEED-type cipher (SEED 형식 암호에서 S 박스와 G 함수 구성에 관한 연구)

  • 송홍복;조경연
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.291-300
    • /
    • 2002
  • In this paper, a way of constituting optimized S box and G function was suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over GF(2$\^$8/) which has neither a fixed point, whose input and output are the same except 0 and 1, nor an opposite flexed number, whose output is one's complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes diffusive linear transform with 4 S-box outputs using the matrix of 4$\times$4 over GF(2$\^$8/). G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, there can be no weak input, where a fried point, an opposite fried point, and output can be two's complement of input, and the construction of hardware can be made easy. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Wide Integrated Surveillance System of Marine Territory Using Multi-Platform (다중플랫폼을 이용한 해양영토 광역통합감시 시스템)

  • Ryu, Joo-Hyung;Lee, Seok;Kim, Duk-jin;Hwang, Jae Dong
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.307-311
    • /
    • 2018
  • It is necessary to establish wide integrated surveillance system of marine territory to reduce damage caused by maritime security threats, marine pollution and accidents for safe and clean marine use and efficient development of marine resources. For marine surveillance, the information characteristics of space-time specific, accuracy and operability are required, and real-time information about the wide area should be provided at all times. This special issue has been published to identify the characteristics of each platform, evaluate its usability for the establishment of a wide integrated surveillance system, and present the direction for future convergence studies between platforms. Since 2015, KIOST and cooperative research team have been performing the project, "Base research for building wide integrated surveillance system of marine territory using multi-platform" that detect vessels and red tide etc. near real time by using satellite, UAV and HF Ocean Radar. The objective of this special issue is to introduce the significance for an integrated system for maritime surveillance and to create a forum for discussion on recent advances in remote sensing technology and applications for marine disasters, pollution, and accident surveillance.

A Performance Improvement Scheme for a Wireless Internet Proxy Server Cluster (무선 인터넷 프록시 서버 클러스터 성능 개선)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.415-426
    • /
    • 2005
  • Wireless internet, which becomes a hot social issue, has limitations due to the following characteristics, as different from wired internet. It has low bandwidth, frequent disconnection, low computing power, and small screen in user terminal. Also, it has technical issues to Improve in terms of user mobility, network protocol, security, and etc. Wireless internet server should be scalable to handle a large scale traffic due to rapidly growing users. In this paper, wireless internet proxy server clusters are used for the wireless Internet because their caching, distillation, and clustering functions are helpful to overcome the above limitations and needs. TranSend was proposed as a clustering based wireless internet proxy server but it has disadvantages; 1) its scalability is difficult to achieve because there is no systematic way to do it and 2) its structure is complex because of the inefficient communication structure among modules. In our former research, we proposed the All-in-one structure which can be scalable in a systematic way but it also has disadvantages; 1) data sharing among cache servers is not allowed and 2) its communication structure among modules is complex. In this paper, we proposed its improved scheme which has an efficient communication structure among modules and allows data to be shared among cache servers. We performed experiments using 16 PCs and experimental results show 54.86$\%$ and 4.70$\%$ performance improvement of the proposed system compared to TranSend and All-in-one system respectively Due to data sharing amount cache servers, the proposed scheme has an advantage of keeping a fixed size of the total cache memory regardless of cache server numbers. On the contrary, in All-in-one, the total cache memory size increases proportional to the number of cache servers since each cache server should keep all cache data, respectively.

A meta analysis of the climate change impact on rice yield in South Korea (기후변화가 국내 쌀 생산량에 미치는 영향에 대한 메타분석)

  • Shin, Deok Ha;Lee, Mun Su;Park, Ju-Hyun;Lee, Yung-Seop
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.2
    • /
    • pp.355-365
    • /
    • 2015
  • As the global climate has dramatically changed over the past decades, there has been active research on evaluating its effects on food security, which has been recognized as one of the most important issues in the field. In this study, we analyzed the impact of the climate change on the Korean agriculture using meta-analysis methods. Especially, our research focus is on estimating the effect of CO2 concentration and two adaptations (planting-date and cultivar adjustments)on rice that accounts for a larger proportion of the Korean domestic agriculture. Unlike traditional general meta-analysis methods that use summary statistics of effects of interest, meta analysis specific to the agriculture literature was conducted by integrating the data on rice yield that were generated under various CO2 emission scenarios and general circulating models of the 6 collected individual studies. As a modeling approach, the rice yield change ratio was set as the dependent variable and the main and interaction effects of CO2 concentration and adaptation were considered as independent variables in a regression model, As a result, CO2 is estimated to have opposite effects on rice yield depending on whether any of the two adaptations is applied or not; decreasing effect without adaptation and increasing effect with adaptation. In addition, it turns out that the cultivar adjustment has a higher increasing effect on rice yield than the planting-date adjustment. The results of the study are expected to be used as basic quantitative data for establishing responsive polices to the future climate changes.