• Title/Summary/Keyword: security technology

Search Result 6,816, Processing Time 0.034 seconds

A Study on Extraction of Irregular Iris Patterns (비정형 홍채 패턴 분리에 관한 연구)

  • Won, Jung-Woo;Cho, Seong-Won;Kim, Jae-Min;Baik, Kang-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.169-174
    • /
    • 2008
  • Recently, biometric systems are of interest for the reliable security system. Iris recognition technology is one of the biometric system with the highest reliability. Various iris recognition methods have been proposed for automatic personal identification and verification. These methods require accurate iris segmentation for successful processing because the iris is a small part of an acquired image. The iris boundaries have been parametrically modeled and subsequently detected by circles or parabolic arcs. Since the iris boundaries have a wide range of edge contrast and irregular border shapes, the assumption that they can be fit to circles or parabolic arcs is not always valid. In some cases, the shape of a dilated pupil is slightly different from a constricted one. This is especially true when the pupil has an irregular shape. This is why this research is important. This paper addresses how to accurately detect iris boundaries for improved iris recognition, which is robust to noises.

AMI Network Failure Analysis based on Graph Database (그래프 데이터베이스 기반 AMI 네트워크 장애 분석)

  • Jeong, Woo-Cheol;Jun, Moon-Seog;Choi, Do-Hyeon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.41-48
    • /
    • 2020
  • Recently, the spreading business of AMI (Advanced Metering Infrastructure) remote metering systems in various regions of the country has been activated, and it provides various metering functions such as two-way communication and security plan functions for power demand management. Current AMI system is difficult to analyze based on the existing RDB(Relational Database) due to the increase in the size of new internal IoT devices and networks. This study proposes a new GDB(Graph Database) based failure analysis method that utilizes existing RDB data. It analyzes the correlation of new failure patterns through accumulated data such as internal thresholds and status values. As a result of GDB-based simulation, it was confirmed that RDB can predict to a new obstacle pattern that was difficult to analyze.

Design of Data Exchange Technique for Power Facilities Monitoring using Augmented Reality (증강현실을 이용한 전력 설비 모니터링 시스템의 데이터 교환 기법 설계)

  • Kim, Donghyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.16-22
    • /
    • 2020
  • Since it is difficult for individual power producers and non-professionals who lack basic knowledge to control, manage, and operate facilities through EMS (Energy Management System), augmented reality and virtual reality monitoring systems are applied. However, in the existing systems, data access efficiency is inferior due to the process of analyzing column values for analog signal values collected from sensors and converting data after combining the columns. In addition, high-speed operation processing is difficult due to a large number of indexes for accommodating access patterns for various analog signal waveforms. Therefore, in this paper, a bitmap generator is inserted into a non-tree structure to convert the data collected from power facilities into physical property information, and the converted information is encrypted with a common key, so that the resources for the resources shared between each device are We propose a method of exchanging data for an augmented reality-based power system that is controlled by measurement.

Structural Safety Assessment of Independent Spherical LNG Tank(1st Report) - Fatigue Strength Analysis Based on the S-N Approach - (독립구형 LNG 탱크의 구조안전성 평가(제1보) - 피로균열 발생수명 예측 -)

  • In-Sik Nho;Yong-Yun Nam;Ho-Sup Lee
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.30 no.2
    • /
    • pp.132-140
    • /
    • 1993
  • The design of LNG ship needs very high level structural design/analysis technology compared with conventional ship types because it requires perfect security against the extremly dangerous and cryogenic cargo. Hence, present paper describes the general procedure of the structural safety assessment for independent tank type LNG ship, which contains following items. 1) Long term prediction of the wave induced stresses including ship motion analysis, structural analysis of hull and tank and stochastic analysis process of ocean waves. 2) Fatigue strength analysis of a tank structure based on the S-N approach. 3) Structural safety assessment against the fatigue crack propagation based on the LBF(Leak Before Failure) concept. The first report focuced on the item (1) (2) and example calculation was performed on a prototype LNG ship. The remained part will be covered by the second report.

  • PDF

Performance Analysis of SDR Communication System Based on MTD Technology (MTD 기법이 적용된 SDR 통신 시스템의 성능 분석)

  • Ki, Jang-Geun;Lee, Kyu-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.51-56
    • /
    • 2017
  • With the rapid increase in the number of mobile terminals, demand for wireless technologies has sharply increased these days. While wireless communication provides advantages such as ease of deployment, mobility of terminals, continuity of session, and almost comparable transmission bandwidth to the wired communication, it has vulnerability to malicious radio attacks such as eavesdropping, denial of service, session hijacking, and jamming. Among a variety of methods of preventing wireless attacks, the MTD(Moving Target Defense) is the technique for improving the security capability of the defense system by constantly changing the ability of the system to be attacked. In this paper, in order to develop a resilient software defined radio communication testbed system, we present a novel MTD approach to change dynamically and randomly the radio parameters such as modulation scheme, operating frequency, packet size. The probability of successful attack on the developed MTD-based SDR communication system has been analysed in a mathematical way and verified through simulation.

Classification Algorithm for Liver Lesions of Ultrasound Images using Ensemble Deep Learning (앙상블 딥러닝을 이용한 초음파 영상의 간병변증 분류 알고리즘)

  • Cho, Young-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.101-106
    • /
    • 2020
  • In the current medical field, ultrasound diagnosis can be said to be the same as a stethoscope in the past. However, due to the nature of ultrasound, it has the disadvantage that the prediction of results is uncertain depending on the skill level of the examiner. Therefore, this paper aims to improve the accuracy of liver lesion detection during ultrasound examination based on deep learning technology to solve this problem. In the proposed paper, we compared the accuracy of lesion classification using a CNN model and an ensemble model. As a result of the experiment, it was confirmed that the classification accuracy in the CNN model averaged 82.33% and the ensemble model averaged 89.9%, about 7% higher. Also, it was confirmed that the ensemble model was 0.97 in the average ROC curve, which is about 0.4 higher than the CNN model.

A New Method to Estimate the Magnetic Field Modulation Effect of Brushless Doubly-Fed Machine with Cage Rotor

  • Liu, Hanghang;Han, Li;Gao, Qiang
    • Journal of international Conference on Electrical Machines and Systems
    • /
    • v.1 no.3
    • /
    • pp.330-335
    • /
    • 2012
  • Brushless doubly-fed machine (BDFM) doesn't use brush and slip ring, and has advantages such as high system reliability, small capacity of its frequency converter, low system cost, adjustable power factor and speed, etc. At the same time, it has good applicable potentials on the variable frequency motors and the variable speed constant frequency generators. However, due to the complicacy and particularity of BDFM in the structure and operating mechanism, the effect of magnetic field modulation directly influences the operating efficiency of BDFM. To study the effect of different cage rotor structures on the magnetic field modulation of BDFM, the rotor magnetomotive force (MMF) of BDFM with cage rotor is studied by the analytical method. The components and features of rotor harmonic MMFs are discussed. At the same time, the method to weaken the higher harmonics is analyzed by the theoretic formulae. Furthermore, the magnetic field modulation mechanism is expounded on in detail and the relationship between the magnetic field modulation effect and the operating efficiency of BDFM is established. And then, a new method for estimating the magnetic field modulation effect is proposed. At last, the magnetic field modulation effects of four BDFM prototypes with different cage rotor structures are compared by the MMF analysis and the efficiency data of electromagnetic design. The results verify the effectiveness of the new method for estimating the magnetic field modulation effect of BDFM with cage rotor.

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.