• Title, Summary, Keyword: 개인정보보호

Search Result 1,981, Processing Time 0.051 seconds

Long Distance Vehicle License Plate Region Detection Using Low Resolution Feature of License Plate Region in Road View Images (로드뷰 영상에서 번호판 영역의 저해상도 특징을 이용한 원거리 자동차 번호판 영역 검출)

  • Oh, Myoung-Kwan;Park, Jong-Cheon
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.239-245
    • /
    • 2017
  • For privacy protection, we propose a vehicle license plate region detection method in road view image served from portal site. Because vehicle license plate regions in road view images have different feature depending on distance, long distance vehicle license plate regions are not detected by feature of low resolution. Therefore, we suggest a method to detect short distance vehicle license plate regions by edge feature and long distance vehicle license plate regions using MSER feature. And then, we select candidate region of vehicle license plate region from detected region of each method, because the number of the vehicle license plate has a structural feature, we used it to detect the final vehicle license plate region. As the experiment result, we got a recall rate of 93%, precision rate of 75%, and F-Score rate of 80% in various road view images.

A Case Study on Smart Plant and Monitoring System Implementation of Venture Company for Auto Parts (자동차부품 벤처기업 스마트공장 및 모니터링 시스템 구현 사례연구)

  • Han, Jae Hun;Lee, Deok Soo;Park, Roh Gook
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.12 no.5
    • /
    • pp.29-37
    • /
    • 2017
  • In this study, real-time monitoring is carried out in the factory site for product quality control such as improvement of productivity through facility automation, improvement of product quality, improvement of factory environment, check of facility maintenance status and check of product defect, And to establish a smart factory for the purpose of protecting the personal environment of the worker. The company is an auto parts company located in the province. The main research content is development of automation and monitoring system of oil filter clipping necessary for smart factory. Smart factory oil filter clipping automation is divided into electric air parts, solenoid valve and other parts processing process. Smart factory quality inspection monitoring system is implemented by server PC and S / W, client software, Operator PC, operating program, and input terminal application. This research data is expected to be very useful data for the auto parts venture companies that are promoting smart factories.

  • PDF

About dentistry infection from dentistry medical institution recognition research of patient (치과내원환자의 감염관리에 관한 인식도 조사)

  • Lee, Youn-Kyung;Kim, Soon-Duck
    • Journal of Korean society of Dental Hygiene
    • /
    • v.10 no.4
    • /
    • pp.617-625
    • /
    • 2010
  • Objectives : The research which sees collected information about dentistry infection management recognition of the patients and the infection management which the medical treatment consumer does in necessity is what, grasped and satisfaction and became the fundamental data which makes the hospital will be able to trust about dentistry image rise and dentistry environment of the medical treatment consumer who assists a dentistry character executed. Methods : From 2009 April 1st until May 28th 233 people common people who have the experience which visits a Gyeongsangnam-do area dentistry the object with the entry question law which sleeps did and the data analysis SPSS, 12.0 For Window under using produced each question item by frequency and a ratio, the analytical degree of infection management One - Way ANOVA stamps and executed t-test. Results : Information experience experienced about dentistry infection of the investigation object person to be, appeared with 74.7% and the after that dentistry assistance at the time of conduct change which experiences the answer back regarding of Former times attentively observes organization disinfecting' was most with 46.6%. The protective equipments wearing goal of the dentistry medical attendance appeared the dentistry medical attendance and patient protection 77.7%, dentistry medical attendance protection 12.9%, by patient protection 9.4% order. Before medical treatment starting of the dentistry medical attendance the hand Does not confirm' appeared 72.1%, with. The hand washing, is whole and the degree which appears is high with 4.11 points the stamp. Is high there was a possibility of knowing the thing about the recording infection where the educational background will be high and considers statistically the difference which was visible Conclusions : The education which is active and continuous is necessary about infection management and sets the guides which are standardized to the patients and about infection management and about infection prevention and exposes from dentistry practices well to emboss the thing is thought that there is a necessity to plant a trust feeling about the dentistry where the patients assist.

A Study of the Health Monitoring System for u-Healthcare (u-Healthcare를 위한 건강모니터링 시스템에 관한 연구)

  • O, Ji-Soo;Lee, Myoung-Hwa;Lim, Myung-Jae;Lee, Ki-Young
    • The Journal of The Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.4
    • /
    • pp.9-15
    • /
    • 2009
  • As disease and aging increased on the map of nuclear families, the interests in protecting individual privancy and u-Healthcare has increased as well. Until now, the health management of individual medical institutions have limited their researches on the future of offline diagnostics and treatment works, time and space only to medical services. However, in the future, healthcare through mobile medical devices to real-time online personality, mobility, and bulwark where patients can receive personal health statues anywhere seems inevitable. Therefore, in this paper, the PDA based on the each individual elderly and patients that updates their physical health statues through the signal meter management system can notify both the individual and the hospital when a medical emergency occurs. Additionally, it provides relevant information on the results of measurements monitoring system.

  • PDF

A Study for Complexity Improvement of Automatic Speaker Verification in PDA Environment (PDA 환경에서 자동화자 확인의 계산량 개선을 위한 연구)

  • Seo, Chang-Woo;Lim, Young-Hwan;Jeon, Sung-Chae;Jang, Nam-Young
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.3
    • /
    • pp.170-175
    • /
    • 2009
  • In this paper, we propose real time automatic speaker verification (ASV) system to protect personal information on personal digital assistant (PDA) device. Recently, the capacity of PDA has extended and been popular, especially for mobile environment such as mobile commerce (M-commerce). However, there still exist lots of difficulties for practical application of ASV utility to PDA device because it requires too much computational complexity. To solve this problem, we apply the method to relieve the computational burden by performing the preprocessing such as spectral subtraction and speech detection during the speech utterance. Also by applying the hidden Markov model (HMM) optimal state alignment and the sequential probability ratio test (SPRT), we can get much faster processing results. The whole system implementation is simple and compact enough to fit well with PDA device's limited memory and low CPU speed.

  • PDF

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of The Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

A Study of Java Card File System with File Cache and Direct Access function (File Cache 및 Direct Access기능을 추가한 Java Card File System에 관한 연구)

  • Lee, Yun-Seok;Jun, Ha-Yong;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.404-413
    • /
    • 2008
  • As toward a ubiquitous society, a lot of methods have been proposed to protect personal privacy. Smart Cards with CPU and Memory are widely being used to implement the methods. The use of Java Card is also gradually getting expanded into more various applications. Because there is no standards in Java Card File System, Generally, Java Card File System follows the standards of Smart Card File System. However, one of disadvantages of the Java Card File System using a standard of Smart Card File System is that inefficient memory use and increasing processing time are caused by redundancy of data and program codes. In this paper, a File Cache method and a Direct Access method are proposed to solve the problems. The proposed methods are providing efficient memory use and reduced processing time by reduce a program codes.

  • PDF

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF

A Study on the Security Checklist Improvements to improve the Security in the Mobile Applications Development (모바일 어플리케이션 개발에서의 보안성 향상을 위한 보안 점검항목 개선에 관한 연구)

  • Shin, Jun-Yuop;Kim, Dong-Soo;Han, Ki-Jun;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.113-127
    • /
    • 2014
  • The use of mobile devices offers a variety of services to the individuals and companies. On the other hand, security threats and new mobile security threats that exist in IT infrastructure to build the environment for mobile services are present at the same time. Services such as mobile and vaccine management services, such as MDM (Mobile Device Management) has attracted a great deal of interest in order to minimize the threat of security in mobile environment. These solutions can not protect an application that was developed for the mobile service from the threat of vulnerability of mobile application itself. Under these circumstances, in this paper, we proposed mobile application security checklists based on application security review items in order to prevent security accidents that can occur in a mobile service environment. We collected and analyzed Android applications, we performed a total inspection of the applications for verification of the effectiveness of the check items. And we checked that the check items through a survey of experts suitability was verified.

Effect of wearing personal protective equipment on cardiopulmonary resuscitation: Focusing on 119 emergency medical technicians (개인보호장비 착용이 심폐소생술에 미치는 영향: 119 구급대원을 중심으로)

  • Shin, Dong-Min;Kim, Seung-Yong;Shin, Sang-Do;Kim, Chu-Hyun;Kim, Tae-Han;Kim, Kyoung-Yong;Kim, Jeong-Hee;Hong, Eun-Jeong
    • The Korean Journal of Emergency Medical Services
    • /
    • v.19 no.3
    • /
    • pp.19-32
    • /
    • 2015
  • Purpose: This study examined the effect of wearing personal protective equipment (PPE) on cardiopulmonary resuscitation (CPR), positive airway pressure, and the posture of emergency medical technicians (EMTs) when conducting CPR. Methods: Twenty 119 EMTs performed 30:2 CPR on a manikin for 4 min. Imaging data were digitized with Kwon3D XP (version 4.0). Data were collected by analyzing the motion when starting in one cycle, such as pressing to the maximum and in the final position (relaxed), and were analyzed with SPSS 18.0. Results: The angle of the elbow joints was significantly reduced (p < .05). The trunk angle was statistically significantly (p < .01, p < .001) increased. The angular velocities of the shoulder joint and left elbow joint were reduced (p > .05). The angular velocity of the trunk was significantly reduced in the starting and maximum compression postures. The hand-escape time was increased. The average compression depth was increased but not significantly (p > .05). The positive airway pressure was reduced (p > .05). Conclusion: The angle of the elbow joints and the angular velocity of the trunk were reduced, and the angle of the trunk was increased. The success of CPR and positive airway pressure was reduced.