• Title/Summary/Keyword: 구조 시스템 식별

Search Result 344, Processing Time 0.027 seconds

A Study on Lip Print Recognition by using Pattern Kernels in Multi-Resolution Architecture (복수 해상도 시스템의 Pattern Kernels에 의한 Lip Print 인식에 관한 연구)

  • Baek, Gyeong-Seok;Jeong, Jin-Hyeon
    • The KIPS Transactions:PartB
    • /
    • v.8B no.2
    • /
    • pp.189-194
    • /
    • 2001
  • 본 논문에서는 개인 식별을 위하여 복수 해상도 구조를 제시하였고 이 방법으로 구순문 인식을 구현하였다. 구순문 인식은 지문, 음성 패턴, 홍채 패턴과 얼굴 인식과 같은 신체적 특징에 비하여 상대적으로 연구가 많이 이루어지지 않은 신체적 특징이다. 구순문은 CCD 카메라를 이용할 경우 홍채나 얼굴 패턴 같은 다른 특징 요소와 연결하여 인식 시스템을 구축할 수 있는 장점을 가지고 있다. 구순문 인식을 위해 pattern kernels를 이용한 새로운 방법을 제시하였다. Pattern kernels는 여러 개의 local lip print mask들로 구성된 함수이며, lip print의 정보를 디지털 데이터로 전환시켜 준다. 복수 해상도를 가지는 인식 시스템은 단일 해상도의 시스템보다 더욱 신뢰적이며 인식률도 높다.

  • PDF

프라이버시 참조 구조 국제표준화 동향

  • Shin, Yong-Nyuo;Kim, Hak-Il;Chun, Myung-Geun
    • Review of KIISC
    • /
    • v.22 no.2
    • /
    • pp.52-57
    • /
    • 2012
  • 프라이버시 참조구조(privacy reference architecture)는 구현 및 배치 상황을 바탕으로 해야 하며, 독립적으로 존재할 수 없다. 구조 설치는 프라이버시 인지 및 가능 ICT 시스템을 배치할 구조와 조화를 이루어 운영되며 정책을 반영하는 업무 관리 기능, 프로세스 및 절차를 종합적으로 고려하여 이루어진다. 업무 및 데이터 처리 모델 또는 인벤토리의 공식적인 구축 및 유지는 해당 조직에 적용되는 모든 프라이버시 및 정보 보호 요건에 부합해야 한다. 업무 프로세스 모델이 구축되고 데이터 처리 모델과의 비교가 완료되면 동의 취득 기능, 개인식별정보 범주화 및 태깅 기능, 감사 및 기록 절차, 보존 일정, 고지 및 보안 경보와 같은 프라이버시 통제수단을 정하고 필수적인 프라이버시 보호 요건과 비교할 수 있다. ISO/IEC JTC1 SC27 WG5의 프라이버시 표준화는 프라이버시 프레임워크, 프레임워크 기반 구현을 위한 프라이버시 레퍼런스 아키텍쳐를 중심으로 이루어지고 있다. 본 논문에서는 프라이버시 표준화를 위한 국외 표준화 동향을 소개하고, 향후 추진해야할 중점 표준화 항목을 도출한다.

Mobile Oriented Future Internet (MOFI): OpenFlow-based Implementation and Testbed Experimentation over KOREN (모바일 중심 미래 인터넷: OpenFlow 기반 구현 및 KOREN 테스트베드 실험)

  • Kim, Ji-In;Jung, Heeyoung;Koh, Seok-Joo
    • Journal of KIISE:Information Networking
    • /
    • v.41 no.4
    • /
    • pp.167-176
    • /
    • 2014
  • In this paper, we discuss the implementation and experimentations of a new future Internet architecture for mobile-oriented environments, named Mobile Oriented Future Internet (MOFI). The MOFI architecture is featured by the host identifier and local locator for identifier-locator separation, Query-First Data Delivery (QFDD), and Distributed Mapping System (DMS) for identifier-locator mapping control. In the existing study on MOFI, we examined the intra-domain mobility control, the implementation of MOFI over Linux platform, and the performance analysis over the small-scale testbed. In this paper, we describe how to implement the MOFI architecture for inter-domain mobility control by using the OpenFlow and Click Modular Router platform. From the experimentations over the KOREN testbed, we can see that the MOFI scheme can give better performance than the existing Proxy Mobile IP scheme.

Selection of the Number and Location of Monitoring Sensors using Artificial Neural Network based on Building Structure-System Identification (인공신경망 기반 건물 구조물 식별을 통한 모니터링센서 설치 개수 및 위치 선정)

  • Kim, Bub-Ryur;Choi, Se-Woon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.5
    • /
    • pp.303-310
    • /
    • 2020
  • In this study, a method for selection of the location and number of monitoring sensors in a building structure using artificial neural networks is proposed. The acceleration-history values obtained from the installed accelerometers are defined as the input values, and the mass and stiffness values of each story in a building structure are defined as the output values. To select the installation location and number of accelerometers, several installation scenarios are assumed, artificial neural networks are obtained, and the prediction performance is compared. The installation location and number of sensors are selected based on the prediction accuracy obtained in this study. The proposed method is verified by applying it to 6- and 10-story structure examples.

The Identified Self: Location-Based Technologies, Surveillance, and Non-place (식별되는 자: 위치기반기술, 원격성과 감시의 문제, 그리고 비-장소(non-place))

  • Yi, Doogab
    • Journal of Science and Technology Studies
    • /
    • v.16 no.2
    • /
    • pp.1-31
    • /
    • 2016
  • This essay examines the recent proliferation of location-based services (LBS) within the context the expansion of the technologies of remote identification, monitoring, and tracking. Following the spatial turn in the social sciences, this essay aims to analyze LBS as a surveillance technology that can re-shape the spatial configuration of its users and their identity. The analytic focus of this essay is on LBS within the global information infrastructure, and it utilizes key LBS examples in the US and South Korea. First, as a way to discuss the technical possibilities of LBS for spatial coordination and surveillance, this essay investigates its technical architecture in terms of information flow. It then discusses the issue of privacy in LBS by analyzing some of its key legal and regulatory issues. The combination of the global information infrastructure with location-related technologies has enabled LBS companies to expand the scope of surveillance over the ever-increasing computer-mediated activities, prompting heated discussions over whether LBS is capturing "Every Moment in Your Life." This essay concludes with a discussion on how location technologies have provided a key platform for the rise of surveillance capitalism through the creation of what Marc $Aug{\acute{e}}$ called a "non-place," a place where the identified self is constituted by LBS.

Analysis and Implementation of RFID Security Protocol using Formal Verification (정형검증을 통한 RFID 보안프로토콜 분석 및 구현)

  • Kim, Hyun-Seok;Kim, Ju-Bae;Han, Keun-Hee;Choi, Jin-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.7
    • /
    • pp.332-339
    • /
    • 2008
  • Radio Frequency Identification (RFID) technology is an important part of infrastructures in ubiquitous computing. Although all products using tags is a target of these services, these products also are a target of attacking on user privacy and services using authentication problem between user and merchant, unfortunately. Presently, it is very important about security mechanism of RFID system and in this paper, we analyze the security protocol among many kinds of mechanisms to solve privacy and authentication problem using formal verification and propose a modified novel protocol. In addition, the possibility of practical implementation for proposed protocol will be discussed.

Analyzing the Sentence Structure for Automatic Identification of Metadata Elements based on the Logical Semantic Structure of Research Articles (연구 논문의 의미 구조 기반 메타데이터 항목의 자동 식별 처리를 위한 문장 구조 분석)

  • Song, Min-Sun
    • Journal of the Korean Society for information Management
    • /
    • v.35 no.3
    • /
    • pp.101-121
    • /
    • 2018
  • This study proposes the analysis method in sentence semantics that can be automatically identified and processed as appropriate items in the system according to the composition of the sentences contained in the data corresponding to the logical semantic structure metadata of the research papers. In order to achieve the purpose, the structure of sentences corresponding to 'Research Objectives' and 'Research Outcomes' among the semantic structure metadata was analyzed based on the number of words, the link word types, the role of many-appeared words in sentences, and the end types of a word. As a result of this study, the number of words in the sentences was 38 in 'Research Objectives' and 212 in 'Research Outcomes'. The link word types in 'Research Objectives' were occurred in the order such as Causality, Sequence, Equivalence, In-other-word/Summary relation, and the link word types in 'Research Outcomes' were appeared in the order such as Causality, Equivalence, Sequence, In-other-word/Summary relation. Analysis target words like '역할(Role)', '요인(Factor)' and '관계(Relation)' played a similar role in both purpose and result part, but the role of '연구(Study)' was little different. Finally, the verb endings in sentences were appeared many times such as '~고자', '~였다' in 'Research Objectives', and '~었다', '~있다', '~였다' in 'Research Outcomes'. This study is significant as a fundamental research that can be utilized to automatically identify and input the metadata element reflecting the common logical semantics of research papers in order to support researchers' scholarly sensemaking.

A Study on a Radio System for Lifesaving in Case of a Falling Accident of the Sea (해상추락 인명구조용 무선시스템에 관한 연구)

  • Choi, Byung-Ha;Kim, Gu-Chol
    • Journal of Advanced Navigation Technology
    • /
    • v.6 no.1
    • /
    • pp.62-68
    • /
    • 2002
  • Mother ship must be able to know accident occurrence information rapidly to rescue crew who fall in sea. In this paper, designed and manufactured transceiver of prescribed 447 MHz is operating as low power radio station specified in Radio Regulation. So, it is available without special permission proceedings getting form probation so that the use of this system may be easy. the system has been started for operation when the sensor get in touch with water. The system transmits with modulation by 500Hz square wave, and the receiver alarms when the transmitted signal is received. Therefore, the system can be used for not only saving a life, but also for low speed of data transmission below 2,400 bps, and other purposes.

  • PDF

An Improved RLS Algorithm Using A Subband Decomposition (서브밴드 분해를 이용한 개선된 RLS 알고리즘)

  • 주상영;이동규;이두수
    • Proceedings of the IEEK Conference
    • /
    • 2000.09a
    • /
    • pp.73-76
    • /
    • 2000
  • 본 논문에서는 음향반향제거기를 구현하기 위한 적응알고리즘을 제안한다 특히 긴 임펄스 응답을 가지는 시스템의 식별을 위해 웨이블릿 필터를 사용하여 입력신호를 서브밴드로 분해함으로써 기존의 RLS알고리즘의 계산량을 줄여 수렴속도를 향상시켰다. 이 과정에서 적응필터를 다위상 구조로 구성하여 컨벌루션 과정을 병렬처리가 가능하도록 하였다. 제안된 알고리즘의 성능분석을 위하여 실제 음성신호를 입력신호로 하여 컴퓨터 모의실험을 수행하였으며 전대역 RLS알고리즘과 비교하였다.

  • PDF

Modified elman neural network structure for nonlinear system identification (비선형 시스템 식별을 위한 수정된 elman 신경회로망 구조)

  • 정경권;권성훈;이인재;이정훈;엄기환
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.917-920
    • /
    • 1998
  • In this paper, we propose a modified elman neural network structure for nonlinear system identification. The proposed structure is that all of network output feed back into hidden units and output units. Learning algorithm is standard back-propagation algorithm. The simulation showed the effectiveness of using the modified elman neural network structure in the nonlinear system identification.

  • PDF