• Title/Summary/Keyword: 출입자 인식 시스템

Search Result 46, Processing Time 0.021 seconds

Implementation of A Monitoring System using Image Data and Environment Data (영상정보와 환경정보를 이용한 실내 공간 모니터링 시스템 구현)

  • Cha, Kyung-Ae;Kwon, Cha-Uk
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.1
    • /
    • pp.1-8
    • /
    • 2009
  • The objective of this study is to design a system that automatically monitors the state of interior spaces like offices where lots of people are coming and going through image data and environment data, which includes temperature, humidity, and other conditions, and implement and test related application programs. In practice, there are lots of image data automatically obtained by unmanned equipments, such as certain types of CCTVs, for monitoring situation in usual interior spaces. This image data can be used as a more effective manner by establishing a system that recognizes situation in specific interior spaces based on the relationship between image and environment data. For instance, it is possible to perform unmanned on/off controls for various electronic equipments, such as air conditioners, lights, and other devices, through analyzing the data acquisited from environment sensors (temperature, humidity, and illumination) as dynamic states are not maintained for a specified period of time. For implementing these controls, this study analyzes environment data acquisited from temperature and humidity sensors and image data input from wireless cameras to recognize situation and that can be used to automatically control environment variables configured by users. Experiments were applied in a laboratory where unmanned controls were effectively performed as automatic on/off controls for the air conditioner and lights installed in the laboratory as certain motions were detected or undetected for a specified period of time.

Reliable Digital Door Lock Control System using Face Recognition (얼굴 인식을 통한 신뢰성 있는 디지털 도어록 제어 시스템)

  • Lim, Jimin;Kim, Chan;Cha, Wonsuk;Han, Taemoon;Huh, Guewon;Song, Sanggeun;Lee, Sangjun
    • Journal of IKEEE
    • /
    • v.17 no.4
    • /
    • pp.499-504
    • /
    • 2013
  • Automation is being progressed rapidly in various fields with the advancement of IT technology. Home automation is a typical application and is being used in a variety of ways now. Most of digital door lock systems simply support to open and close a door using the methods of password and a particular magnetic key. In this paper, we propose a intelligent digital door lock system using face recognition technology. Our proposed system can control the locking device opening and closing from a remote location after confirming the identification of the visitor via a smart device, and support the reliable and secure control of door systems.

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Person Identification based on Clothing Feature (의상 특징 기반의 동일인 식별)

  • Choi, Yoo-Joo;Park, Sun-Mi;Cho, We-Duke;Kim, Ku-Jin
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • With the widespread use of vision-based surveillance systems, the capability for person identification is now an essential component. However, the CCTV cameras used in surveillance systems tend to produce relatively low-resolution images, making it difficult to use face recognition techniques for person identification. Therefore, an algorithm is proposed for person identification in CCTV camera images based on the clothing. Whenever a person is authenticated at the main entrance of a building, the clothing feature of that person is extracted and added to the database. Using a given image, the clothing area is detected using background subtraction and skin color detection techniques. The clothing feature vector is then composed of textural and color features of the clothing region, where the textural feature is extracted based on a local edge histogram, while the color feature is extracted using octree-based quantization of a color map. When given a query image, the person can then be identified by finding the most similar clothing feature from the database, where the Euclidean distance is used as the similarity measure. Experimental results show an 80% success rate for person identification with the proposed algorithm, and only a 43% success rate when using face recognition.

< A study on Game design with minimized game addiction by application of Bio rhythm > (< 게임중독의 최소화를 위한 인체리듬의 적용과 인터페이스 디자인 >)

  • Kim, Du-Beom;Cho, Ok-Hue;Kim, Hyung-Gi
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02b
    • /
    • pp.597-601
    • /
    • 2006
  • 게임 시장 규모는 하루가 다르게 성장 하고 있고 게임의 종류 또한 다양해지고 유저층도 넓어지고 있다. 그로 인한 새로운 하나의 여가문화가 생겼으며, 미디어 산업의 고부가 가치 창출을 이끌고 있다고 볼 수 있을 것이다. 하지만 재미로써의 기능과 그에 따른 병폐가 고부가가치 게임산업의 많은 부작용으로 대두되며, 최근 사회의 이슈가 되여 게임 중독성이 날로 심각해 지고 있는 실정이다. 게임 개발업체와 판매자 입장에선 유저들의 게임중독은 오히려 이득이 될 수 있겠지만, 장기적으로는 심각한 사회문제로 대두 될 것이다. 이런 사태를 미연에 방지 하기 위해서는 대책이 필요한데 불행히도 게임에 중독 되는 원인은 너무나도 다양하다. 또한 현재 게임 개발자들에게 이러한 인식과 대책이 미흡한 실정이고, 뒤늦게 나온 대책으로 청소년 PC방 출입을 아침9시부터 밤 10시까지로 제한한 사례도 있지만 현 실정에 큰 영향은 주지 못하고 있다. 게임 중독을 미연에 방지하기 위한 방안으로 법적인 제제가 필요하며, 게임 디자인에 시작에서부터 중독에 대한 고려가 필요하다. 이에 본 논문에서는 게임의 중독성을 방지하기 위한 인터페이스 디자인을 연구하는데 그 목적이 있다. 가상에서의 자신의 얼굴 ID나 캐릭터에 인체의 리듬을 적용하여 ID나 캐릭터도 쉬어야 한다는 개념을 심는 대안 시스템을 제작한다면 지금 까지 보아왔던 게임 속의 등장 캐릭터를 단순한 그래픽이 아닌 자신과 같은 인격체로 느낄 수 있으며, 이로 인해 게임의 몰입과 중독에 어떠한 효과가 나타나는지 분석하고 나온 결과를 근거로 인간에게 이로운 게임을 만드는 초석이 될 수 있을 것으로 기대해 본다.

  • PDF

Design and Development of University Asset Management systems (대학 자산관리 시스템의 설계 및 구현)

  • Park, Chul-Young;Park, Dae-Heon;Cho, Sung-Eon;Park, Jang-Woo
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.6
    • /
    • pp.971-976
    • /
    • 2009
  • This paper demonstrates the design and development of asset management systems suitable for the universities full of very various kind of assets. Universities consists of many departments, which have a multiplicity of many experimental. It is very difficult to record and manage assets with hands. In addition, the equipments are moving freely from one lab to another inside the school, which means it is tough to find the location of the assets and so some stuffs that are given lack attention are likely to disappear. So, these things occurring frequently in the university asset management environment should be considered in the design and embodiment of the asset management system. In the proposed system, location recognition of the assets is realized based on a route tracking method, so it is possible to detect the loss of the high priced assets and entrance, export, and lending of them are controlled efficiently. The system is likely to reduce the load of a manager responsible for asset management, because configured to decrease interventions of the manager in overall asset management process. Especially, the proposed system and implementation method will be suitable for small and medium-scale asset management, path tracking, history management.

  • PDF