• Title/Summary/Keyword: Address Verification System

Search Result 57, Processing Time 0.03 seconds

Hangul Segmentation and Word Verification System for Automatic Address Processing (문자 가분할과 Support Vector Machine을 이용한 필기 한글 단어 고속 검증기)

  • 이충식;김인중;신종탁;김진형
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.37-40
    • /
    • 2000
  • A fast method of Hangul address word verification is presented in this Paper. Pre-segmentation and recognition by DP matching is adopted in this paper. An address line image is over-segmented by analyzing the topology of connected components and the projection profile. A fast individual Hangul character verifier was developed by applying SVM (Support Vector Machine). The segmentation hypothesis was represented by lattice structure, and a best path search by dynamic programming generates the most probable segmentation path and the final verification score. The word verifier was tested on 310 address image DB, and it show the possibility of improvements of this method.

  • PDF

The Verification System of the Customer Barcode for the Advanced Automatic Processing of the Mail Items (우편물 자도처리 촉진을 위한 우편용 고객 바코드 검증 시스템)

  • Park, Mun-Seong;Song, Jae-Gwan;U, Dong-Jin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.968-976
    • /
    • 1999
  • Currently, in the most mail automatic processing centers, after facing and canceling, envelope mail is passed through an Optical Character Recognition/Barcode Sorter(OCR/BS) to read the address and 3 of 5 fluorescent(luminescent) barcode is applied. Normally, 30%∼35% of this mail is rejected. The usual reasons for read failure are poor printing quality of address and barcode, script printing and failure to locate the address. This paper describes a verification system of the postal 3 of 5 customer barcode for solving this problem. The certification system of the 3 of 5 customer barcode consists of barcode verification system and postal address database. The purpose of certification system of the customer barcode verifies the postal 3 of 5 customer barcode and tests matching of mail piece postal address, and retrieves postal code.

  • PDF

Overseas Address Data Quality Verification Technique using Artificial Intelligence Reflecting the Characteristics of Administrative System (국가별 행정체계 특성을 반영한 인공지능 활용 해외 주소데이터 품질검증 기법)

  • Jin-Sil Kim;Kyung-Hee Lee;Wan-Sup Cho
    • The Journal of Bigdata
    • /
    • v.7 no.2
    • /
    • pp.1-9
    • /
    • 2022
  • In the global era, the importance of imported food safety management is increasing. Address information of overseas food companies is key information for imported food safety management, and must be verified for prompt response and follow-up management in the event of a food risk. However, because each country's address system is different, one verification system cannot verify the addresses of all countries. Also, the purpose of address verification may be different depending on the field used. In this paper, we deal with the problem of classifying a given overseas food business address into the administrative district level of the country. This is because, in the event of harm to imported food, it is necessary to find the administrative district level from the address of the relevant company, and based on this trace the food distribution route or take measures to ban imports. However, in some countries the administrative district level name is omitted from the address, and the same place name is used repeatedly in several administrative district levels, so it is not easy to accurately classify the administrative district level from the address. In this study we propose a deep learning-based administrative district level classification model suitable for this case, and verify the actual address data of overseas food companies. Specifically, a method of training using a label powerset in a multi-label classification model is used. To verify the proposed method, the accuracy was verified for the addresses of overseas manufacturing companies in Ecuador and Vietnam registered with the Ministry of Food and Drug Safety, and the accuracy was improved by 28.1% and 13%, respectively, compared to the existing classification model.

High-Speed Korean Address Searching System for Efficient Delivery Point Code Generation (효율적인 순로코드 발생을 위한 고속 한글 주소검색 시스템 개발)

  • Kim, Gyeong-Hwan;Lee, Seok-Goo;Shin, Mi-Young;Nam, Yun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.273-284
    • /
    • 2001
  • A systematic approach for interpreting Korean addresses based on postal code is presented in this paper. The implementation is focused on producing the final delivery point code from various types of address recognized. There are two stages in the address interpretation : 1) agreement verification between the recognized postal code and upper part of the address and 2) analysis of lower part of the address. In the agreement verification procedure, the recognized postal code is used as the key to the address dictionary and each of the retrieved addresses is compared with the words in the recognized address. As the result, the boundary between the upper part and the lower part is located. The confusion matrix, which is introduced to correct possible mis-recognized characters, is applied to improve the performance of the process. In the procedure for interpreting the lower part address, a delivery code is assigned using the house number and/or the building name. Several rules for the interpretation have been developed based on the real addresses collected. Experiments have been performed to evaluate the proposed approach using addresses collected from Kwangju and Pusan areas.

  • PDF

Application of SE Management Techniques for space Launch System Development (우주발사체 시스템 개발에 있어서의 SE관리기법 적용)

  • Jo, Mi-Ok;Jo, Byeong-Gyu;O, Beom-Seok;Park, Jeong-Ju;Jo, Gwang-Rae
    • 시스템엔지니어링워크숍
    • /
    • s.4
    • /
    • pp.90-94
    • /
    • 2004
  • System engineering(SE) management techniques applied for space launch system development are introduced to assess the current status and address the effwctiveness of these techniques. Management plans and guides are prepared for the work breakdown structure , data, comfiguration, interface control, Quality assurance, procurement, reliability, risk and verification/validation . Further improvement is required for the system engineering management plan(SEMP) to merge the international cooperation into current engineering managment system.

  • PDF

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

An Improved Privacy Preserving Construction for Data Integrity Verification in Cloud Storage

  • Xia, Yingjie;Xia, Fubiao;Liu, Xuejiao;Sun, Xin;Liu, Yuncai;Ge, Yi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3607-3623
    • /
    • 2014
  • The increasing demand in promoting cloud computing in either business or other areas requires more security of a cloud storage system. Traditional cloud storage systems fail to protect data integrity information (DII), when the interactive messages between the client and the data storage server are sniffed. To protect DII and support public verifiability, we propose a data integrity verification scheme by deploying a designated confirmer signature DCS as a building block. The DCS scheme strikes the balance between public verifiable signatures and zero-knowledge proofs which can address disputes between the cloud storage server and any user, whoever acting as a malicious player during the two-round verification. In addition, our verification scheme remains blockless and stateless, which is important in conducting a secure and efficient cryptosystem. We perform security analysis and performance evaluation on our scheme, and compared with the existing schemes, the results show that our scheme is more secure and efficient.

Writer Verification Using Spatial Domain Features under Different Ink Width Conditions

  • Kore, Sharada Laxman;Apte, Shaila Dinkar
    • Journal of Computing Science and Engineering
    • /
    • v.10 no.2
    • /
    • pp.39-50
    • /
    • 2016
  • In this paper, we present a comparative study of spatial domain features for writer identification and verification with different ink width conditions. The existing methods give high error rates, when comparing two handwritten images with different pen types. To the best of our knowledge, we are the first to design the feature with different ink width conditions. To address this problem, contour based features were extracted using a chain code method. To improve accuracy at higher levels, we considered histograms of chain code and variance in bins of histogram of chain code as features to discriminate handwriting samples. The system was trained and tested for 1,000 writers with two samples using different writing instruments. The feature performance is tested on our newly created dataset of 4,000 samples. The experimental results show that the histogram of chain code feature is good compared to other methods with false acceptance rate of 11.67%, false rejection rate of 36.70%, average error rates of 24.18%, and average verification accuracy of 75.89% on our new dataset. We also studied the effect of amount of text and dataset size on verification accuracy.

Design Verification Method of Offshore Separation Systems Based on System Dynamics (시스템 다이내믹스 기반 해양구조물 분리시스템의 설계검증 방법에 관한 연구)

  • Hwang, John-Kyu;Ko, Jae-Yong;Lee, Dong-Kun;Park, Bon-Yeong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.6
    • /
    • pp.715-722
    • /
    • 2020
  • This paper proposes a design verification method based on system dynamics for offshore separation systems. Oil and gas separation systems are key components of offshore oil platforms; these systems determine the competitiveness of engineering, procurement, and construction (EPC) projects, especially in terms of added value. However, previous research on design verification has been limited to the process and deliverables of design. To address this, the study aims to develop a comprehensive design verification method and the associated functions from the perspective of project management, for the entire project life-cycle of offshore structures. The proposed methodology for design verification is expected to contribute toward effective and detailed designs as well as improve the competitiveness of EPC companies in constructing of shore structures during the early design stages. We first analyzed the separation system of the FPSO using the design verification method adopted by advanced countries and compared it with the system dynamics process formalized as ISO 15288. Subsequently, a tailored process for the design verification of the offshore structure was derived. It is shown that the proposed design verification method can be applied to the front-end engineering design process of of shore structures. Moreover, it can contribute toward the successful performance of offshore projects in the future and also minimize design changes and critical risks during the construction of these offshore structures.

For the development of software industry, extensive software certification scheme (소프트웨어 산업의 발전을 위한 확장된 소프트웨어 인증체계)

  • Seo, Hee Suk;Kim, Sang Ho;Lee, Seung Jae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.3
    • /
    • pp.121-129
    • /
    • 2010
  • For the development of software industry, offers an expanded software authentication scheme caused by the unauthorized copying of software is to reduce the damage to software developers, retail sales and to promote the development of the software industry was studied. Serial Number of the current software registration is conducted in such a simple verification procedure if the Serial Number only illegal and can be installed on multiple computers, such as program code to allow third parties to enter the Serial Number, or the extract can be used without is a reality. The proposed extension to the software authentication system when you install the software, my phone authentication and MAC Address Authentication Service introduced to distinguish normal user, the user of the MAC Address of the server and software development company that was sent to the registered MAC Address of the computer to be run only by the use of genuine software and to make unauthorized copies of software generated by the software developer can reduce the damage of the proposed plan.