• Title/Summary/Keyword: Database security

Search Result 639, Processing Time 0.027 seconds

Fingerprint Recognition Algorithm using Clique (클릭 구조를 이용한 지문 인식 알고리즘)

  • Ahn, Do-Sung;Kim, Hak-Il
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.2
    • /
    • pp.69-80
    • /
    • 1999
  • Recently, social requirements of personal identification techniques are rapidly expanding in a number of new application ares. Especially fingerprint recognition is the most important technology. Fingerprint recognition technologies are well established, proven, cost and legally accepted. Therefore, it has more spot lighted among the any other biometrics technologies. In this paper we propose a new on-line fingerprint recognition algorithm for non-inked type live scanner to fit their increasing of security level under the computing environment. Fingerprint recognition system consists of two distinct structural blocks: feature extraction and feature matching. The main topic in this paper focuses on the feature matching using the fingerprint minutiae (ridge ending and bifurcation). Minutiae matching is composed in the alignment stage and matching stage. Success of optimizing the alignment stage is the key of real-time (on-line) fingerprint recognition. Proposed alignment algorithm using clique shows the strength in the search space optimization and partially incomplete image. We make our own database to get the generality. Using the traditional statistical discriminant analysis, 0.05% false acceptance rate (FAR) at 8.83% false rejection rate (FRR) in 1.55 second average matching speed on a Pentium system have been achieved. This makes it possible to construct high performance fingerprint recognition system.

  • PDF

Video Retrieval System supporting Adaptive Streaming Service (적응형 스트리밍 서비스를 지원하는 비디오 검색 시스템)

  • 이윤채;전형수;장옥배
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.1
    • /
    • pp.1-12
    • /
    • 2003
  • Recently, many researches into distributed processing on Internet, and multimedia data processing have been performed. Rapid and convenient multimedia services supplied with high quality and high speed are to be needed. In this paper, we design and implement clip-based video retrieval system on the Web enviroment in real-time. Our system consists of the content-based indexing system supporting convenient services for video content providers, and the Web-based retrieval system in order to make it easy and various information retrieval for users in the Web. Three important methods are used in the content-based indexing system, key frame extracting method by dividing video data, clip file creation method by clustering related information, and video database construction method by using clip unit. In Web-based retrieval system, retrieval method ny using a key word, two dimension browsing method of key frame, and real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time display method of the clip are used. In this paper, we design and implement the system that supports real-time retrieval for video clips on Web environment and provides the multimedia service in stability. The proposed methods show a usefulness of video content providing, and provide an easy method for serching intented video content.

A Basic Study of iBUM Development based on BIM/GIS Standard Information for Construction of Spatial Database (공간자료 구축을 위한 BIM/GIS 표준정보 기반 건축도시통합모델(iBUM)의 개발에 관한 기초연구)

  • Ryu, Jung Rim;Choo, Seung Yeon
    • Spatial Information Research
    • /
    • v.22 no.5
    • /
    • pp.27-41
    • /
    • 2014
  • Recently, BIM(Building Information Modeling) has been applied to the infrastructure such as road and bridge, and information about the outside environment of buildings is needed for maintaining and managing the large urban facilities. In addition, the convergence between spatial information and Big-data has a large potentiality, in respect that considerable profits and developments in other application problems such as various simulations and urban plans, national land security, may be brought about on the basis of the interoperability of information between BIM and GIS. Therefore, this study attempted to suggest the development direction of a model integrating building for spatial information analysis and city on the subject by comparing and analyzing difference between information system and shape expression of IFC, CityGML and LandXML to efficiently link information between IFC as a standard model of BIM and CityGML as a standard model in the GIS sector and to prepare a basic fusion strategy and a method of utilization between BIM and GIS. The result of the study are as follow. Firstly, contents and structure of IFC, CityGML and LandXML are compared and analyzed. Secondly, the development direction of iBUM(Integrated Building and Urban Model) suggested, which is based on convergence technology for analysis of space information. Finally, a strategy and method of the BIM and GIS are proposed in the iBUM environment.

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

Accidents resulting in disability in vulnerable populations and their consequences: A study of vulnerable worker groups in South Korea (취약계층의 사고 후 장애 발생으로 인한 결과: 한국사회의 취약한 노동계층 중심으로)

  • Pak, Haeyong;Bahk, Jinwook;Paek, Domyung;Lee, Eun-Hee;Pak, Yun-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.225-232
    • /
    • 2017
  • This study aimed to identify worker groups that are to accidents and to track the changes in their socioeconomic status there after. We analyzed the Korean Labor and Income Panel Study (KLIPS) database(2001-2006) were recorded according to the participant's economic activity status at the beginning of follow-up, and economic activity status was. During the follow-up period, the unemployed group experienced more accidents that resulted in disability than the economically active group. Interestingly, the unemployed group also had the highest industrial accident rate. Among the employed, daily and unpaid family workers were more vulnerable to disabilities. After the accidents, the participants tended to become economically inactive or unemployed. Compared to other worker groups, the economically inactive, unemployed, and daily and unpaid family workers experienced higher rates of accidents and faced graver conditions as a result. Although they constitute a significantly large part of society, these vulnerable workers are not currently covered by any social security measures, such as accident surveillance, training, and accident insurance. Social policy should therefore be directed toward protecting these vulnerable worker groups.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

Degree Programs in Data Science at the School of Information in the States (미국 정보 대학의 데이터사이언스 학위 현황 연구)

  • Park, Hyoungjoo
    • Journal of Korean Library and Information Science Society
    • /
    • v.53 no.2
    • /
    • pp.305-332
    • /
    • 2022
  • This preliminary study examined the degree programs in data science at the School of Information in the States. The focus of this study was the data science degrees offered at the School of Information awarded by the 64 Library and Information Science (LIS) programs accredited by the American Library Association (ALA) in 2022. In addition, this study examined the degrees, majors, minors, specialized tracks, and certificates in data science, as well as the potential careers after earning a data science degree. Overall, eight Schools of Information (iSchools) offered 12 data science degrees. Data science courses at the School of Information focus on topics such as introduction to data science, information retrieval, data mining, database, data and humanities, machine learning, metadata, research methods, data analysis and visualization, internship/capstone, ethics and security, user, policy, and curation and management. Most schools did not offer traditional LIS courses. After earning the data science degree in the School of Information, the potential careers included data scientists, data engineers and data analysts. The researcher hopes the findings of this study can be used as a starting point to discuss the directions of data science programs from the perspectives of the information field, specifically the degrees, majors, minors, specialized tracks and certificates in data science.

Spatial Assessment of Climate Suitability for Summer Cultivation of Potato in North Korea (기후적합도 모형을 활용한 북한지역 내 감자의 여름재배 적지 탐색)

  • Kang, Minju;Hyun, Shinwoo;Kim, Kwang Soo
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.24 no.1
    • /
    • pp.35-47
    • /
    • 2022
  • Expansion of potato production areas can improve the food security in North Korea because the given crop has less requirements for agricultural materials and facilities. The Global Agro-Ecological Zones (GAEZ) model, which was developed to evaluate climate suitability under different cultivation conditions, was used to identify potential areas for the potato production. The spatial estimates of crop suitability under low and high input management conditions were downloaded from the GAEZ data portal. The values of suitability were obtained at the potato occurrence sites retrieved from the Global Biodiversity Information Facility (GBIF) database. The suitable areas for the potato production were identified using a threshold value derived from the suitability estimates at the occurrence sites. It was found that 90% of the occurrence sites had the suitability index value >3,333, which was set to be the threshold value. The suitable areas in North Korea were summarized by province and county. Rice cultivation areas were excluded from the analysis. The reported relative acreage of potato production was better represented by the suitable areas under the low input management options than the high input conditions. The suitable areas also had a similar distribution to the reported acreage of potato production by county. These results indicated that the GAEZ model would be useful to identify the candidate production areas, which would facilitate the increases in potato production especially under future climate conditions. Furthermore, monthly maps of crop suitability can be used to design cropping systems that would improve crop production under the limited use of agricultural materials and facilities.

Comparative Study of Anomaly Detection Accuracy of Intrusion Detection Systems Based on Various Data Preprocessing Techniques (다양한 데이터 전처리 기법 기반 침입탐지 시스템의 이상탐지 정확도 비교 연구)

  • Park, Kyungseon;Kim, Kangseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.11
    • /
    • pp.449-456
    • /
    • 2021
  • An intrusion detection system is a technology that detects abnormal behaviors that violate security, and detects abnormal operations and prevents system attacks. Existing intrusion detection systems have been designed using statistical analysis or anomaly detection techniques for traffic patterns, but modern systems generate a variety of traffic different from existing systems due to rapidly growing technologies, so the existing methods have limitations. In order to overcome this limitation, study on intrusion detection methods applying various machine learning techniques is being actively conducted. In this study, a comparative study was conducted on data preprocessing techniques that can improve the accuracy of anomaly detection using NGIDS-DS (Next Generation IDS Database) generated by simulation equipment for traffic in various network environments. Padding and sliding window were used as data preprocessing, and an oversampling technique with Adversarial Auto-Encoder (AAE) was applied to solve the problem of imbalance between the normal data rate and the abnormal data rate. In addition, the performance improvement of detection accuracy was confirmed by using Skip-gram among the Word2Vec techniques that can extract feature vectors of preprocessed sequence data. PCA-SVM and GRU were used as models for comparative experiments, and the experimental results showed better performance when sliding window, skip-gram, AAE, and GRU were applied.

A Web-based 'Patterns of Care Study' System for Clinical Radiation Oncology in Korea: Development, Launching, and Characteristics (우리나라 임상방사선종양을 위한 웹 기반 PCS 시스템의 개발과 특성)

  • Kim, Il Han;Chie, Eui Kyu;Oh, Do Hoon;Suh Chang-Ok;Kim, Jong Hoon;Ahn, Yong Chan;Hur, Won-Joo;Chung, Woong Ki;Choi, Doo Ho;Lee, Jae Won
    • Radiation Oncology Journal
    • /
    • v.21 no.4
    • /
    • pp.291-298
    • /
    • 2003
  • Purpose: We report upon a web-based system for Patterns of Care Study (PCS) devised for Korean radiation oncology. This PCS was designed to establish standard tools for clinical quality assurance, to determine basic parameters for radiation oncology processes, to offer a solid system for cooperative clinical studies and a useful standard database for comparisons with other national databases. Materials and Methods: The system consisted of a main server with two back-ups in other locations. The program uses a Linux operating system and a MySQL database. Cancers with high frequencies in radiotherapy departments in Korea from 1998 to 1999 were chosen to have a developmental priority. Results: The web-based clinical PCS .system for radiotherapy in www.pcs.re.kr was developed in early 2003 for cancers of the breast, rectum, esophagus, larynx and lung, and for brain metastasis. The total number of PCS study items exceeded one thousand. Our PCS system features user-friendliness, double entry checking, data security, encryption, hard disc mirroring, double back-up, and statistical analysis. Alphanumeric data can be input as well as image data. In addition, programs were constructed for IRB submission, random sampling of data, and departmental structure. Conclusion: For the first time in the field of PCS, we have developed a web-based system and associated working programs. With this system, we can gather sample data in a short period and thus save, cost, effort and time. Data audits should be peformed to validate input data. We propose that this system should be considered as a standard method for PCS or similar types of data collection systems.