• Title/Summary/Keyword: Object Trace

Search Result 125, Processing Time 0.026 seconds

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

Dynamic Data Path Prediction use Extend EKF Movement Tracing in Net-VE (Net-VE에서 이동궤적을 이용한 동적데이터 경로예측)

  • Song, Sun-Hee;Oh, Haeng-Soo;Park, Kwang-Chae;Kim, Gwang-Jun;Ra, Sang-Dong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.2
    • /
    • pp.81-89
    • /
    • 2008
  • Improved EKF suggests variable path prediction to reduce the event traffic caused by the information sharing among multi-users in networked virtual environment. The three dimensional virtual space is maintained consistently by endless status information exchange among dispersed users, and periodic status transmission brings traffic overhead in network. By using the error between the measured movement trace of dynamic information and the EKF predicted, we propose the method applied to predict the mobile packet of dynamic data which is simultaneously changing. And, the simulation results of DIS dead reckoning algorithms and EKF path prediction is compared here. It followed the specific path and while moving, the proposed method which it proposes predicting with DIS dead reckoning algorithm and to compare to the mobile path of the actual object and it got near it predicts the possibility of knowing it was.

  • PDF

Study on RFID tag Design and Privacy Protection (RFID tag 설계 및 프라이버시 보호에 관한 연구)

  • Baek, Hyun-Ok;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.41-49
    • /
    • 2007
  • RFID in which subminiature IC chip with the indentified information is built a core technique that can recognize, trace and manage various information of an object using radio frequency in the age of Ubiquitous. Several pressing matters about an infringement of Privacy and a security of private information should be settled as soon as possible because an information of specific circumstance can be collected and used without any awareness by others as well as a private information. In addition, various algorithms with high level of security, which is normally used in wire, can be hardly applied to RFID tag because of a lot of restrictions of tag. In this report, designed-RFID tag based on the standard of ISO/IEC 18000-6 and the problems which originated from the technical procedure of that design were analyzed, and the algorithm which could be applied to the designed-tag was also investigated.

  • PDF

Efficient RFID Authentication protocol for Distribution Database Environment (분산시스템 환경에 적합한 효율적인 RFID 인증 시스템)

  • Choi, Eun-Young;Lee, Su-Mi;Lim, Jong-In;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.25-35
    • /
    • 2006
  • Radio Frequency identification (RFID) will become an important technology in remotely object identification systems. However, the use of RFID tags may create new threats to the sniな and Privacy of individuals holding RFID tags. These threats bring several problems which are information leakage of a tag, location trace of individuals and impersonation of a tag. Low-cost RFID systems have much restrictions such as the limited computing power, passive power mechanism and low storage space. Therefore, the cost of tag's computation should be considered as an important factor in low-cost RFID systems. We propose an authentication protocol, OHLCAP which requires only one one-way hash function operation and hence is very efficient. Furthermore, our protocol is suitable to distribution database environment. Hence our scheme can be applied to ubiquitous computing environment.

Proxy Caching Scheme Based on the User Access Pattern Analysis for Series Video Data (시리즈 비디오 데이터의 접근 패턴에 기반한 프록시 캐슁 기법)

  • Hong, Hyeon-Ok;Park, Seong-Ho;Chung, Ki-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1066-1077
    • /
    • 2004
  • Dramatic increase in the number of Internet users want highly qualified service of continuous media contents on the web. To solve these problems, we present two network caching schemes(PPC, PPCwP) which consider the characteristics of continuous media objects and user access pattern in this paper. While there are plenty of reasons to create rich media contents, delivering this high bandwidth contents over the internet presents problems such as server overload, network congestion and client-perceived latency. PPC scheme periodically calculates the popularity of objects based on the playback quantity and determines the optimal size of the initial fraction of a continuous media object to be cached in proportion to the calculated popularity. PPCwP scheme calculates the expected popularity using the series information and prefetches the expected initial fraction of newly created continuous media objects. Under the PPCwP scheme, the initial client-perceived latency and the data transferred from a remote server can be reduced and limited cache storage space can be utilized efficiently. Trace-driven simulation have been performed to evaluate the presented caching schemes using the log-files of iMBC. Through these simulations, PPC and PPCwP outperforms LRU and LFU in terms of BHR and DSR.

  • PDF

Method Extracting Observation Data by Spatial Factor for Analysis of Selective Attention of Vision (시각의 선택적 주의집중 분석을 위한 공간요소별 주시데이터 추출방법)

  • Kim, Jong-Ha;Kim, Ju-Yeon
    • Science of Emotion and Sensibility
    • /
    • v.18 no.4
    • /
    • pp.3-14
    • /
    • 2015
  • This study has extracted observation data by spatial factor for the analysis of subjects' selective attention with the objects of public space at the entrance of subway stations. The methods extracting observation data can be summarized as the following. First, the frequency analysis by lattice was prevalent for those methods, but there is a limitation to the analysis of the observation data. On the contrary, the method extracting observation data by factor applied in this study can make it clear if any sight is concentrated on any particular factors in a space. Second, the results from the extracted data corresponding to the observation area can be objectified while the method setting up the observation area by applying the radius of fovea. Third, time-sequential trace of observation results of relevant factors was possible through hourly analysis of spatial factors. The consideration of the results of "corresponding spatial scope" which is the object of this study will reveal that the more the observation time, the less the degree of attention it receives. Fourth, the frequency of observation superiority was applied for the analysis of the sections with selective attention by time scope; this revealed that men and women had intensive observation in time scope I (52.4 %) and in time scope IV (24.0 %), respectively.

Back-end Prefetching Scheme for Improving the Performance of Cluster-based Web Servers (클러스터 웹 서버에서 성능 향상을 위한 노드간 선인출 기법)

  • Park, Seon-Yeong;Park, Do-Hyeon;Lee, Joon-Won;Cho, Jung-Wan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.5
    • /
    • pp.265-273
    • /
    • 2002
  • With the explosive growth of WWW traffic, there is an increasing demand for the high performance Web servers to provide a stable Web service to users. The cluster-based Web server is a solution to core with the heavy access from users, easily scaling the server according to the loads. In the cluster-based Web sewer, a back-end node may not be able to serve some HTTP requests directly because it does not have the requested contents in its main memory. In this case, the back-end node has to retrieve the requested contents from its local disk or other back-end nodes in the cluster. To reduce service latency, we introduce a new prefetch scheme. The back-end nodes predict the next HTTP requests and prefetch the contents of predicted requests before the next requests arrive. We develop three prefetch algorithms bated on some useful information gathered from many clients'HTTP requests. Through trace-driven simulation, the service latency of the prefetch scheme is reduced by 10 ~ 25% as compared with no prefetch scheme. Among the proposed prefetch algorithms, Time and Access Probability-based Prefetch (TAP2) algorithm, which uses the access probability and the inter-reference time of Web object, shows the best performance.

The Discipline of the Dom-ino Frame and the Regulating Line - A Study of Le Corbusier's Villa La Roche-Jeanneret and Villa Stein-de Monzie - (르 꼬르뷔제 건축에서 돔-이노 프레임과 규준선의 기율 - 라 로쉬-잔느레 주택과 가르쉬 주택을 중심으로 -)

  • Pai, Hyung-Min;Hyun, Myung-Seok
    • Journal of architectural history
    • /
    • v.12 no.1 s.33
    • /
    • pp.25-41
    • /
    • 2003
  • This paper is a study of Le Corbusier's trace regulateur of the 1920s, particularly its role in the design of the Villas La Roche-Jeanneret and Stein-de Monzie. It proceeds on the basis of the following three themes: first, the relation between the regulating line and the dom-ino frame; second, its status as a proportional device based not on a module system but one that defines relations; third, its function as an essential practical device in the design process. In the Villa La Roche-Jeanneret, the embedded horizontal planes of the dom-ino frame were constant, but the vortical lines of the columns were altered according to the changes in plan. Initially, a left-hand bay window formed a symmetry with the right-hand bay window, the only constant in the design process. With subsequent changes, mullion sections of the horizontal window and roof elements came to provide the reference points for the regulating line. Eventually, a regulating line different from the one that controlled the bay window and the elongated volume came to control the entrance hall of Villa La Roche, resulting in three different kinds of regulating lines in the final version. In contrast to the Villa La Roche-Jeanneret, a singular and consistent regulation line was anticipated in the earliest design stages of the Villa Stein-de Monzie. The repetition of its A:B grid and the standard $2.5m{\times}1.0m$ sliding window determined the proportions of both its plan and elevation, and thus the regulating line became 'automatic,' losing its viability as a practical tool. Though the regulating titles of the La Roche-Jeanneret look as if they were an afterthought, drawn after the design was complete, they were most active, requiring tenacity and discipline in their application. On the other hand, the seemingly 'redundant' regulating line of the Villa Stein-de Monzie gains its raison d'etre from the dom-ino frame. Its cantilevers and uninterrupted horizontal window could be used in decisive fashion because of the guarantee that the correct proportion would always be maintained. Thus we discover that Le Corbusier's discipline of the 1920s had a certain spectrum of flexibility. His 'parti' ranged from the extremely loose and malleable grid of the Villa La Roche-Jeanneret to the fixed grid of the Villa Stein-de Monzie. In different ways, these projects retain the tension between the dom-ino frame and the regulating line. For Le Corbusier, as much as the grid was an object with fixed attributes, it was also an active medium manipulated by the will of the architect.

  • PDF

Beyond Humanism - The End of Modern Humanity and the New Transformations of Human Being (휴머니즘의 경계를 넘어서 - 근대 인간학의 종언과 인간의 새로운 변형 -)

  • Choi, Jin-Seok
    • Cross-Cultural Studies
    • /
    • v.41
    • /
    • pp.381-413
    • /
    • 2015
  • This article aims to trace a historical trajectory of "Humanism" as a Modern scientific concept in the light of Michel Foucault's genealogy. Generally, we believe that Humanism is a natural and eternal idea for mankind, because no one doubts that he or she is not included in the category of a "Human Being." On the contrary, according to French philosopher Foucault, the Idea of Humanism, or anthropocentrism, appeared only in the Modern Age, from the 16th century downward. Before the Renaissance, human beings did not occupy the most important status in Nature, and only existed as natural beings. As soon as mankind was liberated from the superstitious of fear and religious dogma, the concept of "Human Being" is supplied with new meanings and values. The famous maxim, such as, "Man is the lord of creation" constitutes modern human science as an inviolable category of modernity. However, Foucault tried to illuminate the hidden sides of humanism, and gave us the strict warning on the end of the human beings, which turned out to be an object of Modern knowledge. If there would be no reason to maintain a knowledge system of Modernity, in other words, Modernity as knowledge would lose its validity and we could give up Humanism as a heavy burden. Moreover, it is very clear that we are confronted with the critical moments of radical skepticism on the meaning and value for Humanity. That means that we need to think about the new transformations of Human Beings, which will probably appear in the forms of "Non-Humans," "Machines (Deleuze & Guattari)," or "Post-Humans" etc. At the present time, we cannot know if it will be positive, or negative for mankind. We should look back at the history of Humanism from a genealogical perspective, which is why we have to investigate the conceptual trajectory of Humanism in this moment.

The Collection and Transfer of Public Records and the Role of the Archivist (공공기록물의 수집·이관과 아키비스트의 역할)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.2
    • /
    • pp.3-48
    • /
    • 2000
  • The collection and transfer of records is a very basic stage in the whole process of records and archives management. However they are regarded as an non-professional art of work in records management that are performed easily by everyone. Therefore they have been treated not properly in the scholarly discussion of archival sciences in Korea. The collection and transfer of records play an active role in the making of effective administrative system, in accumulating and sharing the knowledge and informations of political, economical, social and cultural values. On the basis of proper collection and transfer of records our democracy can operate regularly and our daily experiences can be preserved as historical resources. For the optimal-functioned collection and transfer of public records the archivists for this task must have a comprehensive understanding of whole process of records management and possess suitable professional skills. Moreover there are many sorts of preliminary works needed for this task, as follows: an accurate defining of administrative organizations and their tasks, thorough understanding of records management institutions on their own competence and ability, and the establishment of technical standards for their tasks. Additionally the archivists are able not only to consider the present informational and evidential values of the records, but also the historical values. It can be said that the collection and transfer of records is a "synthesis of records management skills" exerted by an archivist. According to the newly established law of public records management, the collection and transfer of public records must be registered at first electronically. Through this procedure the whole contents of produced and transmitted records, which are to be transferred, can be reported in detail. By means of this report the archival institutions and the archivists can trace back the each items of records(archives) and the result of their arrangement to identify a certain object. There are also new storage strategies employed to increase the whole sum of stored informations, i. e. records and archives, in spite of reducing the storage costs. It will be achieved by differentiations of the preservation methods for each sorts of records by the criteria of storage-period, -place, and -method. Many supplementary methods are also prepared to help the collection of important records(archives) in a complete structure and form. To let this new concept and system of collection and transfer of records operate properly, a number of professional archivists should be posted in the needed places throughout the whole administrative body. Their training must be also updated for the newly defined task of collection and transfer of records.