• 제목/요약/키워드: Problem Identification

검색결과 1,328건 처리시간 0.026초

광학식 지문센서에서의 위조 지문 검출 방법 (A Detection Method of Fake Fingerprint in Optical Fingerprint Sensor)

  • 이지선;김재환;채진석;이병수
    • 한국멀티미디어학회논문지
    • /
    • 제11권4호
    • /
    • pp.492-503
    • /
    • 2008
  • 최근 개인 인증 기술의 발달과 중요성이 높아짐에 따라 분실이나 도용 등의 위험이 적은 바이오 인식 기술이 빠르게 보급되고 있다. 특히, 인식률이 높고 이용하기 쉬운 지문 인식 시스템이 홍채 인식, 얼굴 인식, 정맥 인식 등의 다른 바이오 인식 시스템보다 훨씬 많이 사용되고 있는 것으로 나타나고 있다. 그러나 이와 같은 지문 인식 시스템은 지문 데이터를 입력할 때, 인공적으로 만들어진 위조 지문이 입력될 수 있는 문제점을 가지고 있다. 따라서 이와 같은 문제를 해결하기 위해 본 논문에서는 광학식 지문센서에서 발생되는 빛이 생체 지문을 투과하면서 감쇠되는 정도를 측정하고, 일정시간에 따른 단계별 빛의 투과량의 명암 차이를 분석하여 위조 지문의 입력을 검출하는 방법을 제안하였다. 제안된 시스템의 성능 향상을 입증하기 위해 기존에 사용되던 지문 온도 측정을 병행하는 멀티센서(Multi-Sensor) 인식 시스템과 성능 비교 실험을 수행하였으며, 그 결과, 위조 지문에 대한 검출률이 약 32.6% 정도 향상된 것을 확인함으로써 지문 인식시스템에서의 보안 문제의 해결 가능성을 제시하였다.

  • PDF

Identification of Plastic Wastes by Using Fuzzy Radial Basis Function Neural Networks Classifier with Conditional Fuzzy C-Means Clustering

  • Roh, Seok-Beom;Oh, Sung-Kwun
    • Journal of Electrical Engineering and Technology
    • /
    • 제11권6호
    • /
    • pp.1872-1879
    • /
    • 2016
  • The techniques to recycle and reuse plastics attract public attention. These public attraction and needs result in improving the recycling technique. However, the identification technique for black plastic wastes still have big problem that the spectrum extracted from near infrared radiation spectroscopy is not clear and is contaminated by noise. To overcome this problem, we apply Raman spectroscopy to extract a clear spectrum of plastic material. In addition, to improve the classification ability of fuzzy Radial Basis Function Neural Networks, we apply supervised learning based clustering method instead of unsupervised clustering method. The conditional fuzzy C-Means clustering method, which is a kind of supervised learning based clustering algorithms, is used to determine the location of radial basis functions. The conditional fuzzy C-Means clustering analyzes the data distribution over input space under the supervision of auxiliary information. The auxiliary information is defined by using k Nearest Neighbor approach.

Fair Identification Scheme for STAC Protocol in 13.56MHz RFID Systems

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • 제9권3호
    • /
    • pp.260-265
    • /
    • 2011
  • In RFID System, when multiple tags respond simultaneously, a collision can occur. A method that solves this collision is referred to anti-collision algorithm. In 13.56MHz RFID system, STAC protocol is defined as an anti-collision algorithm for multiple tag reading. In STAC protocol, there is no differentiation between the collided tags and others in the identification process. Therefore, tags may never be successfully identified because its responses may always collide with others. This situation may cause the tag starvation problem. This paper proposes a fair identification scheme for STAC protocol. In the proposed scheme, if the number of collided slots is large during a query round, the reader broadcasts a CollisionRound command to begin a collision round. During the collision round, the reader identifies only tags that are experienced collision during the previous query round.

가스 파이프 내부의 음향 전파 특성에 관한 연구 (Identification on Principle of Acoustic Wave Propagation in a Gas Duct)

  • 김민수;이상권
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 2007년도 춘계학술대회논문집
    • /
    • pp.1100-1105
    • /
    • 2007
  • In the gas supply duct, the gas leakage caused by the impact of the construct equipment is serious problem. The identification of the impact position is an important issue and an engineering work. For the basic research of this problem, the principle studies for the acoustic wave propagation in a gas duct are proceeded in this paper. This principal work is based on the identification of the cut-off frequency associated with major modes of the gas duct theoretically and experimentally. The cut-off frequency is confirmed by STFT and cross-correlation function is used to identify the leakage position.

  • PDF

가스 배관 내부의 음파 전달 특성에 관한 연구 (Identification on Principle of Acoustic Wave Propagation Characteristics in a Gas Pipe)

  • 김민수;이상권;장상엽;고재필
    • 한국소음진동공학회논문집
    • /
    • 제18권8호
    • /
    • pp.797-804
    • /
    • 2008
  • In the gas supply pipe, the gas leakage caused by the impact of the construct equipment is serious problem. The identification of the impact position is an important issue and an engineering work. For the basic research of this problem, the principle studies for the acoustic wave propagation in a gas pipe are proceeded in this paper. This principal work is based on the identification of the cut-off frequency associated with major modes of the gas pipe theoretically and experimentally The cut-off frequency is confirmed by STFT and cross-correlation function is used to identify the leakage position.

Security in the Password-based Identification

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제5권4호
    • /
    • pp.346-350
    • /
    • 2007
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBSI(Password Based Secure Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBSI is also excellent in the aspect of the performance.

확장칼만필터와 최대공산법을 이용한 미사일 공력계수 모델의 설정 및 계수추정 (Missile Aerodynamic Structure and Parameter Identification Using the Extended Kalman Filter and Maximum Likelihood Method)

  • 성태경;이장규
    • 대한전기학회논문지
    • /
    • 제35권6호
    • /
    • pp.246-256
    • /
    • 1986
  • Determination of an aerodynamic structure is a very important problem in missile modeling. The structure problem is to choose an appropriate set of aerodynamic coefficients to represent chosen missile dynamics. A methodology and criteria to determine a structure from windtunnel data are presented in this paper. Aerodynamic coeffecients in the determined structure are then identified by parameter identification algorithms. The identified coefficients are in turn used to verify appropriateness of the structure. The extended Kalman filter (EKF) and the maximum likelihood mithod (ML) are adopted as the parameter identification algorithm. Both methods exhibit satisfactory results. While the model identified by the ML more closely follows dynamics of the chosen missile than that by the EKF.

  • PDF

On order determination in identification of closed-loop systems

  • Oura, Kunihiko;Akizuki, Kageo;Hanazaki, Izumi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1995년도 Proceedings of the Korea Automation Control Conference, 10th (KACC); Seoul, Korea; 23-25 Oct. 1995
    • /
    • pp.480-483
    • /
    • 1995
  • Identification of a process in closed-loop control system is an important problem in practice. This paper deals with parameter estimation using input-output data of the process operating in a closed-loop system. It is necessary to determine orders and delay-time to get consistent estimators by least square method for input-output data collected from the process. The authors considered a problem to determine delay-time in the condition that orders were known, in last KACC. So we extend the range to determine orders and delay-time in this paper.

  • PDF

다중 입력 규명을 위한 센서의 위치 선정에 관한 연구 ; 주파수 응답 행렬의 직교성 응용 (A STUDY ON THE SENSOR PLACEMENT TO IDENTIFY MULTIPLE INPUT FORCES USING ORTHOGONALITY OF FREQUENCY RESPONSE MATRIX)

  • 박남규;박용화;박윤식
    • 한국소음진동공학회:학술대회논문집
    • /
    • 한국소음진동공학회 1997년도 춘계학술대회논문집; 경주코오롱호텔; 22-23 May 1997
    • /
    • pp.102-109
    • /
    • 1997
  • A study to determine a proper sensor placement was developed to improve force identification. Improper selection of response position cause erroneous result in force identification problem. This paper presents two methods to improve the conditioning of the system's FRM(Frequency Response Matrix) which affects the accuracy of result. The basic strategy of the two methods in selecting the response position is to let the smallest singular value be as large as possible by maximizing the orthogonality of FRM. The suggested methods are tested numerically with a fixed-fixed beam model. The test results show that the proposed methods are very effective in dealing with the force identification problem.

  • PDF

Human Memorable Password based Efficient and Secure Identification

  • Park Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • 제3권4호
    • /
    • pp.213-216
    • /
    • 2005
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. It is the stability that is based on Square Root Problem, and we would like to suggest PBI(password Based Identification), enhancing the stability, for all of the well-known attacks by now including Off-line dictionary attack, password file compromise, Server and so on. The PBI is also excellent in the aspect of the performance.