• Title/Summary/Keyword: Security Objects

Search Result 372, Processing Time 0.026 seconds

Design and Implementation of a Smart Tag System for Ubiquitous Port Logistics (유비쿼터스 항만 물류 환경을 위한 스마트 태그 시스템의 설계 및 구현)

  • Cho, Hyun-Tae;Baek, Yun-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1500-1510
    • /
    • 2007
  • In recent, rapid and accurate processing for logistics have been required, according as logistics has grown dramatically. Especially, identifying, locating, or tracking objects in ports are important, because ports are gateways to extended markets. In this paper, we describe the design and implementation of a smart tag system for ubiquitous port logistics. Our solution consists of three parts: an active RFID to identify objects, an electronic container seal to charge with security of containers, and a RTLS system to locate objects. Because identification technology for logistics can be read by heterogenous systems, compliance with the international standard is one of the most critical issues. This paper introduces the method to maintain compliance with ISO, and conducts some verifications. In addition, we analyze the system performance such as lifetime, identification rate, and time for multiple tag identification.

GIS Vector Map Compression using Spatial Energy Compaction based on Bin Classification (빈 분류기반 공간에너지집중기법을 이용한 GIS 벡터맵 압축)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.15-26
    • /
    • 2012
  • Recently, due to applicability increase of vector data based digital map for geographic information and evolution of geographic measurement techniques, large volumed GIS(geographic information service) services having high resolution and large volumed data are flowing actively. This paper proposed an efficient vector map compression technique using the SEC(spatial energy compaction) based on classified bins for the vector map having 1cm detail and hugh range. We encoded polygon and polyline that are the main objects to express geographic information in the vector map. First, we classified 3 types of bins and allocated the number of bits for each bin using adjacencies among the objects. and then about each classified bin, energy compaction and or pre-defined VLC(variable length coding) were performed according to characteristics of classified bins. Finally, for same target map, while a vector simplification algorithm had about 13%, compression ratio in 1m resolution we confirmed our method having more than 80% encoding efficiencies about original vector map in the 1cm resolution. Also it has not only higher compression ratio but also faster computing speed than present SEC based compression algorithm through experimental results. Moreover, our algorithm presented much more high performances about accuracy and computing power than vector approximation algorithm on same data volume sizes.

Improvement of Port Entrance System using RFID (RFID를 활용한 항만출입체계 개선방안)

  • Choi, Hyung-Rim;Kim, Hyun-Soo;Hong, Soon-Gu;Park, Yong-Sung;Kim, Hee-Yoon;Shin, Joong-Jo;Choi, Sung-Pill;Lee, Byung-Ha;Choi, Ki-Nam;Ha, Jeong-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.709-719
    • /
    • 2010
  • As the world has had a high recognition of security since 9/11 attacks in 2001, many countries and international organizations around the world are making strenuous efforts in establishing stronger security, centering on areas with high possibility of terrorist attacks. In particular, harbor facilities where a great deal of trade take place between countries, have high possibilities of becoming the objects of terrorist attacks and also of becoming places of trading objects and illegal items which might be leveraged for terror attacks. In this study, I have explained the current status of the harbor entrance system through existing documents, interviews and field trips to harbors and have also introduced improvement measures using RFID technology from the viewpoint of BP(Business Process). I expect that this study will be used as basic materials because I have studied the number of people entering harbors and working procedures for vehicle entrance, which have not been studied so far and also laid out various factors to be considered to introduce RFID technology.

Research for realization of platform of portable radiation detector using NaI(TI) Scintillator (NaI(TI) Scintillator를 이용한 휴대용 방사선 검출 장치 구현에 대한 연구)

  • Lee, Yoon-Ho;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.266-269
    • /
    • 2012
  • Over the world, the development of critical technology for the safety and security of coastal distribution based on ubiquitous computing is being processed to meet the bottom lines of governmental regulations. Currently, 3D detectors using X-rays for freight search technology are being developed concerning U-based shipping security systems. In addition to that, there are increasing needs for developing portable radiation detector to detect gamma rays nuclide. The purpose of the thesis is to suggest the research of high speed portable gamma rays detector platform to prevent disorder caused to humans and public objects.

  • PDF

A Study of the Factors Affecting Adoption of a Mobile RFID : Focused on the Technology Area of Mobile RFID (모바일 RFID의 특성이 실제 사용의도에 미치는 영향에 관한 연구)

  • Lee, Da Hoon;Cho, Sung Min;Whang, Jaehoon
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.1
    • /
    • pp.67-85
    • /
    • 2013
  • The emergence of RFID markets and development of various RFID-embedded mobile devices has brought fundamental changes to our lives. As the availability of RFID readers and tags that are implanted in smart phones and table PCs increases, information on RFID-affixed objects can be tracked wirelessly and this had open possibilities for B2B businesses to be run like B2C businesses. However, given the popularity of the RFID markets, there is limited research in this area. This paper serves to develop an extended technology acceptance model by Mobile RFID characteristics (perceived cost, security, instant connectivity, context awareness, and result demonstrability) examines the determinant factors that cause the acceptance of mobile RFID. To do so, the study conducted a survey targeting smart phone users and used the PLS path modeling, one of the structural equation models to verify the significance of research hypothesis. As a result, perceived cost, instant connectivity, context awareness, and result demonstrability turned out to have a real effect on intention to use mobile RFID by means of perceived usefulness and perceived ease of use. Security turned out to have a partial effect on intention to use mobile RFID by means of perceived usefulness or perceived ease of Use.

Research for realization of platform of portable radiation detector using NaI(Tl) Scintillator (NaI(Tl) Scintillator를 이용한 휴대용 방사선 검출 장치 구현에 대한 연구)

  • Lee, Jon-Hwey;Joh, Yool-Hee;Lee, Yoon-Ho;Lim, Ik-Chan;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2323-2328
    • /
    • 2012
  • Over the world, the development of critical technology for the safety and security of coastal distribution based on ubiquitous computing is being processed to meet the bottom lines of governmental regulations. Currently, 3D detectors using X-rays for freight search technology are being developed concerning U-based shipping security systems. In addition to that, there are increasing needs for developing portable radiation detector to detect gamma rays. The purpose of the thesis is to suggest the research of high speed portable gamma rays detector platform to prevent disorder caused to humans and public objects.

A Comparison Algorithm of Rectangularly Partitioned Regions (직사각형으로 분할된 영역 비교 알고리즘)

  • Jung, Hae-Jae
    • Convergence Security Journal
    • /
    • v.6 no.2
    • /
    • pp.53-60
    • /
    • 2006
  • In the applications such as CAD or image processing, a variety of geometric objects are manipulated. A polygon in which all the edges are parallel to x- or y-axis is decomposed into simple rectangles for efficient handling. But, depending on the partitioning algorithms, the same region can be decomposed into a completely different set of rectangles in the number, size and shape of rectangles. So, it is necessary an algorithm that compares two sets of rectangles extracted from two scenes such as CAD or image to see if they represent the same region. This paper proposes an efficient algorithm that compares two sets of rectangles. The proposed algorithm is not only simpler than the algorithm based on sweeping method, but also reduces the number $O(n^2)$ of overlapped rectangles from the algorithm based on a balanced binary tree to O(nlogn).

  • PDF

A Study of Personal Characteristics Influencing Cloud Intention (클라우드 사용의도에 영향을 미치는 개인특성 연구)

  • Kim, Jin Bae;Cho, Myeonggil
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.3
    • /
    • pp.135-157
    • /
    • 2019
  • Information technology has economic, social and cultural impacts is closely linked to our lives. This information technology is becoming a key to the change of human civilization through connecting people and objects on the earth. In addition, future information technology is becoming more intelligent and personalized with the development of computing technology, and due to the rapid development of alcohol, environment without time and space constraint is realized, Is spreading. Since existing portable storage media are made of physical form, there is a limit to usage due to the risk of loss and limitation of capacity. Cloud services can overcome these limitations. Due to the problems of existing storage media, it is possible to overcome the limitations of storing, managing and reusing information through cloud services. Despite the large number of cloud service users, the existing research has focused mainly on the concept of cloud service and the effect of introduction on the companies. This study aims to conduct a study on individual characteristics that affect the degree of cloud use. We will conduct research on the causes of IT knowledge, personal perception of security, convenience, innovation, economical trust, and platform dependency affecting the intention to use the cloud. These results show that the variables affecting individual 's use of cloud service are influenced by individuals, and this study can be used as a basic data for individuals to use cloud service.

Multiple-Background Model-Based Object Detection for Fixed-Embedded Surveillance System (고정형 임베디드 감시 카메라 시스템을 위한 다중 배경모델기반 객체검출)

  • Park, Su-In;Kim, Min Young
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.21 no.11
    • /
    • pp.989-995
    • /
    • 2015
  • Due to the recent increase of the importance and demand of security services, the importance of a surveillance monitor system that makes an automatic security system possible is increasing. As the market for surveillance monitor systems is growing, price competitiveness is becoming important. As a result of this trend, surveillance monitor systems based on an embedded system are widely used. In this paper, an object detection algorithm based on an embedded system for a surveillance monitor system is introduced. To apply the object detection algorithm to the embedded system, the most important issue is the efficient use of resources, such as memory and processors. Therefore, designing an appropriate algorithm considering the limit of resources is required. The proposed algorithm uses two background models; therefore, the embedded system is designed to have two independent processors. One processor checks the sub-background models for if there are any changes with high update frequency, and another processor makes the main background model, which is used for object detection. In this way, a background model will be made with images that have no objects to detect and improve the object detection performance. The object detection algorithm utilizes one-dimensional histogram distribution, which makes the detection faster. The proposed object detection algorithm works fast and accurately even in a low-priced embedded system.

Sentiment Analysis From Images - Comparative Study of SAI-G and SAI-C Models' Performances Using AutoML Vision Service from Google Cloud and Clarifai Platform

  • Marcu, Daniela;Danubianu, Mirela
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.179-184
    • /
    • 2021
  • In our study we performed a sentiments analysis from the images. For this purpose, we used 153 images that contain: people, animals, buildings, landscapes, cakes and objects that we divided into two categories: images that suggesting a positive or a negative emotion. In order to classify the images using the two categories, we created two models. The SAI-G model was created with Google's AutoML Vision service. The SAI-C model was created on the Clarifai platform. The data were labeled in a preprocessing stage, and for the SAI-C model we created the concepts POSITIVE (POZITIV) AND NEGATIVE (NEGATIV). In order to evaluate the performances of the two models, we used a series of evaluation metrics such as: Precision, Recall, ROC (Receiver Operating Characteristic) curve, Precision-Recall curve, Confusion Matrix, Accuracy Score and Average precision. Precision and Recall for the SAI-G model is 0.875, at a confidence threshold of 0.5, while for the SAI-C model we obtained much lower scores, respectively Precision = 0.727 and Recall = 0.571 for the same confidence threshold. The results indicate a lower classification performance of the SAI-C model compared to the SAI-G model. The exception is the value of Precision for the POSITIVE concept, which is 1,000.