• Title/Summary/Keyword: System Authentication

Search Result 1,678, Processing Time 0.025 seconds

Face Tracking Method based on Neural Oscillatory Network Using Color Information (컬러 정보를 이용한 신경 진동망 기반 얼굴추적 방법)

  • Hwang, Yong-Won;Oh, Sang-Rok;You, Bum-Jae;Lee, Ji-Yong;Park, Mig-Non;Jeong, Mun-Ho
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.2
    • /
    • pp.40-46
    • /
    • 2011
  • This paper proposes a real-time face detection and tracking system that uses neural oscillators which can be applied to access regulation system or control systems of user authentication as well as a new algorithm. We study a way to track faces using the neural oscillatory network which imitates the artificial neural net of information handing ability of human and animals, and biological movement characteristic of a singular neuron. The system that is suggested in this paper can broadly be broken into two stages of process. The first stage is the process of face extraction, which involves the acquisition of real-time RGB24bit color video delivering with the use of a cheap webcam. LEGION(Locally Excitatory Globally Inhibitory)algorithm is suggested as the face extraction method to be preceded for face tracking. The second stage is a method for face tracking by discovering the leader neuron that has the greatest connection strength amongst neighbor neuron of extracted face area. Along with the suggested method, the necessary element of face track such as stability as well as scale problem can be resolved.

A Study on the Satisfaction Recognition of the Employees of the Social Enterprise in JeollaNamdo (전남지역 사회적기업종사자의 만족도인식 연구)

  • Jeong, Mun-Gyung
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.133-140
    • /
    • 2016
  • The study has been implemented for finding out a revitalization of the social enterprise to be continuously developed. In this research, social enterprise employees residing in JeollaNamdo were selected as the research members. The polled papers had 210 copies of total and 180 copies of recovery. The response results were written as a rule of their own way with advanced visit to them explaining how to write down. The collected data were analysed with T-test and ANOVA. As a result of the research, the system effectiveness of social enterprise is shown to influence the satisfaction of employees. Therefore, it is shown that the certification system and priority purchase system of local government can be effective. Second, it is shown that the satisfaction of employees of the social enterprise influences the satisfaction of employees. Therefore, it is shown that the need of finding out a new business item for a social enterprise to grow influences positively on the satisfaction of employees. Third, operation difficulty of the social enterprise is not shown to influence the satisfaction of employees. In other words, the satisfaction of employees is not influenced by a difficulty arising from not receiving the official recognition from local government on the social enterprise.

Study on Security Policy Distribute Methodology for Zero Trust Environment (제로 트러스트 환경을 위한 보안 정책 배포 방법에 대한 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.93-98
    • /
    • 2022
  • Information service technology continues to develop, and information service continues to expand based on the IT convergence trend. The premeter-based security model chosen by many organizations can increase the effectiveness of security technologies. However, in the premeter-based security model, it is very difficult to deny security threats that occur from within. To solve this problem, a zero trust model has been proposed. The zero trust model requires authentication for user and terminal environments, device security environment verification, and real-time monitoring and control functions. The operating environment of the information service may vary. Information security management should be able to response effectively when security threats occur in various systems at the same time. In this study, we proposed a security policy distribution system in the object reference method that can effectively distribute security policies to many systems. It was confirmed that the object reference type security policy distribution system proposed in this study can support all of the operating environments of the system constituting the information service. Since the policy distribution performance was confirmed to be similar to that of other security systems, it was verified that it was sufficiently effective. However, since this study assumed that the security threat target was predefined, additional research is needed on the identification method of the breach target for each security threat.

Speaker verification with ECAPA-TDNN trained on new dataset combined with Voxceleb and Korean (Voxceleb과 한국어를 결합한 새로운 데이터셋으로 학습된 ECAPA-TDNN을 활용한 화자 검증)

  • Keumjae Yoon;Soyoung Park
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.2
    • /
    • pp.209-224
    • /
    • 2024
  • Speaker verification is becoming popular as a method of non-face-to-face identity authentication. It involves determining whether two voice data belong to the same speaker. In cases where the criminal's voice remains at the crime scene, it is vital to establish a speaker verification system that can accurately compare the two voice evidence. In this study, to achieve this, a new speaker verification system was built using a deep learning model for Korean language. High-dimensional voice data with a high variability like background noise made it necessary to use deep learning-based methods for speaker matching. To construct the matching algorithm, the ECAPA-TDNN model, known as the most famous deep learning system for speaker verification, was selected. A large dataset of the voice data, Voxceleb, collected from people of various nationalities without Korean. To study the appropriate form of datasets necessary for learning the Korean language, experiments were carried out to find out how Korean voice data affects the matching performance. The results showed that when comparing models learned only with Voxceleb and models learned with datasets combining Voxceleb and Korean datasets to maximize language and speaker diversity, the performance of learning data, including Korean, is improved for all test sets.

A Legal and Systematic Study On Consumer Protection In Electronic Commerce (전자상거래에서의 소비자보호에 관한 법.제도적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.787-796
    • /
    • 2009
  • The electronic commerce keeps going through a tremendous growth since the latter half of 1990's. But the consumer damages are being increased from characteristics such as non-confrontation, anonymity, internationality, unilaterality and possibility of temptation. Accordingly, this thesis has derived legal and systematic improvements for consumer protection in general as follows. First of all, it is necessary to extend the period to exercise the subscription withdrawal rights according to electronic commerce consumer protection law. Second, the electronic commerce has high possibility of causing errors by consumers because it is performed by non-confrontation and the accurate information must be provided to prevent errors in advance because it is not easy for consumers to prove their own errors. Third, a certification mark system on electronic agreement has to be adopted. Fourth, the legal, systematic and technological measures have to be adopted to prevent from having a sense of fear toward leaking or using personal information through a safe personal information management. Fifth, a strict supervision on internet trust mark is required. Finally, because the intervention or interference by a third party may take place through a hacking on messages or documents sent according to procedure in terms of online settlement, it is necessary to raise security on the system through a precise authentication between concerned parties.

Authentication of Sesame Oil with Addition of Perilla Oil Using Electronic Nose Based on Mass Spectrometry (전자코-Mass spectrometry를 이용한 들기름이 혼합된 참기름의 판별 분석)

  • Son, Hee-Jin;Kang, Jin-Hee;Hong, Eun-Jeung;Lim, Chae-Lan;Choi, Jin-Young;Noh, Bong-Soo
    • Korean Journal of Food Science and Technology
    • /
    • v.41 no.6
    • /
    • pp.609-614
    • /
    • 2009
  • Sesame oil was sometimes replaced by mixed oil due to high price in Korean market. To find out authentic sesame oil, electronic nose (E-nose) based on mass spectrometer system was used. Sesame oil was blended with perilla oil at the ratio of 97:3, 94:6, 91:9, 88:12 and 85:15, respectively. Intensities of each fragment from sesame oil by E-nose based on MS were completely different from those of perilla oil. The obtained data was used for discriminant function analysis. For quantitative analysis, the partial least square algorithm was used. The added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1) and second score (DF2). From this relationship it could be found out how much perilla oil added. DFA plot indicated a significant separation of pure sesame oil and pure perilla oil. The different geographical origin of sesame oil was used for blending with perilla oil were closed to that of sesame oil. Korean sesame oil mixture and Indian sesame oil one were well separated. And the correlation between mixing ratios and DF1 values was found at the ratio of 97:3, 91:9, and 85:15 (SE vs PE oil), respectively. But the added concentration of perilla oil to sesame oil was correlated with discriminant function first score (DF1). E-nose based on MS system could be used as an efficient method for purity of oil quality.

Simultaneous Determination of Pesticide Residues in Soils by Dichloromethane Partition - Adsorption Chromatography - GC-ECD/NPD Analytical Methods (Dichloromethane 분배 - 흡착 크로마토그래피 - GC-ECD/NPD 분석법에 의한 토양잔류농약 다성분 분석)

  • Kim, Chan-Sub;Lee, Byung-Moo;Park, Kyung-Hun;Park, Byung-Jun;Park, Jae-Eup;Lee, Young-Deuk
    • The Korean Journal of Pesticide Science
    • /
    • v.14 no.4
    • /
    • pp.361-370
    • /
    • 2010
  • Considering the efficiencies of the preparation process at each stage obtained in previous studies, the analytical determination method was established for multi-pesticide residues in soils. It consist of the acetone-extraction, the dichloromethane-partition, the Florisil or silica-gel chromatography and the gas chromatography analysis equipped with the electron capture detector and the nitrogen-phosphorus detector. In the soil recovery test by Florisil clean-up system, the number of pesticides recovered in the range of 70~120% and showed less than 20% of RSD were 165 pesticides for paddy soil, 169 pesticides for upland soil and 159 pesticides in both soils through the tested 183 pesticides. And in the soil recovery test by silica-gel system, the number of pesticides recovered in the range of 70~120% and showed less than 20% of RSD were 154 pesticides for paddy soil, 145 pesticides for upland soil, and 134 pesticides in both soils.

Fast Fingerprint Alignment Method and Weighted Feature Vector Extraction Method in Filterbank-Based Fingerprint Matching (필터뱅크 기반 지문정합에서 빠른 지문 정렬 방법 및 가중치를 부여한 특징 벡터 추출 방법)

  • 정석재;김동윤
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.71-81
    • /
    • 2004
  • Minutiae-based fingerprint identification systems use minutiae points, which cannot completely characterize local ridge structures. Further, this method requires many methods for matching two fingerprint images containing different number of minutiae points. Therefore, to represent the fired length information for one fingerprint image, the filterbank-based method was proposed as an alternative to minutiae-based fingerprint representation. However, it has two shortcomings. One shortcoming is that similar feature vectors are extracted from the different fingerprints which have the same fingerprint type. Another shortcoming is that this method has overload to reduce the rotation error in the fingerprint image acquisition. In this paper, we propose the minutia-weighted feature vector extraction method that gives more weight in extracting feature value, if the region has minutiae points. Also, we Propose new fingerprint alignment method that uses the average local orientations around the reference point. These methods improve the fingerprint system's Performance and speed, respectively. Experimental results indicate that the proposed methods can reduce the FRR of the filterbank-based fingerprint matcher by approximately 0.524% at a FAR of 0.967%, and improve the matching performance by 5% in ERR. The system speed is over 1.28 times faster.

Design and Implementation of Multi-functional Java Card for AMR (원격검침을 위한 다기능 자바카드 설계 및 구현)

  • Kang, Hwan-Soo;Cho, Jin-Hyung;Kwon, Kwi-Seok;Lee, Jong-Man;Kang, Hwan-Il
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.64-72
    • /
    • 2009
  • AMR(Automatic Meter Reading), which means that it reads the meter of electricity, gas, or water, etc at a remote place automatically through wired or wireless communication, has been studied in terms of Power Line Communication method and Local Area Wireless Communication method, etc. In this paper, we designed and implemented JCA(Java Card for AMR) capable of AMR, which is based on java Card technology indispensable to the ubiquitous world. In this paper, JCA follows standard transactional procedures offered by power supply company and manages power usage log and billing data, and is designed in order to satisfy EMV multi-functional specifications. Because JCA is a multi-functional smart card capable of post-issuance applets as an open platform, it is installed into other applications of affiliated concerns as well as credit card and traffic card applications. Not only the proposed JCA is a low cost system, compared to other AMR systems, but is capable of paying rates in advance or later by applying authentication and security function of java Card. In addition the proposed JCA system can create value added services such as affiliated services with corporate alliance.

A Study on the Korea Smart City Certification Index and Demonstration Authentication (국내 스마트시티 인증 지표 및 시범 인증에 관한 연구)

  • Han, Sun-Hee;Shin, Young-Seob;Yu, In-Jae;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.1
    • /
    • pp.688-698
    • /
    • 2018
  • The government has recognized the importance of smart city indicators and prepared the legal grounds for the certification of smart cities in the recently revised "Act on Smart City Development and Industrial Promotion." This study derived smart city indicators adequate for the domestic conditions and compatible with the overseas trends by examining and complementing the indicators through an AHP analysis based on consultations and interviews (surveys) with experts and local government officials, who are actually carrying out related projects. In addition, the adequacy and reliability of the indicators were confirmed by verifying and certifying the Korean local governments' smart city plans through demand surveys on a trial basis. This study is meaningful in that it systematically studies the smart city indicators that have gained in importance and reviews their application. The findings of this study can be used as a basis for implementing a smart cities certification system in the future. Recently, the Special Committee on Smart Cities was established under the Committee for the Fourth Industrial Revolution. This committee is composed of civilian members and is working with the Ministry of Land, Infrastructure, and Transport, the Ministry of Science and ICT, etc., to promote the creation of smart cities. It is expected that smart city indicators that include the levels of both domestic and overseas smart cities will boost the active spread of such cities in Korea.