• 제목/요약/키워드: biometric information

검색결과 583건 처리시간 0.023초

Non-intrusive measurement of pulse arrival time and Estimation of Systolic Blood Pressure (무구속적 맥파 전달 시간의 측정을 통한 혈압 추정)

  • Chee, Young-Joon;Park, Kwang-Suk
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.489-492
    • /
    • 2005
  • Even though the blood pressure is one of the most widely used index for the healthcare monitoring of hypertensive and normotensive persons, there is no non-intrusive measurement method which is commercialized until now. Pulse Arrival Time (PAT) is known that it has close relation with the systolic blood pressure (SBP) and arterial stiffness. In this study, SBP estimation methods by non-intrusive measurement of PAT are suggested. For the unconstrained measurement of PAT, the first method used the electrically non contact electrocardiogram (ENC-ECG) technique and the reflective type of Photoplethysmography (PPG) sensor on the computer mouse. In the second method, ENC-ECG and the air pressure sensor in the seat cushion on a chair were measured. The third method used ECG electrodes and PPG sensors on the toilet seat cover. The validation and regression analysis of the relationship of PAT and SBP are summarized. These methods have considerable errors to be used for all people. But these can be applied for each subject after the parameter customization within acceptable error. So, it is feasible for suggested methods to be used for monitoring of SBP in daily life in non-intrusive way when there is personal identification system of each subject.

  • PDF

New Authentication Methods based on User's Behavior Big Data Analysis on Cloud (클라우드 환경에서 빅데이터 분석을 통한 새로운 사용자 인증방법에 관한 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • 제6권4호
    • /
    • pp.31-36
    • /
    • 2016
  • User authentication is the first step to network security. There are lots of authentication types, and more than one authentication method works together for user's authentication in the network. Except for biometric authentication, most authentication methods can be copied, or someone else can adopt and abuse someone else's credential method. Thus, more than one authentication method must be used for user authentication. However, more credential makes system degrade and inefficient as they log on the system. Therefore, without tradeoff performance with efficiency, this research proposed user's behavior based authentication for secure communication, and it will improve to establish a secure and efficient communication.

Adaptive Face Region Detection and Real-Time Face Identification Algorithm Based on Face Feature Evaluation Function (적응적 얼굴검출 및 얼굴 특징자 평가함수를 사용한 실시간 얼굴인식 알고리즘)

  • 이응주;김정훈;김지홍
    • Journal of Korea Multimedia Society
    • /
    • 제7권2호
    • /
    • pp.156-163
    • /
    • 2004
  • In this paper, we propose an adaptive face region detection and real-time face identification algorithm using face feature evaluation function. The proposed algorithm can detect exact face region adaptively by using skin color information for races as well as intensity and elliptical masking method. And also, it improves face recognition efficiency using geometrical face feature and geometric evaluation function between features. The proposed algorithm can be used for the development of biometric and security system areas. In the experiment, the superiority of the proposed method has been tested using real image, the proposed algorithm shows more improved recognition efficiency as well as face region detection efficiency than conventional method.

  • PDF

A Study on User Authentication based on Keystroke Dynamics of Long and Free Texts (자유로운 문자열의 키스트로크 다이나믹스를 활용한 사용자 인증 연구)

  • Kang, Pil-Sung;Cho, Sung-Zoon
    • IE interfaces
    • /
    • 제25권3호
    • /
    • pp.290-299
    • /
    • 2012
  • Keystroke dynamics refers to a way of typing a string of characters. Since one has his/her own typing behavior, one's keystroke dynamics can be used as a distinctive biometric feature for user authentication. In this paper, two authentication algorithms based on keystroke dynamics of long and free texts are proposed. The first is the K-S score, which is based on the Kolmogorov-Smirnov test, and the second is the 'R-A' measure, which combines 'R' and 'A' measures proposed by Gunetti and Picardi (2005). In order to verify the authentication performance of the proposed algorithms, we collected more than 3,000 key latencies from 34 subjects in Korean and 35 subjects in English. Compared with three benchmark algorithms, we found that the K-S score was outstanding when the reference and test key latencies were not sufficient, while the 'R-A' measure was the best when enough reference and test key latencies were provided.

A Development of Healthcare Monitoring System Based on Internet of Things Effective

  • KIM, Song-Eun;MUN, Ji-Hui;KIM, Kyoung-Sook;KANG, Min-Soo
    • Korean Journal of Artificial Intelligence
    • /
    • 제8권1호
    • /
    • pp.1-6
    • /
    • 2020
  • The Recently there has been a growing interest in health care due to the COVID-19 situation. In this paper, we intend to develop a healthcare monitoring system to provide users with smart healthcare systems in line with the healthcare 3.0 era. The system consists of a wireless network between various sensors, Android smartphones, and OLEDs using Bluetooth, and through this, a health care monitoring system capable of collecting user's biometric information and managing health by receiving data values of sensors connected to Arduino. In conclusion, the user's BPM value was calculated using the heart rate sensor, and the exercise intensity can be adjusted through this. In addition, a step derivation algorithm is implemented using an acceleration sensor, and calorie consumption can be measured using the step and weight values. As such, the heart rate, step count, calorie consumption data can be transmitted to a smartphone application through a Bluetooth module and output, and can be output to an OLED for users who are not easy to access the smartphone. This healthcare monitoring system can be applied to various groups and technologies.

A Quality Assessment Method of Biometrics for Estimating Authentication Result in User Authentication System (사용자 인증시스템의 인증결과 예측을 위한 바이오정보의 품질평가기법)

  • Kim, Ae-Young;Lee, Sang-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제16권2호
    • /
    • pp.242-246
    • /
    • 2010
  • In this paper, we propose a quality assessment method of biometrics for estimating an authentication result in an user authentication system. The proposed quality assessment method is designed to compute a quality score called CIMR (Confidence Interval Matching Ratio) as a result by small-sample analysis like T-test. We use the C/MR-based quality assessment method for testing how to well draw a distinction between various biometrics in a multimodal biometric system. We also test a predictability for authentication results of obtained biometrics using the mean $\bar{X}$ and the variance $s^2$ in T-test-based CIMR. As a result, we achieved the maximum 88% accuracy for estimation of user authentication results.

User Authentication Using Accelerometer Sensor in Wrist-Type Wearable Device (손목 착용형 웨어러블 기기의 가속도 센서를 사용한 사용자 인증)

  • Kim, Yong Kwang;Moon, Jong Sub
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제6권2호
    • /
    • pp.67-74
    • /
    • 2017
  • This paper proposes a method of user authentication through the patterns of arm movement with a wrist-type wearable device. Using the accelerometer sensor which is built in the device, the 3-axis accelerometer data are collected. Then, the collected data are integrated and the periodic cycle are extracted. In the cycle, the features of frequency are generated with the accelerometer. With the frequency features, 2D Gaussian mixture are modelled. For authenticating an user, the data(the accelerometer) of the user at some point are tested with confidence interval of the Gaussian distribution. The model showed a valuable results for the user authentication with an example, which is average 92% accuracy with 95% confidence interval.

Design of Compatible Set-Top Box for Healthcare (헬스케어를 위한 호환 가능한 셋톱박스 설계)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • 제12권7호
    • /
    • pp.285-290
    • /
    • 2014
  • In these days the patient can be easy to see the treatment results at home without going directly to hospital. Despite the many advantages that the patient is got optimum service timely, the currently used personal healthcare devices have no compatibility because the manufacturer use the proprietary software and hardware protocols. For these issues, standardization is required between the set-top box and the individual healthcare devices. In this paper, we designed the healthcare set-top box possible to biometric data transmission by using a standard IEEE P11073 between the device and the set-top box. Because the set-top box using IEEE P11073 standardization can transfer data independently, we are expected to make it contribute significantly to the healthcare business.

Supercomputer's Security Issues and Defense: Survey (슈퍼컴퓨터 보안 이슈 및 대책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • 제11권4호
    • /
    • pp.215-220
    • /
    • 2013
  • The super computer calls usually as the super computer in case the computing power of the computer is 20 G flops (GFLOPS) or greater. In the past, the computer equipped with the vector processor (the instrument processing the order having the logic operation and maximum value or minimum value besides the common computer instruction) processing the scientific calculation with the super high speed was installed as the super computer. Recently, cyber attack focuses on supercomputer because if it is being infected, then it will affect hundreds of client PC. Therefore, our research paper analyzed super computer security issues and biometric countermeasure to develop the level of security on super computer.

Effects of EMG-Biofeedback Training on Functional Ability and Q-angle in Patellofemoral Pain Syndrome (근전도-생체되먹임 훈련이 무릎넙다리통증의 기능적 능력과 Q-각에 미치는 영향)

  • Park, Seung-Kyu;Kang, Jae-Young
    • The Journal of Korean Physical Therapy
    • /
    • 제26권2호
    • /
    • pp.68-73
    • /
    • 2014
  • Purpose: The purpose of this study was to investigate the effect of closed kinetic chain exercise using EMG-biofeedback for selective training of the vastus medialis oblique on functional ability and Q-angle in subjects with patellofemoral pain syndrome. Methods: Thirty participants who met the criteria were included in this study. Participants were randomly allocated to the control group (Group I, n=10), closed kinetic chain exercise group (Group II, n=10), and closed kinetic chain exercise using EMG-biofeedback group (Group III, n=10). Intervention was performed in three groups, three times per week, for a period of six weeks. Kujala patellofemoral score and Q-angle were measured before and after the experiment. Results: Some significant differences in kujala patellofemoral score were observed in group II and group III, compared with group I (p<0.01). There was no significant difference on in Q-angle at knee flexion angle $0^{\circ}$. However, some significant differences in Q-angle at knee flexion $60^{\circ}$ were observed in group III, compared with group I (p<0.01). Conclusion: Closed kinetic chain exercise using EMG-biofeedback that provides real-time biometric information on selected muscles in order to increase the efficiency of treatment may be helpful in improvement of functional ability and Q-angle in patellofemoral pain syndrome.