• Title/Summary/Keyword: biometric information

Search Result 577, Processing Time 0.024 seconds

Comparison of Intraocular Lens Power Calculation Methods Following Myopic Laser Refractive Surgery: New Options Using a Rotating Scheimpflug Camera

  • Cho, Kyuyeon;Lim, Dong Hui;Yang, Chan-min;Chung, Eui-Sang;Chung, Tae-Young
    • Korean Journal of Ophthalmology
    • /
    • v.32 no.6
    • /
    • pp.497-505
    • /
    • 2018
  • Purpose: To evaluate and compare published methods of calculating intraocular lens (IOL) power following myopic laser refractive surgery. Methods: We performed a retrospective review of the medical records of 69 patients (69 eyes) who had undergone myopic laser refractive surgery previously and subsequently underwent cataract surgery at Samsung Medical Center in Seoul, South Korea from January 2010 to June 2016. None of the patients had pre-refractive surgery biometric data available. The Haigis-L, Shammas, Barrett True-K (no history), Wang-Koch-Maloney, Scheimpflug total corneal refractive power (TCRP) 3 and 4 mm (SRK-T and Haigis), Scheimpflug true net power, and Scheimpflug true refractive power (TRP) 3 mm, 4 mm, and 5 mm (SRK-T and Haigis) methods were employed. IOL power required for target refraction was back-calculated using stable post-cataract surgery manifest refraction, and implanted IOL power and formula accuracy were subsequently compared among calculation methods. Results: Haigis-L, Shammas, Barrett True-K (no history), Wang-Koch-Maloney, Scheimpflug TCRP 4 mm (Haigis), Scheimpflug true net power 4 mm (Haigis), and Scheimpflug TRP 4 mm (Haigis) formulae showed high predictability, with mean arithmetic prediction errors and standard deviations of $-0.25{\pm}0.59$, $-0.05{\pm}1.19$, $0.00{\pm}0.88$, $-0.26{\pm}1.17$, $0.00{\pm}1.09$, $-0.71{\pm}1.20$, and $0.03{\pm}1.25$ diopters, respectively. Conclusions: Visual outcomes within 1.0 diopter of target refraction were achieved in 85% of eyes using the calculation methods listed above. Haigis-L, Barrett True-K (no history), and Scheimpflug TCRP 4 mm (Haigis) and TRP 4 mm (Haigis) methods showed comparably low prediction errors, despite the absence of historical patient information.

Handwritten One-time Password Authentication System Based On Deep Learning (심층 학습 기반의 수기 일회성 암호 인증 시스템)

  • Li, Zhun;Lee, HyeYoung;Lee, Youngjun;Yoon, Sooji;Bae, Byeongil;Choi, Ho-Jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.25-37
    • /
    • 2019
  • Inspired by the rapid development of deep learning and online biometrics-based authentication, we propose a handwritten one-time password authentication system which employs deep learning-based handwriting recognition and writer verification techniques. We design a convolutional neural network to recognize handwritten digits and a Siamese network to compute the similarity between the input handwriting and the genuine user's handwriting. We propose the first application of the second edition of NIST Special Database 19 for a writer verification task. Our system achieves 98.58% accuracy in the handwriting recognition task, and about 93% accuracy in the writer verification task based on four input images. We believe the proposed handwriting-based biometric technique has potential for use in a variety of online authentication services under the FIDO framework.

Evaluation of a Smart After-Care Program for Patients with Lung Cancer: A Prospective, Single-Arm Pilot Study

  • Yang, Hee Chul;Chung, Seung Hyun;Yoo, Ji Sung;Park, Boram;Kim, Moon Soo;Lee, Jong Mog
    • Journal of Chest Surgery
    • /
    • v.55 no.2
    • /
    • pp.108-117
    • /
    • 2022
  • Background: The efficacy of telemedicine among cancer survivors is uncertain. The Smart After-Care Program (SAP), which is an interactive, smartphone-based remote health monitoring system, was developed to help patients manage their health after leaving the hospital. This study was designed to evaluate the efficacy of our remote health care program for lung cancer patients. Methods: We enrolled 50 patients with lung cancer. Self-monitoring devices were supplied to all patients, who were instructed to enter their daily vital signs and subjective symptoms to the Smart After-Care app. The app also provided information about rehabilitation exercises and a healthy diet for lung cancer patients. All patients received health counseling via telephone once a week and visited an outpatient clinic during weeks 6 and 12 to assess satisfaction with the SAP and changes in quality of life and physical performance. Results: Overall satisfaction with the SAP was very high (very good, 61.9%; good, 26.2%). In the multivariate analysis to identify factors affecting satisfaction, the distance between the patient's residence and the hospital was the only significant independent factor (p=0.013). Quality of life improved along all functional scales (p<0.05). Muscle strength significantly improved in the lower limbs (p=0.012). Two-minute walk distance also significantly improved (p=0.028). Conclusion: This study demonstrated that the SAP was acceptable for and supportive of patients with reduced pulmonary function after lung cancer treatment. The SAP was found to be particularly useful for patients living far from the hospital.

The Interface between Wearable Devices and Metaverse: A Study on Soccer Game Character Ability Mapping using Mi Band (웨어러블 디바이스와 메타버스의 접점: 미밴드를 이용한 축구 게임 캐릭터 능력치 매핑 연구)

  • Hyun-Su Kim;Mi-Kyeong Moon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1345-1352
    • /
    • 2023
  • With the development of virtual reality (VR) and blockchain technology, Metaverse is being used in various fields such as games, education, and social networking. At the same time, shipments of wearable devices such as smartwatches are growing every year, becoming more and more integrated into people's daily lives. This study presents a new possibility of reflecting the user's body signals measured through the combination of the two phenomena in the metaverse character. Various biometric information such as the user's heart rate and amount of exercise collected through the smartwatch are reflected on the character in the metaverse, allowing the user's physical condition to be reflected in the virtual world. Through this, Metaverse is expected to provide a new experience that can be called 'extended reality' beyond simple virtual reality, improve user's satisfaction with Metaverse, and suggest a direction for the development of smartwatches.

Biological aspects of Oreochromis niloticus (Linnaeus, 1758) in Geray Reservoir (Ethiopia) for effective sustainable fisheries

  • Solomon Wagaw;Ayalew Sisay;Asnaku Bazezew;Yirga Enawgaw;Assefa Wosnie
    • Fisheries and Aquatic Sciences
    • /
    • v.27 no.2
    • /
    • pp.100-110
    • /
    • 2024
  • Biometric evaluation and reproductive biology of Oreochromis niloticus were studied from Geray Reservoir. Between November 2021 and August 2022, 316 O. niloticus specimens were collected from this reservoir. The observed male to female sex ratio was 1:1.14, which was statistically insignificant compared with the hypothetical 1:1 sex ratio (X2 = 1.27, p > 0.05). The length-weight relationship was curvilinear with allometric growth (b < 3) and statistically significant from the expected isometric growth pattern (b = 3). The regression equation for females was TW = 0.0264TL2.72 (r2 = 0.90, n = 168), males (TW = 0.0183TL2.79, r2 = 0.93, n = 148), and combined sexes (TW = 0.0229TL2.76, r2 = 0.91, n = 316). Gonadosomatic index (GSI) ranged from 0.8 to 1.4 (males) and 1.8 to 4.9 (females). The breeding season lasted from March to June, with a GSI peak in April. Fecundity ranged from 279 to 1,528 eggs./fish, with a mean of 1,025 eggs./fish. The correlation between absolute fecundity and length was more significant (F = 0.76TL2.8, R2 = 0.94, p < 0.05) than with weight (F = 17.683TW0.71, R2 = 0.92, p < 0.05). This study provides basic information on the biology of O. niloticus in the Geray Reservoir for future fishery management tools for the conservation and utilization of this valuable freshwater fish.

Secure Management Method for Private Key using Smartphon's Information (스마트폰 고유정보를 이용한 안전한 개인키 관리 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.8
    • /
    • pp.90-96
    • /
    • 2016
  • The 3390 million people, around 83% of the adult population in Korea use smartphone. Although the safety problem of the certificate has been occurred continuously, most of these users use the certificate. These safety issues as a solution to 'The owner of a mobile phone using SMS authentication technology', 'Biometric authentication', etc are being proposed. but, a secure and reliable authentication scheme has not been proposed for replace the certificate yet. and there are many attacks to steal the certificate and private key. For these reasons, security experts recommend to store the certificate and private key on usb flash drive, security tokens, smartphone. but smartphones are easily infected malware, an attacker can steal certificate and private key by malicious code. If an attacker snatchs the certificate, the private key file, and the password for the private key password, he can always act as valid user. In this paper, we proposed a safe way to keep the private key on smartphone using smartphone's unique information and user password. If an attacker knows the user password, the certificate and the private key, he can not know the smart phone's unique information, so it is impossible to use the encrypted private key. Therefore smartphone user use IT service safely.

A study on the FIDO authentication system using OpenSource (OpenSource를 이용한 FIDO 인증 시스템에 관한 연구)

  • Lee, Hyun-Jo;Cho, Han-Jin;Kim, Yong-Ki;Chae, Cheol-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.19-25
    • /
    • 2020
  • As the number of mobile device users increases, research on various user authentication methods has been actively conducted to protect sensitive personal information. Knowledge-based techniques have the disadvantage that security is deteriorated due to easy exposure of authentication means, and proprietary-based techniques have a problem of increasing construction cost and low user convenience to use the service. In order to solve this problem, a FIDO authentication system, which is a user authentication method using a smart device, has been proposed. Since the FIDO authentication system performs authentication based on the biometric information of the user, the risk of the authentication means being leaked is low, and since the authentication information is stored in the user's smart device, the user information due to server hacking is solved. Through this, it is possible to select and utilize user authentication technology suitable for the security level of the service. In this paper, we introduce the FIDO authentication system, explain the main parts required for FIDO UAF client-server development, and show examples of implementation using UAF open source provided by ebay.

Duplicated ECG signal decomposition (이중 심전도 신호의 분리 방법)

  • Kim, Do-Yeon;Kang, Hyun-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.414-421
    • /
    • 2015
  • This paper presents a new method to decompose a duplicated ECG signal, which is measured from two people, to two individual ECG signals. In paper, it is shown that the duplicated ECG signal can be decomposed, provided that their SAECG signals are known. As the SAECG signal is the average of a ECG signal, it is a feature to identify individual ECG signals from the duplicated signal. Since the ECG signal is nearly periodic, so-called heart-rate, the period of each ECG signal can be found by using the autocorrelation of the duplicated signal, That is, the autocorrelation has high peaks at the multiple instants of heart-rate of each person. With the heart-rate of each person obtained by some processing, all R-peaks are identified by the SAECG signals. To be concrete, the SAECG signal of each person is repeatedly placed at the R-peak instants with his heart-rate, and the weight of each SAECG signal is computed by LMSE optimization. Finally, as adding the error signal in the LMSE optimization processing to the weighted SAECG signal, each individual ECG signal is obtained. In experimental results, we demonstrate that the duplicated ECG signal is successfully decomposed into two ECG signals.

When Disease Defines a Place: Batavia in British Diplomatic and Military Narratives, 1775-1850

  • Keck, Stephen
    • SUVANNABHUMI
    • /
    • v.14 no.2
    • /
    • pp.117-148
    • /
    • 2022
  • The full impact of COVID-19 has yet to be felt: while it may not define the new decade, it is clear that its immediate significance was to test many of the basic operating assumptions and procedures of global civilization. Even as vaccines are developed and utilized and even as it is possible to see the beginning of the end of COVID-19 as a discrete historical event, it remains unclear as to its ultimate importance. That said, it is evident that the academic exploration of Southeast Asia will also be affected by both the global and regional experiences of the pandemic. "Breakthroughs of Area Studies and ASEAN in the Era of Homo Untact" promises to help reconceptualize the study of the region by highlighting the importance of redefined spatial relationships and new potentially depersonalized modes of communication. This paper acknowledges these issues by suggesting that the transformations caused by the pandemic should motivate scholars to raise new questions about how to understand humanity-particularly as it is defined by societies, nations and regions. Given that COVID-19 (and the response to it) has altered many of the fundamental rhythms of globalized regions, there is sufficient warrant for re-examining both the ways in which disease, health and their related spaces affect the perceptions of Southeast Asia. To achieve "breakthroughs" into the investigation of the region, it makes sense to have another glance at the ways in which the discourses about diseases and health may have helped to inscribe definitions of Southeast Asia-or, at the very least, the nations, societies and peoples who live within it. In order to at least consider these larger issues, the discussion will concentrate on a formative moment in the conceptualization of Southeast Asia-British engagement with the region in the late 18th and early 19th centuries. To that end three themes will be highlighted: (1) the role that British diplomatic and military narratives played in establishing the information priorities required for the construction of colonial knowledge; (2) the importance not only of "colonial knowledge" but information making in its own right; (3) in anticipation of the use of big data, the manner in which manufactured information (related to space and disease) could function in shaping early British perceptions of Southeast Asia-particularly in Batavia and Java. This discussion will suggest that rather than see social distancing or increased communication as the greatest outcome of COVID-19, instead it will be the use of data-that is, big, aggregated biometric data which have not only shaped responses to the pandemic, but remain likely to produce the reconceptualization of both information and knowledge about the region in a way that will be at least as great as that which took place to meet the needs of the "New Imperialism." Furthermore, the definition and articulation of Southeast Asia has often reflected political and security considerations. Yet, the experience of COVID-19 could prove that data and security are now fused into a set of interests critical to policy-makers. Given that the pandemic should accelerate many existing trends, it might be foreseen these developments will herald the triumph of homo indicina: an epistemic condition whereby the human subject has become a kind of index for its harvestable data. If so, the "breakthroughs" for those who study Southeast Asia will follow in due course.

A Scheme of Security Drone Convergence Service using Cam-Shift Algorithm (Cam-Shift 알고리즘을 이용한 경비드론 융합서비스 기법)

  • Lee, Jeong-Pil;Lee, Jae-Wook;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.5
    • /
    • pp.29-34
    • /
    • 2016
  • Recently, with the development of high-tech industry, the use of the drones in various aspects of daily life is rapidly advancing. With technical and functional advancements, drones have an advantage of being easy to be utilized in the areas of use according to various lifestyles. In addition, through the diversification of the drone service converged with image processing medium such as camera and CCTV, an automated security system that can replace humans is expected to be introduced. By designing these unmanned security technology, a new convergence security drone service techniques that can strengthen the previous drone application technology will be proposed. In the proposed techniques, a biometric authentication technology will be designed as additional authentication methods that can determine the safety incorporated with security by selecting the search and areas of an object focusing on the objects in the initial windows and search windows through OpenCV technology and CAM-Shift algorithm which are an object tracking algorithm. Through such, a highly efficient security drone convergence service model will be proposed for performing unmanned security by using the drones that can continuously increase the analysis of technology on the mobility and real-time image processing.