• Title/Summary/Keyword: biometric information

Search Result 577, Processing Time 0.023 seconds

A Study on the Trend of Healthcare Device Technology by Biometric Signal (생체신호를 통한 헬스케어 디바이스 기술 동향 연구)

  • Choi, Kyoung-Ho;Yang, Eun-Seok
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.2
    • /
    • pp.165-176
    • /
    • 2020
  • Customized medical care and services timely providing effective prevention and treatment by collecting and using individuals' biomedical data are recently possible and utilized for users' health care. They are developed as the real-time health care services and information is provided to individuals by using smart phones, PC, tablet, etc. Interactive communication is supported by informing managers of analysis data and results, through collected data. It is therefore the time for constructing health care. This study attempts to prepare for patent applications of technical development at this time, by analyzing the tendency of smart wearable health care technologies, including biological signal-based health care devices and real-time health care system. Patents regarding smart wearable health care technologies were reported to have the relatively higher concentration of research development. Korea focuses on patent activities for real-time health care systems across the intervals of analysis, while U.S and European countries actively make efforts for patent activities regarding health care devices Japan conduct patent activities across health care devices and systems, based on bio-technologies. Korea has recently dominated the market of patents for bio-technologies-based health care devices and real-time health care devices and also appears to secure patents for the technologies and the market, so entry barriers to the market of smart wearable health care technologies are determined to be higher in Korea. It is important to establish the portfolios of patents, by securing patent rights for the figures of products, manufacturing methods and other related technical systems, if technologies are planned to be commercialized.

Various Quality Fingerprint Classification Using the Optimal Stochastic Models (최적화된 확률 모델을 이용한 다양한 품질의 지문분류)

  • Jung, Hye-Wuk;Lee, Jee-Hyong
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.143-151
    • /
    • 2010
  • Fingerprint classification is a step to increase the efficiency of an 1:N fingerprint recognition system and plays a role to reduce the matching time of fingerprint and to increase accuracy of recognition. It is difficult to classify fingerprints, because the ridge pattern of each fingerprint class has an overlapping characteristic with more than one class, fingerprint images may include a lot of noise and an input condition is an exceptional case. In this paper, we propose a novel approach to design a stochastic model and to accomplish fingerprint classification using a directional characteristic of fingerprints for an effective classification of various qualities. We compute the directional value by searching a fingerprint ridge pixel by pixel and extract a directional characteristic by merging a computed directional value by fixed pixels unit. The modified Markov model of each fingerprint class is generated using Markov model which is a stochastic information extraction and a recognition method by extracted directional characteristic. The weight list of classification model of each class is decided by analyzing the state transition matrixes of the generated Markov model of each class and the optimized value which improves the performance of fingerprint classification using GA (Genetic Algorithm) is estimated. The performance of the optimized classification model by GA is superior to the model before the optimization by the experiment result of applying the fingerprint database of various qualities to the optimized model by GA. And the proposed method effectively achieved fingerprint classification to exceptional input conditions because this approach is independent of the existence and nonexistence of singular points by the result of analyzing the fingerprint database which is used to the experiments.

Analysis of inflammatory markers in blood related with the occurrence of subcutaneous abscesses in goats (염소의 피하농양 발생에 따른 혈액 내 염증지표 분석)

  • Ku, Ji-yeong;Park, Jun-Hwan;Kim, Seo-Ho;Cho, Yong-il;Kim, Chan-Lan;Cha, Seung-Eon;Shin, Gee-Wook;Park, Jinho
    • Korean Journal of Veterinary Service
    • /
    • v.45 no.1
    • /
    • pp.47-54
    • /
    • 2022
  • Subcutaneous abscesses, which occur mainly in goats and sheep, are lymph node abscesses caused by Corynebacterium pseudotuberculosis infection, and are divided into internal, external, and mixed types depending on the type of occurrence. While diagnostic methods for subcutaneous abscesses have been continuously studied, research reports for effective treatment and management of subcutaneous abscesses are inadequate. Therefore, this study was conducted to determine the changes in biometric information related to the inflammatory markers of goats induced by subcutaneous abscesses by infection with C. pseudotuberculosis. For this, hematological tests, analysis of inflammatory indicators, and analysis of serum proteins through electrophoresis separation of goats with healthy goats and goats inoculated with C. pseudotuberculosis to induce subcutaneous abscesses were compared and analyzed by date, and the differences and characteristics were identified periodically. As a result, in goats induced with subcutaneous abscesses, anemia findings related to a rapid decrease in red blood cell (RBC), hematocrit (HCT), and hemoglobin (Hb) were observed, and a significant increase in inflammatory cells expressed in total white blood cell (WBC), neutrophil, and monocytes was observed. And the levels of acute phase protein (APP) such as fibrinogen, haptoglobin, and serum amyloid A (SAA) were observed to increase rapidly immediately after infection. In addition, in the results of electrophoretic analysis of serum proteins, it was observed that the levels of α-globulin and β-globulin were significantly increased in goats with subcutaneous abscesses. That is, when looking at these changes, it was found that the systemic inflammatory response of goats was rapidly induced immediately after infection with the C. pseudotuberculosis pathogen. Through this study, it was possible to identify changes in the biomarkers of goats with subcutaneous abscesses, which had not been reported. Furthermore, these analyzed data are thoughts to be of great help in identifying, treating, and managing the goats of subcutaneous abscesses.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Object Tracking Based on Exactly Reweighted Online Total-Error-Rate Minimization (정확히 재가중되는 온라인 전체 에러율 최소화 기반의 객체 추적)

  • JANG, Se-In;PARK, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.53-65
    • /
    • 2019
  • Object tracking is one of important steps to achieve video-based surveillance systems. Object tracking is considered as an essential task similar to object detection and recognition. In order to perform object tracking, various machine learning methods (e.g., least-squares, perceptron and support vector machine) can be applied for different designs of tracking systems. In general, generative methods (e.g., principal component analysis) were utilized due to its simplicity and effectiveness. However, the generative methods were only focused on modeling the target object. Due to this limitation, discriminative methods (e.g., binary classification) were adopted to distinguish the target object and the background. Among the machine learning methods for binary classification, total error rate minimization can be used as one of successful machine learning methods for binary classification. The total error rate minimization can achieve a global minimum due to a quadratic approximation to a step function while other methods (e.g., support vector machine) seek local minima using nonlinear functions (e.g., hinge loss function). Due to this quadratic approximation, the total error rate minimization could obtain appropriate properties in solving optimization problems for binary classification. However, this total error rate minimization was based on a batch mode setting. The batch mode setting can be limited to several applications under offline learning. Due to limited computing resources, offline learning could not handle large scale data sets. Compared to offline learning, online learning can update its solution without storing all training samples in learning process. Due to increment of large scale data sets, online learning becomes one of essential properties for various applications. Since object tracking needs to handle data samples in real time, online learning based total error rate minimization methods are necessary to efficiently address object tracking problems. Due to the need of the online learning, an online learning based total error rate minimization method was developed. However, an approximately reweighted technique was developed. Although the approximation technique is utilized, this online version of the total error rate minimization could achieve good performances in biometric applications. However, this method is assumed that the total error rate minimization can be asymptotically achieved when only the number of training samples is infinite. Although there is the assumption to achieve the total error rate minimization, the approximation issue can continuously accumulate learning errors according to increment of training samples. Due to this reason, the approximated online learning solution can then lead a wrong solution. The wrong solution can make significant errors when it is applied to surveillance systems. In this paper, we propose an exactly reweighted technique to recursively update the solution of the total error rate minimization in online learning manner. Compared to the approximately reweighted online total error rate minimization, an exactly reweighted online total error rate minimization is achieved. The proposed exact online learning method based on the total error rate minimization is then applied to object tracking problems. In our object tracking system, particle filtering is adopted. In particle filtering, our observation model is consisted of both generative and discriminative methods to leverage the advantages between generative and discriminative properties. In our experiments, our proposed object tracking system achieves promising performances on 8 public video sequences over competing object tracking systems. The paired t-test is also reported to evaluate its quality of the results. Our proposed online learning method can be extended under the deep learning architecture which can cover the shallow and deep networks. Moreover, online learning methods, that need the exact reweighting process, can use our proposed reweighting technique. In addition to object tracking, the proposed online learning method can be easily applied to object detection and recognition. Therefore, our proposed methods can contribute to online learning community and object tracking, detection and recognition communities.

Lessons from Cross-Scale Studies of Water and Carbon Cycles in the Gwangneung Forest Catchment in a Complex Landscape of Monsoon Korea (몬순기후와 복잡지형의 특성을 갖는 광릉 산림유역의 물과 탄소순환에 대한 교차규모 연구로부터의 교훈)

  • Lee, Dong-Ho;Kim, Joon;Kim, Su-Jin;Moon, Sang-Ki;Lee, Jae-Seok;Lim, Jong-Hwan;Son, Yow-Han;Kang, Sin-Kyu;Kim, Sang-Hyun;Kim, Kyong-Ha;Woo, Nam-Chil;Lee, Bu-Yong;Kim, Sung
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.9 no.2
    • /
    • pp.149-160
    • /
    • 2007
  • KoFlux Gwangneung Supersite comprises complex topography and diverse vegetation types (and structures), which necessitate complementary multi-disciplinary measurements to understand energy and matter exchange. Here, we report the results of this ongoing research with special focuses on carbon/water budgets in Gwangneung forest, implications of inter-dependency between water and carbon cycles, and the importance of hydrology in carbon cycling under monsoon climate. Comprehensive biometric and chamber measurements indicated the mean annual net ecosystem productivity (NEP) of this forest to be ${\sim}2.6\;t\;C\;ha^{-1}y^{-1}$. In conjunction with the tower flux measurement, the preliminary carbon budget suggests the Gwangneung forest to be an important sink for atmospheric $CO_2$. The catchment scale water budget indicated that $30\sim40%$ of annual precipitation was apportioned to evapotranspiration (ET). The growing season average of the water use efficiency (WUE), determined from leaf carbon isotope ratios of representative tree species, was about $12{\mu}mol\;CO_2/mmol\;H_2O$ with noticeable seasonal variations. Such information on ET and WUE can be used to constrain the catchment scale carbon uptake. Inter-annual variations in tree ring growth and soil respiration rates correlated with the magnitude and the pattern of precipitation during the growing season, which requires further investigation of the effect of a monsoon climate on the catchment carbon cycle. Additionally, we examine whether structural and functional units exist in this catchment by characterizing the spatial heterogeneity of the study site, which will provide the linkage between different spatial and temporal scale measurements.

Critical Success Factor of Noble Payment System: Multiple Case Studies (새로운 결제서비스의 성공요인: 다중사례연구)

  • Park, Arum;Lee, Kyoung Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.59-87
    • /
    • 2014
  • In MIS field, the researches on payment services are focused on adoption factors of payment service using behavior theories such as TRA(Theory of Reasoned Action), TAM(Technology Acceptance Model), and TPB (Theory of Planned Behavior). The previous researches presented various adoption factors according to types of payment service, nations, culture and so on even though adoption factors of identical payment service were presented differently by researchers. The payment service industry relatively has strong path dependency to the existing payment methods so that the research results on the identical payment service are different due to payment culture of nation. This paper aims to suggest a successful adoption factor of noble payment service regardless of nation's culture and characteristics of payment and prove it. In previous researches, common adoption factors of payment service are convenience, ease of use, security, convenience, speed etc. But real cases prove the fact that adoption factors that the previous researches present are not always critical to success to penetrate a market. For example, PayByPhone, NFC based parking payment service, successfully has penetrated to early market and grown. In contrast, Google Wallet service failed to be adopted to users despite NFC based payment method which provides convenience, security, ease of use. As shown in upper case, there remains an unexplained aspect. Therefore, the present research question emerged from the question: "What is the more essential and fundamental factor that should takes precedence over factors such as provides convenience, security, ease of use for successful penetration to market". With these cases, this paper analyzes four cases predicted on the following hypothesis and demonstrates it. "To successfully penetrate a market and sustainably grow, new payment service should find non-customer of the existing payment service and provide noble payment method so that they can use payment method". We give plausible explanations for the hypothesis using multiple case studies. Diners club, Danal, PayPal, Square were selected as a typical and successful cases in each category of payment service. The discussion on cases is primarily non-customer analysis that noble payment service targets on to find the most crucial factor in the early market, we does not attempt to consider factors for business growth. We clarified three-tier non-customer of the payment method that new payment service targets on and elaborated how new payment service satisfy them. In case of credit card, this payment service target first tier of non-customer who can't pay for because they don't have any cash temporarily but they have regular income. So credit card provides an opportunity which they can do economic activities by delaying the date of payment. In a result of wireless phone payment's case study, this service targets on second of non-customer who can't use online payment because they concern about security or have to take a complex process and learn how to use online payment method. Therefore, wireless phone payment provides very convenient payment method. Especially, it made group of young pay for a little money without a credit card. Case study result of PayPal, online payment service, shows that it targets on second tier of non-customer who reject to use online payment service because of concern about sensitive information leaks such as passwords and credit card details. Accordingly, PayPal service allows users to pay online without a provision of sensitive information. Final Square case result, Mobile POS -based payment service, also shows that it targets on second tier of non-customer who can't individually transact offline because of cash's shortness. Hence, Square provides dongle which function as POS by putting dongle in earphone terminal. As a result, four cases made non-customer their customer so that they could penetrate early market and had been extended their market share. Consequently, all cases supported the hypothesis and it is highly probable according to 'analytic generation' that case study methodology suggests. We present for judging the quality of research designs the following. Construct validity, internal validity, external validity, reliability are common to all social science methods, these have been summarized in numerous textbooks(Yin, 2014). In case study methodology, these also have served as a framework for assessing a large group of case studies (Gibbert, Ruigrok & Wicki, 2008). Construct validity is to identify correct operational measures for the concepts being studied. To satisfy construct validity, we use multiple sources of evidence such as the academic journals, magazine and articles etc. Internal validity is to seek to establish a causal relationship, whereby certain conditions are believed to lead to other conditions, as distinguished from spurious relationships. To satisfy internal validity, we do explanation building through four cases analysis. External validity is to define the domain to which a study's findings can be generalized. To satisfy this, replication logic in multiple case studies is used. Reliability is to demonstrate that the operations of a study -such as the data collection procedures- can be repeated, with the same results. To satisfy this, we use case study protocol. In Korea, the competition among stakeholders over mobile payment industry is intensifying. Not only main three Telecom Companies but also Smartphone companies and service provider like KakaoTalk announced that they would enter into mobile payment industry. Mobile payment industry is getting competitive. But it doesn't still have momentum effect notwithstanding positive presumptions that will grow very fast. Mobile payment services are categorized into various technology based payment service such as IC mobile card and Application payment service of cloud based, NFC, sound wave, BLE(Bluetooth Low Energy), Biometric recognition technology etc. Especially, mobile payment service is discontinuous innovations that users should change their behavior and noble infrastructure should be installed. These require users to learn how to use it and cause infra-installation cost to shopkeepers. Additionally, payment industry has the strong path dependency. In spite of these obstacles, mobile payment service which should provide dramatically improved value as a products and service of discontinuous innovations is focusing on convenience and security, convenience and so on. We suggest the following to success mobile payment service. First, non-customers of the existing payment service need to be identified. Second, needs of them should be taken. Then, noble payment service provides non-customer who can't pay by the previous payment method to payment method. In conclusion, mobile payment service can create new market and will result in extension of payment market.