• Title/Summary/Keyword: locks

Search Result 91, Processing Time 0.02 seconds

Design and development of non-contact locks including face recognition function based on machine learning (머신러닝 기반 안면인식 기능을 포함한 비접촉 잠금장치 설계 및 개발)

  • Yeo Hoon Yoon;Ki Chang Kim;Whi Jin Jo;Hongjun Kim
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.29-38
    • /
    • 2022
  • The importance of prevention of epidemics is increasing due to the serious spread of infectious diseases. For prevention of epidemics, we need to focus on the non-contact industry. Therefore, in this paper, a face recognition door lock that controls access through non-contact is designed and developed. First very simple features are combined to find objects and face recognition is performed using Haar-based cascade algorithm. Then the texture of the image is binarized to find features using LBPH. An non-contact door lock system which composed of Raspberry PI 3B+ board, an ultrasonic sensor, a camera module, a motor, etc. are suggested. To verify actual performance and ascertain the impact of light sources, various experiment were conducted. As experimental results, the maximum value of the recognition rate was about 85.7%.

Optimizing LRU Lock Management in the Linux Kernel for Improving Parallel Write Throughout in Many-Core CPU Systems (매니코어 CPU 시스템의 병렬 쓰기 성능 향상을 위한 리눅스 커널의 LRU 관리 최적화 기법)

  • Eun-Kyu Byun;Gibeom Gu;Kwang-Jin Oh;Jiwoo Bang
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.7
    • /
    • pp.209-216
    • /
    • 2023
  • Modern HPC systems are equipped with many-core CPUs with dozens of cores. When performing parallel I/O in such a system, there is a limit to scalability due to the problem of the LRU lock management policy of the Linux system. The study proposes an improved FinerLRU to solve this problem. Our new FinerLRU improves the parallel write performance of file systems using the buffer cache through granular lock management by increasing the number of LRU locks upto the maximum number of cores. The proposed method was implemented in Linux 5.18.11, and the performance was measured on two types of CPUs, Intel Icelake Xeon and Intel Knights landing, with different characteristics, and it was found that a performance improvement of about two times can be obtained in both types of systems.

The Study on Camera Control for Improvement of Gimbal Lock in Digital-Twin Environment (디지털 트윈 환경에서의 짐벌락 개선을 위한 카메라 제어방법에 대한 연구)

  • Kim, Kyoung-Tae;Kim, Young-Chan;Cho, In-Pyo;Lee, Sang-Yub
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.476-477
    • /
    • 2022
  • This study deals with rotation, which is one of the expression methods of motion used in the 3D development environment. Euler angle is a rotation method introduced by Leonhard Euler to display objects in three-dimensional space. Although three angles can handle all rotations in a three dimensional coordinate space, there are serious errors in this approach. If you rotate an object with Euler angles, you will face the problem of gimbal locks that cannot rotate under certain circumstances. In contrast to this, the method to rotate an object without a gimbal lock is the quaternion rotation with quaternion. Rather than a detailed mathematical proof of quaternion, it introduces what concept is used in the current 3D development environment, and applies it to camera rotation control to implement a rotating camera without a gimbal lock.

  • PDF

Secure PIN Authentication Technique in Door-Lock Method to Prevent Illegal Intrusion into Private Areas (사적 영역에 불법 침입 방지를 위한 도어락 방식의 안전한 PIN 인증 기법)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.327-332
    • /
    • 2024
  • The spread of smart phones provides users with a variety of services, making their lives more convenient. In particular, financial transactions can be easily made online after user authentication using a smart phone. Users easily access the service by authenticating using a PIN, but this makes them vulnerable to social engineering attacks such as spying or recording. We aim to increase security against social engineering attacks by applying the authentication method including imaginary numbers when entering a password at the door lock to smart phones. Door locks perform PIN authentication within the terminal, but in smart phones, PIN authentication is handled by the server, so there is a problem in transmitting PIN information safely. Through the proposed technique, multiple PINs containing imaginary numbers are generated and transmitted as processed values such as hash values, thereby ensuring the stability of transmission and enabling safe user authentication through a technique that allows the PIN to be entered without exposure.

Structural Design and Performance Evaluation of a Mid-story Seismic Isolated High-Rise Building

  • Tamari, Masatoshi;Yoshihara, Tadashi;Miyashita, Masato;Ariyama, Nobuyuki;Nonoyama, Masataka
    • International Journal of High-Rise Buildings
    • /
    • v.6 no.3
    • /
    • pp.227-235
    • /
    • 2017
  • This paper describes some of the challenges for structural design of a mid-story seismic isolated high-rise building, which is located near Tokyo station, completed in 2015. The building is a mixed-use complex and encompasses three volumes: one substructure including basement and lower floors, and a pair of seismic isolated superstructures on the substructure. One is a 136.5m high Main Tower (office use), and the other is a 98.5 m high South Tower (hotel use). The seismic isolation systems are arranged in the $3^{rd}$ floor of the Main Tower and $5^{th}$ floor of the South Tower, so that we call this isolation system as the mid-story seismic isolation. The primary goal of the structural design of this building was to secure high seismic safety against the largest earthquake expected in Tokyo. We adopted optimal seismic isolation equipment simulated by dynamic analysis to minimize building damage. On the other hand, wind-induced vibration of a seismic isolated high-rise building tends to be excited. To reduce the vibration, the following strategies were adopted respectively. In the Main Tower with a large wind receiving area, we adopted a mechanism that locks oil dampers at the isolation level during strong wind. In the South Tower, two tuned mass dampers (TMDs) are installed at the top of the building to control the vibration. In addition, our paper will also report the building performance evaluated for wind and seismic observation after completion of the building. In 2016, an earthquake of seismic intensity 3 (JMA scale) occurred twice in Tokyo. The acceleration reduction rate of the seismic isolation level due to these earthquakes was approximately 30 to 60%. These are also verified by dynamic analysis using observed acceleration data. Also, in April 2016, a strong wind exceeding the speed of 25m/s occurred in Tokyo. On the basis of the record at the strong wind, we confirmed that the locking mechanism of oil damper worked as designed.

TREATMENT OF ECTOPICALLY ERUPTED MAXILLARY FIRST PERMANENT MOLARS (이소맹출 한 상악 제1대구치의 맹출 유도)

  • Yun, Hyo-Jin;Park, Ho-Won;Lee, Ju-Hyun;Seo, Hyun-Woo
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • v.37 no.4
    • /
    • pp.519-525
    • /
    • 2010
  • Ectopic eruption means the eruption of the tooth in an abnormal position due to multiple factors, which found most frequently in maxillary fist permanent molars, mandibular lateral incisors and maxillary permanent canines. Ectopic eruption of the maxillary first permanent molar occurs when the molar erupts with a more mesial angulation than normal, and locks itself in an atypical resorption on the distobuccal root of the second primary molar. The maxillary first permanent molar plays important roles for mastication and occlusion, so ectopically erupted maxillary first permanent molars should be relocated into proper position. Treatment options are separation by insertion of the brass wire or elastic rings, preparation of distal aspect of the maxillary second primary molar, using fixed or removable appliance with finger spring, and placement of space maintainer or space regainer after extraction of the maxillary second primary molar. We report three cases treated of ectopically erupted maxillary first permanent molar by re-setting of stainless steel crowns, placement of brass wire and using active plate. We could find out distal movement of maxillary first permanent molars into proper position and normal occlusion.

Characteristic Validation of High-damping Printed Circuit Board Using Viscoelastic Adhesive Tape (점탄성 테이프를 적용한 고댐핑 적층형 전자기판의 기본 특성 검증)

  • Shin, Seok-Jin;Jeon, Su-Hyeon;Kang, Soo-Jin;Park, Sung-Woo;Oh, Hyun-Ung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.5
    • /
    • pp.383-390
    • /
    • 2020
  • Wedge locks have been widely used for spaceborne electronics for mounting or removal of a printed circuit board (PCB) during integration, test and maintenance process. However, it can basically provide a mechanical constraint on the edge of the board. Thus, securing a fatigue life of solder joint for electronic package by limiting board deflection becomes difficult as the board size increases. Previously, additional stiffeners have been applied to reduce the board deflection, but the mass and volume increases of electronics are unavoidable. To overcome the aforementioned limitation, we proposed an application of multi-layered PCB sheet with viscoelastic adhesive tapes to implement high-damping capability on the board. Thus, it is more advantageous in securing the fatigue life of package under launch environment compared with the previous approach. The basic characteristics of the PCB with the multi-layered sheet was investigated through free-vibration tests at various temperatures. The effectiveness of the proposed design was validated through launch vibration test at qualification level and fatigue life prediction of electronic package based on the test results.

The Effect of an Emotional Factor on User Experience with Smartphone Unlocking Process (스마트 폰 잠금 해제 과정에서의 감성적 UX 요소가 전반적 기기 사용 경험과 향후 사용 의도에 미치는 영향)

  • Lee, Sunhwa;Shin, Youngsoo;Im, Chaerin;Beak, Hannah;Lee, Sungho;Kim, Jinwoo
    • Science of Emotion and Sensibility
    • /
    • v.17 no.4
    • /
    • pp.79-88
    • /
    • 2014
  • Smart-phones have become a vital part of our lives, paying a bill online, shopping using applications, using email and office applications. Therefore, the risk of the leakage of personal informations and the misuse of them becomes high, for the cost of loosing smart-phone. Many types of smart-phone security features such as password, slide-lock, and pattern lock have been introduced. However, those security locks make users not to easily access and use a smart-phone. There is tradeoff between security on one hand, and usability and cost on the other. This paper propose Self-Concealment to solve the tradeoff problem and demonstrate the effect through the experiment. In sum, Self-Concealment lowers smart-phone experience; however increases smart-phone use intension. This paper has implication for proposing new User Experience (UX) construct to resolve the trade-off between security and usability.

An Effective Method Guaranteeing Mutual Exclusion of Lock Waiting Information for Deadlock Detection in Main Memory Databases (주기억장치 데이타베이스에서 교착 상태의 검출을 위한 락 대기 정보의 효과적인 상호 배제 기법)

  • Kim, Sang-Wook;Lee, Seung-Sun;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1313-1321
    • /
    • 1999
  • The two-phase locking protocol(2PL) is the most widely-used concurrency control mechanism for guaranteeing logical consistency of data in a database environment where a number of transactions perform concurrently. The problem inherent in the 2PL protocol is a deadlock, where a set of transactions holding some locks indefinitely wait an additional lock that is already held by other transactions in the set. The deadlock detector is a DBMS sub-component that examines periodically whether a system is in a deadlock state based on lock waiting information of transactions. The deadlock detector and transactions execute concurrently in a DBMS and read and/or write the lock waiting information simultaneously. Since the lock waiting information is a shared one, we need an efficient method guaranteeing its physical consistency by using mutual exclusion. The efficiency of the mutual exclusion method is crucial especially in a main memory DBMS with high performance since it seriously affects the performance of an entire system. In this paper, we propose a new method that effectively guarantees physical consistency of lock waiting information. Two primary goals of our method are to minimize the processing overhead and to maximize system concurrency.

  • PDF

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.