• Title/Summary/Keyword: Identity-based identification

Search Result 180, Processing Time 0.029 seconds

A Relationship among Sexual contact, Sex Role Identity, and Self Esteem of Girls' High School Students (여고생의 성 접촉과 성역할 정체감 및 자아존중감에 대한 연구)

  • Sohn, Jung-Nam
    • Research in Community and Public Health Nursing
    • /
    • v.14 no.3
    • /
    • pp.468-478
    • /
    • 2003
  • Purpose: The purpose of this study is to identify the relationship among sexual contact, sex role identification, and self esteem in Korean girls' high school students. Methods: The data were collected from 522 girls, who were stratified samples from a target population of 63,375 11th grade students from 200 regular high schools and 70 vocational high schools in Seoul, Korea from June 22 to July 18, 2002. Data were processed with the SAS program. Results: It was found that 42.51% of girls haven't experienced any sexual contact at all. The highest frequency in the final level of sexual contact was 'kiss', which was 22.03%. The 'androgyny' type among sex role identities of girls was most common, 32.57%, being followed by the 'undifferentiated' type 31.61%, the 'masculinity' type 18.97%, and the 'femininity' type 16.86, in that order. The sexual contacts such as 'holding hands', 'arms around', 'embracing', and 'kiss' were significantly different depending on sex role identity types. The score for self-esteem was significantly different depending on sex role identity types. The score for self- esteem was not significantly different depending on the final level of sexual contact. Conclusion: Based on the findings of this study, sex education programs should be developed in order to delay the sexual contacts of girls.

  • PDF

Speaker Change Detection Based on a Graph-Partitioning Criterion

  • Seo, Jin-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.30 no.2
    • /
    • pp.80-85
    • /
    • 2011
  • Speaker change detection involves the identification of time indices of an audio stream, where the identity of the speaker changes. In this paper, we propose novel measures for the speaker change detection based on a graph-partitioning criterion over the pairwise distance matrix of feature-vector stream. Experiments on both synthetic and real-world data were performed and showed that the proposed approach yield promising results compared with the conventional statistical measures.

Analysis of Eating Behavior Based on Social Identity (한국과 미국 대학생들의 대인 관계 유형에 따른 식행동 분석)

  • Moon, Soo-Jae;Kim, Jung-Hyun;Harrod, Wendy Jean;McComber, Diane
    • Journal of the Korean Society of Food Culture
    • /
    • v.8 no.2
    • /
    • pp.117-123
    • /
    • 1993
  • Food is an expression of social identity. The food we eat identifies us as members of a social group, distinguishes us from other groups, and binds us together through a process of self-categorization and social identification. This research extends the theory of collectivism versus individualism as basic dimensions of culture and personality to research on food and identity. We tested 2 hypotheses among 402 university students in Korea and the U.S. 1) Americans assume relatively individualistic orientation while Koreans relatively collectivistic in orientation. 2) Koreans and Americans differ in their orientation toward food, with Americans assuming an individualistic orientation and Koreans assuming a collectivistic approach. The level of collectivism versus individualism was measured by using Hui's INCOL Scale. We initially hypothesized that the Americans would be strongly individualistic and Koreans strongly collectivistic, however our results did not prove this. The two groups showed collectivistic social identity with the Americans being a bit more collectivistic, so little support was found. In order to test the second hypothesis, we devised a new set of questions based on a idea by Hui and Fischer. It was found that this hypothesis was strongly supported. In conclusion, it is difficult to find overall differences in collectivism versus individualism between the two groups. But in the area of attitude toward food, we found clear differences. For Koreans, food is an expression of collectivistic identity, whereas Americans assume a more individualistic approach.

  • PDF

Robust Person Identification Using Optimal Reliability in Audio-Visual Information Fusion

  • Tariquzzaman, Md.;Kim, Jin-Young;Na, Seung-You;Choi, Seung-Ho
    • The Journal of the Acoustical Society of Korea
    • /
    • v.28 no.3E
    • /
    • pp.109-117
    • /
    • 2009
  • Identity recognition in real environment with a reliable mode is a key issue in human computer interaction (HCI). In this paper, we present a robust person identification system considering score-based optimal reliability measure of audio-visual modalities. We propose an extension of the modified reliability function by introducing optimizing parameters for both of audio and visual modalities. For degradation of visual signals, we have applied JPEG compression to test images. In addition, for creating mismatch in between enrollment and test session, acoustic Babble noises and artificial illumination have been added to test audio and visual signals, respectively. Local PCA has been used on both modalities to reduce the dimension of feature vector. We have applied a swarm intelligence algorithm, i.e., particle swarm optimization for optimizing the modified convection function's optimizing parameters. The overall person identification experiments are performed using VidTimit DB. Experimental results show that our proposed optimal reliability measures have effectively enhanced the identification accuracy of 7.73% and 8.18% at different illumination direction to visual signal and consequent Babble noises to audio signal, respectively, in comparison with the best classifier system in the fusion system and maintained the modality reliability statistics in terms of its performance; it thus verified the consistency of the proposed extension.

An Efficient and Provable Secure Certificateless Identification Scheme in the Standard Model

  • Chin, Ji-Jian;Heng, Swee-Huay;Phan, Raphael C.W.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2532-2553
    • /
    • 2014
  • In Asiacrypt 2003, Al-Riyami and Paterson proposed the notion of certificateless cryptography, a technique to remove key escrow from traditional identity-based cryptography as well as circumvent the certificate management problem of traditional public key cryptography. Subsequently much research has been done in the realm of certificateless encryption and signature schemes, but little to no work has been done for the identification primitive until 2013 when Chin et al. rigorously defined certificateless identification and proposed a concrete scheme. However Chin et al.'s scheme was proven in the random oracle model and Canetti et al. has shown that certain schemes provable secure in the random oracle model can be insecure when random oracles are replaced with actual hash functions. Therefore while having a proof in the random oracle model is better than having no proof at all, a scheme to be proven in the standard model would provide stronger security guarantees. In this paper, we propose the first certificateless identification scheme that is both efficient and show our proof of security in the standard model, that is without having to assume random oracles exist.

A Study on the Impact of Cause-related Marketing on Consumer Purchase Intention

  • Huan Liu;Yazhu Zhao;Chi Gong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.1
    • /
    • pp.251-261
    • /
    • 2024
  • In this study, based on S-O-R theory and social identity theory, we aim to explore how cause-related marketing influences consumer purchase intention. Analyzing 306 questionnaire responses, our findings indicate that cause-related marketing significantly impacts perceived value, cognitive identification, and purchasing behavior. Both perceived value and cognitive identification further facilitate purchasing. Acting as mediators between cause-related marketing and consumer purchase intention, perceived value and cognitive identification strengthen the connection between marketing behavior and purchase intention. Additionally, enhanced perceived value contributes to consumers' cognitive identification with marketing activities. These findings provide crucial theoretical insights and practical implications for business marketing.

A Historical-Geographical Identification of East Asia as a Cultural Region (동아시아 문화지역의 역사-지리적 설정)

  • Ryu, Je-Hun
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.5
    • /
    • pp.728-744
    • /
    • 2007
  • In East Asia, regional identity can be expected to obtain popular consent more successfully when it is firmly based on historical-geographical reality. This study is an attempt to apply a broadened concept of place to the identification of East Asia as a cultural region. Cultural mixture within places at various scales, rather than cultural integration across those places, would give greater coherence to East Asia as a cultural region. This cultural mixture varies from one place to another, depending on the relative position in power relations. It could appear in the form of either domination or resistance, and even entanglement. The concept of a "mountain as a contested place" is proposed as an experimental effort to search for the basis for cultural identity within East Asia. This concept of place should be extended to the individual studies of such spatial units as houses, gardens, villages and cities. These individual studies, if accumulated, would result in improved theories of East Asia as a region that has a distinct cultural identity in historical-geographical terms.

Evaluation System of Psychological Feelings for Corporate Identity Symbol Marks Using Fuzzy Neural Networks (퍼지 - 뉴럴네트워크를 이용한 CI 심벌마크의 감성평가시스템)

  • Chang, In-Seong;Park, Yong-Ju
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.27 no.3
    • /
    • pp.305-314
    • /
    • 2001
  • In this paper, we construct an automatic evaluation system of psychological feeling for corporate identity (CI) symbol mark based on a fuzzy neural network technique. The system is modelled by trainable fuzzy inference rules with several input variables (qualitative and quantitative design components of CI symbol mark) and a single output variable (consumer's feeling). The back propagation learning algorithm, which is a conventional learning method of multilayer feedforward neural networks, is used for parameter identification of the fuzzy inference system. The learning ability to train data and the generalization ability to test data are evaluated for the proposed evaluation system by computer simulations.

  • PDF

Design of Blockchain Application based on Fingerprint Recognition Module for FIDO User Authentification in Shoppingmall (지문인식 모듈 기반의 FIDO 사용자 인증기술을 이용한 쇼핑몰에서 블록체인 활용 설계)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, a USB module with fingerprint recognition was designed as a distributed node of blockchain on distributed ID (DID, distributed ID) for user identification. This biometric-linked fingerprint recognition device was verified for the real-time authentication process of authentication transaction with FIDO(Fast IDentity Online) server. Blockchain DID-based services were proposed like as a method of individual TV rating survey, and recommending service for customized shopping channels, and crypto-currency, too. This DID based remote service can be improved by recognizing of channel-changing information through personal identification. The proposed information of production purchase can be shared by blockchain. And customized service can be provided for the utilization of purchase history in shoppingmall using distributed ID. As a result, this blockchain node-device and Samsung S10 Key-srore with FIDO service can be certified for additional transactions through various biometric authentication like fingerprint, and face recognition.

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].