• Title/Summary/Keyword: Performance verification

Search Result 2,555, Processing Time 0.035 seconds

A Study on FTA-related Administrative Efficiency Measures for Verifying the Origin (FTA 원산지검증행정의 효율화 방안에 대한 연구)

  • Chung, Jae-Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.55
    • /
    • pp.243-264
    • /
    • 2012
  • This study is aimed to analyze problems related to FTA country of origin of goods verification which is increasing from 2006 and thereby to grope for solution of such problems and seek adequate FTA performance administration. It is found, through comparative analysis and statistics of last 8 FTAs so far Korea has concluded that there are major problems such as excessive verification processing due to complicated country of origin regulation etc. This paper suggests following policies of country of origin administration ; (1) Simplification of FTA country of origin rules (2) reciprocal cooperation between each country's Customs Authorities based on trust (3) rational measurement against corresponding country's Customs Authorities' misbehavior (4) enhancement of transparency in relation to processing rule of country of origin verification (5) securing FTA country of origin verification experts. For these improvements, upcoming FTA shall rule country of origin reasonably, simplification and transparency of rule is needed for established FTAs in relation to FTA performance administration with corresponding countries. Also it is necessary to revise FTA preferential tariff law and its related laws, and carry forward policies in accordance with medium and long term plan.

  • PDF

Evaluation of Histograms Local Features and Dimensionality Reduction for 3D Face Verification

  • Ammar, Chouchane;Mebarka, Belahcene;Abdelmalik, Ouamane;Salah, Bourennane
    • Journal of Information Processing Systems
    • /
    • v.12 no.3
    • /
    • pp.468-488
    • /
    • 2016
  • The paper proposes a novel framework for 3D face verification using dimensionality reduction based on highly distinctive local features in the presence of illumination and expression variations. The histograms of efficient local descriptors are used to represent distinctively the facial images. For this purpose, different local descriptors are evaluated, Local Binary Patterns (LBP), Three-Patch Local Binary Patterns (TPLBP), Four-Patch Local Binary Patterns (FPLBP), Binarized Statistical Image Features (BSIF) and Local Phase Quantization (LPQ). Furthermore, experiments on the combinations of the four local descriptors at feature level using simply histograms concatenation are provided. The performance of the proposed approach is evaluated with different dimensionality reduction algorithms: Principal Component Analysis (PCA), Orthogonal Locality Preserving Projection (OLPP) and the combined PCA+EFM (Enhanced Fisher linear discriminate Model). Finally, multi-class Support Vector Machine (SVM) is used as a classifier to carry out the verification between imposters and customers. The proposed method has been tested on CASIA-3D face database and the experimental results show that our method achieves a high verification performance.

Speaker Verification with the Constraint of Limited Data

  • Kumari, Thyamagondlu Renukamurthy Jayanthi;Jayanna, Haradagere Siddaramaiah
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.807-823
    • /
    • 2018
  • Speaker verification system performance depends on the utterance of each speaker. To verify the speaker, important information has to be captured from the utterance. Nowadays under the constraints of limited data, speaker verification has become a challenging task. The testing and training data are in terms of few seconds in limited data. The feature vectors extracted from single frame size and rate (SFSR) analysis is not sufficient for training and testing speakers in speaker verification. This leads to poor speaker modeling during training and may not provide good decision during testing. The problem is to be resolved by increasing feature vectors of training and testing data to the same duration. For that we are using multiple frame size (MFS), multiple frame rate (MFR), and multiple frame size and rate (MFSR) analysis techniques for speaker verification under limited data condition. These analysis techniques relatively extract more feature vector during training and testing and develop improved modeling and testing for limited data. To demonstrate this we have used mel-frequency cepstral coefficients (MFCC) and linear prediction cepstral coefficients (LPCC) as feature. Gaussian mixture model (GMM) and GMM-universal background model (GMM-UBM) are used for modeling the speaker. The database used is NIST-2003. The experimental results indicate that, improved performance of MFS, MFR, and MFSR analysis radically better compared with SFSR analysis. The experimental results show that LPCC based MFSR analysis perform better compared to other analysis techniques and feature extraction techniques.

Performance Improvements of Energy Detector for Spectrum Sensing in Cognitive Radio Environments: Verification using Time delay (인지무선환경에서 스펙트럼 센싱을 위한 에너지 검출기의 성능개선: 시간지연을 이용한 확인과정)

  • Baek, Jun-Ho;Lee, Jong-Hwan;Oh, Hyeong-Joo;Hwang, Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.1
    • /
    • pp.72-77
    • /
    • 2008
  • In this paper, we propose a novel structure where the energy detector has multiples of verification using time delay in order to improve its performance. Additionally, the performance is investigated by simulation and compared to that of the original energy detector. The simulation result shows that the proposed scheme improves the performance when SNR is compared with the mis-detection probability for both 1% and 10% of false alarm probability. The performance is also described in terms of ROC.

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

A Study on the Performance Evaluation based on Modular Face Recognition System (모듈화된 얼굴인식 시스템을 이용한 성능 시험에 관한 연구)

  • Hong Tae-Hwa;Moon Hyeon-Joon;Shin Yong-Nyuo;Lee Dong-Geun;Kim Jae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.4 s.304
    • /
    • pp.35-44
    • /
    • 2005
  • Face recognition out of biometrics is considerable interesting due to high performance and accessibility in applications to security such as access control and banking service. Therefore, a study on the protocol of the performance test is an important issue to understand the art-of state and to show a direction in future works, in addtion to developing algorithms. We present a design criterion for the performance test protocol of face recognition system and show the result of experiment executed on identification and verification scenario based on PCA algorithm and XM2VTS DB

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

Impact of Entrepreneurial Morality on Financial Performance and Social Performance through Entrepreneurship and Social Responsibility (기업가의 도덕성이 기업가정신 및 사회적 책임을 통한 재무적 성과와 사회적 성과에 미치는 영향)

  • Kim, Yeon Jong;Park, Sang Hyeok;Oh, Seung Hee
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.137-158
    • /
    • 2020
  • Purpose This study aims to analyze how entrepreneurs' morality affects entrepreneurship and social responsibility. The purpose of this study is to analyze the differences of entrepreneurship and social responsibility on corporate financial performance and social performance by measuring entrepreneurial morality index. Design/methodology/approach The research model is based on the existing literature related to morality, entrepreneurship, social responsibility, and corporate performance. In order to verify the research model, empirical analysis was conducted. The collected data were analyzed by Smart-pls 2.0 based on the structural equation model based measurement model verification and the structural model verification two - step approach. Using the bootstrapping method of PLS, 500 samples were constructed and hypothesis verification was performed. Findings The results of this study are as follows. In the case of general manufacturing companies, business people are more focused on improving corporate performance than morality, and have a somewhat consistent effect with entrepreneurial spirit that does not have a space of morality. When entrepreneurship is strengthened, financial performance and social performance. Business entrepreneurs in social enterprises are more aware of social responsibility than entrepreneurship, so they achieve both financial performance and social performance at the same time. As a result of this study, it was found that there is a difference in perception depending on the morality of the business people, entrepreneurship, social bookkeeping, and management performance according to the type of company.

The guideline for development and verification of railway software (철도 소프트웨어 개발 및 검증을 위한 지침)

  • Lee, Young-Jun;Choi, Jong-Gyun;Cha, Kyung-Ho;Cheon, Se-Woo;Lee, Jang-Soo;Kwon, Ki-Choon;Jung, Ui-Jin
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.659-664
    • /
    • 2008
  • The Railroad Safety Act's regulation reads as follows. "The Minister of Construction and Transportation may qualify and authorize the product to guarantee performance and safety of parts, machine, and device used in Railway fields." Another regulation reads as follows."“The guidelines about targets, standards, and procedures of Quality and Authority in first provision are decided as Ministry of Construction and Transportation Decree." The software used in rail cars and facilities is considered as a railway product. Therefore, it is qualified and authorized for acquiring the safety of rail cars and facilities. The software businesses shall again a Quality and Authority for applying a software to the rail cars and facilities. This paper regulates some guidelines that are needed to develop a software. The procedures that a software developer performs are divided by plan, requirement, design, implementation, and maintenance. The procedures that a software verification person performs are classified by verification plan, requirement verification, design verification, implementation verification, testing verification, maintenance verification, and safety activity. The entire processes and detailed activities to develope and verify a software are described as new guidelines.

  • PDF