• Title/Summary/Keyword: Person Identification

Search Result 236, Processing Time 0.026 seconds

A Study on the Attitude of University Students on Understanding Disabed (대학생의 장애 이해에 대한 태도 연구)

  • Kim, Young-Hee
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.1
    • /
    • pp.95-102
    • /
    • 2002
  • The present study focuses on the relation of the attitudes of university students to disabled by using modified disability factor scales(DFS, Siller). As for the attitude areas, it relies on the eight categories DFS provides. The 8 categories that specify each attitude area are: generalized rejection, distressed identification, inferred emotional consequences, imputed functional limitation, authoritarian virtuousness, rejection of intimacy, interaction strain, mainstreaming. This study is based on a series of questionnaire researches conducted on 322 students, over the period from October 19th to November 14th, 2001. The questionnaire carries 50 items, covering the 8 attitude areas and each item has 5 choices. The subjects' responses to each of the areas are examined in their relations to the four conditions, as they are analysed by t-test and one way ANOVA. The conclusion drawn from the research are as follows: 1. There is no significant difference between the students of the department concerned with the problem of disability, and those of the department unconcerned. But the responses are significantly different in the three areas of generalized rejection, rejection of intimacy and interaction strain(1st condition, P<.05). 2. The responses are significantly different in 6 areas except for the two, distressed identification and inferred emotional consequences, between the students who have volunteered services as helpers of the disabled and those who have no such experiences(2nd condition, P<.05). 3. the responses are significantly different between those who have volunteered long-time services and those who are far less experienced(3nd condition, P<.05). 4. There is no significant difference, whether the subjects have disabled persons around them or not. But generalized rejection, authoritarian virtuousness, rejection of intimacy, interaction strain & mainstreming show significant differences(4th condition, P<.05). 5. Generalized rejection, rejection intimacy and interaction strain show significant differences in every pair of the 4 condition. 6. Distressed identification and inferred emotional consequence show no significant difference between the two conditions in every pair of the 4 considerations.

  • PDF

A study on the User Experience and Aggressive Action in Violent Video Game (폭력적 비디오게임의 사용자 경험과 공격행동성에 대한 연구)

  • Yun, Ju-Sung;Noh, Ghee-Young
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.215-226
    • /
    • 2015
  • As violent video game is used based on active interaction and involvement of users, it is widely thought that it may have more effect on individual violence and aggressive action than existing violent videos. This study aimed to examine the effect of user experiences in the violent video game such as hostility, anger, arousal, enjoyment and identification on users' aggressive action. For this purpose, the first person FPS shooting game that consists of violent contents was employed to carry out playtest for 80 subjects with 40 male and 40 female university students. As a result, it was found that the user's arousal level, state anger, enjoyment and identification experience by the use of violent video game had an effect on aggressive action. Among factors that have aggressive action in the used of violent video game, besides emotion and arousal, the level of identification with a game character was found to be important effect factor. Hostility factor that was assumed to have effect on aggressive action was not significant, but enjoyment of game was proved to have effect on aggressive action of users.

Histogram-Based Singular Value Decomposition for Object Identification and Tracking (객체 식별 및 추적을 위한 히스토그램 기반 특이값 분해)

  • Ye-yeon Kang;Jeong-Min Park;HoonJoon Kouh;Kyungyong Chung
    • Journal of Internet Computing and Services
    • /
    • v.24 no.5
    • /
    • pp.29-35
    • /
    • 2023
  • CCTV is used for various purposes such as crime prevention, public safety reinforcement, and traffic management. However, as the range and resolution of the camera improve, there is a risk of exposing personal information in the video. Therefore, there is a need for new technologies that can identify individuals while protecting personal information in images. In this paper, we propose histogram-based singular value decomposition for object identification and tracking. The proposed method distinguishes different objects present in the image using color information of the object. For object recognition, YOLO and DeepSORT are used to detect and extract people present in the image. Color values are extracted with a black-and-white histogram using location information of the detected person. Singular value decomposition is used to extract and use only meaningful information among the extracted color values. When using singular value decomposition, the accuracy of object color extraction is increased by using the average of the upper singular value in the result. Color information extracted using singular value decomposition is compared with colors present in other images, and the same person present in different images is detected. Euclidean distance is used for color information comparison, and Top-N is used for accuracy evaluation. As a result of the evaluation, when detecting the same person using a black-and-white histogram and singular value decomposition, it recorded a maximum of 100% to a minimum of 74%.

Height Estimation of pedestrian based on image (영상기반 보행자 키 추정 방법)

  • Kim, Sung-Min;Song, Jong-Kwan;Yoon, Byung-Woo;Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.9
    • /
    • pp.1035-1042
    • /
    • 2014
  • Object recognition is one of the key technologies of the monitoring system for the prevention of various intelligent crimes. The height is one of the physical information of a person, and it may be important information for identification of the person. In this paper, a method which can detect pedestrians from CCTV images and estimate the height of the detected objects, is proposed. In this method, GMM (Gaussian Mixture Model) method was used to separate the moving object from the background and the pedestrian was detected using the conditions such as the width-height ratio and the size of the candidate objects. The proposed method was applied to the CCTV video, and the height of the pedestrian at far-distance, middle- distance, near-distance was estimated for the same person, and the accuracy was evaluated. Experimental results showed that the proposed method can estimate the height of the pedestrian as the accuracy of 97% for the short-range, 98% for the medium-range, and more than 97% for the far-range. The image sizes for the same pedestrian are different as the position of him in the image, it is shown that the proposed algorithm can estimate the height of pedestrian for various position effectively.

Personal Information Exposure on Social Network Service (소셜네트워크서비스 개인정보 노출 실태 분석)

  • Choi, Daeseon;Kim, Seok Hyun;Cho, Jin-Man;Jin, Seung-Hun;Cho, Hyun-Sook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.977-983
    • /
    • 2013
  • This paper presents result of researching personal information exposure of Korean twitter and facebook users. Personally identifiable information such as e-mail and phone numer is exposed in the accounts less than 1%. However there are many cases that a person is identified by non personally identifiable information. For example, 350 thousands accounts are distinguished with other accounts because its name is unique. Using combination of information such as name and high school, we can distinguish 2.97 millions accounts. We also found 170 thousands account pairs that are candidate of one users' own account. Linkability between two accounts in two different domains means that the person is identified. Currently, only personally identifiable information is protected by policy. This paper shows that the policy has limited effects under the circumstances that a person can be identified by non personally identifiable information and the account linking is possible.

Voice Personality Transformation Using a Probabilistic Method (확률적 방법을 이용한 음성 개성 변환)

  • Lee Ki-Seung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.3
    • /
    • pp.150-159
    • /
    • 2005
  • This paper addresses a voice personality transformation algorithm which makes one person's voices sound as if another person's voices. In the proposed method, one person's voices are represented by LPC cepstrum, pitch period and speaking rate, the appropriate transformation rules for each Parameter are constructed. The Gaussian Mixture Model (GMM) is used to model one speaker's LPC cepstrums and conditional probability is used to model the relationship between two speaker's LPC cepstrums. To obtain the parameters representing each probabilistic model. a Maximum Likelihood (ML) estimation method is employed. The transformed LPC cepstrums are obtained by using a Minimum Mean Square Error (MMSE) criterion. Pitch period and speaking rate are used as the parameters for prosody transformation, which is implemented by using the ratio of the average values. The proposed method reveals the superior performance to the previous VQ-based method in subjective measures including average cepstrum distance reduction ratio and likelihood increasing ratio. In subjective test. we obtained almost the same correct identification ratio as the previous method and we also confirmed that high qualify transformed speech is obtained, which is due to the smoothly evolving spectral contours over time.

A Study on Metadata Design for Managing Person and Organization Names in the National Debt Redemption Movement Digital Archive (국채보상운동 디지털 아카이브의 개인/단체명 관리를 위한 메타데이터 설계에 관한 연구)

  • Sangeun Han;Seulki Do
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.509-536
    • /
    • 2024
  • The purpose of this study is to develop a metadata AP for managing the person and organization name authority data in the National Debt Redemption Movement Digital Archive, a small-scale digital archive. The design principles and core metadata elements were derived by analyzing person/organization(group or corporateBody) metadata standards, implementation practices, and guidelines of libraries and archives, and mapped to the National Debt Redemption Movement person/organization name thesaurus data and the Wikidata Linked Metadata Model, resulting in 10 elements in the identification area, 14 elements in the content area, 8 elements in the relationship area, and 4 elements in the control area. A simple structure schema was applied so that it can be applied even in small organizations, and for interoperability, the schema was proposed with reference to DublinCore and SKOS schemes, and the applicability was confirmed based on actual data. The results of this study can be utilized as a basis for institutions that recognize the importance of data management but have difficulty in applying it in practice, when they want to prepare a system for managing their own authority data.

Parents' Recognitions and Attitudes on Identification of Gifted Students Using Observation and Nomination by Teachers in Busan (교사 관찰.추천제를 활용한 영재교육 대상자 선발방식에 대한 부산지역 초등학교 학부모의 인식과 태도)

  • Choe, Ho-Seong;Park, Hoo-Hwi;Kim, Eel
    • Journal of Gifted/Talented Education
    • /
    • v.21 no.2
    • /
    • pp.407-426
    • /
    • 2011
  • This study is to examine the perceptions and attitudes of parents about the teachers' recommendation system through their observations to identify the gifted. We conducted surveys for parents who had elementary school children in Busan metropolitan city and analysed the results to find out about the differences among parents groups in terms of their monthly incomes and opinions on teachers' observation and nomination for the gifted. The results are following; First, approx. 80% of the respondents recognized the changes in the giftedness identification system. Also, 40.5% of the parents positively thought about the teachers' observation and nomination system (positive group), whereas 32.3% of the parents showed their negative opinions about the system (negative group). There were also 27.2% of the parents who did not make their decisions (no-decision-making group). Second, most of the parents accepted that the teachers who were professionally trained in gifted education should be the persons for observing and nominating gifted students. However, significant differences were shown among the different monthly income groups of the parents in regards to who should be the person taking charge of recommending the gifted and how trustworthy this person could be. Third, the positive parents' group mostly expected that as the teachers' observation and nomination system is adopted, expenses for private education would decrease, whereas the negative group and no-decision-making group thought that the opposite result would occur. These results will be helpful for the successful adoption of teachers' observation and recommendation system to identify the gifted in the field of education.

Union and Division using Technique in Fingerprint Recognition Identification System

  • Park, Byung-Jun;Park, Jong-Min;Lee, Jung-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.140-143
    • /
    • 2007
  • Fingerprint Recognition System is made up of Off-line treatment and On-line treatment; the one is registering all the information of there trieving features which are retrieved in the digitalized fingerprint getting out of the analog fingerprint through the fingerprint acquisition device and the other is the treatment making the decision whether the users are approved to be accessed to the system or not with matching them with the fingerprint features which are retrieved and database from the input fingerprint when the users are approaching the system to use. In matching between On-line and Off-line treatment, the most important thing is which features we are going to use as the standard. Therefore, we have been using "Delta" and "Core" as this standard until now, but there might have been some deficits not to exist in every person when we set them up as the standards. In order to handle the users who do not have those features, we are still using the matching method which enables us to make up of the spanning tree or the triangulation with the relations of the spanned feature. However, there are some overheads of the time on these methods and it is not sure whether they make the correct matching or not. In this paper, introduces a new data structure, called Union and Division, representing binary fingerprint image. Minutiae detecting procedure using Union and Division takes, on the average, 32% of the consuming time taken by a minutiae detecting procedure without using Union and Division.

A Study on the Size of 2D Iris Codes for Personal Identification (신분인식을 위한 2D 홍채코드 크기에 관한 연구)

  • Joo, Sang-Hyun;Yang, Woo-Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.113-118
    • /
    • 2011
  • This paper has analyzed recognizing performance depending on the size of iris codes extracting by iris recognition algorithm using scale-space filtering. The iris images were created through pre-processing, the features were extracted by scale-space filtering, and the codes of 16 sizes were generated. The generated code's performance was compared for each code to calculate FAR and FRR by matching method utilizing Hamming distance. Every code had little overlapping portion between same person and other persons group so that the proposed algorithm's superiority was proved, and the performance of iris codes was analyzed for each size focused on convenience to use when implementing in realization. In addition, the iris codes suitable to iris recognition system that is high-reliable and is able to reduce user's inconvenience due to mis-rejection has been presented considering for commercialization.