• Title/Summary/Keyword: Person Identification

Search Result 236, Processing Time 0.026 seconds

Factors Influencing on the Adolescence`s Clothing Conformity -Focused on Female Middle and High School Students in Seoul- (청소년의 TV 미디어스타에 대한 의복 동조성에 영향을 미치는 요인 -서울시내 여자 중.고등학생을 중심으로-)

  • 홍혜은;나수임
    • The Research Journal of the Costume Culture
    • /
    • v.7 no.6
    • /
    • pp.28-40
    • /
    • 1999
  • The purpose of this study was to understand the Korean teenagers\` clothing behavior through pointing out the factors that clothing behavior of teenagers that was initiated from the important reference group, TV stars. The subject of this study were 570 purposively selected students at female middle and high school students in Seoul. The results were as follows : 1. The clothing conformity to TV stars relating to demographic variables was influenced significantly by location and personal expense variable in the high school group. 2. The exhibition showed a more important role to the clothing conformity in middle school group than in high school group. 3. The clothing conformity to TV stars relating to the clothing related variables was significantly affected by self-confidence to clothing than clothing normative recognition, clothing risk recognition and degree of clothing importance regardless of groups. 4. The clothing conformity to TV stars relating to TV media variables was affected by TV media star identification variable in both groups. And in case of middle school group, interests in TV stars also had influence on the clothing conformity to TV stars. And in case of high school group, interests in TV had effect on the imitation to TV stars\` clothing. As middle school students tend to have self-identification about a particular person, TV media stars become the reference group for the adolescence to follow their clothing.

  • PDF

A New Fingerprinting Method Using Safranine O for Adhesive Tapes and Non-Porous Papers

  • Kim, Young-Sam;Oh, In-Sun;Yoon, Kwang-Sang;Kim, Young-Joo;Eom, Yong-Bin
    • Biomedical Science Letters
    • /
    • v.16 no.3
    • /
    • pp.197-200
    • /
    • 2010
  • All citizens over 17 year old living in Korea have to be fingerprinted to obtain a certificate of resident registration. For this reason, human identification through fingerprints has been used actively in crime scene investigation. The fingerprint is so unique that it is one of the most certain ways to identify oneself and it can differentiate between genetically identical twins. Fingerprints gained in crime scene indicate a direction of criminal investigation in conjecturing a suspect. Fingerprints help a reunion of family got scattered for a long time and make it possible to get a personal identification for missing person who met with natural calamity. We developed a new fingerprinting method using safranine O, so as to develop fingerprints on the adhesive tapes and non-porous papers in various physical environments. Results were compared to the preexisting fingerprinting method, the minutiae numbers of fingerprints were greatly increased in our newly developed safranine O fingerprinting method. This newly developed safranine O method showed a quantity and quality comparable to the preexisting fingerprinting method routinely used in these days. In our hands, the safranine O fingerprinting method is another easy and obvious choice when the forensic case sample is available for fingerprints on the adhesive tapes and non-porous papers.

A Method for Clustering Noun Phrases into Coreferents for the Same Person in Novels Translated into Korean (한국어 번역 소설에서 인물명 명사구의 동일인물 공통참조 클러스터링 방법)

  • Park, Taekeun;Kim, Seung-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.533-542
    • /
    • 2017
  • Novels include various character names, depending on the genre and the spatio-temporal background of the novels and the nationality of characters. Besides, characters and their names in a novel are created by the author's pen and imagination. As a result, any proper noun dictionary cannot include all kinds of character names. In addition, the novels translated into Korean have character names consisting of two or more nouns (such as "Harry Potter"). In this paper, we propose a method to extract noun phrases for character names and to cluster the noun phrases into coreferents for the same character name. In the extraction of noun phrases, we utilize KKMA morpheme analyzer and CPFoAN character identification tool. In clustering the noun phrases into coreferents, we construct a directed graph with the character names extracted by CPFoAN and the extracted noun phrases, and then we create name sets for characters by traversing connected subgraphs in the directed graph. With four novels translated into Korean, we conduct a survey to evaluate the proposed method. The results show that the proposed method will be useful for speaker identification as well as for constructing the social network of characters.

A Study on RFID Application Method in Franchise Business (프랜차이즈산업에서의 RFID 적용 방법에 대한 연구)

  • Rim, Jae-Suk;Choi, Wean-Yang
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.189-198
    • /
    • 2008
  • At present, companies write daily work record or use bar-code in order to collect distribution flow data in real time. However, it needs additional works to check the record or read the bar-code with a scanner. In this case, human error could decrease accuracy of data and it would cause problems in reliability. To solve this problem, RFID (Radio Frequency Identification) is introduced in many automatic recognition sector recently. RFID is a technology that identification data is inserted into micro-mini IC chip and recognize, trace, and manage object, animal, or person using wireless frequency. This is being emerged as the core technology in future ubiquitous environment. This study is intended to suggest RFID application method in franchise business. Traceability and visibility of individual product are supplied based on EPCglobal network. It includes DW system which supplies various assessment data about product in supply chain, financial transaction system which is based on product transaction and position information, and RFID middleware which refines and divides product data from RFID tag. With the suggested application methods, individual product's profile data are supplied in real time and it would boost reliability to customer and make effective cooperation with existing operation systems (SCM, CRM, and e-Business) possible.

Face Recognition: A Survey (얼굴인식 기술동향)

  • Mun, Hyeon-Jun
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02c
    • /
    • pp.172-177
    • /
    • 2008
  • Biometrics is essential for person identification because of its uniqueness from each individuals. Face recognition technology has advantage over other biometrics because of its convenience and non-intrusive characteristics. In this paper, we will present a overview of face recognition technology including face detection, feature extraction, and face recognition system. For face detection, we will describe template based method and face component based approach. PCA and LDA approach will be discussed for feature extraction, and nearest neighbor classifiers -will be covered for matching. Large database and the standardized performance evaluation methodology is essential in order to support state-of-the-art face recognition system. Also, 3D based face recognition technology is the key solution for the pose, lighting and expression variations in many applications.

  • PDF

RFID Standardization Trends and Mobile RFID Services (RFID 표준화 동향)

  • Lee, Jun-Seob;Kim, Hyoung-Jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.754-756
    • /
    • 2005
  • RFID(Radio Frequency Identification) is used to describe a system that transmits the identity of an object or person wirelessly using radio waves. RFID is recognized as a key technology of USN(Ubiquitous Sensor Network). ISO/IEC JTC1 and EPCglobal are developing RFID related standards for global supply chain management. RFID is an important solution not only for the supply chain management, but also for USN and future services. Recently, mobile RFID which provide various services using RFID reader in mobile phone, is being standardized in Korea. In this paper, we analyze trends of RFID standardization activities in ISO/IEC JTC1 and EPCglobal and mobile RFID, and propose an convergence scenario of IPv6 and RFID.

  • PDF

Impacts of Coffee Shop Companies' Mecenat Activity on Identification, Corporate Image, Love Mark and Loyalty (커피전문점 기업의 메세나 활동이 동일시, 기업이미지, 러브마크, 충성도에 미치는 영향)

  • Kim, Su-Yeon;Byun, Gwang-In
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.482-497
    • /
    • 2018
  • This study would investigate the impacts of coffee shop companies' mecenat activity on identification, corporate image, love mark and loyalty. For sampling, an investigator who visited the coffee shops in person conducted surveys with customers. 800 copies were distributed for 11 days from May 23 through June 2, 2018, and excluding unreliable questionnaires from the collected questionnaires, 711 copies were used in the final analysis. As a result of the analysis, it turned out that the higher social contribution, purity, public interest and preference, the higher identification became. Also, the higher social contribution, public interest and preference, the higher corporate image became. On the other hand, it turned out that purity had a negative (-) impact on the corporate image. It turned out that purity and preference had positive impacts on the love mark, while did not affect social contribution, while public interest had a negative (-) impact on that. It turned out that identification had a positive impact on the corporate image, and identification and corporate image had positive impacts on the love mark. Also, identification, corporate image and love mark had positive impacts on loyalty. It is expected that the above research result would provide practical implications for coffee shop companies' marketing techniques in the future, and further, it is judged that it would play a positive role in the quality of life of consumers who experience coffee shop companies' mecenat activity.

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.

A Method for Effective Mobile Electronic Notification Service of Private Institutions

  • Kim, JongBae
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.2
    • /
    • pp.194-200
    • /
    • 2022
  • Traditionally, postal services that produce and deliver paper-based notices have been the mainstream. The reason is that it has the function of distribution and proof of delivery in the postal delivery system as well as the advantage of information delivery through postal delivery. After all, for the purpose of distribution and proof of delivery, many organizations use paper-based postal notices. However, in recent years, it has been in the spotlight to produce a paper-based postal notice as an electronic notice and deliver information to a mobile device through the Internet. In this paper, we propose a safe interworking method for user identification information required for private institutions to transmit mobile electronic notices. In order for a private institution to accurately deliver an electronic notice to a mobile service subscriber, a means to confirm whether the private institution and the mobile device subscriber are the same person is required. In the mobile electronic notification service, the connecting information provided by the personal identity proofing agency is used as a means of user identification. Connecting information is called a resident registration number on the Internet and is one-way hash information that can only be created by the personal identity proofing agency designated by the government. In order to transmit a mobile electronic notice, it is necessary to share connecting information for the same user identification between the institution that requests the sending of the electronic notice and the institution that processes the sending of the electronic notice. Connecting information is personal information that can uniquely identify a user, and if it is disclosed, damage such as personal information infringement may occur. As such, it is necessary to prevent problems that may arise from misuse and abuse of connecting information as well as increase in the benefits of sending the mobile electronic notice. In this paper, a safe and effective mobile electronic notification service can be performed by suggesting a method for safe interworking of information related to the mobile electronic notification service.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.