• 제목/요약/키워드: Personal Information Recognition

검색결과 328건 처리시간 0.028초

사례분석을 통한 객체검출 기술의 건설현장 적용 방안에 관한 연구 (A Study on the Application of Object Detection Method in Construction Site through Real Case Analysis)

  • 이기석;강성원;신윤석
    • 한국재난정보학회 논문집
    • /
    • 제18권2호
    • /
    • pp.269-279
    • /
    • 2022
  • 연구목적: 본 연구의 목적은 건설현장의 재해 예방을 위해 딥러닝기반의 개인보호구 검출 모델을 개발하고, 실제 건설현장에 적용하여 분석하는 것이다. 연구방법: 본 연구의 수행 방법은 실제 환경의 데이터를 구축하고, 개발된 개인보호구 검출 모델을 적용하였다. 개인보호구 검출 모델은 크게 근로자 검출 및 개인보호구 착용 분류 모델로 구성되어 있다. 근로자 검출 모델은 딥러닝 기반의 알고리즘을 실제 현장에서 획득한 데이터셋을 구축하여 학습 및 근로자를 검출하였고, 개인보호구 착용 분류 모델은 앞단에서 추출된 근로자 검출영역에서 학습된 개인보호구 검출 알고리즘을 적용하였다. 구축된 모델의 검증을 위해 건설현장 3곳에서 획득된 데이터를 통해 실험결과를 도출하였다. 연구결과: 데이터베이스 12,000장을 구축하여 정상검출 9,460장(78.8%), 오검출 1,468(12.2%), 미검출 1,072장(8.9%)으로 나타났으며 주요 원인은 영상에서의 객체 크기, 객체간 중첩(Occulusion), 객체 잘림, 그림자에 의한 오검출로 분류되었다. 결론: 개인보호구 검출모델은 현장 상황마다 다른 검출률을 확인할 수 있었고, 본 연구의 결과가 차후 현장적용을 위한 연구에 활용될 수 있을 것으로 여겨진다.

개인확인 및 인증 알고리즘을 위한 홍채 패턴인식 (Iris Pattern Recognition for Personal Identification and Authentication Algorithm)

  • 고현주;이상원;전명근
    • 정보처리학회논문지C
    • /
    • 제8C권5호
    • /
    • pp.499-506
    • /
    • 2001
  • 정보통신 시스템과 네트워크의 개방화 추세와 더불어 인가되지 않은 불법 사용자로 인한 피해도 점점 더 커지고 있다. 이에 본 논문에서는 생체 특징에 기초한 개인확인 및 인증방법의 하나로 사람 눈에 있는 홍채의 패턴 인식에 관한 연구를 행하였다. 이를 위하여 먼저, 눈에 있는 홍채패턴으로 부터 개개인을 분리해 낼 수 있는 특징값을 찾아내는 알고리즘을 이산 Walsh-Hadamard 변환을 이용하여 제안하였다. 이를 이용하여 최종적으로 각 개인에게 부여할 수 있는 512 비트의 홍채코드를 만들었다. 제안된 알고리즘은 디지털 처리가 가능한 연산구조를 갖는 관계로 실시간 처리가 요구되는 정보보호를 위한 개인확인 및 인증알고리즘으로 널리 이용될 수 있으리라 생각된다.

  • PDF

환자 개인정보보호에 대한 치위생 전공 학생의 인식도 (Awareness of Dental Hygiene Department Students regarding the Protection of Patients' Personal Information)

  • 조명숙;이성숙
    • 대한치위생과학회지
    • /
    • 제4권1호
    • /
    • pp.89-98
    • /
    • 2021
  • Background: The purpose of the present study was to gather basic data necessary for developing an educational program regarding the protection of patients' personal information. Such a program would stress the importance of the protection of patients' personal information for dental hygiene students obtaining clinical practice. Methods: A self-reported questionnaire-based survey was conducted targeting dental hygiene undergraduates who were obtaining clinical practice in the capital region. A total of 543 questionnaires were included in the analysis. Results: The results of this study were as follows: 1) the average score for awareness of the Patient Privacy Act was 2.93 on a 4-point scale; 2) the average score for the recognition of the protection of patients' personal information was 3.22 on a 4-point scale; 3) the area-based perception of the protection of patient's personal information was 3.37 points for communication, which scored highest, followed-by the linked-work area at 3.27 points, the patient's information management at 3.22 points, and the direct dental hygiene work at 3.18 points; 4) with regard to awareness of the protection of patients' personal information according to general characteristics, the perception was higher in the advanced academic year (p < 0.01), in those who had education regarding the protection of patients' personal information at both the university and the clinical practice institution (p < .05), and in those with higher grades (p < 0.01). Conclusions: Based on the above findings, the development and application of an educational program to improve awareness of the protection of patients' personal information are considered to be necessary by both universities and clinical practice institutions.

The Effects of Children's Self-perception and Human Rights Recognition in Local Children Center - Focusing on moderation effects of right guarantee and use satisfaction -

  • Rho, Seon-duk;Sim, Mi-young
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권2호
    • /
    • pp.201-207
    • /
    • 2019
  • The purpose of this study is to suggest some implications by empirical testing the relationships between children's self-perception and human rights recognition in local children's center. For this study, Total 438 children were sampled and surveyed. The analytical results are the followings. First, personal characteristics was shown to have a significant effect to human right recognition. Second, self-perception was shown to have a significant effect to human right recognition. Third, right guarantee of center was shown to moderate the relationship between self-perception and human right recognition. This study provides some theoretical and polcy implications basing on these analytical results.

Value Recognition and Intention to Adopt Smart City Services: A Public Value Management Theory Approach

  • Lee, Seung Ha;Lee, Jung Hoon;Lee, Young Joo
    • Journal of Contemporary Eastern Asia
    • /
    • 제18권1호
    • /
    • pp.124-152
    • /
    • 2019
  • Smart city, which employs information and communication technology (ICT) to resolve urban problems, is gaining more research attention in the innovation research. However, most previous studies regard citizens as merely passive accepters of the smart city services, focusing on individual private values. The present study aims to expand existing limited perspectives by applying public value management theory. Drawing from the literature review, we developed a dual perspective that a smart city service should encompass: private and public value. Then we set up a causal relationship between the value recognitions and intention to adopt smart city services. We further related antecedent variables to the dual value recognition in terms of citizens' characteristics: prior knowledge, personal innovativeness, and citizenship. Two case subjects among currently operating smart city services in South Korea were selected to empirically investigate our hypothesis. Results confirm the recognition of both public and private value is significantly related to the citizens' personal characteristics and resultant attitude towards acceptance and support for diffusion of the smart city services. This study is expected to provide useful implications for a new angle for the recipient of the smart city services, value orientation of the services, citizen's participation, and method selection for promotion.

오픈소스기반의 지능형 개인 도움시스템(IPA) 개발방법 연구 (A Study on the Intelligent Personal Assistant Development Method Base on the Open Source)

  • 김길현;김영길
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2016년도 추계학술대회
    • /
    • pp.89-92
    • /
    • 2016
  • 최근 시리(siri)와 같이 사람의 말을 인식하고 대답해주는 서비스를 스마트폰 혹은 웹서비스로 제공해주고 있다. 이러한 지능형 처리를 위해서는 음성을 받아 드리고 웹상의 빅테이타를 검색하고 구문으로 분석, 정확도 부여등의 구현이 필요하다. 본 논문에서는 공개된 소스를 기반으로 하여 음성인식하는 ASR(Automatic Speech Recognition), 질문에 대한 내용을 데이터로 분석하고 응답을 만드는 QAS (Question Answering System), 결과를 음성으로 전달하는 TTS(Text to Speech) 로 구분하고 하나의 시스템으로 구현하는 연구와 분야별 적용될 수 있는 방법을 제안하고자 한다.

  • PDF

제어 네트워크 기반의 지문인식 도어 컨트롤러 개발에 관한 연구 (A Study Of Developing Control Network based Fingerprint Recognition Door Controller)

  • 양재원;박진석;윤석현;심일주;박귀태
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2002년도 합동 추계학술대회 논문집 정보 및 제어부문
    • /
    • pp.313-316
    • /
    • 2002
  • The need to protect a main information and control a personal access using Biometrics in the intelligent building system is extended with growing the information and communication technologies in recent years. The fingerprint recognition technology is one of the biometrics methods available that has been widely used in various applications. But the present architecture of fingerprint recognition system has many of the problems because of centralized control network architecture. But we can solve the problems with distributed control network architecture. In this paper, the fingerprint recognition system uses the merit of the LonWorks. it is able to easily modularize the system and make up for the weak points in the typical fingerprint recognition system.

  • PDF

CNN 알고리즘을 기반한 얼굴인식에 관한 연구 (A Study on the Recognition of Face Based on CNN Algorithms)

  • 손다연;이광근
    • 한국인공지능학회지
    • /
    • 제5권2호
    • /
    • pp.15-25
    • /
    • 2017
  • Recently, technologies are being developed to recognize and authenticate users using bioinformatics to solve information security issues. Biometric information includes face, fingerprint, iris, voice, and vein. Among them, face recognition technology occupies a large part. Face recognition technology is applied in various fields. For example, it can be used for identity verification, such as a personal identification card, passport, credit card, security system, and personnel data. In addition, it can be used for security, including crime suspect search, unsafe zone monitoring, vehicle tracking crime.In this thesis, we conducted a study to recognize faces by detecting the areas of the face through a computer webcam. The purpose of this study was to contribute to the improvement in the accuracy of Recognition of Face Based on CNN Algorithms. For this purpose, We used data files provided by github to build a face recognition model. We also created data using CNN algorithms, which are widely used for image recognition. Various photos were learned by CNN algorithm. The study found that the accuracy of face recognition based on CNN algorithms was 77%. Based on the results of the study, We carried out recognition of the face according to the distance. Research findings may be useful if face recognition is required in a variety of situations. Research based on this study is also expected to improve the accuracy of face recognition.

Proactive Task Execution Using Data Sharing and Event Transition among Personal Devices

  • Jeon, Ho-Cheol;Kim, Tae-Hwan;Choi, Joong-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제4권6호
    • /
    • pp.1237-1252
    • /
    • 2010
  • This paper proposes an intelligent technique for data sharing and event transition among personal devices including smart phones, laptops, and desktops. We implemented the PES (Personal Event Service) system that proactively executes appropriate tasks across multiple devices without explicit user requests by sharing the data used by the user and recognizing user intention based on the observed actions of the user for specific devices. The client module of PES installed on each device monitors the user actions and recognizes the intention of the user. The server provides data sharing and maintenance for clients. The connection between client and server is established by Java RMI (Remote Method Invocation). A series of experiments were performed to evaluate user satisfaction and system accuracy, and the results showed that the PES system can proactively provide appropriate, personalized services with a high degree of satisfaction to the user in an effective and efficient manner.