• Title/Summary/Keyword: Personal type

Search Result 1,358, Processing Time 0.021 seconds

Development of Synchro-drive Mobile Robot Base with Endless Rotate Type Turret (무한회전 터릿을 갖는 동기식 이동로봇 베이스의 개발)

  • Kwon, Oh-Sang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.9 s.174
    • /
    • pp.123-129
    • /
    • 2005
  • As the robot industry changes from industrial robot into personal robot used in home, the concept also changes from the existing fixed manipulator into Mobile Manipulator of free move in the aspect of appliance. For personal robot with such features, the role of mobile system is very important technology that rules the roost of robot functions. Especially, it is necessary to develop moving mechanism for free move in a narrow environment with obstacles such as home. This study introduces 3-axis structure in order to develop synchronous method that has turret capable of endless revolution for practical use as well as semi-omnidirectional function, and suggests applicable method to solve the problem of mechanical coupling.

The effects of perception toward cyber identity on loyalty and purchase intention

  • Kim, Su-Yeon;Hwang, Hyun-Seok
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.135-138
    • /
    • 2005
  • Many aspects of the way we work and live in the twenty-first century will be determined by the vast web of Internet. Virtual environments open the door to new identity experiences. Having the possibility to enter in a new community, where any personal information is directly shown to others, is a possibility to experiencing different self and thus to show and build new identities. This paper aims to identify how to relate the perception of cyber identity, loyalty and purchase intention. First, we classified cyber identity into two types, personal and social, and analyzed perception of each identity type. Then we conducted a survey using pre-designed questionnaire and found out factors consisting personal and social identity. Finally we analyzed the effects of these factors on loyalty and purchase intention using Structural Equation Model.

  • PDF

Study on Protection and Access Control of Personal Bioinformation in Telemecine Environment (원격의료환경에서 개인생체정보 보호 및 무결성에 관한 연구)

  • Kim, Soon Seok;Lee, Jae Hyun
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.57-62
    • /
    • 2016
  • By using personal health devices, a type of bio-censor at home and building, for telemedicine, this paper proposes a new method to protect more robust patient's privacy than before scheme [1] by ensuring the integrity and the secure transmission further when it communicates with gateway which collecting bio-information from them. As the suggested method is designed to conform with ISO/IEEE 11073-20601 [2], which is international standard, it considered interoperability with various health devices.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

A study on the relationship between fashion consumption style and the related variables of male and female consumers (남녀대학생의 패션소비유형과 관련변인의 관계연구)

  • Ha, Jong-Kyung
    • Korean Journal of Human Ecology
    • /
    • v.17 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • The study is to provide the types of fashion consumption of male and female university students and to analyze fashion involvement to the types and students' source of fashion information. Then the correlations were examined between fashion involvement and source of fashion information. The data were analyzed by a factor analysis, one-way ANOVA, Duncan test, cluster analysis, cross-tabulation analysis. The results are as follows: 1. The awareness about fashion consumption is classified into five factors: "hedonic consumption", "impulsive consumption", "brand loyal consumption", "prudent consumption", and "independent consumption". The fashion involvement to the types is categorized into four factors; "pleasure", "trend", "image", and "risk awareness". The source of fashion information is categorized into "mass media", "product information", and "personal information". 2. The fashion consumption is classified into three types: "an independent consumer type", "a brand loyal/ prudent consumer type", and "an impulsive consumer type". 3. In the fashion involvement to the types and the source of fashion information, there is a high correlation between the factors of "mass media" and "trend", "product information" and "pleasure" and "personal information" and "trend".

The Development of Micro NCT for Micro Blanking/Punching of Thin Plates (미세박판가공을 위한 마이크로 NCT 제작에 관한 연구)

  • 홍남표;신용승;최근형;김병희;장인배;김헌영;오수익
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.1084-1087
    • /
    • 1997
  • In this paper, we developed the micro NCT system for punching the thin plates, which is driven is driven by the standalone type microprocessor. In order to adjust the alignment between the punch and die in-situ punching procedures, the non-contact type laser sensor for measuring the burr and micro-driving system for punching die with using the differential screw are developed. The height of burr in four directions in the punched hole of test specimen are measured, and the measured data are transferred to the personal computer by RS232C serial communication technology. In the personal computer, by using the graphic user interface type monitoring program and data handling procedures which includes the filtering algorithms, the direction and length of movement of the die position is decided and these data are transferred back to the microprocessor. The microprocessor drives the micro positioning stage based on these data. Even if this method is not a perfect solution for the in-situ alignment in micro punching, but this alignment methodology is accomplished in the same stage just after the punching that we hope to solve the alignment problem in the punching system based on this technology.

  • PDF

A Study of the Factors influencing on Client's Violence in a Shelter for Teenage Runaway (청소년쉼터에서의 클라이언트 폭력에 영향을 미치는 요인)

  • Yoon, Suk Ja;Kim, Hee Jeong
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.1-11
    • /
    • 2013
  • This study attempt to explore how much characteristics of personal and institutional of staffs in shelter for teenage runaway influence to client's violence, and which factor of them are relative to client's violence. For this aims, we carried out a survey, survey subjects in shelter for teenage runaway participated in this research. T-test and variance analysis attempted to compare degree of violence experience of respondents by personal and institutional characteristics. According to result of analysis, age in the midst of personal characteristics is meaning difference and duty-time and type of shelter in the midst of institutional characteristics revealed meaning difference. Next, Multi-regression analysis tried to explore relative factor influencing on client's violence. The results, age in the midst of personal characteristics is relative with physical violence, duty-year in present institution is relative with etc harm. Also, duty-time per week of institutional characteristics is relative all with four type of violence. Type of shelter is relative with property harm, emotional violence and etc harm. Counseling time during duty is relative with physical violence. Above results provide basic data to find ways preventing client's violence to staffs in shelter for teenage runaway.

Effect of Information Security Incident on Outcome of Investment by Type of Investors: Case of Personal Information Leakage Incident (정보보안사고가 투자주체별 투자성과에 미치는 영향: 개인정보유출사고 중심으로)

  • Eom, Jae-Ha;Kim, Min-Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.463-474
    • /
    • 2016
  • As IT environment has changed, paths of information security in financial environment which is based on IT have become more diverse and damage caused by information leakage has been more serious. Among security incidents, personal information leakage incident is liable to give the greatest damage. Personal information leakage incident is more serious than any other types of information leakage incidents in that it may lead to secondary damage. The purpose of this study is to find how much personal information leakage incident influences corporate value by analyzing 21 cases of personal information leakage incident for the last 15 years 1,899 listing firm through case research method and inferring investors' response of to personal information leakage incident surveying a change in transaction before and after personal information leakage incident. This study made a quantitative analysis of what influence personal information leakage incident has on outcome of investment by types of investors by classifying types of investors into foreign investors, private investors and institutional investors. This study is significant in that it helps improve awareness of importance of personal information security by providing data that personal information leakage incident can have a significant influence on outcome of investment as well as corporate value in Korea stock market.

An Exploration on Personal Information Regulation Factors and Data Combination Factors Affecting Big Data Utilization (빅데이터 활용에 영향을 미치는 개인정보 규제요인과 데이터 결합요인의 탐색)

  • Kim, Sang-Gwang;Kim, Sun-Kyung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.287-304
    • /
    • 2020
  • There have been a number of legal & policy studies on the affecting factors of big data utilization, but empirical research on the composition factors of personal information regulation or data combination, which acts as a constraint, has been hardly done due to the lack of relevant statistics. Therefore, this study empirically explores the priority of personal information regulation factors and data combination factors that influence big data utilization through Delphi Analysis. As a result of Delphi analysis, personal information regulation factors include in order of the introduction of pseudonymous information, evidence clarity of personal information de-identification, clarity of data combination regulation, clarity of personal information definition, ease of personal information consent, integration of personal information supervisory authority, consistency among personal information protection acts, adequacy punishment intensity in case of violation of law, and proper penalty level when comparing EU GDPR. Next, data combination factors were examined in order of de-identification of data combination, standardization of combined data, responsibility of data combination, type of data combination institute, data combination experience, and technical value of data combination. These findings provide implications for which policy tasks should be prioritized when designing personal information regulations and data combination policies to utilize big data.