• 제목/요약/키워드: Re-Identification

검색결과 283건 처리시간 0.024초

Efficient Time Domain Aeroelastic Analysis Using System Identification

  • Kwon, Hyuk-Jun;Kim, Jong-Yun;Lee, In;Kim, Dong-Hyun
    • International Journal of Aeronautical and Space Sciences
    • /
    • 제6권1호
    • /
    • pp.52-60
    • /
    • 2005
  • The CFD coupled aeroelastic analyses have significant advantages over linear panel methods in their accuracy and usefulness for the simulation of actual aeroelastic motion after specific initial disturbance. However, in spite of their advantages, a heavy computation time is required. In this paper, a method is discussed to save a computational cost in the time domain aeroelastic analysis based on the system identification technique. The coefficients of system identification model are fit to the computed time response obtained from a previously developed aeroelastic analysis code. Because the non-dimensionalized data is only used to construct the model structure, the resulting model of the unsteady CFD solution is independent of dynamic pressure and this independency makes it possible to find the flutter dynamic pressure without the unsteady aerodynamic computation. To confirm the accuracy of the system identification methodology, the system model responses are compared with those of the CFD coupled aeroelastic analysis at the same dynamic pressure.

활용성 강화 데이터 프라이버시 보호 기술 동향 (Trends in Data Privacy Protection Technologies with Enhanced Utilization)

  • 김주영;조남수;장구영
    • 전자통신동향분석
    • /
    • 제35권6호
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Nonlinear Dynamic Analysis of Cantilever Tube Conveying Fluid with System Identification

  • Lim, Jae-Hoon;Jung, Goo-Choong;Park, Yeon-Sun
    • Journal of Mechanical Science and Technology
    • /
    • 제17권12호
    • /
    • pp.1994-2003
    • /
    • 2003
  • The vibration of a flexible cantilever tube with nonlinear constraints when it is subjected to flow internally with fluids is examined by experimental and theoretical analysis. These kinds of studies have been performed to find the existence of chaotic motion. In this paper, the important parameters of the system leading to such a chaotic motion such as Young's modulus and the coefficient of viscoelastic damping are discussed. The parameters are investigated by means of system identification so that comparisons are made between numerical analysis using the design parameters and the experimental results. The chaotic region led by several period-doubling bifurcations beyond the Hopf bifurcation is also re-established with phase portraits, bifurcation diagram and Lyapunov exponent so that one can define optimal parameters for system design.

Identification of reinforced concrete beam-like structures subjected to distributed damage from experimental static measurements

  • Lakshmanan, N.;Raghuprasad, B.K.;Muthumani, K.;Gopalakrishnan, N.;Basu, D.
    • Computers and Concrete
    • /
    • 제5권1호
    • /
    • pp.37-60
    • /
    • 2008
  • Structural health monitoring of existing infrastructure is currently an important field of research, where elaborate experimental programs and advanced analytical methods are used in identifying the current state of health of critical and important structures. The paper outlines two methods of system identification of beam-like reinforced concrete structures representing bridges, through static measurements, in a distributed damage scenario. The first one is similar to the stiffness method, re-cast and the second one to flexibility method. A least square error (LSE) based solution method is used for the estimation of flexural rigidities and damages of simply supported, cantilever and propped cantilever beam from the measured deformation values. The performance of both methods in the presence of measurement errors is demonstrated. An experiment on an un-symmetrically damaged simply supported reinforced concrete beam is used to validate the developed method. A method for damage prognosis is demonstrated using a generalized, indeterminate, propped cantilever beam.

"동의수세보원(東醫壽世保元)"의 삼음삼양(三陰三陽) 인식(認識) (Understanding of the Sameum-Samyang in "Dong-uisusebowon(東醫壽世保元)")

  • 장우창
    • 대한한의학원전학회지
    • /
    • 제23권1호
    • /
    • pp.303-316
    • /
    • 2010
  • Ijema's four constitution theory is the result of creative succession which is originated from the "Hwangjenaegyeong(黃帝內經)", and shaped up as "Sanghanron(傷寒論)", the key of Ijema's theory would be the re-explnation of the Sameum-Samyang pattern identification. therefore, we should recognize that the four constitution theory is related to the Sameum-Samyang identification of "Sanghanron(傷寒論)". And is even on the mutual supporting relation. from this point of view, the "Dong-uisusebowon(東醫壽世保元)" could be valuated as a commentary of "Sanghanron(傷寒論)" which shows us that how to review the Sameum-Samyang identification as the point of characteristic of four constitution theory.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제11권2호
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜 (Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System)

  • 박정수;최은영;이수미;이동훈
    • 정보보호학회논문지
    • /
    • 제16권4호
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) 시스템은 다양한 서비스를 제공함으로써 유비쿼터스 시대에 매우 중요한 역할을 할 것으로 예상되지만, 이와 반대로 이 시스템이 폭넓게 사용될수록 정보 노출과 위치 추적 문제 같은 소비자의 프라이버시 문제가 발생될 것으로 예상된다. RFID 태그는 기존의 암호학적인 방법을 사용할 수 없을 정도로 제한된 연산 능력을 갖기 때문에, 이러한 프라이버시 문제를 해결하는데 많은 어려움이 있었다. [2]의 프로토콜에서는 외부기기를 사용하여 태그를 가진 소비자의 프라이버시를 보호하지만, 태그는 높은 자원이 필요한 지수 연산을 실행해야 했다. 하지만, 제안하는 프로토콜의 태그는 사용자의 프라이버시를 보호하기 위해서 곱셈연산만을 실행하기 때문에 저가형의 RFID 시스템에 적합하다. 또한, 태그는 외부장치 없이 자체적으로 재암호화되므로, 외부장치가 태그에 잘못된 값을 저장함으로써 발생될 수 있는 모든 문제를 근본적으로 해결하였다.

Implementation of persistent identification of topological entities based on macro-parametrics approach

  • Farjana, Shahjadi Hisan;Han, Soonhung;Mun, Duhwan
    • Journal of Computational Design and Engineering
    • /
    • 제3권2호
    • /
    • pp.161-177
    • /
    • 2016
  • In history based parametric CAD modeling systems, persistent identification of the topological entities after design modification is mandatory to keep the design intent by recording model creation history and modification history. Persistent identification of geometric and topological entities is necessary in the product design phase as well as in the re-evaluation stage. For the identification, entities should be named first according to the methodology which will be applicable for all the entities unconditionally. After successive feature operations on a part body, topology based persistent identification mechanism generates ambiguity problem that usually stems from topology splitting and topology merging. Solving the ambiguity problem needs a complex method which is a combination of topology and geometry. Topology is used to assign the basic name to the entities. And geometry is used for the ambiguity solving between the entities. In the macro parametrics approach of iCAD lab of KAIST a topology based persistent identification mechanism is applied which will solve the ambiguity problem arising from topology splitting and also in case of topology merging. Here, a method is proposed where no geometry comparison is necessary for topology merging. The present research is focused on the enhancement of the persistent identification schema for the support of ambiguity problem especially of topology splitting problem and topology merging problem. It also focused on basic naming of pattern features.

빅데이타 비식별화 기술과 이슈 (De-identification Techniques for Big Data and Issues)

  • 우성희
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 춘계학술대회
    • /
    • pp.750-753
    • /
    • 2017
  • 최근 스마트폰, SNS, 사물인터넷이 확산되면서 생겨나는 빅데이타의 처리와 활용이 ICT 분야의 새로운 성장 동력으로 부상하고 있다. 하지만 이러한 빅데이터의 활용을 위해서는 개인정보 비식별화가 이루어져야한다. 비식별화는 개인의 데이터가 특정인과 연결되지 않도록 데이터 셋으로부터 식별정보를 제거하는 것으로 정보를 수집, 처리, 보관 혹은 배포하는데 있어 발생할 수 있는 개인정보노출의 위험을 줄이며 그 정보를 활용하고 공유하는데 그 목적을 두고 있다. 비식별화된 정보는 또한 재식별화되어 개인정보보호의 논란이 되고 있지만 빅데이터등의 개인정보가 비식별 처리되어 활용되는 사례는 점차 증가하고 있다. 또한 많은 비식별화 가이드라인의 등장과 함께 개인정보 비식별화 방법이 제시되고 있다. 따라서 본 연구에서는 빅데이타 비식별화 과정과 사후관리를 서술, 비식별화 방법을 비교분석하고 비식별화와 개인정보보호 관련 이슈와 해결과제를 제시한다.

  • PDF

효과적인 교통정보 수집체계 구축을 위한 Paramics 기반의 AVI 성능 요구사항 분석 기법 (A Tool for Analyzing Performance Requirements of Automatic Vehicle Identification (AVI) Techniques Based on Paramics)

  • 오철
    • 대한교통학회지
    • /
    • 제23권8호
    • /
    • pp.147-152
    • /
    • 2005
  • 본 연구에서는 구간의 교통상황을 보다 정확하게 관측할 수 있는 기법 중의 하나인 차량자동인식기법(AVI, Automatic Vehicle Identification)의 성능 요구사항 (performance requirements)을 분석할 수 있는 기법을 처음으로 제시하였다. 미시적 교통시뮬레이터인 Paramics를 이용하여 개별차량의 재인식(re-identification)을 통한 AVI 성능요구사항 분석을 몬테카를로 시뮬레이션을 적용하여 구현하였다. 본 연구에서 제안한 기법은 목표로 설정한 통행시간의 정확도를 달성하기 위한 매칭률(matching rate)과 오매칭률(mis-matching rate)의 조합을 찾고, 나아가 이에 부합하는 AVI 기술을 선정하는데 사용될 수 있다. 본 연구에서 제안한 기법은 AVI를 통한 정확하고 신뢰성 있는 교통정보의 수집 및 가공을 위한 의사결정지원 수단으로 유용하게 사용될 것으로 기대된다.