• Title/Summary/Keyword: Signature Identification

Search Result 116, Processing Time 0.025 seconds

Scaling Reuse Detection in the Web through Two-way Boosting with Signatures and LSH

  • Kim, Jong Wook
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.6
    • /
    • pp.735-745
    • /
    • 2013
  • The emergence of Web 2.0 technologies, such as blogs and wiki, enable even naive users to easily create and share content on the Web using freely available content sharing tools. Wide availability of almost free data and promiscuous sharing of content through social networking platforms created a content borrowing phenomenon, where the same content appears (in many cases in the form of extensive quotations) in different outlets. An immediate side effect of this phenomenon is that identifying which content is re-used by whom is becoming a critical tool in social network analysis, including expert identification and analysis of information flow. Internet-scale reuse detection, however, poses extremely challenging scalability issues: considering the large size of user created data on the web, it is essential that the techniques developed for content-reuse detection should be fast and scalable. Thus, in this paper, we propose a $qSign_{lsh}$ algorithm, a mechanism for identifying multi-sentence content reuse among documents by efficiently combining sentence-level evidences. The experiment results show that $qSign_{lsh}$ significantly improves the reuse detection speed and provides high recall.

Load Profile Disaggregation Method for Home Appliances Using Active Power Consumption

  • Park, Herie
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.572-580
    • /
    • 2013
  • Power metering and monitoring system is a basic element of Smart Grid technology. This paper proposes a new Non-Intrusive Load Monitoring (NILM) method for a residential buildings sector using the measured total active power consumption. Home electrical appliances are classified by ON/OFF state models, Multi-state models, and Composite models according to their operational characteristics observed by experiments. In order to disaggregate the operation and the power consumption of each model, an algorithm which includes a switching function, a truth table matrix, and a matching process is presented. Typical profiles of each appliances and disaggregation results are shown and classified. To improve the accuracy, a Time Lagging (TL) algorithm and a Permanent-On model (PO) algorithm are additionally proposed. The method is validated as comparing the simulation results to the experimental ones with high accuracy.

An Approach to the Spectral Signature Analysis and Supervised Classification for Forest Damages - An Assessment of Low Altitued Airborne MSS Data -

  • Kim, Choen
    • Korean Journal of Remote Sensing
    • /
    • v.7 no.2
    • /
    • pp.149-163
    • /
    • 1991
  • This paper discusses the capabilities of airborne remotely sensed data to detect and classify forest damades. In this work the AMS (Aircraft Multiband Scanner) was used to obtain digital imagery at 300m altitude for forest damage inventory in the Black Forest of Germany. MSS(Multispectral Scanner) digital numbers were converted to spectral emittance and radiance values in 8 spectral bands from the visible to the thermal infrared and submitted to a maximum-likelihood classification for : (1) tree species ; and. (2) damage classes. As expected, the resulted, the results of MSS data with high spatial resolution 0.75m$\times$0.75m enabled the detection and identification of single trees with different damages and were nearly equivalent to the truth information of ground checked data.

Threats and response measures according to the type of software updates (소프트웨어 업데이트 유형별 위협요소 및 대응방안)

  • Lee, Daesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.277-279
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

  • PDF

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF

An Observational Multi-Center Study Protocol for Distribution of Pattern Identification and Clinical Index in Parkinson's Disease (파킨슨병 변증 유형 및 지표 분포에 대한 전향적 다기관 관찰연구 프로토콜)

  • HuiYan Zhao;Ojin Kwon;Bok-Nam Seo;Seong-Uk Park;Horyong Yoo;Jung-Hee Jang
    • The Journal of Internal Korean Medicine
    • /
    • v.45 no.1
    • /
    • pp.1-10
    • /
    • 2024
  • Objectives: This study investigated the pattern identification (PI) and clinical index of Parkinson's disease (PD) for personalized diagnosis and treatment. Methods: This prospective observational multi-center study recruited 100 patients diagnosed with PD from two Korean medicine hospitals. To cluster new subtypes of PD, items on a PI questionnaire (heat and cold, deficiency and excess, visceral PI) were evaluated along with pulse and tongue analysis. Gait analysis was performed and blood and feces molecular signature changes were assessed to explore biomarkers for new subtypes. In addition, unified PD rating scale II and III scores and the European quality of life 5-dimension questionnaire were assessed. Results: The clinical index obtained in this study analyzed the frequency statistics and hierarchical clustering analysis to classify new subtypes based on PI. Moreover, the biomarkers and current status of herbal medicine treatment were analyzed using the new subtypes. The results provide comprehensive data to investigate new subtypes and subtype-based biomarkers for the personalized diagnosis and treatment of PD patients. Ethical approval was obtained from the medical ethics committees of the two Korean medicine hospitals. All amendments to the research protocol were submitted and approved. Conclusions: An objective and standardized diagnostic tool is needed for the personalized treatment of PD by traditional Korean medicine. Therefore, we developed a clinical index as the basis for the PI clinical evaluation of PD. Trial Registration: This trial is registered with the Clinical Research Information Service (CRIS) (KCT0008677)

Biometrics for Person Authentication: A Survey (개인 인증을 위한 생체인식시스템 사례 및 분류)

  • Ankur, Agarwal;Pandya, A.-S.;Lho, Young-Uhg;Kim, Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.1-15
    • /
    • 2005
  • As organizations search fur more secure authentication methods (Dr user access, e-commerce, and other security applications, biometrics is gaining increasing attention. Biometrics offers greater security and convenience than traditional methods of personal recognition. In some applications, biometrics can replace or supplement the existing technology. In others, it is the only viable approach. Several biometric methods of identification, including fingerprint hand geometry, facial, ear, iris, eye, signature and handwriting have been explored and compared in this paper. They all are well suited for the specific application to their domain. This paper briefly identifies and categorizes them in particular domain well suited for their application. Some methods are less intrusive than others.

  • PDF

A study on shape changes of hangul signature under the influence of alcohol (한글서명의 알콜 섭취에 의한 외형 변화율에 대한 연구)

  • Roh, Seung-Chan;Park, Sung-Woo;Kim, Jung-Ho
    • Analytical Science and Technology
    • /
    • v.23 no.6
    • /
    • pp.607-614
    • /
    • 2010
  • Handwriting identifications are often faced with difficulties in evaluating handwriting by persons under the influence of alcohol. Cerebellar dysfunction is associated with deficits in the control of movement extent, as well as changes in the amplitude and relative amounts of acceleration and deceleration and action tremor. Although numerous articles are available on the subject of alcohol influence on handwriting quality, most of them were based on empirical data such as experience method, without any statistical evaluation. In this study, Hangul signature giyeok and nieun of consonant were measured in samples of handwriting. The result of this study can be used as a basic data of comparison on handwriting by identifying consistency of features and relative individualization of.

A Study on RFID System Design and Expanded EPCIS Model for Manufacturing Systems (제조 시스템의 RFID System 설계 및 EPCIS 확장모형 연구)

  • Choi, Weon-Yong;Lee, Jong-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.123-135
    • /
    • 2007
  • In the recent years, the companies have manually recorded a production status in a work diary or have mainly used a bar code in order to collect each process's progress status, production performance and quality information in the production and logistics process in real time. But, it requires an additional work because the worker's record must be daily checked or the worker must read it with the bar code scanner. At this time, data's accuracy is decreased owing to the worker's intention or mistake, and it causes the problem of the system's reliability. Accordingly, in order to solve such problem, the companies have introduced RFID which comes into the spotlight in the latest automatic identification field. In order to introduce the RFID technology, the process flow must be analyzed, but the ASME sign used by most manufacturing companies has the difficult problem when the aggregation event occurs. Hence, in this study, the RFID logistic flow analysis Modeling Notation was proposed as the signature which can analyze the manufacturing logistic flow amicably, and the manufacturing logistic flow by industry type was analyzed by using the proposed RFID logistic flow analysis signature. Also, to monitor real-time information through EPCglobal network, EPCISEvent template by industry was proposed, and it was utilized as the benchmarking case of companies for RFID introduction. This study suggested to ensure the decision-making on real-time information through EPCglobal network. This study is intended to suggest the Modeling Notation suitable for RFID characteristics, and the study is intended to establish the business step and to present the vocabulary.

Identification and Validation of Circulating MicroRNA Signatures for Breast Cancer Early Detection Based on Large Scale Tissue-Derived Data

  • Yu, Xiaokang;Liang, Jinsheng;Xu, Jiarui;Li, Xingsong;Xing, Shan;Li, Huilan;Liu, Wanli;Liu, Dongdong;Xu, Jianhua;Huang, Lizhen;Du, Hongli
    • Journal of Breast Cancer
    • /
    • v.21 no.4
    • /
    • pp.363-370
    • /
    • 2018
  • Purpose: Breast cancer is the most commonly occurring cancer among women worldwide, and therefore, improved approaches for its early detection are urgently needed. As microRNAs (miRNAs) are increasingly recognized as critical regulators in tumorigenesis and possess excellent stability in plasma, this study focused on using miRNAs to develop a method for identifying noninvasive biomarkers. Methods: To discover critical candidates, differential expression analysis was performed on tissue-originated miRNA profiles of 409 early breast cancer patients and 87 healthy controls from The Cancer Genome Atlas database. We selected candidates from the differentially expressed miRNAs and then evaluated every possible molecular signature formed by the candidates. The best signature was validated in independent serum samples from 113 early breast cancer patients and 47 healthy controls using reverse transcription quantitative real-time polymerase chain reaction. Results: The miRNA candidates in our method were revealed to be associated with breast cancer according to previous studies and showed potential as useful biomarkers. When validated in independent serum samples, the area under curve of the final miRNA signature (miR-21-3p, miR-21-5p, and miR-99a-5p) was 0.895. Diagnostic sensitivity and specificity were 97.9% and 73.5%, respectively. Conclusion: The present study established a novel and effective method to identify biomarkers for early breast cancer. And the method, is also suitable for other cancer types. Furthermore, a combination of three miRNAs was identified as a prospective biomarker for breast cancer early detection.