• Title/Summary/Keyword: Violation Identification

Search Result 22, Processing Time 0.022 seconds

Consideration of Voluntary Company by Police to Legality of Criminal Investigation (경찰의 임의동행에 의한 수사의 적법성에 대한 고찰)

  • Son, Bong-Son
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.105-113
    • /
    • 2007
  • Company without voluntary agreement(nature) of police, violation on the reason of company, violation on identification state, Violations on duties to notify the party's family members and to allow the party have a chance to be notified. Violation on duty to notify the party to have the right to call an investigation authority, Violation on the time of company, Violation on the place of company, and Violation on using force such as compulsory during the process of voluntary company in state of illegal voluntary company. It also has to decide whether the evidences are illegal and eliminated by these two requisites even in probative value and evidence admissibility on confession of the party under the illegal voluntary company.

YOLO-based Traffic Signal Detection for Identifying the Violation of Motorbike Riders (YOLO 기반의 교통 신호등 인식을 통한 오토바이 운전자의 신호 위반 여부 확인)

  • Wahyutama, Aria Bisma;Hwang, Mintae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.141-143
    • /
    • 2022
  • This paper presented a new technology to identify traffic violations of motorbike riders by detecting the traffic signal using You Only Look Once (YOLO) object detection. The hardware module that is mounted on the front of the motorbike consists of Raspberry Pi with a camera to run the YOLO object detection, a GPS module to acquire the motorcycle's coordinate, and a LoRa communication module to send the data to a cloud DB. The main goal of the software is to determine whether a motorbike has violated a traffic signal. This paper proposes a function to recognize the red traffic signal colour with its movement inside the camera angle and determine that the traffic signal violation happens if the traffic signal is moving to the right direction (the rider turns left) or moving to the top direction (the riders goes straight). Furthermore, if a motorbike rider is violated the signal, the rider's personal information (name, mobile phone number, etc), the snapshot of the violation situation, rider's location, and date/time will be sent to a cloud DB. The violation information will be delivered to the driver's smartphone as a push notification and the local police station to be used for issuing violation tickets, which is expected to prevent motorbike riders from violating traffic signals.

  • PDF

A study of access control using fingerprint recognition for Electronic Medical Record System (지문인식 기반을 이용한 전자의무기록 시스템 접근제어에 관한 연구)

  • Baek, Jong Hyun;Lee, Yong Joon;Youm, Heung Youl;Oh, Hae Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.3
    • /
    • pp.127-133
    • /
    • 2009
  • The pre-existing medical treatment was done in person between doctors and patients. EMR (Electronic Medical Record) System computerizing medical history of patients has been proceed and has raised concerns in terms of violation of human right for private information. Which integrates "Identification information" containing patients' personal details as well as "Medical records" such as the medical history of patients and computerizes all the records processed in hospital. Therefore, all medical information should be protected from misuse and abuse since it is very important for every patient. Particularly the right to privacy of medical record for each patient should be surely secured. Medical record means what doctors put down during the medical examination of patients. In this paper, we applies fingerprint identification to EMR system login to raise the quality of personal identification when user access to EMR System. The system implemented in this paper consists of embedded module to carry out fingerprint identification, web server and web site. Existing carries out it in client. And the confidence of hospital service is improved because login is forbidden without fingerprint identification success.

Foreign Exchange Return Predictability: Rational Expectations Risk Premium vs. Expectational Errors

  • Moon, Seongman
    • East Asian Economic Review
    • /
    • v.22 no.4
    • /
    • pp.467-505
    • /
    • 2018
  • We propose a simple identification scheme for the causes of the violations of uncovered interest parity. Our method uses the serial dependence patterns of excess returns as a criterion for judging performance of economic models. We show that a mean reverting component in excess returns, representing a violation of uncovered interest parity, mainly contributes to generating different serial dependence patterns of excess returns: rational expectations risk premium models tend to generate negative serial dependence of excess returns, while expectational errors models tend to generate positive serial dependence.

A Study on the Identification of Open Source License Compatibility Violations (오픈 소스 라이선스 양립성 위반 식별 기법 연구)

  • Lee, Dong-Gun;Seo, Yeong-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.451-460
    • /
    • 2018
  • Open source software is used in various ways when developing new softwares all around the world. It requires rights and responsibilities as a form of an open source software license. Because the license is a contract between original software developers of the open source software and users, we must follow it and extremely cautious to avoid copyright infringement. In particular, we must verify license compatibility when we develop new software using the existing open source softwares. However, license violation issues always occur and lead to lawsuits so that they are having an adverse effect on the open source software ecosystem. Thus, in this paper, we propose a method, OSLC-Vid, to identify license violations whether compatibility issues exist between open source softwares. The proposed method is verified by the experiments to detect actual license violation cases.

A Study on Metering Data De-identification Method for Smart Grid Privacy Protection (스마트그리드 개인정보보호를 위한 미터링 데이터 비식별화 방안 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1593-1603
    • /
    • 2016
  • In the smart grid environment, there are various security threats. In particular, exposure of smart meter data can lead to serious privacy violation. In this paper, we propose a method for de-identification method of metering data. The proposed method is to de-identify the time data and the numeric data, respectively. Therefore, it can't analyze the pattern information from the metering data. In addition, there is an advantage that the query is available, such as the range of search in the database for statistical analysis.

Crowdsourcing Identification of License Violations

  • Lee, Sanghoon;German, Daniel M.;Hwang, Seung-won;Kim, Sunghun
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.4
    • /
    • pp.190-203
    • /
    • 2015
  • Free and open source software (FOSS) has created a large pool of source codes that can be easily copied to create new applications. However, a copy should preserve copyright notice and license of the original file unless the license explicitly permits such a change. Through software evolution, it is challenging to keep original licenses or choose proper licenses. As a result, there are many potential license violations. Despite the fact that violations can have high impact on protecting copyright, identification of violations is highly complex. It relies on manual inspections by experts. However, such inspection cannot be scaled up with open source software released daily worldwide. To make this process scalable, we propose the following two methods: use machine-based algorithms to narrow down the potential violations; and guide non-experts to manually inspect violations. Using the first method, we found 219 projects (76.6%) with potential violations. Using the second method, we show that the accuracy of crowds is comparable to that of experts. Our techniques might help developers identify potential violations, understand the causes, and resolve these violations.

Displacement and force control of complex element structures by Matrix Condensation

  • Saeed, Najmadeen M.;Kwan, Alan S.K.
    • Structural Engineering and Mechanics
    • /
    • v.59 no.6
    • /
    • pp.973-992
    • /
    • 2016
  • A direct and relatively simple method for controlling nodal displacements and/or internal bar forces has been developed for prestressable structural assemblies including complex elements ("macro-elements", e.g., the pantographic element), involving Matrix Condensation, in which structural matrices being built up from matrices of elementary elements. The method is aimed at static shape control of geometrically sensitive structures. The paper discusses identification of the most effective bars for actuation, without incurring violation in bar forces, and also with objective of minimal number of actuators or minimum actuation. The advantages of the method is that the changes for both force and displacement regimes are within a single formulation. The method can also be used for adjustment of bar forces to either reduce instances of high forces or increase low forces (e.g., in a cable nearing slack).

Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems

  • Kang, Jin-Suk;Choi, Yong-Sik;Sung, Mee-Young;Shin, Seung-Ho;Jeong, Tai-Keong T.
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.254-258
    • /
    • 2007
  • Recently, ubiquitous computing in being actively researched and one of the main technology in ubiquitous computing environments is recognized as RFID system. The RFID system has much benefits but simultaneously has some problems such as user's privacy violation. In this paper, in order to improve the survivability of its nodes, it should build available simulation surrounding sensor nodes. Also, In the proposed cryptosystems we use a new hash function for user authentication and a stream cipher based on LFSR(Linear Feedback Shift Register) for message encryption and decryption. Moreover, each algorithm is programmed with C language and simulated on IBM-PC system and we analyze the randomness properties of the proposed algorithms by using statistical tests.

Preparation of Contingency Trajectory Operation for the Korea Pathfinder Lunar Orbiter

  • Jun Bang;SeungBum Hong;Jonghee Bae;Young-Joo Song;Donghun Lee
    • Journal of Astronomy and Space Sciences
    • /
    • v.40 no.4
    • /
    • pp.217-224
    • /
    • 2023
  • The Korea Pathfinder Lunar Orbiter (KPLO), also known as Danuri, successfully entered its mission orbit on December 27, 2022 (UTC), and is currently performing its mission smoothly. To mitigate potential contingencies during the flight and to navigate the spacecraft into the desired lunar orbit, the KPLO flight dynamics (FD) team analyzed major trajectory-related contingencies that could lead to the violation of mission requirements and prepared operational procedures from the perspective of trajectory and FD. This paper presents the process of preparing contingency trajectory operations for the KPLO, including the identification of trajectory contingencies, prioritization results, and the development of recovery plans and operational procedures. The prepared plans were successfully applied to address minor contingencies encountered during actual operations. The results of this study will provide valuable insights to FD engineers preparing for space exploration mission operations.