• Title/Summary/Keyword: identification restrictions

Search Result 25, Processing Time 0.022 seconds

Unconscious Personal Recognition Method using Personal Footprint (발자국 정보를 이용한 무의식적 개인 식별 방법)

  • 정진우;김대진;박광현;변증남
    • Proceedings of the IEEK Conference
    • /
    • 2002.06e
    • /
    • pp.137-140
    • /
    • 2002
  • We introduce a personal identification method which can find user's ID without any help of the user. To do this, there has been two approaches, vision-based and pressure-based. Pressure-based approach has some advantages compared than vision-based one in the aspects of illumination, occlusion, and the amount of data. In the previous study about pressure-based personal identification, there are some restrictions about human body posture for extracting normalized footprints. Since this approach cannot be extended unconscious and continuos identification, we suppose more natural method and verified it by experiments.

  • PDF

Impact of Structural Shock and Estimation of Dynamic Response between Variables (구조적 충격의 영향과 동적 반응의 추정)

  • Cho, Eun-Jung;Kim, Tae-Ho
    • The Korean Journal of Applied Statistics
    • /
    • v.24 no.5
    • /
    • pp.799-807
    • /
    • 2011
  • This study investigates long and short run responses of variables to exogenous shocks by imposing prior restrictions on a contemporaneous structural shock coefficient matrix of the model to identify shocks by endogenous variables in the vector autoregression. The relative importance of each structural shock in variation of each variable is calculated through the identification of proper restrictions (not based on any specific theory but on researcher judgment corresponding to actual situations) and an estimation of the structural vector autoregression. The results of the analyses are found to maintain consistency.

De-identification Policy Comparison and Activation Plan for Big Data Industry (비식별화 정책 비교 및 빅데이터 산업 활성화 방안)

  • Lee, So-Jin;Jin, Chae-Eun;Jeon, Min-Ji;Lee, Jo-Eun;Kim, Su-Jeong;Lee, Sang-Hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.71-76
    • /
    • 2016
  • In this study, de-identification policies of the US, the UK, Japan, China and Korea are compared to suggest a future direction of de-identification regulations and a method for vitalizing the big data industry. Efficiently using the de-identification technology and the standard of adequacy evaluation contributes to using personal information for the industry to develop services and technology while not violating the right of private lives and avoiding the restrictions specified in the Personal Information Protection Act. As a counteraction, the re-identification issue may occur, for re-identifying each person as a de-identified data collection. From the perspective of business, it is necessary to mitigate schemes for discarding some regulations and using big data, and also necessary to strengthen security and refine regulations from the perspective of information security.

Flying Safety Area Model Creation and Obstruction Identification using 3D GIS Techniques (3차원 GIS 기법을 이용한 비행안전구역 모형 생성 및 장애 식별)

  • Park, Wan Yong;Heo, Joon;Sohn, Hong Gyoo;Lee, Yong Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.3D
    • /
    • pp.511-517
    • /
    • 2006
  • In this paper, we studied the techniques to analyze the flying safety area focused on the air base rules for military that has been the criteria of the altitude restrictions around the airfield for both civilian and military purposes in Korea. We wanted to present the effective method to analyze the restricted area and to help solving problems that could result recently from the altitude restrictions around the airfield at the beginning of the development projects. To do this we proposed the methods to effectively generate the model of the flying safety area in accordance with the air base rules using 3D GIS techniques and to automatically identify the obstructions caused by the natural and man-made features in those areas. To apply the proposed methods actually to the airfield chosen for the study area, we presented the approaches to generate geospatial informations based on the commercial digital maps and satellite imagery and by generating the flying safety area model, identifying the obstructions, and visualizing the integrated model for the flying safety area analysis we showed the practical usability of the proposed techniques.

On the Efficacy of Fiscal Policy in Korea during 1979~2000 (우리나라 재정정책의 유효성에 관한 연구)

  • Hur, Seok-Kyun
    • KDI Journal of Economic Policy
    • /
    • v.29 no.2
    • /
    • pp.1-40
    • /
    • 2007
  • This paper mainly estimates a trajectory of GDP induced by variations in fiscal expenditure and taxation policy using three variable structural VAR models. By assigning different combinations of identifying restrictions on the disturbances and measuring the corresponding fiscal multipliers, we compare how robust the estimated values of fiscal multipliers are with respect to the restrictions. Then, considering the dependency of Korean economy on the foreign sector, we extend the three variable SVARs to four variable ones by adding a variable reflecting external shocks. Empirical analyses into the Korean quarterly data (from 1979 to 2000) with the three variable SVARs reveal that the size and the significance of the estimated fiscal multipliers in Korea are very small and low or they decay very fast. Results from the four variable SVARs confirm these results while the significance of the effectiveness of fiscal policy is enhanced in some cases.

  • PDF

Hazard Identification and Testcase Design Method based on Use Case and HAZOP (사용사례와 HAZOP 기반의 위험원 식별 및 테스트케이스 설계 방안)

  • Do, Sungryong;Han, Hyuksoo
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.662-667
    • /
    • 2016
  • As electric and electronic control systems have sharply increased in vehicles, safety accident has emerged as an important issue. Therefore, in order to ensure safety of the vehicle, engineers are required to identify the hazards utilizing PHA and HAZOP, etc. in the early phase of development and implement safety mechanisms to prevent them. HAZOP has been widely used in a systematic manner based on guidewords. However, HAZOP identifies malfunctions from the top-level functionality provided by the system, so it cannot sufficiently identify hazards during the system operation. This leads to restrictions in designing testcases, because the safety requirements are derived from only some of the hazards. This research aimed to provide a hazard identification method utilizing Use case description, which defines operation procedure of the system and HAZOP and a testcase design method based on safety requirements. We introduced a case study on Smart Key Control System in vehicles and compared with hazards identification results based on HAZOP, to demonstrate the effectiveness of this study. The result of this study could potentially reduce development cost and increase system quality by adequately identifying hazards and safety requirements and designing the related testcase.

Applications and Key Technologies of Biomimetic Underwater Robot for Naval Operations (생체모방형 수중로봇의 해양작전 운용개념 및 핵심소요기술)

  • Lee, Ki-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.2
    • /
    • pp.189-200
    • /
    • 2015
  • This paper gives an overview on the some potential applications and key technologies of biomimetic underwater robot for naval operations. Unlike most manned underwater naval systems, biomimetic underwater robots can be especially useful in near-land or harbour areas due to their ability to operate in shallow water effectively. Biomimetic underwater robot provide advantages in reaching locations that would be difficult or too dangerous for a manned vehicle to reach, as well as providing a level of autonomy that can remove the requirement for dedicated human operator support. Using multiple or schools of underwater robots would provide increased flexibility for navigation, communication and surveillance ability. And it alleviate some of the restrictions associated with speed and endurance design constraints.

A Study on the Efficient Planning of Defense Weapon System Test & Evaluation (국방무기 시험평가시스템 효율화방안 연구)

  • Ryoo, Yeon Uk;Lim, Yeong Bong
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.143-153
    • /
    • 2013
  • The objective of this study is to present improvement of Weapon System T&E(Test and Evaluation) correspond to future environment by analyzing restrictions such as change of future weapon system procurement environment, and present T&E management system, organization and resource etc. The results of this study will be aid of produ ction dicision making by timely risk management through early identification of deficiency on the process of weapon system development, and suitability of combat determination.

A Study on Fire Risk Analysis & Indexing of Buildings (건축물의 화재위험의 분석과 지수화에 관한 연구)

  • Chung, Eui-Soo;Yang, Kwang-Mo;Ha, Jeong-Ho;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.10 no.4
    • /
    • pp.93-104
    • /
    • 2008
  • A successful fire risk assessment is depends on identification of risk, the analytical process of potential risk, on estimation of likelihood and the width and depth of consequence. Take the influence on enterprise into consideration, Fire risk assessment could carry out along the evaluation of the risk importance, the risk level and the risk acceptance. A large part of the limitation of choosing the risk assessment techniques impose restrictions on expense and time. If it is unnecessary high level risk assessment or Probabilistic Risk Assessment of buildings, in compliance with the Relative Ranking Method, Fire risk indexing and assessing is possible. As working-level technique, AHP method is useful with practical technique.

Design and Implementation of IEEE 802.11 Wireless LAN-based Identification and Location Tracking Techniques for Vehicle Information Terminals (IEEE 802.11 무선랜 기술 기반 차량용 정보 단말을 위한 식별과 위치 추적 기능의 설계와 구현)

  • Oh, Doo-Hwan;Yoon, Mi-Kyung;Han, Seung-Ho;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.2B
    • /
    • pp.107-118
    • /
    • 2009
  • In this paper, we present design and implementation for identification and location tracking techniques for vehicle information terminals in high-speed mobile environment using IEEE 802.11 wireless LAN technology. RSU be installed at a specific point. RSU recognizes it and then aware identification and location tracking for target vehicle when target vehicle that is equipped with information terminals pass near point. Issue of quick recognition using IEEE 802.11 access management frame, issue of weak wireless LAN security and tracking a range of restrictions be raised and we present solutions. Vehicle information terminal, RSU and a server-side GUI-based management program be implemented based on proposed solution. Implementation system be performed experiment at actual road environment and effectiveness be verified.