• Title/Summary/Keyword: internal information search

Search Result 166, Processing Time 0.023 seconds

Masked Face Recognition via a Combined SIFT and DLBP Features Trained in CNN Model

  • Aljarallah, Nahla Fahad;Uliyan, Diaa Mohammed
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.319-331
    • /
    • 2022
  • The latest global COVID-19 pandemic has made the use of facial masks an important aspect of our lives. People are advised to cover their faces in public spaces to discourage illness from spreading. Using these face masks posed a significant concern about the exactness of the face identification method used to search and unlock telephones at the school/office. Many companies have already built the requisite data in-house to incorporate such a scheme, using face recognition as an authentication. Unfortunately, veiled faces hinder the detection and acknowledgment of these facial identity schemes and seek to invalidate the internal data collection. Biometric systems that use the face as authentication cause problems with detection or recognition (face or persons). In this research, a novel model has been developed to detect and recognize faces and persons for authentication using scale invariant features (SIFT) for the whole segmented face with an efficient local binary texture features (DLBP) in region of eyes in the masked face. The Fuzzy C means is utilized to segment the image. These mixed features are trained significantly in a convolution neural network (CNN) model. The main advantage of this model is that can detect and recognizing faces by assigning weights to the selected features aimed to grant or provoke permissions with high accuracy.

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.

The Effects of Human Resource Management on Organizational Effectiveness (중소기업의 고몰입 인적자원관리가 조직효과성에 미치는 영향)

  • Chang, Yong-Sun;Kim, Min-Soo;Lee, Kang Min;Cho, Dae Hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.3
    • /
    • pp.103-114
    • /
    • 2014
  • The purpose of this study is to find out the relationship between high involvement Human Resource Management and organizational effectiveness in small company. High involvement Human Resource Management practices include training, incentive, performance appraisal, participation, proposal, communication, job description. This research approached organizational effectiveness using internal process and goal. Internal process approach measured internal organizational health using aggregate organizational commitment, turnover intention, job search. Goal approach measured organizational growth using sales growth rate per employee and net income growth rate per employee. Using the collected data from 267 employees at 27 small-sized firms located in South region in Korea, this research tested and confirmed the construct validity regression analysis at the organizational level. This research came to the conclusions to as follows: First, high-involvement HRM had the positive effect on the organizational commitment. Second, high-involvement HRM had the negative effect on the turnover intention. The findings suggest that high-involvement HRM is a valuable construct to understand internal process approach of organizational effectiveness in small firms.

Features for Author Disambiguation (저자 식별을 위한 자질 비교)

  • Kang, In-Su;Lee, Seungwoo;Jung, Hanmin;Kim, Pyung;Goo, HeeKwan;Lee, MiKyung;Sung, Won-Kyung;Park, DongIn
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.107-111
    • /
    • 2007
  • There exists a many-to-many mapping relationship between persons and their names. A person may have multiple names, and different persons may share the same name. These synonymous and homonymous names may severely deteriorate the recall and precision of the person search, respectively. This study addresses the characteristics of features for resolving homonymous author names appearing in citation data. As disambiguation features, previous works have employed citation-internal features such as co-authorship, titles of articles, titles of publications as well as citation-external features such as emails, affiliations, Web evidences. To the best of our knowledge, however, there has been no literature to deal with the influences of features on author disambiguation. This study analyzes the effect of individual features on author resolution using a large-scale test set for Korean.

  • PDF

Privacy-Preserving Parallel Range Query Processing Algorithm Based on Data Filtering in Cloud Computing (클라우드 컴퓨팅에서 프라이버시 보호를 지원하는 데이터 필터링 기반 병렬 영역 질의 처리 알고리즘)

  • Kim, Hyeong Jin;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.243-250
    • /
    • 2021
  • Recently, with the development of cloud computing, interest in database outsourcing is increasing. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Therefore, in this paper, we propose a parallel range query processing algorithm that supports privacy protection. The proposed algorithm uses the Paillier encryption system to support data protection, query protection, and access pattern protection. To reduce the operation cost of a checking protocol (SRO) for overlapping regions in the existing algorithm, the efficiency of the SRO protocol is improved through a garbled circuit. The proposed parallel range query processing algorithm is largely composed of two steps. It consists of a parallel kd-tree search step that searches the kd-tree in parallel and safely extracts the data of the leaf node including the query, and a parallel data search step through multiple threads for retrieving the data included in the query area. On the other hand, the proposed algorithm provides high query processing performance through parallelization of secure protocols and index search. We show that the performance of the proposed parallel range query processing algorithm increases in proportion to the number of threads and the proposed algorithm shows performance improvement by about 5 times compared with the existing algorithm.

Utilizing the Application of High-Intensity Yttrium Aluminum Garnet (YAG) Lasers Focused on Acupoint Irradiation (경혈 조사를 중심으로 본 고출력 Yttrium Aluminum Garnet (YAG) 레이저의 활용)

  • Maeum Lee;Yoomin Choi;Subin Ahn;Gihyang Lee;Eunhee Lee;Myungjin Yim;Hyung-Sik Seo;Eui-hyoung Hwang;Insoo Jang
    • Korean Journal of Acupuncture
    • /
    • v.40 no.4
    • /
    • pp.141-148
    • /
    • 2023
  • Objectives : The purpose of this study is to investigate on the application of the yttrium aluminum garnet (YAG) lasers for acupoints irradiation. Methods : We conducted a systematic search for peer-reviewed studies published from inception to November 2023, in the following electronic databases: PubMed, Scopus, and Web of Science in English, Science ON, Oriental Medicine Advanced Searching Integrated System (OASIS) and Research Information Sharing Service (RISS) in Korean, and China National Knowledge Infrastructure (CNKI) and Wanfang in Chinese, and Japan Science Technology Information Aggregator, Electronic (J-STAGE) and Citation Information by NII (CiNii) in Japanese. Inclusion criteria were original articles including clinical and experimental studies related with YAG lasers for acupoints including Ashi or meridian sinews. Results : Among the 8 selected studies, there were 7 studies on human subjects and 1 study on animals, 7 studies on Nd:YAG (1,064 nm) laser, and 1 study on Er:YAG (2,940 nm) laser. A total of 16 acupoints were used, 15 of which were in the face and 1 of which was located in the foot. In addition, there were two studies using Ashi. 4 studies looked at the effect of pain relief, 2 studies looked at safety, 1 study looked at changes in blood flow, and 1 study looked at the effect of skin care. There were no reported adverse events, and the YAG laser was confirmed to be safe and effective in pain relief, beautifying the skin, and increasing blood flow. Conclusions : We suggest that high intensity YAG lasers can be applied to laser acupuncture or laser moxibustion. YAG lasers are considered to be worth using for various clinical indications of Korean medicine because of photobiomodulation effects, analgesic action, and deep penetration depth. Further scientific research and clinical evidences should be warranted.

VLSI Design for Motion Estimation Based on Bit-plane Matching (비트 플레인 정합에 의한 움직임 추정기의 VLSI 설계)

  • Go, Yeong-Gi;O, Hyeong-Cheol;Go, Seong-Je
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.509-517
    • /
    • 2001
  • Full-search algorithm requires large amount of computation which causes time delay or very complex hardware architecture for real time implementation. In this paper, we propose a fast motion estimator based on bit-plane matching, which reduce the computational complexity and the hardware cost. In the proposed motion estimator, the conventional motion estimation algorithms are applied to the binary images directly extracted from the video sequence. Furthermore, in the proposed VLSI motion estimator, we employ a Pair of processing cores that calculate the motion vector continuously By controlling the data flow in a systolic fashion using the internal shift registers in the processing cores, we avoid using SRAM (local memory) so that we remove the time overhead for accessing the local memory and adopt lower-cost fabrication technology. We modeled and tested the proposed motion estimator in VHDL, and then synthesized the whole system which has been integrated in a 0.6-$\mu$m triple-metal CMOS chip of size 8.15 X 10.84$\textrm{mm}^2$.

  • PDF

Meta Analysis of Symptom Improvement through Eradication of Helicobacter pylori in Patients with Non-ulcer Dyspepsia (비궤양성 소화불량에서 Helicobacter pylori 박멸치료후 증상개선에 대한 메타분석)

  • Ohm, Sang-Hwa;Jeong, Ki-Won;Shin, Won-Chang;Cho, Jong-Rae;Shon, Hye-Suk;Pae, Ki-Taek;Kim, Sung-Jun
    • Journal of Preventive Medicine and Public Health
    • /
    • v.32 no.4
    • /
    • pp.427-434
    • /
    • 1999
  • Objectives: This study was conducted to determine, by reviewing the literature, whether treatment of Helicobacter pylori infection in patients with non-ulcer dyspepsia affects symptoms. Methods: We retrieved the literature using MEDLINE search, with nonulcer dyspepsia and Hericobacter pylori and treatment as key words, which were reported from 1984 to 1998, and manual literature search. The criteria for inclusion was as follows; 1) The paper should have confirmed nonulcer dyspepsia as case definition. 2) The paper should have peformed a randomized, blind trial. 3) Confirmation of Helicobacter pylori eradication should be done 4 weeks after treatment. 4) studies with no information on measurement of symptoms after treatment were not accepted. The percentage of patients with symptom improvement after eradication therapy for Helicobacter pylori infection was calculated. Cumulative odds ratio was compared by fixed effect model and random effect model as sensitivity and funnel plot was used to evaluate publication bias. Results: The overall effect size of symptom improvement was calculated by cumulative odds ratio. Cumulative odds ratio of random effect model was 4.16(95% CI: 1.55-11.19). Before integrating each effect sizes into common effect size, the homogeneity test was conducted and random effect model was selected(Cochran's Q=41.08 (d.f=10, p<0.001)). The heterogeneity across studies was evaluated and the different methodological aspects of studies led to differences between study results Conclusions: The results suggest that the eradication of Helicobacter pylori in patients with non-ulcer dyspepsia results more symptom improvement. In studios that shows the opposite results there are methodological aspects explaining the heterogeneity.

  • PDF

Access to and Utilization of the Open Source Data-related to Adolescent Health (청소년 건강관련 공개자료 접근 및 활용에 관한 고찰)

  • Lee, Jae-Eun;Sung, Jung-Hye;Lee, Won-Jae;Moon, In-Ok
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.11 no.1
    • /
    • pp.67-78
    • /
    • 2010
  • Background & Objectives: Current trend is that funding agencies require investigators to share their data with others. However, there is limited guidance how to access and utilize the shared data. We sought to determine what common data sharing practices in U.S.A. are, what data-related to adolescent health are freely available, and how we deal with the large dataset adopting the complex study design. Methods: The study included only research data-related to adolescent health which was collected in USA and unlimitedly accessible through the internet. Only the raw data, not aggregated, was considered for the study. Major keywords for web search were "adolescent", "children", "health", and "school". Results: Current approaches for public health data sharing lacked of common standards and varied largely due to the data's complex nature, large size, local expertise and internal procedures. Some common data sharing practices are unlimited access, formal screened access, restricted access, and informal exclusive access. The Inter-University Consortium for Political and Social Research and the Center for Disease Control and Prevention were the best data depository. "Data on the net" was search engine for the website providing data freely available. Six datasets related to adolescent health freely available were identified. The importance and methods of incorporating complex research design into analysis was discussed. Conclusion: There have been various attempts to standardize process for open access and open data using the information technology concept. However, it may not be easy for researchers to adapt themselves to this high technology. Therefore, guidance provided by this study may help researchers enhance the accessibility to and the utilization of the open source data.

  • PDF

A Fusion System of WS-BPEL and OWL-S for Semi-Automatic Composition of Web Services (반자동 웹 서비스 조합을 위한 WS-BPEL과 OWL-S의 융합 시스템)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.15D no.4
    • /
    • pp.569-580
    • /
    • 2008
  • Web services are the current most promising technology for service oriented architecture(SOA) implementations. However, in spite of the large scale acceptance of web services, they have been relegated to internal integration projects, and the grand vision of virtual enterprises where partners can be integrated on demand is yet to be realized. The main reason is that the current standards of web services are not very suitable for the dynamic web service discovery and integration. In this paper, we present a novel SemanticBPEL solution that merges the benefit of WS-BPEL, with the advantage of OWL-S for building a semi-automatic web service composition system. In particular, this work proposes a multi-phase search method for solving dynamic discovery and integration problems of web services. The proposed method is compared with the existing keyword based retrieval method. These comparisons show that our approach outperforms the existing method.