• Title/Summary/Keyword: people re-identification

Search Result 14, Processing Time 0.024 seconds

People Re-identification: A Multidisciplinary Challenge (사람 재식별: 학제간 연구 과제)

  • Cheng, Dong-Seon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.135-139
    • /
    • 2012
  • The wide diffusion of internet and the overall increased reliance on technology for information communication, dissemination and gathering have created an unparalleled mass of data. Sifting through this data is defining and will define in the foreseeable future a big part of contemporary computer science. Within this data, a growing proportion is given by personal information, which represents a unique opportunity to study human activities extensively and live. One important recurring challenge in many disciplines is the problem of people re-identification. In its broadest definition, re-identification is the problem of newly recognizing previously identified people, such as following an unknown person while he walks through many different surveillance cameras in different locations. Our goals is to review how several diverse disciplines define and meet this challenge, from person re-identification in video-surveillance to authorship attribution in text samples to distinguishing users based on their preferences of pictures. We further envision a situation where multidisciplinary solutions might be beneficial.

Deep Neural Networks Learning based on Multiple Loss Functions for Both Person and Vehicles Re-Identification (사람과 자동차 재인식이 가능한 다중 손실함수 기반 심층 신경망 학습)

  • Kim, Kyeong Tae;Choi, Jae Young
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.8
    • /
    • pp.891-902
    • /
    • 2020
  • The Re-Identification(Re-ID) is one of the most popular researches in the field of computer vision due to a variety of applications. To achieve a high-level re-identification performance, recently other methods have developed the deep learning based networks that are specialized for only person or vehicle. However, most of the current methods are difficult to be used in real-world applications that require re-identification of both person and vehicle at the same time. To overcome this limitation, this paper proposes a deep neural network learning method that combines triplet and softmax loss to improve performance and re-identify people and vehicles simultaneously. It's possible to learn the detailed difference between the identities(IDs) by combining the softmax loss with the triplet loss. In addition, weights are devised to avoid bias in one-side loss when combining. We used Market-1501 and DukeMTMC-reID datasets, which are frequently used to evaluate person re-identification experiments. Moreover, the vehicle re-identification experiment was evaluated by using VeRi-776 and VehicleID datasets. Since the proposed method does not designed for a neural network specialized for a specific object, it can re-identify simultaneously both person and vehicle. To demonstrate this, an experiment was performed by using a person and vehicle re-identification dataset together.

The Development of the Retirement Coaching Model(RE-TIRE) for Effective Retirement Planning (효과적인 은퇴설계를 위한 은퇴코칭모델(RE-TIRE) 개발 연구)

  • Choe, Hyuncha;Cho, Hyejin;Kim, Minjung;Lee, Ji Young;Jang, Younju;Suh, Woo-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.459-470
    • /
    • 2015
  • In this study, we have developed a retirement coaching model for effective retirement planning by applying systematic conversation of the coaching technique. A draft of the retirement coaching model was complemented by the validity verification of experts. The retirement coaching model can be summarized as follows. The first step, rapport and empowerment(RE), consists of sharing the image of a happy retirement after establishing a rapport between the coach and the people wanting to prepare for retirement. The second step, target establishment(T), consists of setting the theme and goals of the conversation. The third step, identification(I), consists of developing a retirement plan for achieving the established goals. The fourth step, realization(R), consists of establishing a concrete schedule and a method of retirement planning. The fifth step, evaluation(E), consists of sharing impressions during coaching sessions, which facilitates future action plans.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Neuroscience and the Social Powers of Narrative: How Stories Configure Our Brains

  • Armstrong, Paul B.
    • Journal of English Language & Literature
    • /
    • v.64 no.1
    • /
    • pp.3-24
    • /
    • 2018
  • Stories are important instruments for configuring our cognitive and social worlds, but they do not necessarily make us more caring or less aggressive and self-involved. The ability to tell and follow a story requires cognitive capacities that are basic to the neurobiology of mental functioning, and so it would stand to reason that our experiences with stories would draw on and re-shape patterns of interaction that extend beyond the immediate experience of reading or listening to a narrative. Our intuitive, bodily-based ability to understand the actions of other people is fundamental to social relations, including the circuit between the representation of a configured action emplotted in a narrative and the reader's or listener's activity of following the story as we assimilate its patterns into the figures that shape our worlds. The activity of following a narrative can have a variety of beneficial or potentially noxious social consequences, either promoting the shared intentionality that neurobiologically oriented cultural anthropologists identify as a unique human capacity supporting culturally productive collaboration, or habitualizing and thereby naturalizing particular patterns of perception into rigid ideological constructs. The doubling of "me" and "not-me" in narrative acts of identification may promote the "we-intentionality" that makes socially beneficial cooperation possible, or it can set off mimetic conflict and various contagion effects. Neuroscience cannot predict what the social consequences of narrative will be, but it can identify the brain- and body-based processes through which (for better or worse) stories exercise social power.

Layer-wise Feature Extraction Capacity using Pre-trained CNN (사전학습된 CNN의 계층별 특징추출능력연구)

  • Lee, Jaehwan;Yoon, Sook;Park, Dong Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2016.05a
    • /
    • pp.435-436
    • /
    • 2016
  • 최근 객체인식 분야에서는 Convolutional Neural Network (CNN)이 주목받고 있다. CNN의 특징 중 하나는 입력이미지로 부터 특징 추출 방법을 스스로 학습한다는 것이다. 전통적은 객체인식 방법에서는 hand-written feature extractor를 사용하지만, CNN은 스스로가 특징을 추출한다. 하지만 CNN은 많은 학습데이터와 학습 시간을 필요로 한다. 우리는 객체인식 데이터로 사전학습된 CNN을 사용하여 특징을 추출하였고, 이 특징으로 People re-identification을 수행하였다. 이 과정에서 어떠한 학습도 하지 않았지만 CNN은 다른 영상처리 응용에 대해서도 비교적 좋은 성능을 보여주었다.

  • PDF

Encryption scheme suitable to RFID Systems based on EPC Generation2 (Gen2 기반 RFID 시스템에 적합한 암호 기법 설계)

  • Won, Tae-Youn;Kim, Il-Jung;Choi, Eun-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.67-75
    • /
    • 2008
  • RFID(Radio Frequency Identification) system is an automated identification system that consists of tags and readers. They communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to substitute a bar-code system. But RFID system creates new threats to the security and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve privacy problems against attacks, but it is difficult to apply to RFID system based on low-cost Gen2. Therefore, We will propose a new encryption scheme using matrix based on Gen2 in RFID system in paper, and We will analyze our encryption scheme in view of the security and efficiency through a simulation and investigate application environments to use our encryption scheme.

Deep Learning based Distress Awareness System for Small Boat (딥러닝 기반 소형선박 승선자 조난 인지 시스템)

  • Chon, Haemyung;Noh, Jackyou
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.5
    • /
    • pp.281-288
    • /
    • 2022
  • According to statistics conducted by the Korea Coast Guard, the number of accidents on small boats under 5 tons is increasing every year. This is because only a small number of people are on board. The previously developed maritime distress and safety systems are not well distributed because passengers must be equipped with additional remote equipment. The purpose of this study is to develop a distress awareness system that recognizes man over-board situations in real time. This study aims to present the part of the passenger tracking system among the small ship's distress awareness situational system that can generate passenger's location information in real time using deep learning based object detection and tracking technologies. The system consisted of the following steps. 1) the passenger location information is generated in the form of Bounding box using its detection model (YOLOv3). 2) Based on the Bounding box data, Deep SORT predicts the Bounding box's position in the next frame of the image with Kalman filter. 3) When the actual Bounding Box is created within the range predicted by Kalman-filter, Deep SORT repeats the process of recognizing it as the same object. 4) If the Bounding box deviates the ship's area or an error occurs in the number of tracking occupant, the system is decided the distress situation and issues an alert. This study is expected to complement the problems of existing technologies and ensure the safety of individuals aboard small boats.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Strengthening Families: The Re-structuring of Family Services in Hong Kong

  • Leung, Joe C.B.
    • 한국사회복지학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.3-19
    • /
    • 2002
  • The problems and needs of families in Hong Kong are becoming more complex. Traditional family structures and functions are rapidly eroding. Moreover, family problems are further exacerbated by a growing number of socio-economic issues including rising divorce rates and extra-marital affairs. continuous family reunion migration from Mainland China, emotional and financial cost of caring for the older people and the changing economy which has pushed more families into hardship. In effect, more and more families are becoming vulnerable to risk. Traditional family services in Hong Kong are varied in mode, operation and provision, often overlapping in service boundaries with other family-oriented programs. In many instances, family service centers are stretched far beyond their capacity. As a consequence, they become too reactive, remedial and casework dominated. The University of Hong Kong Consultant Team recommended that family service programs have to protect vulnerable families and strengthen family capacities to promote maximum independence. The direction of family services is summarized as: strengthening families; child-centered, family-focused and community-based. New integrative family service centers aim at attaining the principles of promoting accessibility to users with minimum physical, psychological and administrative barriers; early identification of needs and intervention before the further deterioration of problems; integration of services cutting across program boundaries, and partnership between service providers to achieve efficient and effective use of scarce resources. Under the new model, multi-skilled teams can respond more proactively to a wide range of social needs, rather than addressing needs in isolation. To demonstrate the effectiveness of the new model, the consultant team has been commissioned by the government to evaluate the performance of these two-year pilot projects. More importantly, a coherent and family-friendly social policy should be formulated to strengthen family capacity against family-related problems.

  • PDF