• Title/Summary/Keyword: people recognition

Search Result 1,356, Processing Time 0.031 seconds

Analysis of Acne Awarness and way to acne care of Chinese People on 20s and 30s with Acne Skin (20-30대 중국인의 여드름 인식 및 여드름 관리 방법 분석)

  • Lee, Jung-Hee;Moon, So-hee
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.5
    • /
    • pp.1441-1453
    • /
    • 2020
  • The purpose of this study was to compare acne recognition and management methods for those in their 20s and 30s who live in China and have acne. A total of 600 questionnaires were distributed and 533 copies were used for final analysis, excluding 27 of the 560 collected questionnaires. As a result of the study, the difference in perception of the cause of acne, management perception, and exacerbation factor of Chinese people according to age showed'management perception' t=3.380, and deteriorating factor recognition' t=2.314, indicating that there was a difference in perception of acne according to age. It was found that the recognition degree of acne is higher in the 20s than in the 30s. Through this study, by comparing and analyzing the perceptions and management methods of acne according to the age of Chinese people, the changes in acne management perception and behavior according to the change of the times were identified, and the difference between Korean and Chinese perceptions of acne, and later acne skin It is believed that it can be provided as a basic data for finding an effective management method.

Experiment on the Perception of Fire Alarm Sound of Small Construction Site Workers (소규모 건설공사현장 작업자의 화재경보음 인지 실험)

  • Pil-Jae Moon;Seo-Young Kim;Ha-Sung Kong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.153-160
    • /
    • 2023
  • This research experiments on the workers' recognition of the fire alarm sound for sirens and portable loudspeakers in a small construction site. As a result of analyzing the siren alarm sound recognition from measuring on the 1st, 2nd, and 4th floors, the sound was more unrecognizable on the 4th floor than on the 1st, and 1 person on the 1st floor was unable to recognize all sounds. In the case of the 2nd floor, one person could not notice the alarm in the last 3rd trial, and another did not realize it all three times. For the 4th floor, 3 people demonstrated unrecognition in all 3 tests. As a result of analyzing the recognition of portable loudspeaker alarm sounds, 1 person could not recognize all sounds on the first floor. In the case of the 2nd floor, 2 people were confirmed to be unable to notice, and lastly, 4 people could not recognize all trials on the 4th floor. The subjects who didn't recognize the sound were unable to distinguish between portable loudspeaker alarm sound and work noise due to the workspace and obstacles.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Optimize the Acoustic Environment Using a Sound Masking Effects of the Audio Signal Compression Principle (음성신호의 압축원리를 이용한 사운드 마스킹 효과로 음향 환경 최적화)

  • Ann, Sook-Hyang
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.28 no.11
    • /
    • pp.748-751
    • /
    • 2015
  • Sound Masking System technology as by sound the same on all bands and artificially generates a constant sound shield People want to hear or recognize the people with the noise generated from the interior of the way. Prevent hearing or prevent recognition by using the technology to control the audible frequency band Continue to emit constant and uniform shielding sound audible frequency band Even the security content of speech (20 Hz~20 KHz). That interception laser eavesdropping, internal solicitations, during recording Or delay the decoding was a result of the effect of interference calculated Experience noise disturbance index is applied around the Stress Index is the average index is 10.16 was a luxury for the average index is then applied to the index 3.07 Noise is significantly lower stress level has improved noise conditions.

Evaluation of CAPTCHA Efficiency

  • Youthasoontorn, Passzarkorn;Phaibulpanich, Akarin;Piromsopa, Krerk
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.3
    • /
    • pp.55-64
    • /
    • 2015
  • We propose statistical methods for evaluating the efficiency of CAPTCHA. Most people unfairly assumed that machines are not capable at reading precisely. This fact leads to the invention of CAPTCHA, a distorted word or short phase, which is designed to thwart computers and separate human from machines. However, advances in image recognition technologies mean that machines are constantly getting better at recognizing CAPTCHA. This forces CAPTCHA designers to design even more difficult CAPTCHAs to prevent their systems from being gamed by malicious bots. However, this arm race has an unintended side effect on the common users. Many CAPTCHAs are now so hard that many people are unable to read them. This obviously conflicts with the original purpose that CAPTCHA was invented in the first place. Our analysis shows that some CAPTCHAs are more users friendly. In particular, Yahoo-style CAPTCHA is the most friendliness. This suggests that a good CAPTCHA could be a simple text with some distortion that prevents machines from correctly segmenting characters.

Affective Computing Among Individuals in Deep Learning

  • Kim, Seong-Kyu (Steve)
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.115-124
    • /
    • 2020
  • This paper is a study of deep learning among artificial intelligence technology which has been developing many technologies recently. Especially, I am talking about emotional computing that has been mentioned a lot recently during deep learning. Emotional computing, in other words, is a passive concept that is dominated by people who scientifically analyze human sensibilities and reflect them in product development or system design, and a more active concept that studies how devices and systems understand humans and communicate with people in different modes. This emotional signal extraction, sensitivity, and psychology recognition technology is defined as a technology to process, analyze, and recognize psycho-sensitivity based on micro-small, hyper-sensor technology, and sensitive signals and information that can be sensed by the active movement of the autonomic nervous system caused by human emotional changes in everyday life. Chapter 1 talks about overview and Chapter 2 shows related research. Chapter 3 shows the problems and models of real emotional computing and Chapter 4 shows this paper as a conclusion.

Projected Local Binary Pattern based Two-Wheelers Detection using Adaboost Algorithm

  • Lee, Yeunghak;Kim, Taesun;Shim, Jaechang
    • Journal of Multimedia Information System
    • /
    • v.1 no.2
    • /
    • pp.119-126
    • /
    • 2014
  • We propose a bicycle detection system riding on people based on modified projected local binary pattern(PLBP) for vision based intelligent vehicles. Projection method has robustness for rotation invariant and reducing dimensionality for original image. The features of Local binary pattern(LBP) are fast to compute and simple to implement for object recognition and texture classification area. Moreover, We use uniform pattern to remove the noise. This paper suggests that modified LBP method and projection vector having different weighting values according to the local shape and area in the image. Also our system maintains the simplicity of evaluation of traditional formulation while being more discriminative. Our experimental results show that a bicycle and motorcycle riding on people detection system based on proposed PLBP features achieve higher detection accuracy rate than traditional features.

  • PDF

A New Team Forming Method in Engineering Design Course

  • Kim, Jongwan
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.243-248
    • /
    • 2017
  • In a basic engineering design class, first year engineering department students learn about engineering design relevant theories and carry out simple projects in teams. By doing a group project in this subject, students develop basic skills such as creativity, teamwork, communication, and problem solving. Before, class proceeded in a way where teams were randomly configured in the beginning of semester and students began working on their project immediately. However, this research introduces a new method where at the beginning of the semester, students are assigned group assignments. Teammates are randomly chosen and constantly switched so that students get a chance to work with different people and experience diverse styles and characteristics. Then, they autonomously form into teams with people they work best and carry out their project. We present the behavior of a monkey robot that recognizes emotions as a case of applying the proposed method. The feedback from the students suggest that this proposed team forming method serves to be effective especially since students who were not aware of other students' characteristics can get to know one another better and form a productive team.

Active assisted-living system using a robot in WSAN (WSAN에서 로봇을 활용한 능동 생활지원 시스템)

  • Kim, Hong-Seok;Yi, Soo-Yeong;Choi, Byoung-Wook
    • The Journal of Korea Robotics Society
    • /
    • v.4 no.3
    • /
    • pp.177-184
    • /
    • 2009
  • This paper presents an active assisted-living system in wireless sensor and actor network (WSAN) in which the mobile robot roles an actor. In order to provide assisted-living service to the elderly people, position recognition of the sensor node attached on the user and localization of the mobile robot should be performed at the same time. For the purpose, we use received signal strength indication (RSSI) to find the position of the person and ubiquitous sensor nodes including ultrasonic sensor which performs both transmission of sensor information and localization like global positioning system. Active services are moving to the elderly people by detecting activity sensor and visual tracking and voice chatting with remote monitoring system.

  • PDF

Injury Prevention, Disaster and Public Health Preparedness and Response (손상예방, 재난과 보건분야 준비와 대응)

  • Jeong, Ae-Suk
    • Health Policy and Management
    • /
    • v.28 no.3
    • /
    • pp.308-314
    • /
    • 2018
  • Injury is a serious problem that not only causes death but also significantly degrades the quality of life of the people and causes loss of socioeconomic opportunities and costs. Damage occurs as a result of an accident. Among them, natural disasters and artificial disasters take lives of many people in a short time and threaten their physical and mental health. The United States has responded to the disaster by establishing relevant laws and regulations and a response system with the recognition that health is recognised soon to be as national security in the wake of the 9/11 terrorist attacks and the Katrina disaster. It is necessary to build a knowledge infrastructure to train disaster response experts in public health area and to have health competence to cope with disasters.