• Title/Summary/Keyword: re-identification

Search Result 282, Processing Time 0.027 seconds

Efficient Time Domain Aeroelastic Analysis Using System Identification

  • Kwon, Hyuk-Jun;Kim, Jong-Yun;Lee, In;Kim, Dong-Hyun
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.6 no.1
    • /
    • pp.52-60
    • /
    • 2005
  • The CFD coupled aeroelastic analyses have significant advantages over linear panel methods in their accuracy and usefulness for the simulation of actual aeroelastic motion after specific initial disturbance. However, in spite of their advantages, a heavy computation time is required. In this paper, a method is discussed to save a computational cost in the time domain aeroelastic analysis based on the system identification technique. The coefficients of system identification model are fit to the computed time response obtained from a previously developed aeroelastic analysis code. Because the non-dimensionalized data is only used to construct the model structure, the resulting model of the unsteady CFD solution is independent of dynamic pressure and this independency makes it possible to find the flutter dynamic pressure without the unsteady aerodynamic computation. To confirm the accuracy of the system identification methodology, the system model responses are compared with those of the CFD coupled aeroelastic analysis at the same dynamic pressure.

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Nonlinear Dynamic Analysis of Cantilever Tube Conveying Fluid with System Identification

  • Lim, Jae-Hoon;Jung, Goo-Choong;Park, Yeon-Sun
    • Journal of Mechanical Science and Technology
    • /
    • v.17 no.12
    • /
    • pp.1994-2003
    • /
    • 2003
  • The vibration of a flexible cantilever tube with nonlinear constraints when it is subjected to flow internally with fluids is examined by experimental and theoretical analysis. These kinds of studies have been performed to find the existence of chaotic motion. In this paper, the important parameters of the system leading to such a chaotic motion such as Young's modulus and the coefficient of viscoelastic damping are discussed. The parameters are investigated by means of system identification so that comparisons are made between numerical analysis using the design parameters and the experimental results. The chaotic region led by several period-doubling bifurcations beyond the Hopf bifurcation is also re-established with phase portraits, bifurcation diagram and Lyapunov exponent so that one can define optimal parameters for system design.

Identification of reinforced concrete beam-like structures subjected to distributed damage from experimental static measurements

  • Lakshmanan, N.;Raghuprasad, B.K.;Muthumani, K.;Gopalakrishnan, N.;Basu, D.
    • Computers and Concrete
    • /
    • v.5 no.1
    • /
    • pp.37-60
    • /
    • 2008
  • Structural health monitoring of existing infrastructure is currently an important field of research, where elaborate experimental programs and advanced analytical methods are used in identifying the current state of health of critical and important structures. The paper outlines two methods of system identification of beam-like reinforced concrete structures representing bridges, through static measurements, in a distributed damage scenario. The first one is similar to the stiffness method, re-cast and the second one to flexibility method. A least square error (LSE) based solution method is used for the estimation of flexural rigidities and damages of simply supported, cantilever and propped cantilever beam from the measured deformation values. The performance of both methods in the presence of measurement errors is demonstrated. An experiment on an un-symmetrically damaged simply supported reinforced concrete beam is used to validate the developed method. A method for damage prognosis is demonstrated using a generalized, indeterminate, propped cantilever beam.

Understanding of the Sameum-Samyang in "Dong-uisusebowon(東醫壽世保元)" ("동의수세보원(東醫壽世保元)"의 삼음삼양(三陰三陽) 인식(認識))

  • Jang, Woo-Chang
    • Journal of Korean Medical classics
    • /
    • v.23 no.1
    • /
    • pp.303-316
    • /
    • 2010
  • Ijema's four constitution theory is the result of creative succession which is originated from the "Hwangjenaegyeong(黃帝內經)", and shaped up as "Sanghanron(傷寒論)", the key of Ijema's theory would be the re-explnation of the Sameum-Samyang pattern identification. therefore, we should recognize that the four constitution theory is related to the Sameum-Samyang identification of "Sanghanron(傷寒論)". And is even on the mutual supporting relation. from this point of view, the "Dong-uisusebowon(東醫壽世保元)" could be valuated as a commentary of "Sanghanron(傷寒論)" which shows us that how to review the Sameum-Samyang identification as the point of characteristic of four constitution theory.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Self Re-Encryption Protocol (SREP) providing Strong Privacy for Low-Cost RFID System (저가형 RFID 시스템에 강한 프라이버시를 제공하는 자체 재암호화 프로토콜)

  • Park Jeong-Su;Choi Eun-Young;Lee Su-Mi;Lee Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.3-12
    • /
    • 2006
  • RFID (Radio Frequency Identification) system is expected to play a critical role providing widespread services in the ubiquitous period. However, widespread use of RFID tags may create new threats to the privacy of individuals such as information leakage and traceability. It is difficult to solve the privacy problems because a tag has the limited computing power that is not the adequate resource to support the general encryption. Although the scheme of [2] protects the consumer privacy using an external agent, a tag should compute exponential operation needed high cost. We propose Self Re-Encryption Protocol (SREP) which provides song privacy without assisting of any external agent. Our SREP is well suitable to low-cost RFID system since it only needs multiplication and exclusive-or operation.

Implementation of persistent identification of topological entities based on macro-parametrics approach

  • Farjana, Shahjadi Hisan;Han, Soonhung;Mun, Duhwan
    • Journal of Computational Design and Engineering
    • /
    • v.3 no.2
    • /
    • pp.161-177
    • /
    • 2016
  • In history based parametric CAD modeling systems, persistent identification of the topological entities after design modification is mandatory to keep the design intent by recording model creation history and modification history. Persistent identification of geometric and topological entities is necessary in the product design phase as well as in the re-evaluation stage. For the identification, entities should be named first according to the methodology which will be applicable for all the entities unconditionally. After successive feature operations on a part body, topology based persistent identification mechanism generates ambiguity problem that usually stems from topology splitting and topology merging. Solving the ambiguity problem needs a complex method which is a combination of topology and geometry. Topology is used to assign the basic name to the entities. And geometry is used for the ambiguity solving between the entities. In the macro parametrics approach of iCAD lab of KAIST a topology based persistent identification mechanism is applied which will solve the ambiguity problem arising from topology splitting and also in case of topology merging. Here, a method is proposed where no geometry comparison is necessary for topology merging. The present research is focused on the enhancement of the persistent identification schema for the support of ambiguity problem especially of topology splitting problem and topology merging problem. It also focused on basic naming of pattern features.

De-identification Techniques for Big Data and Issues (빅데이타 비식별화 기술과 이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.750-753
    • /
    • 2017
  • Recently, the processing and utilization of big data, which is generated by the spread of smartphone, SNS, and the internet of things, is emerging as a new growth engine of ICT field. However, in order to utilize such big data, De-identification of personal information should be done. De-identification removes identifying information from a data set so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or publishing information, thus it attempts to balance the contradictory goals of using and sharing personal information while protecting privacy. De-identified information has also been re-identified and has been controversial for the protection of personal information, but the number of instances where personal information such as big data is de-identified and processed is increasing. In addition, many de-identification guidelines have been introduced and a method for de-identification of personal information has been proposed. Therefore, in this study, we describe the big data de-identification process and follow-up management, and then compare and analyze de-identification methods. Finally we provide personal information protection issues and solutions.

  • PDF

A Tool for Analyzing Performance Requirements of Automatic Vehicle Identification (AVI) Techniques Based on Paramics (효과적인 교통정보 수집체계 구축을 위한 Paramics 기반의 AVI 성능 요구사항 분석 기법)

  • Oh, Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.23 no.8 s.86
    • /
    • pp.147-152
    • /
    • 2005
  • This study firstly developed a tool for evaluating performance requirements of automatic vehicle identification (AVI) techniques. A microscopic traffic simulator, Paramics, was employed to investigate the effects of AVI performances on the accuracy of estimating section travel times. Mote Carlo simulation approach was incorporated into Paramics to conduct systematic evaluations of identifying required AVI performances. The proposed method in this study can serve as a logical and necessary precursor to field implementation of a variety of AVI techniques toward achieving more reliable traffic information.