• Title/Summary/Keyword: Data de-identification

Search Result 116, Processing Time 0.027 seconds

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

IDENTIFICATION OF FALSIFIED DRUGS USING NEAR-INFRARED SPECTROSCOPY

  • Scafi, Sergio H.F.;Pasquini, Celio
    • Proceedings of the Korean Society of Near Infrared Spectroscopy Conference
    • /
    • 2001.06a
    • /
    • pp.3112-3112
    • /
    • 2001
  • Near-Infrared Spectroscopy (NIRS) was investigated aiming at the identification of falsified drugs. The identification is based on comparison of the NIR spectrum of a sample with a typical spectra of an authentic drug using multivariate modelling and classification algorithms (PCA/SIMCA). Two spectrophotometers (Brimrose - Luminar 2000 and 2030), based on acoustic-optical filter (AOTF) technology, sharing the same controlling computer, software (Brimrose - Snap 2.03) and the data acquisition electronics, were employed. The Luminar 2000 scans the range 850 1800 nm and was employed for transmitance/absorbance measurements of liquids with a transflectance optical bundle probe with total optical path of 5 mm and a circular area of 0.5 $\textrm{cm}^2$. Model 2030 scans the rage 1100 2400 nm and was employed for reflectance measurement of solids drugs. 300 spectra, acquired in about 20 s, were averaged for each sample. Chemometric treatment of the spectral data, modelling and classification were performed by using the Unscrambler 7.5 software (CAMO Norway). This package provides the Principal Component Analysis (PCA) and SIMCA algorithms, used for modelling and classification, respectively. Initially, NIRS was evaluated for spectrum acquisition of various drugs, selected in order to accomplish the diversity of physico-chemical characteristics found among commercial products. Parameters which could affect the spectra of a given drug (especially if presented as solid tablets) were investigated and the results showed that the first derivative can minimize spectral changes associated with tablet geometry, physical differences in their faces and position in relation to the probe beam. The effect of ambient humidity and temperature were also investigated. The first factor needs to be controlled for model construction because the ambient humidity can cause spectral alterations that should cause the wrong classification of a real drug if the factor is not considered by the model.

  • PDF

Modal flexibility based damage detection for suspension bridge hangers: A numerical and experimental investigation

  • Meng, Fanhao;Yu, Jingjun;Alaluf, David;Mokrani, Bilal;Preumont, Andre
    • Smart Structures and Systems
    • /
    • v.23 no.1
    • /
    • pp.15-29
    • /
    • 2019
  • This paper addresses the problem of damage detection in suspension bridge hangers, with an emphasis on the modal flexibility method. It aims at evaluating the capability and the accuracy of the modal flexibility method to detect and locate single and multiple damages in suspension bridge hangers, with different level of severity and various locations. The study is conducted numerically and experimentally on a laboratory suspension bridge mock-up. First, the covariance-driven stochastic subspace identification is used to extract the modal parameters of the bridge from experimental data, using only output measurements data from ambient vibration. Then, the method is demonstrated for several damage scenarios and compared against other classical methods, such as: Coordinate Modal Assurance Criterion (COMAC), Enhanced Coordinate Modal Assurance Criterion (ECOMAC), Mode Shape Curvature (MSC) and Modal Strain Energy (MSE). The paper demonstrates the relative merits and shortcomings of these methods which play a significant role in the damage detection ofsuspension bridges.

Fintech Industry Invigoration by the De-identification and Linkage Reform of Personal Information (개인정보 비식별 조치와 결합 개선을 통한 핀테크 시장 활성화)

  • Oh, Won-Gyeom;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.340-343
    • /
    • 2016
  • The Korean government published the personal information de-identification guideline on June 2016, which were made by related government ministries. The guideline's objective is that the invigoration of Korean bigdata industry on personal information protection under the current laws. However, if there is some unreasonable method or process in the guideline, it can be an obstacle to bigdata analysis. This article will review the guideline to find defects in methods and processes of de-identification evaluation, de-identification support and data-linkage and then propose the best solutions to improve them. Lastly, this article will mention how these solutions can invigorate Fintech industry.

  • PDF

A Health Management Service with Beacon-Based Identification for Preventive Elderly Care

  • Li, Jian-Wei;Chang, Yi-Chun;Xu, Min-Xiong;Huang, De-Yao
    • Journal of Information Processing Systems
    • /
    • v.16 no.3
    • /
    • pp.648-662
    • /
    • 2020
  • Bluetooth low energy (BLE) beacon is an actively push-to-broadcast electronic signal and can be used for object identification. This paper uses such beacon-based identification and Internet of Things (IoT) technologies for the elder health management service system to simplify the user interfaces and steps for preventive elder care. In the proposed system, an elder's family member, caregiver, or medical worker can conveniently and quickly record daily health management information. Besides, through the statistics and analysis of the data on the back end of the system, it is helpful for the elderly to refer to the data of daily care management and future management trends. Similarly, it is also an essential reference data for system maintenance and the new preventive health care services development.

Damage localization and quantification in beams from slope discontinuities in static deflections

  • Ma, Qiaoyu;Solis, Mario
    • Smart Structures and Systems
    • /
    • v.22 no.3
    • /
    • pp.291-302
    • /
    • 2018
  • This paper presents a flexibility based method for damage identification from static measurements in beam-type structures. The response of the beam at the Damaged State is decomposed into the response at the Reference State plus the response at an Incremental State, which represents the effect of damage. The damage is localized by detecting slope discontinuities in the deflection of the structure at the Incremental State. A denoising filtering technique is applied to reduce the effect of experimental noise. The extent of the damage is estimated through comparing the experimental flexural stiffness of the damaged cross-sections with the corresponding values provided by analytical models of cracked beams. The paper illustrates the method by showing a numerical example with two cracks and an experimental case study of a simply supported steel beam with one artificially introduced notch type crack at three damage levels. A Digital Image Correlation system was used to accurately measure the deflections of the beam at a dense measurement grid under a set of point loads. The results indicate that the method can successfully detect and quantify a small damage from the experimental data.

Suggestion of Elementary School Information Security Education Elements Based on Pipe Game to Understand the Principle of Data De-Identification (데이터 비식별화 원리의 이해를 위한 파이프 게임 기반 초등 정보보호 교육 요소 제언)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1063-1070
    • /
    • 2021
  • The development of IT technology emphasizes the importance of training IT professionals, and the need for education for elementary and secondary education as well as adult education for training technical talent is expanding. In particular, information curriculum will be added as an essential course from the 2015 revised curriculum, and IT technology will be understood in the curriculum for elementary and secondary schools and will be required to develop applicability to solve problems based on understanding. Currently, research is under way to integrate IT technologies to provide new services, and if the use of personal information is required in the process, thorough security for the leakage of personal information is pre-empted. It also prevents the identification of personal information in the process of transmitting data to the outside world. In this paper, we propose a training method for elementary school subjects to understand the non-identification process that occurs in the process of transferring data using pipe games so that they can understand the principles of non-identification and develop applications to solve real-life problems.

High-throughput identification of chrysanthemum gene function and expression: An overview and an effective proposition

  • Nguyen, Toan Khac;Lim, Jin Hee
    • Journal of Plant Biotechnology
    • /
    • v.48 no.3
    • /
    • pp.139-147
    • /
    • 2021
  • Since whole-genome duplication (WGD) of diploid Chrysanthemum nankingense and de novo assembly whole-genome of C. seticuspe have been obtained, they have afforded to perceive the diversity evolution and gene discovery in the improved investigation of chrysanthemum breeding. The robust tools of high-throughput identification and analysis of gene function and expression produce their vast importance in chrysanthemum genomics. However, the gigantic genome size and heterozygosity are also mentioned as the major obstacles preventing the chrysanthemum breeding practices and functional genomics analysis. Nonetheless, some of technological contemporaries provide scientific efficient and promising solutions to diminish the drawbacks and investigate the high proficient methods for generous phenotyping data obtaining and system progress in future perspectives. This review provides valuable strategies for a broad overview about the high-throughput identification, and molecular analysis of gene function and expression in chrysanthemum. We also contribute the efficient proposition about specific protocols for considering chrysanthemum genes. In further perspective, the proper high-throughput identification will continue to advance rapidly and advertise the next generation in chrysanthemum breeding.

Debaryomyces hansenii Strains from Valle De Los Pedroches Iberian Dry Meat Products: Isolation, Identification, Characterization, and Selection for Starter Cultures

  • Ramos, Jose;Melero, Yessica;Ramos-Moreno, Laura;Michan, Carmen;Cabezas, Lourdes
    • Journal of Microbiology and Biotechnology
    • /
    • v.27 no.9
    • /
    • pp.1576-1585
    • /
    • 2017
  • Yeasts, filamentous fungi, and bacteria colonize the surface of fermented sausages during the ripening process. The source of this microbiota is their surrounding environment, and is influenced by the maturing conditions and starter cultures. Debaryomyces hansenii was previously isolated from several dry-cured meat products and associated with the lipolytic and proteolytic changes that occur in these products, influencing their taste and flavor. Therefore, this study isolated the yeast microbiota present in the casing from different meat products ("lomo," "chorizo," and "$salchich{\acute{o}}n$") from the Valle de los Pedroches region in southern Spain. D. hansenii was by far the most abundant species in each product, as all 22 selected isolates were identified as D. hansenii by biochemical and/or molecular methods. In contrast, no yeasts were found in the meat batter. These data constitute the first study of the yeasts present in "lomo" sausages and particularly the highly appreciated Valle de los Pedroches "lomo" sausages. Furthermore, the resistance of these isolates to different pHs, temperatures, and saline stress was studied, together with their catabolic characteristics. Based on the results, certain isolates are proposed as valuable candidate starter cultures that could improve both the manufacture and the flavor of such dry-cured meat products, and provide an understanding of new mechanisms involved in stress tolerance. Applied medium-scale industrial tests are currently in progress.

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.