• Title/Summary/Keyword: Facial Identity

Search Result 40, Processing Time 0.019 seconds

Real-time Tracking and Identification for Multi-Camera Surveillance System

  • Hong, Yo-Hoon;Song, Seung June;Rho, Jungkyu
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.1
    • /
    • pp.16-22
    • /
    • 2018
  • This paper presents a solution for personal profiling system based on user-oriented tracking. Here, we introduce a new way to identify and track humans by using two types of cameras: dome and face camera. Dome camera has a wide view angle so that it is suitable for tracking human movement in large area. However, it is difficult to identify a person only by using dome camera because it only sees the target from above. Thus, face camera is employed to obtain facial information for identifying a person. In addition, we also propose a new mechanism to locate human on targeted location by using grid-cell system. These result in a system which has the capability of maintaining human identity and tracking human activity (movement) effectively.

The Meaning of Hair Style in Modern Fashion Design -In aspects of gender and cultural/political standpoint- (현대 패션에서 헤어스타일 지니는 의미 -젠더와 문화정치적 관점을 중심으로 -)

  • 권기영
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.28 no.8
    • /
    • pp.1100-1111
    • /
    • 2004
  • The purpose of this study is to investigate the hair in aspects of gender and cultural/political ideology, and to confirm the meanings of hair style in modem fashion. There are three zones of social significance such as head hair, facial hair, and body hair, and each of theses zones has both gender and ideological significance. In aspects of gender, opposite sexes have opposite hair norms. And, in sociocultural standpoint, hair is a political symbol of the main protest movements in culture. The contemporary hair styles in fashion design mean that the 'paying' with gender identity, the reflection of changing sexuality, the non-politicism, the fragmentation of style, and the naturalness.

Action-Based Audit with Relational Rules to Avatar Interactions for Metaverse Ethics

  • Bang, Junseong;Ahn, Sunghee
    • Smart Media Journal
    • /
    • v.11 no.6
    • /
    • pp.51-63
    • /
    • 2022
  • Metaverse provides a simulated environment where a large number of users can participate in various activities. In order for Metaverse to be sustainable, it is necessary to study ethics that can be applied to a Metaverse service platform. In this paper, Metaverse ethics and the rules for applying to the platform are explored. And, in order to judge the ethicality of avatar actions in social Metaverse, the identity, interaction, and relationship of an avatar are investigated. Then, an action-based audit approach to avatar interactions (e.g., dialogues, gestures, facial expressions) is introduced in two cases that an avatar enters a digital world and that an avatar requests the auditing to subjects, e.g., avatars controlled by human users, artificial intelligence (AI) avatars (e.g., as conversational bots), and virtual objects. Pseudocodes for performing the two cases in a system are presented and they are examined based on the description of the avatars' actions.

Characterization of Lipases from Staphylococcus aureus and Staphylococcus epidermidis Isolated from Human Facial Sebaceous Skin

  • Xie, Winny;Khosasih, Vivia;Suwanto, Antonius;Kim, Hyung-Kwoun
    • Journal of Microbiology and Biotechnology
    • /
    • v.22 no.1
    • /
    • pp.84-91
    • /
    • 2012
  • Two staphylococcal lipases were obtained from Staphylococcus epidermidis S2 and Staphylococcus aureus S11 isolated from sebaceous areas on the skin of the human face. The molecular mass of both enzymes was estimated to be 45 kDa by SDS-PAGE. S2 lipase displayed its highest activity in the hydrolysis of olive oil at $32^{\circ}C$ and pH 8, whereas S11 lipase showed optimal activity at $31^{\circ}C$ and pH 8.5. The S2 lipase showed the property of cold-adaptation, with activation energy of 6.52 kcal/mol. In contrast, S11 lipase's activation energy, at 21 kcal/mol, was more characteristic of mesophilic lipases. S2 lipase was stable up to $45^{\circ}C$ and within the pH range from 5 to 9, whereas S11 lipase was stable up to $50^{\circ}C$ and from pH 6 to 10. Both enzymes had high activity against tributyrin, waste soybean oil, and fish oil. Sequence analysis of the S2 lipase gene showed an open reading frame of 2,067 bp encoding a signal peptide (35 aa), a pro-peptide (267 aa), and a mature enzyme (386 aa); the S11 lipase gene, at 2,076 bp, also encoded a signal peptide (37 aa), pro-peptide (255 aa), and mature enzyme (399 aa). The two enzymes maintained amino acid sequence identity of 98-99% with other similar staphylococcal lipases. Their microbial origins and biochemical properties may make these staphylococcal lipases isolated from facial sebaceous skin suitable for use as catalysts in the cosmetic, medicinal, food, or detergent industries.

Temperature Measurement and Intelligent Access Management System Service Platform Advancement Research using AI Facial Recognition Technology (AI 얼굴정보처리기술을 활용한 체온측정 및 지능형 출입관리 시스템 서비스플랫폼 고도화 연구)

  • Kim, Byung-Wan
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.7
    • /
    • pp.249-257
    • /
    • 2021
  • Recently, interest and demand for facial information processing technology that can provide non-face-to-face identity authentication and access management service using smart devices, which is an essential environmental improvement for multi-use facilities, is increasing as a way to prevent the spread of infectious diseases worldwide and to cope with social measures. This study defines a multi-use facility classification system and applied service field to establish a continuous access control system, and measures to improve the usability of the service platform considering scalability through a dual access control system and personal/measurement information type analysis, and accordingly We would like to propose a service roadmap. In addition, it aims to improve the physical access management system service platform, which is a multi-use facility application service that requires one-time and multiple-use authentication according to usage. It is expected that the methodology of this study can be applied as a service platform of a logical access control system type in the future.

Effect of Stereotype Threat on Spatial Working Memory and Emotion Recognition in Korean elderly (노화에 대한 고정관념 위협이 노인의 공간 작업기억 및 정서인식에 미치는 영향)

  • Lee, Kyoung eun;Lee, Wanjeoung;Choi, Kee-hong;Kim, Hyun Taek;Choi, June-seek
    • 한국노년학
    • /
    • v.36 no.4
    • /
    • pp.1109-1124
    • /
    • 2016
  • We examined the effect of stereotype threat (STT) on spatial working memory and facial emotion recognition in Korean elderly. In addition, we investigated the role of expected moderator such as self-perception of aging. Seventeen seniors (male=7) received basic cognitive tests including K-WMS-IV, MMSE and answered self-report questionnaires including self-perception of aging, anxiety of aging, attitude toward aging and age identity on the first visit. On the second visit, they were exposed to negative stereotype by reading a script detailing cognitive decline related to aging while a control group was exposed to a neutral content. Following the exposure, they were tested on a spatial-working memory task (Corsi-block tapping task) and emotion recognition task (facial expression identification task). The results showed that the seniors exposed to STT showed significantly lower performance on emotion recognition task (p < .05) (i.e., especially on the more difficult facial stimuli). In addition, there was a significant interaction between STT and self-perception of aging (p< .05), indicating that those who have positive self-perception of aging did not show impairment in emotion recognition task and difficult spatial working memory task under STT. On the other hand, those with negative self-perception of aging showed impaired performance under STT. Taken together, the current study suggests that being exposed to STT could negatively influence cognitive and emotional functioning of elderly. Interestingly, having a positive self-perception of aging could protect the underperformance caused by STT.

The Symbolic Meaning and Values Portrayed In Models' Characteristics in Fashion Advertisements

  • Kwon, Gi-Young;Helvenston, Sally I.
    • International Journal of Human Ecology
    • /
    • v.7 no.2
    • /
    • pp.29-41
    • /
    • 2006
  • Various current events provide evidence that society is undergoing changes in perceptions of social relationships. Specifically, visual media in the form of advertisements can convey images which reflect society's values and concepts about role relationships. The purpose of this research was to examine ads in fashion magazines to determine what types of model roles and role relationships typically appear in fashion advertising which can mirror society's values. A content analysis was conducted of ads obtained from US Vogue and US GQ for the year 2002. Six kinds of roles/relationships were found: (1) Narcissism (representing self absorption), (2) sexually enticing opposite-sex relationships, (3) close/romantic same-sex relationships, (4) friend relationships, (5) family relationships, and (6) independent relationships. Of these, narcissism predominated, however, a small number of sexually provocative ads appeared as well as same-sex romantic relationships. Because sole (single) models were more typical, they also were examined to determine ways in which they relate to the audience. Characteristics examined included body presentation & pose, eye gaze, and facial expression. Direct eye gaze was the typical way to engage the audience. Gender differences were apparent: smiling was more typical of women, indifference for men. The symbolic meaning and values investigated from this research are the blurring of gender identity portrayed in homosexual imagery, family values, and the value of youth. The consistency of models' race in ads does not portray the diversity reflected in the demographic census.

Energy-Efficient Biometrics-Based Remote User Authentication for Mobile Multimedia IoT Application

  • Lee, Sungju;Sa, Jaewon;Cho, Hyeonjoong;Park, Daihee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6152-6168
    • /
    • 2017
  • Recently, the biometric-based authentication systems such as FIDO (Fast Identity Online) are increased in mobile computing environments. The biometric-based authentication systems are performed on the mobile devices with the battery, the improving energy efficiency is important issue. In the case, the size of images (i.e., face, fingerprint, iris, and etc.) affects both recognition accuracy and energy consumption, and hence the tradeoff analysis between the both recognition accuracy and energy consumption is necessary. In this paper, we propose an energy-efficient way to authenticate based on biometric information with tradeoff analysis between the both recognition accuracy and energy consumption in multimedia IoT (Internet of Things) transmission environments. We select the facial information among biometric information, and especially consider the multicore-based mobile devices. Based on our experimental results, we prove that the proposed approach can enhance the energy efficiency of GABOR+LBP+GRAY VALUE, GABOR+LBP, GABOR, and LBP by factors of 6.8, 3.6, 3.6, and 2.4 over the baseline, respectively, while satisfying user's face recognition accuracy.

An image analysis system Design using Arduino sensor and feature point extraction algorithm to prevent intrusion

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • Korean Journal of Artificial Intelligence
    • /
    • v.9 no.2
    • /
    • pp.23-28
    • /
    • 2021
  • In this paper, we studied a system that can efficiently build security management for single-person households using Arduino, ESP32-CAM and PIR sensors, and proposed an Android app with an internet connection. The ESP32-CAM is an Arduino compatible board that supports both Wi-Fi, Bluetooth, and cameras using an ESP32-based processor. The PCB on-board antenna may be used independently, and the sensitivity may be expanded by separately connecting the external antenna. This system has implemented an Arduino-based Unauthorized intrusion system that can significantly help prevent crimes in single-person households using the combination of PIR sensors, Arduino devices, and smartphones. unauthorized intrusion system, showing the connection between Arduino Uno and ESP32-CAM and with smartphone applications. Recently, if daily quarantine is underway around us and it is necessary to verify the identity of visitors, it is expected that it will help maintain a safety net if this system is applied for the purpose of facial recognition and restricting some access. This technology is widely used to verify that the characters in the two images entered into the system are the same or to determine who the characters in the images are most similar to among those previously stored in the internal database. There is an advantage that it may be implemented in a low-power, low-cost environment through image recognition, comparison, feature point extraction, and comparison.

A Phenomenological Qualitative Study on the Traditional Korean Medical Doctor's Experience of Treating Victims of Sexual Violence (한의사의 성폭력피해자 진료경험에 대한 현상학적 질적 연구)

  • Choi, You-Kyung
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.25 no.3
    • /
    • pp.73-88
    • /
    • 2021
  • Objectives : The purpose of this study is to explore the experiences of traditional korean medical doctors (TKMD) who have treated victims of sexual violence by collecting their qualitative data that cannot be obtained with statistical data. Methods : In-depth interviews were conducted with semi-structured questionnaires for each of 5 TKMDs who had experiences in treating sexual violence victims. For analysis, the interviews were recorded along with their facial expressions and actions during the interview process, and all collected data were analyzed by colaizzi's method. In each process, a 'phenomenological reduction' was applied. Results : The identity of TKMD's experience of treating sexual violence victims was structured into 25 themes, 9 theme clusters, and 4 categories. The 4 categories included 'Professionalism and sense of efficacy', 'Personal life experiences and mental trauma treatment experiences that are mutually influencing each other', 'Factors needed to increase TKMD's participation in treatment of sexual violence victims', 'Deriving the future strategy of traditional korean medicine'. Conclusions : This study derived the essence and meaning of TKMDs' experiences in treating sexual violence victims, and presented future directions of traditional korean medicine in this field. It is expected that the results of this study would be used as the basis for establishing the traditional korean medical support system for sexual violence victims in the context of the korean medical system.