• Title/Summary/Keyword: self-identification

Search Result 591, Processing Time 0.024 seconds

Design and Performance Analysis of Emulator for Standard Conformance Test of Active RFID

  • Song, Tae-Seung;Lee, Wang-Sang;Kim, Tae-Yeon;Lyou, Joon
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.376-386
    • /
    • 2009
  • An active radio frequency identification (RFID) system has the advantages of a long identification distance and a good identification rate, overcoming passive RFID drawbacks. Therefore, interest in the development of active RFID systems has been gradually increasing in areas of harbor logistics and national defense. However, some identification failures between active RFID systems developed under the same standards have been reported, presumably due to a lack of development of accurate evaluation methods and test equipment. We present a realization of the hardware and software of an emulator to evaluate the standard conformance of an active RFID system in a fully anechoic chamber. The performance levels of the designed emulator are analyzed using Matlab/Simulink simulations, and the applicability of the emulator is verified by evaluating the standard conformance of a real active RFID tag. Finally, we propose a new evaluation method by incorporating a self-running test mode environment into the RFID tags to reduce testing time and increase testing accuracy. The application of the suggested method to actual tags improves measurement uncertainty by 0.56 dB over that obtained using existing methods.

Self-Tuning Control of Multivariable System (다변수 시스템의 자기동조제어)

  • Lee, D.C.
    • Journal of Power System Engineering
    • /
    • v.3 no.4
    • /
    • pp.69-78
    • /
    • 1999
  • In the single-input and single-output system, the parameter of plant is scalar polynomial, but in the multiple input and multiple output, it accompanies, being matrix polynomial, the consideration of observable controlability index or problems non-commutation in matrix polynomial as well as degree, and it is more complex to deal with. Therefore, it is thought that a full research on the single-input and single-output system is not sufficient. This paper proposes that problems of minimum variance self-tuning regulator by using numerical calculation example of multivariable system and pole assignment self-tuning regulator.

  • PDF

Antecedents of Users' Intentions to Give Personal Identification Information and Privacy-Related Information in Social Media (소셜 미디어에서 개인 식별 정보와 사생활 정보 공유 의지에 영향을 미치는 요인)

  • Kim, Byoungsoo;Kim, Daekil
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.127-136
    • /
    • 2019
  • In the social media, information that users share with service providers can be divided into personal identification information such as gender and age and privacy-related information such as photos and comments. However, previous works on IS and service management have shed relatively little light on the difference of information-sharing decisions depending on the type of information. This study examines information-sharing decisions by separating the two types of information. A structural equation modeling method is used to test the research model based on a sample of 350 Facebook in South Korea. Analysis results show that self-expression, trust, and perceived security had a significant positive effect on both user's intentions to give personal identification information and their intentions to give privacy-related information. However, privacy concerns negatively affected their intentions to give personal identification and intention to give privacy-related information. The analysis results confirm that there was no difference between decision-making processes about sharing personal identification information and ones about sharing privacy-related information.

Korean Genderless Fashion Consumers' Self-image and Identification

  • Shin, Eun Jung;Koh, Ae-Ran
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.3
    • /
    • pp.400-412
    • /
    • 2020
  • The "genderless fashion" style adopted by 20 to 30-year-olds in Korea cannot be ignored in the consumer fashion code. This study investigated self-images of Korean genderless fashion consumers through in-depth interviews. Interview analyses confirmed that Korean genderless fashion consumers express their self-image through clothing. As the theoretical framework, this study used Lacan's concept of desire to classify the types of self-image consumers want to express. The results are classified into three subject types: those who pursue self-fulfillment, those who pursue fulfillment from others, and those who pursue endless fulfillment through a self-image. This reflects various factors and the subjects' desires. Further, a subject's desire to present a specific self-image was an important factor in understanding the genderless fashion style. The study results revealed that modern fashion is an "unconscious" field of self-expression that crucially reflects individual desires. The study also contributes to the understanding of the concept of self-image at large.

Automatic Intrusion Response System based on a Self-Extension Monitoring (자기확장 모니터링 기반의 침입자동대응 시스템)

  • Jang, Hee-Jin;Kim, Sang-Wook
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.489-497
    • /
    • 2001
  • In the coming age of information warfare, information security patterns take on a more offensive than defensive stance. It is necessary to develop an active form of offensive approach to security protection in order to guard vital information infrastructures and thwart hackers. Information security products need to support an automatic response facility without human intervention in order to minimize damage to the attacked system and cope with the intrusion immediately. This paper presents an automatic intrusion response model which is developed on a Self-Extension Monitoring. It also proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested model. The Self-Extension Monitoring using self-protection and replication minimizes spatial limitations on collection of monitoring information and intruder tracing. It enhances the accuracy of intrusion detection and tracing.

  • PDF

Hybrid evolutionary identification of output-error state-space models

  • Dertimanis, Vasilis K.;Chatzi, Eleni N.;Spiridonakos, Minas D.
    • Structural Monitoring and Maintenance
    • /
    • v.1 no.4
    • /
    • pp.427-449
    • /
    • 2014
  • A hybrid optimization method for the identification of state-space models is presented in this study. Hybridization is succeeded by combining the advantages of deterministic and stochastic algorithms in a superior scheme that promises faster convergence rate and reliability in the search for the global optimum. The proposed hybrid algorithm is developed by replacing the original stochastic mutation operator of Evolution Strategies (ES) by the Levenberg-Marquardt (LM) quasi-Newton algorithm. This substitution results in a scheme where the entire population cloud is involved in the search for the global optimum, while single individuals are involved in the local search, undertaken by the LM method. The novel hybrid identification framework is assessed through the Monte Carlo analysis of a simulated system and an experimental case study on a shear frame structure. Comparisons to subspace identification, as well as to conventional, self-adaptive ES provide significant indication of superior performance.

Identification of Damages within a Plate Structure (평판 구조물의 손상규명)

  • Kim, Nam-In;Lee, U-Sik
    • Proceedings of the KSME Conference
    • /
    • 2000.11a
    • /
    • pp.671-675
    • /
    • 2000
  • In this study, an FRF-based structural damage identification method (SDIM) is proposed for plate structures. The present SDIM is derived from the partial differential equation of motion of the damaged plate, in which damage is characterized by damage distribution function. Various factors that might affect the accuracy of the damage identification are investigated. They include the number of modal data used in the analysis and the damage-induced modal coupling. In the present SDIM, an efficient iterative damage self-search method is introduced. The iterative damage search method efficiently reduces the size of problem by searching out and then by removing all damage-free zones at each iteration of damage identification analysis. The feasibility of the present SDIM is studied by some numerically simulated tests.

  • PDF

Hand Shape Detection and Recognition using Self Organized Feature Map(SOMF) and Principal Component Analysis (자기 조직화 특징 지도(SOFM)와 주성분 분석을 이용한 손 형상 검출 및 인식)

  • Kim, Kyoung-Ho;Lee, Kee-Jun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.28-36
    • /
    • 2013
  • This study proposed a robust detection algorithm. It detects hands more stably with respect to changes in light and rotation for the identification of a hand shape. Also it satisfies both efficiency of calculation and the function of detection. The algorithm proposed segmented the hand area through pre-processing using a hand shape as input information in an environment with a single camera and then identified the shape using a Self Organized Feature Map(SOFM). However, as it is not easy to exactly recognize a hand area which is sensitive to light, it has a large degree of freedom, and there is a large error bound, to enhance the identification rate, rotation information on the hand shape was made into a database and then a principal component analysis was conducted. Also, as there were fewer calculations due to the fewer dimensions, the time for real-time identification could be decreased.

The Effect on the Contents of Self-Disclosure Activities using Ubiquitous Home Robots (자기노출 심리를 이용한 유비쿼터스 로봇 콘텐츠의 효과)

  • Kim, Su-Jung;Han, Jeong-Hye
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.57-63
    • /
    • 2008
  • This study uses the identification which is one of the critical components of psychological mechanism and enables replacing one's own self because of the needs of self-expression(disclosure) and creation. The study aims to improve educational effects using the realistic by increasing sense of the virtual reality and the attention. After the computer-based contents were developed and converted to be applied into robot, and then the contents were combined the student's photo and the avatar using automatic loading. Finally each one of the contents was applied to the students. The results of the investigation indicated that there were significant effects of the contents based on identification. In other words, the contents effect on student's attention, but not their academic achievement. The study could find the effect of the identification's application using the educational robot. We suggested that improving technical ability of the augmented virtuality as a face-detection and sensitive interaction may lead to the specific suggestions for educational effects for further research.

  • PDF