identity information
Recently Published Documents


TOTAL DOCUMENTS

195
(FIVE YEARS 64)

H-INDEX

17
(FIVE YEARS 5)

2021 ◽  
Vol 5 (Supplement_1) ◽  
pp. 704-704
Author(s):  
Alan Kersten ◽  
Julie Earles ◽  
Jennifer Brymer

Abstract This research tested whether performing an action themselves leads young and older adults to have difficulty remembering which of a number of other people had performed that same action. It also tested whether observing another person perform an action leads to false memory for self-performance of that action. Young adults and healthy older adults 62 to 88 years of age viewed videos of actors performing actions. After viewing some of the actions, participants were instructed to perform those same actions themselves. Participants were tested one week later on their memory for their own actions and for the actions of the actors in the videos. Older adults were more strongly influenced by self-performance than were young adults when asked whether the actor in a test item had performed the same action previously. Young adults performed better than older adults at discriminating the correct and incorrect actors in the videos, although both groups showed reduced discrimination for actions that they had also performed themselves. The two groups were equally likely to falsely remember having performed an action that had only appeared in the videos, but young adults were better able than older adults to correctly identify the actions that they had in fact performed. Older adults thus have greater difficulty than young adults at distinguishing self-performed actions from actions performed by other people. This suggests the existence of common representations for the actions of oneself and others that must be bound to identity information to specify the correct source of the actions.


2021 ◽  
Vol 13 (11) ◽  
pp. 298
Author(s):  
Kunlin Liu ◽  
Ping Wang ◽  
Wenbo Zhou ◽  
Zhenyu Zhang ◽  
Yanhao Ge ◽  
...  

Deepfake aims to swap a face of an image with someone else’s likeness in a reasonable manner. Existing methods usually perform deepfake frame by frame, thus ignoring video consistency and producing incoherent results. To address such a problem, we propose a novel framework Neural Identity Carrier (NICe), which learns identity transformation from an arbitrary face-swapping proxy via a U-Net. By modeling the incoherence between frames as noise, NICe naturally suppresses its disturbance and preserves primary identity information. Concretely, NICe inputs the original frame and learns transformation supervised by swapped pseudo labels. As the temporal incoherence has an uncertain or stochastic pattern, NICe can filter out such outliers and well maintain the target content by uncertainty prediction. With the predicted temporally stable appearance, NICe enhances its details by constraining 3D geometry consistency, making NICe learn fine-grained facial structure across the poses. In this way, NICe guarantees the temporal stableness of deepfake approaches and predicts detailed results against over-smoothness. Extensive experiments on benchmarks demonstrate that NICe significantly improves the quality of existing deepfake methods on video-level. Besides, data generated by our methods can benefit video-level deepfake detection methods.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Hongcheng Xue ◽  
Junping Qin ◽  
Chao Quan ◽  
Wei Ren ◽  
Tong Gao ◽  
...  

As the essential content of intelligent animal husbandry, identifying each livestock is the only way to achieve modern and refined scientific husbandry. This paper proposes a sheep face recognition method based on European spatial metrics and realizes noncontact sheep identity recognition by training the network using sheep face image samples in the natural environment. The SheepBase data set was first proposed in this process, which contains 6559 images of Inner Mongolia fine-wool sheep and Sunite sheep. To enhance the diversity of the data, the sheep face images were data-enhanced. Secondly, to solve the problems of more redundant information in the sheep face image and the poor posture and angle of the sheep face, we propose the sheep face detection and correction (SheepFaceRepair) method. This method aims to detect the sheep face area in the image to be recognized and align the sheep face area. On this basis, we offer an open sheep facial recognition network (SheepFaceNet) based on the European spatial metric. This method incorporates the biological identity information features of the sheep face to achieve sheep identity. We also tested the effectiveness of this method in the SheepBase data set. The experimental results show that the method proposed in this paper is much higher than the other methods, and the precision of recognition reaches 89.12%. In addition, we found that integrating the biometrics of the sheep face can effectively improve the network’s recognition capacity.


2021 ◽  
Author(s):  
◽  
Julie Bunnell

<p>Information that is presented visually can be described in terms of its identity and in terms of its position, and a distinction can be drawn between what an item is and where that item is. For example, a letter displayed on a screen has both an identity (its name) and a spatial position; the spatial position can be specified either absolutely (the upper right quadrant) or relatively (beside the "x" and above the "y"). There is an obvious and intimate relationship between the identity component and the position component, and it is this relationship, between the the processing of position information and the processing of identity information, that forms the subject of the present thesis. First, the relevant I literature is reviewed. The relationship between position and identity is examined in the context of two major research areas: iconic memory and short term visual memory. Second, the concept of dimensional separability is considered with reference to the appropriate literature. The purpose is to indicate a theoretical framework within which the issue of concern may be profitably addressed. The key idea to be developed is that position and identity are asymmetrically separable dimensions. A small group of studies that offer tentative support to this conceptualization will be discussed. Third, the results of eight related experiments are reported. These experiments involve the recognition of position and/or identity information in a discrete trials procedure. The eight experiments fall into three separate groups. Experiments 1 to 3 examine the recognition of either position or identity information, with the two types of information presented in relative isolation. Several stimulus factors are manipulated in order to demonstrate differential effects upon the two dimensions. Experiments 4 to 6 examine the effect of the irrelevant dimension upon recognition of the relevant dimension. Experiment 4 uses a logically balanced set of stimuli, so that the irrelevant dimension is either consistent or inconsistent, whereas in Experiments 5 and 6 each dimension is examined in the context of consistent, inconsistent, or neutral information on the irrelevant dimension. Experiments 7 and 8 explore the integration of position and identity information by varying the task requirements. Shared attention conditions are contrasted with selective attention conditions to show the impact of attentional strategy. The thesis concludes with a general discussion of the results, and their accordance with the hypothesis of asymmetric separability.</p>


2021 ◽  
Author(s):  
◽  
Julie Bunnell

<p>Information that is presented visually can be described in terms of its identity and in terms of its position, and a distinction can be drawn between what an item is and where that item is. For example, a letter displayed on a screen has both an identity (its name) and a spatial position; the spatial position can be specified either absolutely (the upper right quadrant) or relatively (beside the "x" and above the "y"). There is an obvious and intimate relationship between the identity component and the position component, and it is this relationship, between the the processing of position information and the processing of identity information, that forms the subject of the present thesis. First, the relevant I literature is reviewed. The relationship between position and identity is examined in the context of two major research areas: iconic memory and short term visual memory. Second, the concept of dimensional separability is considered with reference to the appropriate literature. The purpose is to indicate a theoretical framework within which the issue of concern may be profitably addressed. The key idea to be developed is that position and identity are asymmetrically separable dimensions. A small group of studies that offer tentative support to this conceptualization will be discussed. Third, the results of eight related experiments are reported. These experiments involve the recognition of position and/or identity information in a discrete trials procedure. The eight experiments fall into three separate groups. Experiments 1 to 3 examine the recognition of either position or identity information, with the two types of information presented in relative isolation. Several stimulus factors are manipulated in order to demonstrate differential effects upon the two dimensions. Experiments 4 to 6 examine the effect of the irrelevant dimension upon recognition of the relevant dimension. Experiment 4 uses a logically balanced set of stimuli, so that the irrelevant dimension is either consistent or inconsistent, whereas in Experiments 5 and 6 each dimension is examined in the context of consistent, inconsistent, or neutral information on the irrelevant dimension. Experiments 7 and 8 explore the integration of position and identity information by varying the task requirements. Shared attention conditions are contrasted with selective attention conditions to show the impact of attentional strategy. The thesis concludes with a general discussion of the results, and their accordance with the hypothesis of asymmetric separability.</p>


2021 ◽  
Vol 2108 (1) ◽  
pp. 012070
Author(s):  
Haijiang Wu ◽  
Jinrong Chen ◽  
Feng Liao ◽  
Yonghao Li ◽  
Shaoheng Zhong ◽  
...  

Abstract This paper proposes an Ethernet transmission method based on modified format, which is applied to the distribution domain protection system. By tagging Ethernet data new identifications, the data has unique identity information in transmission. The switch replicates data and transmit it in two directions. When the ring network is destroyed, there is no data loss caused by switching the transmission direction. The distribution domain protection system realizes ring network with seamless redundancy.


2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Gwan-Hwan Hwang ◽  
Tao-Ku Chang ◽  
Hung-Wen Chiang

The PKI framework is a widely used network identity verification framework. Users will register their identity information with a certification authority to obtain a digital certificate and then show the digital certificate to others as an identity certificate. After others receive the certificate, they must check the revocation list from the CA to confirm whether the certificate is valid. Although this architecture has a long history of use on the Internet, significant doubt surrounds its security. Because the CA may be attacked by DDoS, the verifier may not obtain the revocation list to complete the verification process. At present, there are many new PKI architectures that can improve on the CA’s single point of failure, but since they still have some shortcomings, the original architecture is still used. In this paper, we proposed a semidecentralized PKI architecture that can easily prevent a single point of failure. Users can obtain cryptographic evidence through specific protocols to clarify the responsibility for the incorrect certificate and then submit the cryptographic evidence to the smart contract for automatic judgment and indemnification.


2021 ◽  
Vol 2021 ◽  
pp. 1-14
Author(s):  
Zhenjie Huang ◽  
Runlong Duan ◽  
Qunshan Chen ◽  
Hui Huang ◽  
Yuping Zhou

Outsourced attribute-based signatures (OABS) enable users to sign messages without revealing specific identity information and are suitable for scenarios with limited computing power. Recently, Mo et al. proposed an expressive outsourced attribute-based signature scheme (Peer-to-Peer Networking and Applications, 11, 2017). In this paper, we show that Mo et al.’s scheme does not achieve any of the three security properties. Their scheme is incorrect. The adversary can collude with the malicious signing-cloud service provider (S-CSP) to forge valid signatures on any message and any attribute set. And the S-CSP could trace the access structures used to generate the signatures. Then, we treat the S-CSP as an adversary and present more accurate unforgeability and anonymity models for OABS to remedy the drawbacks of the previous ones. Finally, we propose a simple but significant improvement to fix our attacks. The improved scheme achieves correctness, unforgeability, and perfect anonymity while keeping the efficiency almost unchanged. We also prove the security of the improved scheme under the standard model.


2021 ◽  
Vol 4 (3) ◽  
Author(s):  
Tahir GÜR ◽  

The lecturing instruction method stands out as the most used education method in university classrooms. Students and researchers have developed study techniques to reduce the disadvantages of this method to increase success at the undergraduate level. The most important, common, and traditional of them is taking note. The verbatim notetaking, which is widely used outside of the lesson, is seen as well as it is also seen that the note takers take it by generating them in their own way. With the development of technology in the notetaking process, it is seen that digital tools have become widespread in addition to the pen. In this study, the effects of generative and verbatim taking notes on success and its persistence were examined. The study group of the study consists of 116 education faculty students studying in Turkish and Social Sciences education programs. Within the scope of the research, demographic information will be presented to the participants in a way that does not violate personal privacy; In the analysis of the opinions, utmost attention was paid to the rules of scientific and research ethics, assuring that the participants will be coded in a way that does not evoke identity information. A pre-experimental study was conducted with four groups of 29 students. The groups made the verbatim and generative note taking with pen and keyboard. The first and second post-tests were applied to measure the success of taking notes during the lesson and its persistence. According to the results of the study, it was determined that taking notes with a pen by the generative method has more positive effects than using the keyboard or taking verbatim notes on both success and persistence.


Sensors ◽  
2021 ◽  
Vol 21 (18) ◽  
pp. 6235
Author(s):  
Chun-Hsien Hsu ◽  
Ya-Ning Wu

Neural decoding is useful to explore the timing and source location in which the brain encodes information. Higher classification accuracy means that an analysis is more likely to succeed in extracting useful information from noises. In this paper, we present the application of a nonlinear, nonstationary signal decomposition technique—the empirical mode decomposition (EMD), on MEG data. We discuss the fundamental concepts and importance of nonlinear methods when it comes to analyzing brainwave signals and demonstrate the procedure on a set of open-source MEG facial recognition task dataset. The improved clarity of data allowed further decoding analysis to capture distinguishing features between conditions that were formerly over-looked in the existing literature, while raising interesting questions concerning hemispheric dominance to the encoding process of facial and identity information.


Sign in / Sign up

Export Citation Format

Share Document