• Title/Summary/Keyword: 위치코드

Search Result 542, Processing Time 0.028 seconds

A Code Recommendation Method Using RNN Based on Interaction History (RNN을 이용한 동작기록 마이닝 기반의 추천 방법)

  • Cho, Heetae;Lee, Seonah;Kang, Sungwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.12
    • /
    • pp.461-468
    • /
    • 2018
  • Developers spend a significant amount of time exploring and trying to understand source code to find a source location to modify. To reduce such time, existing studies have recommended the source location using statistical language model techniques. However, in these techniques, the recommendation does not occur if input data does not exactly match with learned data. In this paper, we propose a code location recommendation method using Recurrent Neural Networks and interaction histories, which does not have the above problem of the existing techniques. Our method achieved an average precision of 91% and an average recall of 71%, thereby reducing time for searching and exploring code more than the existing recommendation techniques.

MS Office Malicious Document Detection Based on CNN (CNN 기반 MS Office 악성 문서 탐지)

  • Park, Hyun-su;Kang, Ah Reum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.439-446
    • /
    • 2022
  • Document-type malicious codes are being actively distributed using attachments on websites or e-mails. Document-type malicious code is relatively easy to bypass security programs because the executable file is not executed directly. Therefore, document-type malicious code should be detected and prevented in advance. To detect document-type malicious code, we identified the document structure and selected keywords suspected of being malicious. We then created a dataset by converting the stream data in the document to ASCII code values. We specified the location of malicious keywords in the document stream data, and classified the stream as malicious by recognizing the adjacent information of the malicious keywords. As a result of detecting malicious codes by applying the CNN model, we derived accuracies of 0.97 and 0.92 in stream units and file units, respectively.

A Study of Transmitter Detection Method for LED-ID using OOK-SS Watermarking (OOK-SS Watermarking을 이용한 LED-ID용 송신기 검출기법에 관한 연구)

  • Cha, Jae-Sang;Kim, Jin-Young;Jang, Yeong-Min;Lim, Yoon-Sik;Kim, Jong-Tae;Lee, Kyong-Gun;Lee, Min-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.281-285
    • /
    • 2010
  • We propose new identification method of LED location in indoor environment. It can transmit and receive position information and additional data, as applying OOK-SS watermarking method for LED transmission signal. Especially, we use a unipolar form code for watermarking spread code, because LED signal has unipolar characteristic. we analysis LED signal influence and interference with watermarking code, demonstrate usefulness of LED-ID using OOK-SS Watermarking.

A Revised QT Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 QT 프로토콜)

  • Lim, In-Taek;Choi, Jin-Oh
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.430-436
    • /
    • 2006
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query. According to the simulation results, the QT_rev protocol outperforms the QT protocol in terms of the number of queries and the number of response bits.

Detection of GPS Multipath Errors Using 4-Receivers (4 수신기를 이용한 GPS 다중경로의 검출과 축소)

  • 박운용;정창식;김진수;곽두호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.235-242
    • /
    • 1998
  • This study aims to detect and to reduce the multipath errors which are main errors source in high precious surveying such as GPS-aided aerial triangulation and Car Navigation. which reference receivers being fixed, when kinematic receivers move continuously, multipath is performed using smoothed code measurement and pure code measurement in the network. Through this methods, 3D RMS errors are reduced into about 30% in the single differential code solution to the kinematic receiver. This is based on the fact that the network adjustment are performed at multiple reference receivers, but positioning is carried out by the single differential methods between a reference receiver and a kinematic receiver. So it was supposed that this methods reduced the correlation errors including the atmospheric errors using the nearest receivers and can be mixed with another methods.

  • PDF

A revised Query Tree Protocol for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 개선된 쿼리 트리 프로토콜)

  • Lim, In-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.491-494
    • /
    • 2005
  • In this paper, a QT_rev protocol is proposed for identifying all the tags within the identification range. The proposed QT_rev protocol revises the QT protocol, which has a memoryless property. In the QT_rev protocol, the tag will send the remaining bits of their identification codes when the query string matches the first bits of their identification codes. After the reader receives all the responses of the tags, it knows which bit is collided. If the collision occurs in the last bit, the reader can identify two tags simultaneously without further query.

  • PDF

A Study on Iriscode Extraction for Iris Recognition in Cellular Phone (휴대폰 환경에서의 홍채 인식을 위한 홍채 코드 추출에 관한 연구)

  • Jung, Dae-Sik;Park, Kang-Ryoung
    • Annual Conference of KIPS
    • /
    • 2005.05a
    • /
    • pp.813-816
    • /
    • 2005
  • 최근 휴대폰의 활용 범위는 단순히 사용자간의 통신이라는 기본적인 목적을 넘어서 다양한 기능을 제공하고 있다. 그중 휴대폰에 카메라를 탑재하여 디지털 카메라의 기능을 혼합한 휴대폰은 최근 각광을 받고 있으며 휴대폰에 탑재된 카메라의 기능은 디지털 카메라의 메가 픽셀 급 화질을 제공하는 정도의 수준으로 발전하였으며 이미 그 수요는 대중화되어 가고 있다. 이런 카메라 폰을 응용한 연구 분야로 생체 인식 기술을 적용할 수 있으며, 본 논문에서는 휴대폰 환경에서의 홍채 인식을 위한 홍채 영역에서의 홍채 코드 추출에 관한 방법을 제안한다. 휴대폰에서의 홍채 인식에 사용되는 홍채 코드 추출 과정은 다음과 같다. 먼저 휴대폰 카메라를 통해 얻은 메가 픽셀 급 영상($2048{\times}1536$ pixel 8bit gray Image)에서 동공위치 추적 & 홍채 영역 추출 알고리즘[1]을 이용하여 눈 영상($640{\times}480$ pixel 8bit gray Image))을 추출한다. 이렇게 추출된 눈 영상 중에 홍채 코드 인식 에러율을 좀더 낮추기 위해 눈썹영역, 안경에 의해 반사되는 반사광(Specular Reflection), 눈꺼풀 영역을 눈 영역에서 제거 하는 과정을 거친다. 이 논문에서는 위와 같은 과정을 거쳐 얻어진 홍채 영상에 그대로 극좌표 가버 필터[2]를 씌워 홍채 코드를 추출해내기 때문에 기존 보간법을 이용한 스트레칭 된 홍채 영상에서의 홍채 코드 추출보다 잘못된 홍채 코드 정보를 줄일 수 있으며 휴대폰이라는 특수한 환경에서의 홍채 코드 추출이란 점을 고려하여 가버 필터를 고주파와 저주파로 나누어 미리 설계해두어 좀더 빠르고 정확한 홍채 코드를 추출해 내는 방법을 제안한다. 실험 결과, 기존 방식보다 극좌표 가버 필터를 사용한 홍채 코드 추출 실험에서 보다 높은 인식률을 보였다.

  • PDF

Scleral Diagnostic System Implementation with Color and Blood Vessel Sign Pattern Code Generations (컬러와 혈관징후패턴 코드 생성에 의한 공막진단시스템 구현)

  • Ryu, Kwang Ryol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.3029-3034
    • /
    • 2014
  • The paper describes the scleral diagnostic system implementation for human eyes by using the scleral color code and vessels sign pattern code generations. The system is based on the high performance DSP image signal processor, programmable gain control for preprocessing and RISC SD frames storage. RGB image signals are optimized by PGC, the edge image is detected form the gray image converted. The processing algorithms are executed by scleral color code generation and scleral vessels sign pattern code creation for discriminating and matching. The scleral symptomatic color code is generated by YCbCr values at memory map tolerated and the vessel sign pattern code is created by digitizing the 24 clock and 13 ring zones, overlay matching and tolerances. The experimental results for performance are that the system runs 40ms, and the color and pattern for diagnostic errors are around 20% and 24% on average. The system and technique enable a scleral diagnosis with subdividing the patterns and patient database.

The Position and Heading Estimation System of Mobile Robot Using the Extended Kalman Filter (확장칼만필터를 이용한 이동로봇의 위치와 자세 추정 시스템)

  • Jin, Kwang-Sik;Yun, Tae-Sung
    • Proceedings of the KIEE Conference
    • /
    • 1999.11c
    • /
    • pp.683-686
    • /
    • 1999
  • 이동로봇은 주행성을 가지며 설정된 이동 경로에 따라 목적지까지 자율적으로 이동하기 위해서는 이동로봇의 실제 위치에 대한 정확한 정보가 확보되어야 한다. 정보확보를 위해서 보통 엔코더, 자이로센서, 비젼센서, 레이저 거리등의 센서를 주로 사용한다. 본 연구에서 주행중인 이동로봇의 위치는 상대센서인 엔코더를 통해 측정된 운동변화량과 출발점에서 이동로봇의 위치로부터 자기유도 주행방법에 의해 계산된다. 이들 상대센서는 이동로봇의 실제 이동에 따라 주행거리 및 주행 방향 변화를 항상 측정할 수 있으므로, 전체 주행구간에 걸쳐 이동로봇의 위치를 연속적으로 측정할 수 있다는 장점이 있으나, 상대센서 측정값에 발생된 오차가 위치 평가값이 연속적으로 누적되므로 실제 위치에 대한 오차가 발생하는 단점이 있다. 즉, 바닥의 미끄럼, 요철, 로봇의 요동(Vibration)등 큰 오차의 요인이 된다. 본 연구에서는 위치를 직접 추정하지 않고 엔코드에서 나온 위치오차, Heading 오차, 자체 엔코드오차 그리고, 자이로 오차와 지자기 센서 오차를 Extended Kalman Filter를 통해 추정하여 이 오차를 다시 위치 계산과 Heading에 되돌려 줌으로서 오차를 보정하는 방법을 제시한다.

  • PDF

A Study on the Causes of Injury Codes by Case-Based Injury Code of External Causes Frequency Analysis (사례 중심의 손상코드 별 손상외인코드 빈도수 분석에 따른 손상코드 발생 원인에 관한 연구)

  • Eun-Mee Choi;Hye-Eun Jin;Jin-Hyoung Jeong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.1
    • /
    • pp.50-59
    • /
    • 2023
  • The purpose of this study was to analyze the patients hospitalized with damage by injury code based on data for two years in 2020 and 2021 of A institution located in Gangneung, Gangwon-do. Analyzed the injury codes with a large number of occurrences per year, and analyzed the injury codes of external causes accordingly. The cause of the injury code was analyzed by analyzing the frequency of the injury code of external causes. Injury code S0650 had the highest frequency of injury code of external causes W189 and X5999, which was judged to be the cause of traumatic subdural hemorrhage without open intracranial wounds when falling in an unspecified place or toilet. Injury code S72120 had the highest frequency of injury code of external causes W010 and W180, and it was judged to be the cause of obstructive femoral intertrochanteric fracture that occurs when falling in the residence. The injury code S32090 had a high frequency of X5999, and it was analyzed that it caused the obstructive fracture of the lumbar region due to an accident caused by exposure in an unspecified place, and the injury code S72.090 had a high frequency of W010 and W180. It was confirmed that the cause of the obstructive fracture of the femoral neck was mainly caused by slipping or slipping in the residence, and the injury code S0220 had a high frequency of the injury code of external causes Y049, and it was confirmed that the fibula was fractured mainly by the force or fist. As such, the cause of the injury code was analyzed by analyzing the frequency of the injury code for each injury code of external causes.