• Title/Summary/Keyword: Association ID

Search Result 207, Processing Time 0.023 seconds

Designation of an Application Model for Tag-Position Tracking in the RFID UHF Band (RFID UHF 대역의 태그 위치추적 응용모델 설계)

  • Shin, Kyung-Chul;Kim, Woo-Sung;Oh, Yong-Sun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.377-383
    • /
    • 2004
  • In this paper, we propose an application model of RFID that needs not be worried about battery degradation problems and offers convenience of hand-carry. We design the RFID application model which can track medium distance target RFID Tag and detect the signal difference between multi-detectors in a room area using 900MHz frequency band. In the case of multi-ID Tag in one detector, we approach TDMA scheme.

  • PDF

Association Rule Discovery using TID List Table (TID 리스트 테이블을 이용한 연관 규칙 탐사)

  • Chai, Duck-Jin;Hwang, Bu-Hyun
    • Journal of KIISE:Databases
    • /
    • v.32 no.3
    • /
    • pp.219-227
    • /
    • 2005
  • In this paper, we propose an efficient algorithm which generates frequent itemsets by only one database scanning. A frequent itemset is subset of an itemset which is accessed by a transaction. For each item, if informations about transactions accessing the item are exist, it is possible to generate frequent itemsets only by the extraction of items haying an identical transaction ID. Proposed method in this paper generates the data structure which stores transaction ID for each item by only one database scanning and generates 2-frequent itemsets by using the hash technique at the same time. k(k$\geq$3)-frequent itemsets are simply found by comparing previously generated data structure and transaction ID. Proposed algorithm can efficiently generate frequent itemsets by only one database scanning .

Hacking Path Retracing Algorithm using Packet Marking (패킷 마킹을 이용한 해킹경로 역추적 알고리즘)

  • 원승영;한승완;서동일;김선영;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.1
    • /
    • pp.21-30
    • /
    • 2003
  • Retracing schemes using packet marking are currently being studied to protect network resources by isolating DDoS attack. One promising solution is the probabilistic packet marking (PPM). However, PPM can't use ICMP by encoding a mark into the IP identification field. Likewise, it can't identify the original source through a hash function used to encode trace information and reduce the mark size. In addition, the retracing problem overlaps with the result from the XOR operation. An algorithm is therefore proposed to pursue the attacker's source efficiently. The source is marked in a packet using a router ID, with marking information abstracted.

  • PDF

Effects of Replacing Spray Dried Plasma Protein With Spray Dried Porcine Intestine Hydrolysate on Ileal Digestibility of Amino Acids and Growth Performance in Early-Weaned Pigs

  • Kim, J.H.;Chae, B.J.;Kim, Y.G.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.13 no.12
    • /
    • pp.1738-1742
    • /
    • 2000
  • A study was conducted to determine the ileal digestibility (ID) of amino acids and feeding values of spray dried plasma protein (SDPP) and spray dried porcine intestine hydrolysate (SDPI) in early-weaned pigs. Twelve pigs aged 18 days old (Landrace${\times}$Yorkshire${\times}$Duroc; $5.83{\pm}0.51kg$ BW) were cannulated in the terminal ileum for determination of ID of amino acids. Ninety pigs ($6.28{\pm}0.1kg$, 18 days old) were also employed for a feeding trial during phase I period. Treatments were: 1) 6% SDPP, 2) 6% SDPI, and 3) 3% SDPP+3% SDPI. The apparent and true ID values of the essential amino acids except leucine, methionine and valine were lower (p<0.01) in SDPI than in SDPP. The average apparent ID of essential amino acids in SDPP and SDPI were 75.63 and 71.30%, and the average true ID of essential amino acids 84.83 and 80.51%, respectively. The ADG and feed conversion ratio in piglets fed the 6% SDPP diet were better (p<0.01) than in those fed the 6% SDPI diet. When 3% of SDPP was replaced by SDPI, however, the growth rate and efficiency of pigs were comparable to those in pigs fed 6% SDPP. In conclusion, SDPP can be partially replaced by SDPI without any detrimental effect on growth performance in early-weaned pigs.

The Effects of Supportive Information Types in Web-Based Learning Using 4C/ID Model (4C/ID 모형을 적용한 웹기반 학습에서 지원정보 유형에 따른 효과)

  • Kim, Kyung;Kim, Kyung-Jin
    • Journal of The Korean Association of Information Education
    • /
    • v.20 no.6
    • /
    • pp.655-672
    • /
    • 2016
  • The purpose of this study was to investigate the effects of prior-knowledge level and supportive information types in web-based learning using 4C/ID model(Four-Components Instructional Design model) on cognitive load and schema acquisition. To achieve the purpose, this study applied a web based learning. 166 university students participated in web-based learning for 4 weeks. After web-based learning, they checked self report for cognitive load and made concept map for schema acquisition and the datum from them were used for 2 ways ANOVA. According to the findings, groups in prior-knowledge level invested significantly differences on cognitive load and a question group in case of supportive information types didn't invested significant differences on cognitive load with statement group. Second, groups in prior-knowledge level invested significantly differences on schema acquisition and a question group in case of supportive information types invested significantly higher schema acquisition than a statement group. Furthermore, it happened interaction effect between supportive information types and prior-knowledge level on schema acquisition. This research has several implications with regard to suggesting the guidelines and conditions for the authentic task of the novice.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Analytic Techniques for Change Detection using Landsat (Landast 영상을 이용한 변화탐지 분석 기법 연구)

  • Choi, Chul-Uong;Lee, Chang-Hun;Suh, Yong-Cheol;Kim, Ji-Yong
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.12 no.3
    • /
    • pp.13-20
    • /
    • 2009
  • Techniques for change detection using satellite images enable efficient detection of natural and artificial changes in use of land through multi-phase images. As for change detection, different results are made based on methods of calibration of satellite images, types of input data, and techniques in change analysis. Thus, an analytic technique that is appropriate to objectives of a study shall be applied as results are different based on diverse conditions even when an identical satellite and an identical image are used for change detection. In this study, Normalized Difference Vegetation Index (NDVI) and Principal Component Analysis (PCA) were conducted after geometric calibration of satellite images which went through absolute and relative radiometric calibrations and change detection analysis was conducted using Image Difference (ID) and Image Rationing (IR). As a result, ID-NDVI showed excellent accuracy in change detection related to vegetation. ID-PCA showed 90% of accuracy in all areas. IR-NDVI had 90% of accuracy while it was 70% and below as for paddies and dry fields${\rightarrow}$grassland. IR-PCA had excellent change detection over all areas.

  • PDF

Changes in the Properties of Cotton Cellulose by Hydrogen Peroxide Bleaching (과산화수소 표백조건에 따른 면셀룰로오스의 특성 변화)

  • Heo, Yong-Dae;Sung, Yong Joo;Joung, Yang-Jin;Kim, Duk-Ki;Kim, Tae-Young
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.45 no.3
    • /
    • pp.59-68
    • /
    • 2013
  • The cotton contains various impurities such as protein, wax, pectins, coloring matter, even though cotton has been a major source of pure cellulose. The purification processes have been commonly applied to obtain the pure cellulose. However the excessive purification treatments could lead to the damage in the cellulose structure which could result in the degradation of cellulose and the limited application of cotton cellulose. In this study, the changes in cellulose structural properties such as crystallinity and DP(degree of polymerization) by the various conditions of the purification processes were investigated. The less toxic agents such as hydrogen peroxide and sodium silicate were applied for the purification treatment in this study. The increase in the process times, the temperature and the applied amount of chemical agents resulted in the more purified cellulose. The DP of cotton cellulose was increased at the first weak conditions by the reduction of small molecules such as pectin, wax, and so on. Especially the 2 % addition amount of $H_2O_2$ with $Na_2SiO_3$ resulted in the higher value in the DP and the brightness compared to the 1.5 % addition amount of $H_2O_2$. However, the 4 % addition amount of $H_2O_2$ with $Na_2SiO_3$ showed the decreased value because of excessive treatment. In case of the changes in the crystallinity (Gjk), the highest value of the crystallinity was obtained by the 2% addition amount of $H_2O_2$ on the cotton cellulose, which showed similar with the change in the DP.

User Authentication System Using USB Device Information (USB 장치 정보를 이용한 사용자 인증방안)

  • Lee, Jin-Hae;Jo, In-June;Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.276-282
    • /
    • 2017
  • Password-based authentication is vulnerable because of its low cost and convenience, but it is still widely used. In order to increase the security of the password-based user authentication method, the password is changed frequently, and it is recommended to use a combination of numbers, alphabets and special characters when generating the password. However, it is difficult for users to remember passwords that are difficult to create and it is not easy to change passwords periodically. Therefore, in this paper, we implemented a user authentication system that does not require a password by using the USB memory that is commonly used. Authentication data used for authentication is protected by USB data stored in USB memory using USB device information to improve security. Also, the authentication data is one-time and reusable.Based on this, it is possible to have the same security as the password authentication system and the security level such as certificate or fingerprint recognition.

Image Watermarking for Identification Forgery Prevention (신분증 위변조 방지를 위한 이미지 워터마킹)

  • Nah, Ji-Hah;Kim, Jong-Weon;Kim, Jae-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.552-559
    • /
    • 2011
  • In this paper, a new image watermarking algorithm is proposed which can hide specific information of an ID card's owner in photo image for preventing ID's photo forgery. Proposed algorithm uses the image segmentation and the correlation peak position modulation of spread spectrum. The watermark embedded in photo ensures not only robustness against printing and scanning but also sufficient information capacity hiding unique number such as social security numbers in small-sized photo. Another advantage of proposed method is extracting accurate information with error tolerance within some rotation range by using $2^h{\times}2^w$ unit sample space not instead $1{\times}1$ pixels for insertion and extraction of information. 40 bits information can be embedded and extracted at $256{\times}256$ sized ID photo with BER value of 0 % when the test condition is 300dpi scanner and photo printer with 22 photos. In conclusion, proposed algorithm shows the robustness for noise and rotational errors occured during printing and scanning.