• Title/Summary/Keyword: Code Distribution Method

Search Result 394, Processing Time 0.028 seconds

The Study for the Production of Rehmannia Glutinosa and the Import Movement and the Improving Methods of Distribution (국내 지황 생산 및 수입 동향과 유통 개선방안에 관한 연구)

  • Yeon Bok Kim;Kwang Jin Chang;Chang Ha Park;Sang Un Park
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.25 no.2
    • /
    • pp.5-11
    • /
    • 2023
  • Rehmannia glutinosa is a perennial herb belonging to the family Scrophulariaceae and is used in traditional oriental medicine. This study was carried out current status of breeding of R. glutinosa, its problems, and the matters to be improved were made. Based on the research data published so far, this study summarized the characteristics of breeds cultivated in Korea and compared and analyzed the status of cultivation area, production, import, and price changes for 15 years from 2008 to 2021. The cultivated area of R. glutinosa is gradually decreasing, and the amount of import is increasing and decreasing repeatedly. Amount of import has declined significantly. There was a lot of disinfection and disposal in the middle of import, and dried Jihwang and Sukjihwang were imported without distinction. R. glutinosa must be cultivated and supplied as a variety desired by the industry, cultivation techniques need to be taught to producers. In order to clearly identify the amount of import, import code of dried Jihwang and Sukjihwang must be classify. In addition, it is necessary to develop and supply harvesting agricultural machines for mechanization. For the stable income of producers, supply control through contract cultivation will ensure stable farm income.

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

A Study of on the Method to Select Manufacturing Activities Sensitive to Regional Characteristics by Analyzing the Locational Hierarchy (입지계층분석을 활용한 산업단지 유치 업종 결정에 관한 연구)

  • So, Jin-Kwang;Lee, Hyeon-Joo;Kim, Sun-Woo
    • Land and Housing Review
    • /
    • v.2 no.4
    • /
    • pp.559-568
    • /
    • 2011
  • This study aims at listing up those manufacturing activities sensitive to regional characteristics by analyzing locational hierarchy designed on the urban rank-size rule. This locational hierarchy by manufacturing activities is expected to provide a ground for the proper supply of an industrial complex. The analysis of the locational hierarchy by manufacturing activities can work as a method of observing the characteristics of the distribution of location for each economic activity by analyzing the trend in the change of manufacturing location. Consequently, it can be used to determine the appropriate manufacturing activities for the industrial complex of a particular region. Here, the locational hierarchy is analyzed depending on the base of the basic local government such as Gun(district level) and Si(city level), and manufacturing activities are categorized by Korea Standard Industry Code. Those activities demonstrating growth pattern are Manufacture of Electronic Equipment(KSIC 26), Manufacture of Medical Precision Optical Instruments Watch(KSIC 27), Manufacture of Motor Vehicles (KSIC 30, 31), etc. With proper infrastructures, these activities can be located everywhere. Those sectors on the decline pattern in the locational hierarchy can be summarized as Manufacture of Tobacco Products(KSIC 12), Manufacture of wearing apparel Fur Articles(KSIC 14), etc. Those sectors scattered widely in the locational hierarchy are Manufacture of Food Products(KSIC 10), Manufacture of Coke Petroleum Products(KSIC 19), Manufacture of Chemical Products(KSIC 20), Manufacture of Electronic Equipment(KSIC 26). These particular manufacturing activities can be operated in those regions in a sufficient supply of unskilled workers regardless of proper infrastructures. Those activities that have a tendency to reconcentrate on larger cities are Manufacture of Textiles(KSIC 13), Manufacture of Wearing Apparel Clothing Fur Articles(KSIC 14), Manufacture of Other Transport Equiptmen(KSIC 31). In most cases, these sectors tend to favor their existing agglomerated areas and concentrate around large cities. Therefore, it is inefficient to promote these sectors in small or medium-sized cities or underdeveloped regions. The establishment of developmental strategies of an industrial complex can gain greater competitiveness by observing such characteristics of the locational hierarchy.