• Title/Summary/Keyword: Identification Code

Search Result 345, Processing Time 0.026 seconds

A Study on Developing the Identification Code System for Korean Sci-Tech Journals for KSCI (KSCI 구축을 위한 국내 학술지 식별체계 연구)

  • Kim, Seon Ho;Kim, Tae Jung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.37 no.3
    • /
    • pp.71-71
    • /
    • 2003
  • 본 연구는 국내 학술지의 표준화된 학술지 식별코드 체계인 KOJIC(KOrean Journal Identification Code)를 개발하는 것이 목적이다. 이 시스템을 개발하기 위하여 전통적인 자료식별 번호체계, 주요 국가서지번호, 그리고 국제적 또는 국가적 자료식별코드체계의 구조를 조사 분석한 다음, 유일성, 간편성, 조기성, 국제성, 그리고 확정성을 갖춘 KOJIC을 개발하였다. 이것은 6 자리의 알파벳 영문자와 숫자로 구성되는 코드이며, 한 개의 체크기호를 포함하고 있다.

A code-based chromagram similarity for cover song identification (커버곡 검색을 위한 코드 기반 크로마그램 유사도)

  • Seo, Jin Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.38 no.3
    • /
    • pp.314-319
    • /
    • 2019
  • Computing chromagram similarity is indispensable in constructing cover song identification system. This paper proposes a code-based chromagram similarity to reduce the computational and the storage costs for cover song identification. By learning a song-specific codebook, a chromagram sequence is converted into a code sequence, which results in the reduction of the feature storage cost. We build a lookup table over the learned codebooks to compute chromagram similarity efficiently. Experiments on two music datasets were performed to compare the proposed code-based similarity with the conventional one in terms of cover song search accuracy, feature storage, and computational cost.

A Novel Active User Identification Method for Space based Constellation Network

  • Kenan, Zhang;Xingqian, Li;Kai, Ding;Li, Li
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.212-216
    • /
    • 2022
  • Space based constellation network is a kind of ad hoc network in which users are self-organized without center node. In space based constellation network, users are allowed to enter or leave the network at any given time. Thus, the number of active users is an unknown and time-varying parameter, and the performance of the network depends on how accurately this parameter is estimated. The so-called problem of active user identification, which consists of determining the number and identities of users transmitting in space based constellation network is discussed and a novel active user identification method is proposed in this paper. Active user identification code generated by transmitter address code and receiver address code is used to spread spectrum. Subspace-based method is used to process received signal and judgment model is established to identify active users according to the processing results. The proposed method is simulated under AWGN channel, Rician channel and Rayleigh channel respectively. Numerical results indicate that the proposed method obtains at least 1.16dB Eb/N0 gains compared with reference methods when miss alarm rate reaches 10-3.

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

A System of Multi RFID code Identification Translation using Ontology (온톨로지를 이용한 다중 RFID 코드 식별 변환 시스템)

  • Byun, Ji-Yung;Yang, Moon-seok;Cha, Ji-Yun;No, Young-sik;Byun, Young-cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.591-594
    • /
    • 2008
  • Currently RFID code systems are classified into ISO, EPC, uCode, KKR code, Mobile RFID code, and etc. According to RFID code systems, RFID system is changed. For various RFID code systems, it's difficult to make it to the network and permanence of RFID business. And the existing system isn't add new RFID code systems to RFID system, and change it efficiently. This paper is proposed to a system of Multi RFID code Identification Translation using Ontology. This system is able to identify code data from RFID reader using ontology build into the identifier info and translation info of RFID code systems, and translate to URN data. Therefore in case of extending and changing RFID code systems, we can add and change the identifier info and translation info of RFID code systems in ontology.

  • PDF

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Biometric Identification: Iris Recognition, Biometric Cryptography

  • Rawan Alrasheddi;Zainab Alawami;Maryam Hazazi;Reema Abu Alsaud;Ruba Alobaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.41-46
    • /
    • 2023
  • Biometrics is an application of biometric authentication and identification techniques that are used for security. Where people can be identified by physical or behavioral features such as iris, fingerprints, or even voice. Biometrics with cryptography can be used in a variety of applications such as issuing, generating, or associating biometric keys. Biometric identification and cryptography are used in many institutions and high-security systems due to the difficulty of tampering or forgery by hackers. In this paper, literature reviews on biometric identification and cryptography are presented and discussed. In addition to a comparison of techniques in the literature reviews, identifying its strengths and weaknesses, and providing an initial proposal for biometrics and cryptography.

Recognition of Colors of Image Code Using Hue and Saturation Values (색상 및 채도 값에 의한 이미지 코드의 칼라 인식)

  • Kim Tae-Woo;Park Hung-Kook;Yoo Hyeon-Joong
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.150-159
    • /
    • 2005
  • With the increase of interest in ubiquitous computing, image code is attracting attention in various areas. Image code is important in ubiquitous computing in that it can complement or replace RFID (radio frequency identification) in quite a few areas as well as it is more economical. However, because of the difficulty in reading precise colors due to the severe distortion of colors, its application is quite restricted by far. In this paper, we present an efficient method of image code recognition including automatically locating the image code using the hue and saturation values. In our experiments, we use an image code whose design seems most practical among currently commercialized ones. This image code uses six safe colors, i.e., R, G, B, C, M, and Y. We tested for 72 true-color field images with the size of $2464{\times}1632$ pixels. With the color calibration based on the histogram, the localization accuracy was about 96%, and the accuracy of color classification for localized codes was about 91.28%. It took approximately 5 seconds to locate and recognize the image code on a PC with 2 GHz P4 CPU.

  • PDF

An Identification System Using QR Codes for Production and Disposal Information of Internet of Things Devices (QR코드 기반 사물인터넷 디바이스의 생산/폐기 정보 식별체계)

  • Lim, Jae-Hyun;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.664-665
    • /
    • 2016
  • This paper proposes an identification system based on QR (Quick Response) code for production and disposal information of Internet of Things (IoT) devices. Three thousands and five hundreds of electronic devices have replaced and discarded in South Korea in a year, and twenty millions to fifty millions tons of e-wastes have happened throughout the world every year. According to Gartner, market research institution, the number of IoT devices will increase from 2.3 billions in 2013 to 30 billions in 2020, however, the regulations and systems which take into account environment were not prepared. The identification systems for reflecting information of devices, which are produced or discarded, are required to resolve the problem. The proposed identification system based on QR code can store much more massive data such as the producer, product's model, serial number, recycling rate, recovering rate, recyclability rate, recoverability rate than RFID (Radio-Frequency Identification). Also, users can immediately recognize production and disposal information by a QR code application in a smartphone.

  • PDF

Parametric identification of the Bouc-Wen model by a modified genetic algorithm: Application to evaluation of metallic dampers

  • Shu, Ganping;Li, Zongjing
    • Earthquakes and Structures
    • /
    • v.13 no.4
    • /
    • pp.397-407
    • /
    • 2017
  • With the growing demand for metallic dampers in engineering practice, it is urgent to establish a reasonable approach to evaluating the mechanical performance of metallic dampers under seismic excitations. This paper introduces an effective method for parameter identification of the modified Bouc-Wen model and its application to evaluating the fatigue performance of metallic dampers (MDs). The modified Bouc-Wen model which eliminates the redundant parameter is used to describe the hysteresis behavior of MDs. Relations between the parameters of the modified Bouc-Wen model and the mechanical performance parameters of MDs are studied first. A modified Genetic Algorithm using real-integer hybrid coding with relative fitness as well as adaptive crossover and mutation rates (called RFAGA) is then proposed to identify the parameters of the modified Bouc-Wen model. A reliable approach to evaluating the fatigue performance of the MDs with respect to the Chinese Code for Seismic Design of Buildings (GB 50011-2010) is finally proposed based on the research results. Experimental data are employed to demonstrate the process and verify the effectiveness of the proposed approach. It is shown that the RFAGA is able to converge quickly in the identification process, and the simulation curves based on the identification results fit well with the experimental hysteresis curves. Furthermore, the proposed approach is shown to be a useful tool for evaluating the fatigue performance of MDs with respect to the Chinese Code for Seismic Design of Buildings (GB 50011-2010).