• Title/Summary/Keyword: Identification Code

Search Result 349, Processing Time 0.021 seconds

Analyses of the Effect of Inserting Border Lines between Adjacent Color Regions on Detecting Boundaries (경계선 검출에 대한 인접 칼라 영역간 테두리 선 삽입 효과의 분석)

  • Yoo, Hyeon-Joong;Kim, Woo-Sung;Jang, Young-Beom
    • Journal of IKEEE
    • /
    • v.10 no.1 s.18
    • /
    • pp.87-95
    • /
    • 2006
  • This paper presents the analyses of the effect of inserting border lines between different color regions on edge detection in color codes, and is not intended to present any new algorithm for color-code recognition. With its role to complement the RFID (radio frequency identification) and the wide and fast spread of digital cameras, an interest on color codes is fast increasing. However, the severe distortion of colors in obtained images prohibits color codes from expanding their applications. To reduce the effect of color distortion it is desirable to process the whole pixels in each color region statistically, instead of relying on some pixels sampled from the region. This requires segmentation, and the segmentation usually requires edge detection. To help detect edges not disconnected, we inserted border lines of the width of two pixels between adjacent color regions. Two colors were used for the border lines: one consisting of white pixels, and the other black pixels. The edge detection was performed on images with either of the two kinds of border lines inserted, and the results were compared to results without inserted border lines. We found that inserting black border lines degraded edge detection by causing zipper effect while inserting white border lines improved it compared to the cases without inserted border lines.

  • PDF

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

A Study of the Valid Model(Kernel Regression) of Main Feed-Water for Turbine Cycle (주급수 유량의 유효 모델(커널 회귀)에 대한 연구)

  • Yang, Hac-Jin;Kim, Seong-Kun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.12
    • /
    • pp.663-670
    • /
    • 2019
  • Corrective thermal performance analysis is required for power plants' turbine cycles to determine the performance status of the cycle and improve the economic operation of the power plant. We developed a sectional classification method for the main feed-water flow to make precise corrections for the performance analysis based on the Performance Test Code (PTC) of the American Society of Mechanical Engineers (ASME). The method was developed for the estimation of the turbine cycle performance in a classified section. The classification is based on feature identification of the correlation status of the main feed-water flow measurements. We also developed predictive algorithms for the corrected main feed-water through a Kernel Regression (KR) model for each classified feature area. The method was compared with estimation using an Artificial Neural Network (ANN). The feature classification and predictive model provided more practical and reliable methods for the corrective thermal performance analysis of a turbine cycle.

Relative Importance Analysis on Technology Adoption Factors of RFID in SCM (SCM에서 무선인식 기술 수용 요인 별 상대적 중요도 분석)

  • Kim, Tae-Young;Choi, Jun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.185-194
    • /
    • 2007
  • Today, there is in the world-wide cognition about RFID technology due to established standard, EPC(Electronic Product Code). RFID technology will have wide influence over various fields. Especially, RFID technology's advantages will have positive influence on logistics field. We can solve limited various problems presented in SCM by applying RFIB technology. We can have higher cantrol system, better benefits and actual decision information. Many organizations, however, still have hesitated now because RFID technology has not been validated and RFID technology is in early stage. Other problems are employee resistance against new technology and lack of academic empirical research on assimilation RFID technology for organization. Above reasons I mentioned make me study on analysis on assimilation RFID technology decision in SCM field. This study attempts to analyze the assimilation RFID technology factor from previous researches by using AHP. This outcomes of study will be helpful when we assimilate RFID technology in SCM fields.

Optimization of a microarray for fission yeast

  • Kim, Dong-Uk;Lee, Minho;Han, Sangjo;Nam, Miyoung;Lee, Sol;Lee, Jaewoong;Woo, Jihye;Kim, Dongsup;Hoe, Kwang-Lae
    • Genomics & Informatics
    • /
    • v.17 no.3
    • /
    • pp.28.1-28.9
    • /
    • 2019
  • Bar-code (tag) microarrays of yeast gene-deletion collections facilitate the systematic identification of genes required for growth in any condition of interest. Anti-sense strands of amplified bar-codes hybridize with ~10,000 (5,000 each for up-and down-tags) different kinds of sense-strand probes on an array. In this study, we optimized the hybridization processes of an array for fission yeast. Compared to the first version of the array (11 ㎛, 100K) consisting of three sectors with probe pairs (perfect match and mismatch), the second version (11 ㎛, 48K) could represent ~10,000 up-/ down-tags in quadruplicate along with 1,508 negative controls in quadruplicate and a single set of 1,000 unique negative controls at random dispersed positions without mismatch pairs. For PCR, the optimal annealing temperature (maximizing yield and minimizing extra bands) was 58℃ for both tags. Intriguingly, up-tags required 3× higher amounts of blocking oligonucleotides than down-tags. A 1:1 mix ratio between up- and down-tags was satisfactory. A lower temperature (25℃) was optimal for cultivation instead of a normal temperature (30℃) because of extra temperature-sensitive mutants in a subset of the deletion library. Activation of frozen pooled cells for >1 day showed better resolution of intensity than no activation. A tag intensity analysis showed that tag(s) of 4,316 of the 4,526 strains tested were represented at least once; 3,706 strains were represented by both tags, 4,072 strains by up-tags only, and 3,950 strains by down-tags only. The results indicate that this microarray will be a powerful analytical platform for elucidating currently unknown gene functions.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

A Study on RFID System Design and Expanded EPCIS Model for Manufacturing Systems (제조 시스템의 RFID System 설계 및 EPCIS 확장모형 연구)

  • Choi, Weon-Yong;Lee, Jong-Tae
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.6
    • /
    • pp.123-135
    • /
    • 2007
  • In the recent years, the companies have manually recorded a production status in a work diary or have mainly used a bar code in order to collect each process's progress status, production performance and quality information in the production and logistics process in real time. But, it requires an additional work because the worker's record must be daily checked or the worker must read it with the bar code scanner. At this time, data's accuracy is decreased owing to the worker's intention or mistake, and it causes the problem of the system's reliability. Accordingly, in order to solve such problem, the companies have introduced RFID which comes into the spotlight in the latest automatic identification field. In order to introduce the RFID technology, the process flow must be analyzed, but the ASME sign used by most manufacturing companies has the difficult problem when the aggregation event occurs. Hence, in this study, the RFID logistic flow analysis Modeling Notation was proposed as the signature which can analyze the manufacturing logistic flow amicably, and the manufacturing logistic flow by industry type was analyzed by using the proposed RFID logistic flow analysis signature. Also, to monitor real-time information through EPCglobal network, EPCISEvent template by industry was proposed, and it was utilized as the benchmarking case of companies for RFID introduction. This study suggested to ensure the decision-making on real-time information through EPCglobal network. This study is intended to suggest the Modeling Notation suitable for RFID characteristics, and the study is intended to establish the business step and to present the vocabulary.

Real-time Water Supply Facilities Monitoring System based on the USN (USN 기반의 실시간 수도설비 모니터링 시스템)

  • Kim, Yong-Tae;Yoo, Neung-Hwan;Park, Gil-Cheol;Kim, Seok-Soo;Kim, Tai-Hoon;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1207-1213
    • /
    • 2007
  • This paper has researched water supply facilities management using real-time water utility monitoring system based on USN(Ubiquitous Sensor Network) which is consisted of wireless sensors transferring waterworks facilities md treatment information about a valve-room and flowmeter-room of water supply installation. In the manholes, it was installed with flowmeter, pressure sensors, vibration sensors, Co-sensors, and hydro-thermograph sensors. These measurement values which are received by PDA are used for facilities operation on the spot safely and conveniently. It has also provided safe installation management via CDMA(Code Division Multiple Access) network which transfers data to remote servers to monitoring at a distance place. With safety management system of water supply facilities on USN technology convenience and safety is increased in real situation, and it is expected that we can supply clean water to people as much safer and more effective water supply installation management.

Souce Code Identification Using Deep Neural Network (심층신경망을 이용한 소스 코드 원작자 식별)

  • Rhim, Jisu;Abuhmed, Tamer
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.9
    • /
    • pp.373-378
    • /
    • 2019
  • Since many programming sources are open online, problems with reckless plagiarism and copyrights are occurring. Among them, source codes produced by repeated authors may have unique fingerprints due to their programming characteristics. This paper identifies each author by learning from a Google Code Jam program source using deep neural network. In this case, the original creator's source is to be vectored using a pre-processing instrument such as predictive-based vector or frequency-based approach, TF-IDF, etc. and to identify the original program source by learning by using a deep neural network. In addition a language-independent learning system was constructed using a pre-processing machine and compared with other existing learning methods. Among them, models using TF-IDF and in-depth neural networks were found to perform better than those using other pre-processing or other learning methods.

Authorship Attribution Framework Using Survival Network Concept : Semantic Features and Tolerances (서바이벌 네트워크 개념을 이용한 저자 식별 프레임워크: 의미론적 특징과 특징 허용 범위)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1013-1021
    • /
    • 2020
  • Malware Authorship Attribution is a research field for identifying malware by comparing the author characteristics of unknown malware with the characteristics of known malware authors. The authorship attribution method using binaries has the advantage that it is easy to collect and analyze targeted malicious codes, but the scope of using features is limited compared to the method using source code. This limitation has the disadvantage that accuracy decreases for a large number of authors. This study proposes a method of 'Defining semantic features from binaries' and 'Defining allowable ranges for redundant features using the concept of survival network' to complement the limitations in the identification of binary authors. The proposed method defines Opcode-based graph features from binary information, and defines the allowable range for selecting unique features for each author using the concept of a survival network. Through this, it was possible to define the feature definition and feature selection method for each author as a single technology, and through the experiment, it was confirmed that it was possible to derive the same level of accuracy as the source code-based analysis with an improvement of 5.0% accuracy compared to the previous study.