• Title/Summary/Keyword: Identification Code

Search Result 345, Processing Time 0.027 seconds

RFID Tag Number Estimation and Query Time Optimization Methods (RFID 태그 개수 추정 방법 및 질의 시간 최소화 방안)

  • Woo, Kyung-Moon;Kim, Chong-Kwon
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.6
    • /
    • pp.420-427
    • /
    • 2006
  • An RFID system is an important technology that could replace the traditional bar code system changing the paradigm of manufacturing, distribution, and service industry. An RFID reader can recognize several hundred tags in one second. Tag identification is done by tags' random transmission of their IDs in a frame which is assigned by the reader at each round. To minimize tag identification time, optimal frame size should be selected according to the number of tags. This paper presents new query optimization methods in RFID systems. Query optimization consists of tag number estimation problem and frame length determination problem. We propose a simple yet efficient tag estimation method and calculate optimal frame lengths that minimize overall query time. We conducted rigorous performance studies. Performance results show that the new tag number estimation technique is more accurate than previous methods. We also observe that a simple greedy method is as efficient as the optimal method in minimizing the query time.

Big Data Processing and Performance Improvement for Ship Trajectory using MapReduce Technique

  • Kim, Kwang-Il;Kim, Joo-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.65-70
    • /
    • 2019
  • In recently, ship trajectory data consisting of ship position, speed, course, and so on can be obtained from the Automatic Identification System device with which all ships should be equipped. These data are gathered more than 2GB every day at a crowed sea port and used for analysis of ship traffic statistic and patterns. In this study, we propose a method to process ship trajectory data efficiently with distributed computing resources using MapReduce algorithm. In data preprocessing phase, ship dynamic and static data are integrated into target dataset and filtered out ship trajectory that is not of interest. In mapping phase, we convert ship's position to Geohash code, and assign Geohash and ship MMSI to key and value. In reducing phase, key-value pairs are sorted according to the same key value and counted the ship traffic number in a grid cell. To evaluate the proposed method, we implemented it and compared it with IALA waterway risk assessment program(IWRAP) in their performance. The data processing performance improve 1 to 4 times that of the existing ship trajectory analysis program.

Numerical Modeling for the Identification of Fouling Layer in Track Ballast Ground (자갈도상 지반에서의 파울링층 식별을 위한 수치해석연구)

  • Go, Gyu-Hyun;Lee, Sung-Jin
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.9
    • /
    • pp.13-24
    • /
    • 2021
  • Recently, attempts have been made to detect fouling patterns in the ground using Ground Penetrating Radar (GPR) during the maintenance of gravel ballast railway tracks. However, dealing with GPR signal data obtained with a large amount of noise in a site where complex ground conditions are mixed, often depends on the experience of experts, and there are many difficulties in precise analysis. Therefore, in this study, a numerical modeling technique that can quantitatively simulate the GPR signal characteristics according to the degree of fouling of the gravel ballast material was proposed using python-based open-source code gprMax and RSA (Random sequential Absorption) algorithm. To confirm the accuracy of the simulation model, model tests were manufactured and the results were compared to each other. In addition, the identification of the fouling layer in the model test and analysis by various test conditions was evaluated and the results were analyzed.

Status-Based RFID Authentication Protocol (상태기반 RFID 인증 프로토콜)

  • Yoo Sung Ho;Kim KiHyun;Hwang Yong Ho;Lee Pil Joong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.57-68
    • /
    • 2004
  • Recently, Radio Frequency Identification (RFID) systems stands in the spotlight of industry as a common and useful tool in manufacturing, supply chain management (SCM) and stock management. In the near future, low-cost RFID Electronic Product Code; (EPC) or smart-labels may be a practical replacement for optical barcodes on consumer items. However, manufacturing cheap and small RFID tags, and developing secure RFID authentication Protocols are problems which need to be solved. In spite of advances in semiconductor technology, computation and storage ability of the tag are so limited that it is difficult and too expensive to apply existing crypto-systems to RFID tags. Thus it is necessary to create a new protocol which would require less storage space and lower computation costs and that is secure in the RFID system's environments. In this paper, we propose a RFID authentication protocol that is secure against location tracking and spoofing attacks. Our protocol can be used as a practical solution for privacy protection because it requires less computations in database than the previous RFID authentication protocol.

Identification of Microservices to Develop Cloud-Native Applications (클라우드네이티브 애플리케이션 구축을 위한 마이크로서비스 식별 방법)

  • Choi, Okjoo;Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • Microservices are not only developed independently, but can also be run and deployed independently, ensuring more flexible scaling and efficient collaboration in a cloud computing environment. This impact has led to a surge in migrating to microservices-oriented application environments in recent years. In order to introduce microservices, the problem of identifying microservice units in a single application built with a single architecture must first be solved. In this paper, we propose an algorithm-based approach to identify microservices from legacy systems. A graph is generated using the meta-information of the legacy code, and a microservice candidate is extracted by applying a clustering algorithm. Modularization quality is evaluated using metrics for the extracted microservice candidates. In addition, in order to validate the proposed method, candidate services are derived using codes of open software that are widely used for benchmarking, and the level of modularity is evaluated using metrics. It can be identified as a smaller unit of microservice, and as a result, the module quality has improved.

Aeroelastic modeling to investigate the wind-induced response of a multi-span transmission lines system

  • Azzi, Ziad;Elawady, Amal;Irwin, Peter;Chowdhury, Arindam Gan;Shdid, Caesar Abi
    • Wind and Structures
    • /
    • v.34 no.2
    • /
    • pp.231-257
    • /
    • 2022
  • Transmission lines systems are important components of the electrical power infrastructure. However, these systems are vulnerable to damage from high wind events such as hurricanes. This study presents the results from a 1:50 scale aeroelastic model of a multi-span transmission lines system subjected to simulated hurricane winds. The transmission lines system considered in this study consists of three lattice towers, four spans of conductors and two end-frames. The aeroelastic tests were conducted at the NSF NHERI Wall of Wind Experimental Facility (WOW EF) at the Florida International University (FIU). A horizontal distortion scaling technique was used in order to fit the entire model on the WOW turntable. The system was tested at various wind speeds ranging from 35 m/s to 78 m/s (equivalent full-scale speeds) for varying wind directions. A system identification (SID) technique was used to evaluate experimental-based along-wind aerodynamic damping coefficients and compare with their theoretical counterparts. Comparisons were done for two aeroelastic models: (i) a self-supported lattice tower, and (ii) a multi-span transmission lines system. A buffeting analysis was conducted to estimate the response of the conductors and compare it to measured experimental values. The responses of the single lattice tower and the multi-span transmission lines system were compared. The coupling effects seem to drastically change the aerodynamic damping of the system, compared to the single lattice tower case. The estimation of the drag forces on the conductors are in good agreement with their experimental counterparts. The incorporation of the change in turbulence intensity along the height of the towers appears to better estimate the response of the transmission tower, in comparison with previous methods which assumed constant turbulence intensity. Dynamic amplification factors and gust effect factors were computed, and comparisons were made with code specific values. The resonance contribution is shown to reach a maximum of 18% and 30% of the peak response of the stand-alone tower and entire system, respectively.

The attacker group feature extraction framework : Authorship Clustering based on Genetic Algorithm for Malware Authorship Group Identification (공격자 그룹 특징 추출 프레임워크 : 악성코드 저자 그룹 식별을 위한 유전 알고리즘 기반 저자 클러스터링)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.1-8
    • /
    • 2020
  • Recently, the number of APT(Advanced Persistent Threats) attack using malware has been increasing, and research is underway to prevent and detect them. While it is important to detect and block attacks before they occur, it is also important to make an effective response through an accurate analysis for attack case and attack type, these respond which can be determined by analyzing the attack group of such attacks. Therefore, this paper propose a framework based on genetic algorithm for analyzing malware and understanding attacker group's features. The framework uses decompiler and disassembler to extract related code in collected malware, and analyzes information related to author through code analysis. Malware has unique characteristics that only it has, which can be said to be features that can identify the author or attacker groups of that malware. So, we select specific features only having attack group among the various features extracted from binary and source code through the authorship clustering method, and apply genetic algorithm to accurate clustering to infer specific features. Also, we find features which based on characteristics each group of malware authors has that can express each group, and create profiles to verify that the group of authors is correctly clustered. In this paper, we do experiment about author classification using genetic algorithm and finding specific features to express author characteristic. In experiment result, we identified an author classification accuracy of 86% and selected features to be used for authorship analysis among the information extracted through genetic algorithm.

Smart Ship Container With M2M Technology (M2M 기술을 이용한 스마트 선박 컨테이너)

  • Sharma, Ronesh;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.3
    • /
    • pp.278-287
    • /
    • 2013
  • Modern information technologies continue to provide industries with new and improved methods. With the rapid development of Machine to Machine (M2M) communication, a smart container supply chain management is formed based on high performance sensors, computer vision, Global Positioning System (GPS) satellites, and Globle System for Mobile (GSM) communication. Existing supply chain management has limitation to real time container tracking. This paper focuses on the studies and implementation of real time container chain management with the development of the container identification system and automatic alert system for interrupts and for normal periodical alerts. The concept and methods of smart container modeling are introduced together with the structure explained prior to the implementation of smart container tracking alert system. Firstly, the paper introduces the container code identification and recognition algorithm implemented in visual studio 2010 with Opencv (computer vision library) and Tesseract (OCR engine) for real time operation. Secondly it discusses the current automatic alert system provided for real time container tracking and the limitations of those systems. Finally the paper summarizes the challenges and the possibilities for the future work for real time container tracking solutions with the ubiquitous mobile and satellite network together with the high performance sensors and computer vision. All of those components combine to provide an excellent delivery of supply chain management with outstanding operation and security.

A National Survey on Utilization of Pattern Identification among Korean Medicine Doctors (전국 한방의료기관 한의사 대상 한의 변증활용 현황 조사)

  • Yeo, Minkyung;Park, Kihyun;Jang, Eunsu;Lee, Youngseop
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2015
  • Objective : The aim of this study was to survey the present utilization of pattern identification(PI) in the clinical field among Korean Medicine Doctors. Method : This survey was conducted from Oct. 1 to Oct. 31, 2014 by face-to-face interview using structured questionnaire. The subjects were 400 korean medicine doctors who worked in hospitals or clinics. The questionnaire consisted of two sections - a demographics section(i.e., sex, age, clinical experience, place of work, residence and so on) and the main research section(i.e., the PI utilization rate, the utilization of PI systems, the utilization of PI in the clinical domain and in the treatment domain, the correlation between utilization PI and so on). Results : This study revealed that subjects used the PI to 66.7% of their patients on average. The utilization rate of PI in patients was significantly higher for female physicians than for male physicians, for physicians worked in clinics than for physicians who worked in hospitals and for physicians with more than 10 years clinical experience than for physicians with less than 10 years clinical experience. In the utilization of PI systems, Visceral PI was most as 92.0%. There were significant difference on the PI utilization rate according to utilization of Meridian and Collateral PI, Triple Energizer PI, Defense, Qi, Nutrient and Blood PI, Six-Meridian PI and Six Excesses PI. As a result of analysing the PI utilization rate by clinical domain and in the treatment domain, the Treatment and the Drug Treatment showed the highest values. Among utilized PI systems, the correlation coefficients between Defense, Qi, Nutrient and Blood PI and Triple Energizer PI showed the highest value, but the correlation coefficients between Sasang Constitutional Medicine with the each PI showed substantially lower value. Conclusion : The results of this study demonstrate that usage of PI was higher than usage of U code(in KCD) usage in clinical field. we suggested that additional studies on using PI and developing more appropriate standardized tool should be conducted to widen scope of PI's utilization.

Application of DNA Test for Individual Traceability in Hanwoo (Korean Cattle) (한우의 개체 추적 검증을 위한 유전자 감식 기법 활용 연구)

  • 이학교;전광주;공홍식;오재돈;최일신;김종대;조창연;윤두학;신형두
    • Food Science of Animal Resources
    • /
    • v.24 no.1
    • /
    • pp.8-14
    • /
    • 2004
  • Identification of animals has been made with an ear tag with dummy code, and blood typing has been used for paternity and individual identification in live animals. As various genetic markers are for different cattle breeds vary, the discrete genetic markers are necessary to identify Hanwoo. A total of 740 progeny testing Hanwoo were used to identify Hanwoo specific markers. To examine traceability of individuals by using breed specific genetic codes, four animal were randomly sampled, and traced from live animals to post-slaughter processing stages. The candidate genetic makers used in the study were 16 DNA microsatellites which were identified in romosomes 1 and 14. The number of alleles of those DNA microsatellites ranged from a minimum of 3 to maximum of 12. The heterozygote frequency ranged from 0.022 to 0.824. Effective number of alleles for each DNA microsatellites were 3 to 6. Six selected candidate genetic markers were able ti trace individual cattle with an 100% confidence level.