• Title/Summary/Keyword: Identification Code

Search Result 345, Processing Time 0.028 seconds

IDENTIFICATION CODE OF INTERSTELLAR CLOUDS WITHIN IRAF

  • Lee, Young-Ung;Jung, Jae-Hoon;Kim, Hyun-Goo
    • Publications of The Korean Astronomical Society
    • /
    • v.12 no.1
    • /
    • pp.185-196
    • /
    • 1997
  • We present a code which identifies individual clouds in crowded region using IMFORT interface within Image Reduction and Analysis Facility (IRAF). We define a cloud as an object composed of all pixels in longitude, latitude, and velocity that are simply connected and that lie above some threshold temperature. The code searches the whole pixels of the data cube in efficient way to isolate individual clouds. Along with identification of clouds it is designed to estimate their mean values of longitudes, latitudes, and velocities. In addition, a function of generating individual images (or cube data) of identified clouds is added up. We also present identified individual clouds using a $^{12}CO$ survey data cube of Galactic Anticenter Region (Lee et al. 1997) as a test example. We used a threshold temperature of $5\sigma$ rms noise level of the data With a higher threshold temperature, we isolated subclouds of a huge cloud identified originally. As the most important parameter to identify clouds is the threshold value, its effect to the size and velocity dispersion is discussed rigorously.

  • PDF

Implementation of a Portable Identification System using Iris Recognition Techniques (홍채인식을 이용한 정보보안을 위한 휴대용 신분인식기 개발)

  • Joo, Sang-Hyun;Yang, Woo-Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.107-112
    • /
    • 2011
  • In this paper, we introduce the implementation of the security system using iris recognition. This system acquires images with infrared camera and extracts the 2D code from a infrared image which uses scale-space filtering and concavity. We examine the system by (i) extract 2D code and (ii) compare the code that stored on the server (iii) measure FAR and FRR using pattern matching. Experiment results show that the proposed method is very suitable.

A Method of Object Identification from Procedural Programs (절차적 프로그램으로부터의 객체 추출 방법론)

  • Jin, Yun-Suk;Ma, Pyeong-Su;Sin, Gyu-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.10
    • /
    • pp.2693-2706
    • /
    • 1999
  • Reengineering to object-oriented system is needed to maintain the system and satisfy requirements of structure change. Target systems which should be reengineered to object-oriented system are difficult to change because these systems have no design document or their design document is inconsistent of source code. Using design document to identifying objects for these systems is improper. There are several researches which identify objects through procedural source code analysis. In this paper, we propose automatic object identification method based on clustering of VTFG(Variable-Type-Function Graph) which represents relations among variables, types, and functions. VTFG includes relations among variables, types, and functions that may be basis of objects, and weights of these relations. By clustering related variables, types, and functions using their weights, our method overcomes limit of existing researches which identify too big objects or objects excluding many functions. The method proposed in this paper minimizes user's interaction through automatic object identification and make it easy to reenginner procedural system to object-oriented system.

  • PDF

Identification of FSK Radar Modulation (FSK 변조 레이더 신호 인식 기술)

  • Lim, Ha-Young;You, Kyung-Jin;Shin, Hyun-Chool
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.2
    • /
    • pp.425-430
    • /
    • 2017
  • This paper presents a novel method for identification of FSK modulated radar signal. Three features which measure the number of frequency tones, the regularity of the frequency shifting, and the diversity of power spectrum of detected radar signal, are introduced. A Two-step combined maximum likelihood classifier was used to identify the details of the detected FSK signal; the modulation order and the use of Costas code. We attempted to divide FSK signal into binary FSK, ternary FSK, 8-ary FSK, and FSK with Costas code of length 7. The simulation results indicated that the proposed methods achieves an averaged identification accuracy was 99.93% at a signal-to-noise of 0 dB.

A Service Identification Scheme for the Convergence of Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크 융합을 위한 서비스 식별 체계)

  • Uhm, Huy-Jung;Eun, Seong-Bae;Jun, Jung-Ho;Kang, Gwon-U;Ju, Yong-Wan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.104-113
    • /
    • 2011
  • While converging USN Services, a single physical infrastructure can be used in several services and in several physical infrastructures can make up a single service. Therefore the physical infrastructure and service have to manage separately for effective convergence of USN Services. However, established Identification Scheme is not suitable to distinguish various services that USN provides. This paper suggests USN Service Identification Scheme that can be separated and managed. Through USN Service Identification Scheme suggested, firstly, it is possible to obtain Service Identification Scheme utilizing various technology such as RFID TAG, QR Code, radio broadcasting, etc. because it is possible to process USN Service Identification Scheme. Secondly, it is easy to mange the service, develope the user application program and interlock with established USN Standard technique as view from service provider. Thirdly, it is possible to manage systematically USN Service. Fourthly, users can search USN Service easily, so it can contribute actively for invigoration of USN service. This thesis, firstly, has analyzed about standard related USN Service and USN Identification Scheme. Secondly, this has suggested brand-new USN Service Identification Scheme based on established USN Identification Scheme.

Tag-Identification Mechanism using Orthogonal Code in RFID System (RFID 시스템에서 Orthogonal Code를 사용한 태그 인식 메커니즘)

  • Kim, Sung-Jun;Jung, Young-Hwan;Ahn, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.490-492
    • /
    • 2005
  • 본 논문에서는 별도의 충돌 방지 메커니즘이 필요 없는 orthogonal code를 태그 ID로 부여함으로써 태그 인식을 간단하게 하는 메커니즘에 대해 설명한다. 첫 번째 적용 메커니즘으로 Local환경에서 Orthogonal code가 적용될 수 있는 여러 가지 응용 분야를 제안하고 두 번째로 Orthogonal code를 기존 ID 체계의 일부분으로 사용하여 anti-collision algorithm의 효율을 높이는 방법을 제시한다. 마지막으로 orthogonal code ID의 개수가 많아짐에 따라 code bit수가 길어지는 문제를 해결하기 위하여 code를 블록화 하여 사용 bit를 줄이는 메커니즘을 제시한다.

  • PDF

Automatic Container Code Recognition from Multiple Views

  • Yoon, Youngwoo;Ban, Kyu-Dae;Yoon, Hosub;Kim, Jaehong
    • ETRI Journal
    • /
    • v.38 no.4
    • /
    • pp.767-775
    • /
    • 2016
  • Automatic container code recognition from a captured image is used for tracking and monitoring containers, but often fails when the code is not captured clearly. In this paper, we increase the accuracy of container code recognition using multiple views. A character-level integration method combines recognized codes from different single views to generate a new code. A decision-level integration selects the most probable results from the codes from single views and the new integrated code. The experiment confirmed that the proposed integration works successfully. The recognition from single views achieved an accuracy of around 70% for the test images collected on a working pier, whereas the proposed integration method showed an accuracy of 96%.

A Study of the Damage and the Countermeasure by Identification Card Loss (신분증 분실에 따른 피해 및 대응책에 관한 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.3
    • /
    • pp.53-64
    • /
    • 2017
  • Korean Identification card or driver license is usually used to verify one's identity in Korea. These are also used as an adult certification. Since the form of these ID card is an analog and it needs to be checked with naked eyes, it might be used maliciously. Someone who's got someone else's ID card can do other things. Therefore, it must be reported rapidly when ID card is lost or stolen. The most serious problem might be occurred when they do not recognize and report the loss. They might suffer from pecuniary or mental damage such as opening a mobile phone service, providing loan or credit card, opening a personal checking account, etc. Thus, this study suggests and compares the ways of avoiding these problems. First, the most effective way is to send the authorization code via mobile phones in consideration of build-up period and cost. The person in charge of business processing department using ID card sends the authorization code via registered mobile phone. The owners submits it to the person and their identifications are confirmed. Next effective way is that the person in charge of business processing department using ID card sends text messages via registered mobile phone. Lastly, the most ineffective way is to introduce and implement the electronic ID card ultimately even though it is expensive and takes a long time to build up the system.

Identification of Attack Group using Malware and Packer Detection (악성코드 및 패커 탐지를 이용한 공격 그룹 판별)

  • Moon, Heaeun;Sung, Joonyoung;Lee, Hyunsik;Jang, Gyeongik;Kwak, Kiyong;Woo, Sangtae
    • Journal of KIISE
    • /
    • v.45 no.2
    • /
    • pp.106-112
    • /
    • 2018
  • Recently, the number of cyber attacks using malicious code has increased. Various types of malicious code detection techniques have been researched for several years as the damage has increased. In recent years, profiling techniques have been used to identify attack groups. This paper focuses on the identification of attack groups using a detection technique that does not involve malicious code detection. The attacker is identified by using a string or a code signature of the malicious code. In addition, the detection rate is increased by adding a technique to confirm the packing file. We use Yara as a detection technique. We have research about RAT (remote access tool) that is mainly used in attack groups. Further, this paper develops a ruleset using malicious code and packer main feature signatures for RAT which is mainly used by the attack groups. It is possible to detect the attacker by detecting RAT based on the newly created ruleset.

A FAST REDUCTION METHOD OF SURVEY DATA IN RADIO ASTRONOMY

  • LEE YOUNGUNG
    • Journal of The Korean Astronomical Society
    • /
    • v.34 no.1
    • /
    • pp.1-8
    • /
    • 2001
  • We present a fast reduction method of survey data obtained using a single-dish radio telescope. Along with a brief review of classical method, a new method of identification and elimination of negative and positive bad channels are introduced using cloud identification code and several IRAF (Image Reduction and Analysis Facility) tasks relating statistics. Removing of several ripple patterns using Fourier Transform is also discussed. It is found that BACKGROUND task within IRAF is very efficient for fitting and subtraction of base-line with varying functions. Cloud identification method along with the possibility of its application for analysis of cloud structure is described, and future data reduction method is discussed.

  • PDF