• Title/Summary/Keyword: Set ID

Search Result 88, Processing Time 0.026 seconds

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

GoBean: a Java GUI application for visual exploration of GO term enrichments

  • Lee, Sang-Hyuk;Cha, Ji-Young;Kim, Hyeon-Jin;Yu, Ung-Sik
    • BMB Reports
    • /
    • v.45 no.2
    • /
    • pp.120-125
    • /
    • 2012
  • We have developed a biologist-friendly, Java GUI application (GoBean) for GO term enrichment analysis. It was designed to be a comprehensive and flexible GUI tool for GO term enrichment analysis, combining the merits of other programs and incorporating extensive graphic exploration of enrichment results. An intuitive user interface with multiple panels allows for extensive visual scrutiny of analysis results. The program includes many essential and useful features, such as enrichment analysis algorithms, multiple test correction methods, and versatile filtering of enriched GO terms for more focused analyses. A unique graphic interface reflecting the GO tree structure was devised to facilitate comparisons of multiple GO analysis results, which can provide valuable insights for biological interpretation. Additional features to enhance user convenience include built in ID conversion, evidence code-based gene-GO association filtering, set operations of gene lists and enriched GO terms, and user -provided data files. It is available at http://neon.gachon.ac.kr/GoBean/.

*-NOETHERIAN DOMAINS AND THE RING D[X]N*, II

  • Chang, Gyu-Whan
    • Journal of the Korean Mathematical Society
    • /
    • v.48 no.1
    • /
    • pp.49-61
    • /
    • 2011
  • Let D be an integral domain with quotient field K, X be a nonempty set of indeterminates over D, * be a star operation on D, $N_*$={f $\in$ D[X]|c(f)$^*$= D}, $*_w$ be the star operation on D defined by $I^{*_w}$ = ID[X]${_N}_*$ $\cap$ K, and [*] be the star operation on D[X] canonically associated to * as in Theorem 2.1. Let $A^g$ (resp., $A^{[*]g}$, $A^{[*]g}$) be the global (resp.,*-global, [*]-global) transform of a ring A. We show that D is a $*_w$-Noetherian domain if and only if D[X] is a [*]-Noetherian domain. We prove that $D^{*g}$[X]${_N}_*$ = (D[X]${_N}_*$)$^g$ = (D[X])$^{[*]g}$; hence if D is a $*_w$-Noetherian domain, then each ring between D[X]${_N}_*$ and $D^{*g}$[X]${_N}_*$ is a Noetherian domain. Let $\tilde{D}$ = $\cap${$D_P$|P $\in$ $*_w$-Max(D) and htP $\geq$2}. We show that $D\;\subseteq\;\tilde{D}\;\subseteq\;D^{*g}$ and study some properties of $\tilde{D}$ and $D^{*g}$.

Simple Identification of DNA Samples Using Multiplex PCR (다중 중합효소연쇄반응을 이용한 핵산시료의 동정방법)

  • Park, Hwa-Yong;Yu, Hyun-Joo
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.22 no.2
    • /
    • pp.427-430
    • /
    • 2008
  • Serious controls and cares using ID numbers and barcode needed throughly to have appropriate management in clinical tissues and nucleic acids inventories because these samples are the most essential and important materials in the experimental research laboratories. While almost all of the laboratories using and handling DNA samples as starting materials in their research, problems such as mixing up of two or more different samples together, contamination with other samples, and/or mistakes can occur, especially when it comes with large number of samples. These problems are rather frequent even though researchers pay more attentions to be far away from these obstacles. It has been such a long time since PCR became useful as an important and essential biological research tool among lots of bio-scientific research methods. In this research, we tried to set up a simple and cost-effective genotyping method using PCR and agarose gels, instead of expensive automated machines, for identification and discrimination among those DNA samples, as a kind of low level quality control and sample inventory management.

Accurate and Efficient Log Template Discovery Technique

  • Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.10
    • /
    • pp.11-21
    • /
    • 2018
  • In this paper we propose a novel log template discovery algorithm which achieves high quality of discovered log templates through iterative log filtering technique. Log templates are the static string pattern of logs that are used to produce actual logs by inserting variable values during runtime. Identifying individual logs into their template category correctly enables us to conduct automated analysis using state-of-the-art machine learning techniques. Our technique looks at the group of logs column-wise and filters the logs that have the value of the highest proportion. We repeat this process per each column until we are left with highly homogeneous set of logs that most likely belong to the same log template category. Then, we determine which column is the static part and which is the variable part by vertically comparing all the logs in the group. This process repeats until we have discovered all the templates from given logs. Also, during this process we discover the custom patterns such as ID formats that are unique to the application. This information helps us quickly identify such strings in the logs as variable parts thereby further increasing the accuracy of the discovered log templates. Existing solutions suffer from log templates being too general or too specific because of the inability to detect custom patterns. Through extensive evaluations we have learned that our proposed method achieves 2 to 20 times better accuracy.

Machine Learning Based Intrusion Detection Systems for Class Imbalanced Datasets (클래스 불균형 데이터에 적합한 기계 학습 기반 침입 탐지 시스템)

  • Cheong, Yun-Gyung;Park, Kinam;Kim, Hyunjoo;Kim, Jonghyun;Hyun, Sangwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1385-1395
    • /
    • 2017
  • This paper aims to develop an IDS (Intrusion Detection System) that takes into account class imbalanced datasets. For this, we first built a set of training data sets from the Kyoto 2006+ dataset in which the amounts of normal data and abnormal (intrusion) data are not balanced. Then, we have run a number of tests to evaluate the effectiveness of machine learning techniques for detecting intrusions. Our evaluation results demonstrated that the Random Forest algorithm achieved the best performances.

Basic Research on Color Planning for Enhancing Brand Image (브랜드 이미지 향상을 위한 색채계획 기초연구)

  • Kim Soo-Jeoung
    • Science of Emotion and Sensibility
    • /
    • v.9 no.1
    • /
    • pp.63-75
    • /
    • 2006
  • This is a basic research aimed at enhancing a brand image by unifying color images of a brand at both online and offline stores. h survey was conducted on color images of online and offline stores to measure the level of consistency between consumers' perception of the color image and the brand's color strategy. A brand preference survey was also performed to shed light on the relationship between the brand preference and the consistency of color images at online and offline stores. This study is committed to building an effective color strategy, based on the brand strategy, through web color planning that is consistent with the offline color image. This paper started with a specific purpose of devising solutions in regard to the prior study, entitled 'Study on Color Strategies in Brand Coffee', which recognizes the need for consistent color images, or integrated color strategies, in online and offline stores. I specifically took the approach of looking at color planning in the stage of designing a website. Two standards were used to analyze emotional and functional aspects of color images: color grading by I.R.I and five communicators of color information by Rouge. Direct visits were made to the offline stores for surveys to address the shortcomings of the prior study, in which offline stimuli were limited to printed materials. The direct visits enabled a study of an overall color image of the offline stores, while providing a set of substantial and specific guidelines for designing colors for a website. I hope this study goes a long way toward enhancing the level of consistency between online and offline color images based on the brand's unique color strategy, and thereby improving the overall level of brand image.

  • PDF

A bidirectional full duplex medium access control protocol for underwater acoustic networks (수중 음향 네트워크를 위한 양방향 전이중 매체 접속 제어 프로토콜)

  • Kang, Sung Min;Hwang, Ho Young;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.211-217
    • /
    • 2017
  • In this paper, we propose a bidirectional full duplex MAC (Medium Access Control) protocol for underwater acoustic networks. An underwater sensor node can set a back-off timer according to the priority of transmission. When the back-off timer expires, the underwater sensor node acquires a transmission opportunity. If a source node wants to send data to a destination node, it broadcasts RTS (Request-To-Send) including ID of the destination node to neighbor nodes. The destination node receiving RTS sends CTS (Clear-To-Send) to the source node to inform the bidirectional full duplex communication. After the source node receives CTS, the source node and the destination node can send the data to each other. In the underwater environment, the existing MAC protocol may take a lot of time for successful transmission of data due to long underwater propagation delay. On the other hand, the proposed bidirectional full duplex MAC protocol improves the throughput by shortening the time for successful transmission of data. In this paper, we analyze the throughput of the proposed bidirectional full duplex MAC protocol. In addition, we show that the proposed bidirectional full duplex MAC protocol has better performance in the presence of the long underwater propagation delay compared with existing MAC protocols for underwater environments.

The State Attribute and Grade Influence Structure for the RC Bridge Deck Slabs by Information Entropy (정보 엔트로피에 의한 RC 교량 상판의 상태속성 및 등급 영향 구조 분석)

  • Hwang, Jin-Ha;Park, Jong-Hoi;An, Seoung-Su
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.61-71
    • /
    • 2010
  • The attributes related to the health condition of RC deck slabs are analyzed to help us identify and rate the safety level of the bridges in this study. According to the related reports the state assessment for the outward aspects of bridges is the important and critical part for rating the overall structural safety. In this respect, the careful identification for the various state attributes make the field inspection and structural diagnosis very effective. This study analyzes the influence of the state attributes on evaluation classes and the relationship of them by the inductive reasoning, which raise the understanding and performance for evaluation work, and support the logical approach for the state assessment. ID3 algorithm applied to the case set which is constructed from the field reports indicates the main attributes and the precedence governing the assessment, and derives the decision hierarchy for the state assessment.

An Extension of MSDL for Obtaining Weapon Effectiveness Data in a Military Simulation (국방 시뮬레이션에서 무기효과 데이터 획득을 위한 MSDL의 확장)

  • Lee, Sangjin;Oh, Hyun-Shik;Kim, Dohyung;Rhie, Ye Lim;Lee, Sunju
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.2
    • /
    • pp.1-9
    • /
    • 2021
  • Many factors such as wind direction, wind strength, temperature, and obstacles affect a munition's trajectory. Since these factors eventually determines the probability of hit and the hitting point of a target, these factors should be considered to obtain reliable weapon effectiveness data. In this study, we propose the extension of the MSDL(Military Scenario Definition Language) to reflect these factors to improve the reliability of weapon effectiveness data. Based on the existing MSDL, which has been used to set the initial condition of a military simulation scenarios, the newly identified subelements are added in ScenarioID, Environment, Organizations, and Installations as a scenario schema. Also, DamageAssessment and DesignOfExperiments element are added to make weapon effectiveness data easily. The extended MSDL enables to automatically generate the simulation scenarios that reflect various factors which affect the probability of hit or kill. This extended MSDL is applied to an integrated simulation software of weapon systems, named AddSIM version 4.0 for generation of weapon effectiveness data.