• 제목/요약/키워드: Trace detect

검색결과 118건 처리시간 0.023초

Tag Mis-recognition Detection using RFID Tag Sensitivity in Logistics System (물류 시스템에서 RFID 태그 수신감도를 이용한 태그 오인식 검출)

  • Kim, Youngmin;Kang, Euisun
    • The Journal of the Korea Contents Association
    • /
    • 제15권8호
    • /
    • pp.9-17
    • /
    • 2015
  • One of RFID features is that each RFID tag has a unique identifying code. Logistic System utilizes RFID tag as location tracing, understanding stock or etc. On the other hand, there is a problem of overall lower recognition rate by getting the information of non-mobility tags with no need for reading. To solve this problem, we trace and analyze variation of moving and moveless RFID tag sensitivity by the hour. In analyzed data, we verify that tag sensitivity of mobile RFID is gradually increase while non-mobility tag has same intensity value. In order to detect mobile tag, we generate a function using Matlab with analyzed data and separate moving tags from non-mobility tags by software. As a result, we can confirm that non-mobility tags are detected by software and recognition rate of RFID tag is improved by separating moveless tag.

Development of Feature Extraction Algorithm for Finger Vein Recognition (지정맥 인식을 위한 특징 검출 알고리즘 개발)

  • Kim, Taehoon;Lee, Sangjoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • 제7권9호
    • /
    • pp.345-350
    • /
    • 2018
  • This study is an algorithm for detecting vein pattern features important for finger vein recognition. The feature detection algorithm is important because it greatly affects recognition results in pattern recognition. The recognition rate is degraded because the reference is changed according to the finger position change. In addition, the image obtained by irradiating the finger with infrared light is difficult to separate the image background and the blood vessel pattern, and the detection time is increased because the image preprocessing process is performed. For this purpose, the presented algorithm can be performed without image preprocessing, and the detection time can be reduced. SWDA (Down Slope Trace Waveform) algorithm is applied to the finger vein images to detect the fingertip position and vein pattern. Because of the low infrared transmittance, relatively dark vein images can be detected with minimal detection error. In addition, the fingertip position can be used as a reference in the classification stage to compensate the decrease in the recognition rate. If we apply algorithms proposed to various recognition fields such as palm and wrist, it is expected that it will contribute to improvement of biometric feature detection accuracy and reduction of recognition performance time.

Development of a Location Tracking System for Operation Management of Public Garbage Trucks (공공 청소차 운행 관리를 위한 위치 추적 시스템 개발)

  • Baek, Seung-Won;Kim, Ho-Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제6권6호
    • /
    • pp.909-914
    • /
    • 2011
  • In these days, according to the enhancement of the mobile communication technologies, location based services using the location and movements are vitalized. In this paper, we develop a private vehicle tracking system for garbage truck operation management using GPS and CDMA communication and Open map interface. The terminal equipment attached in vehicle receives the GPS signals and detect the position data including time, longitude, latitude, and altitude. And the terminal sends these data to the server PC through CDMA cellular network in fixed period. The server saves these data into database to process in map server program with which we can view real-time trace of moving vehicle. We apply our system to public garbage truck managing operation and we can increase operation efficiency by examine real-time working and moving path and by present reasonable operation rout.

Analysis of UV Filters in Water using Stir Bar Sorptive Extraction (SBSE) and GC/MS-MS (교반막대 추출법과 GC/MS-MS를 이용한 수중의 자외선 차단제 분석)

  • Seo, Chang-Dong;Son, Hee-Jong;Jung, Jong-Moon;Choi, Jin-Taek;Jang, Seong-Ho
    • Journal of Environmental Science International
    • /
    • 제23권6호
    • /
    • pp.1037-1047
    • /
    • 2014
  • A highly sensitive analytical method based on stir bar sorptive extraction (SBSE) technique and gas chromatography/tandem mass spectrometry (GC/MS-MS) has been developed, allowing the simultaneous multi-analyte determination of seven UV filters in water samples. The stir bar coated with polydimethylsiloxane (PDMS) was added to 40 mL of water sample at pH 3 and stirred at 1,100 rpm for 120 min. Other SBSE parameters (salt effect and presence of organic solvent) were optimised. The method shows good linearity (coefficients > 0.990) and reproducibility (RSD < 12.9%). The extraction efficiencies were above 84% for all the compounds. The limits of detections (LOD) and limits of quantification (LOQ) were 2.1~8.6 ng/L and 6.8~27.5 ng/L, respectively. The developed method offers the ability to detect 8 UV filters at ultra-low concentration levels with only 40 mL of sample volume. Matrix effects in tap water, river water, wastewater treatment plant (WWTP) final effluent water and seawater were investigated and it was shown that the method is suitable for the analysis of trace level of 7 UV filters except of benzophenone (BP). The method developed in the present study has the advantage of being rapid, simple, high-sensitive and both user and environmentally friendly.

Analysis of Lower body on Korean Young Women and the Effect of the Lower body Type on the Shape of Flare Skirt (II) (한국 미혼 여성의 하반신체형 분석과 체형변인이 플레어스커트 입체성능에 미치는 영향(II))

  • 조정미
    • Journal of the Korean Home Economics Association
    • /
    • 제30권3호
    • /
    • pp.15-32
    • /
    • 1992
  • The purpose of this study was to detect the effect of the lower body type on the shape of flare skirts. The subjects for the wearing test were 50 female students, who were controlled in their hip and waist shapes. The skirts used for wearing test were six types(three flar angles $\times$ two fabric types). The effect of lower body type on the shape of flare skirts was determind by the hemline trace method and the silhouette photography. The data were then analyzed by the repeated measures of analysis of variance and the SNK multiple range test. The results obtained from this study were as follows : 1) When a flare skirt made with larger flare angle and better drapable fabric was worn, the numeric of the nodes increased as the drop value(hip - waist) increased. When a flare skirt made with smaller flare angle was worn, the width of horizontal sectio of hemline increased as the drop value increased. The hemline uneveness decreased on the sides and back as the drop value increased. When a flare skirt made with worse drapable fabric was worn, the sides angle of the flarskirt increased as the drop value increased. 2) When a flare skirt made with larger flare angle was worn, the numeric of nodes increased as the ratio of dropped hip increased. The wave-height increased and the back variation ratio of wave-height was higher than the front variation ratio of wave-height as the ratio of dropped hip increased. The hemiline uneveness decreased on the back as the ratio of dropped hip increased. When a flare skirt made with larger flare angle was worn, the sides angle of the flare skirt increased as the ratio of dropped hip increased.

  • PDF

An Automatic Portscan Detection System with Adaptive Threshold Setting

  • Kim, Sang-Kon;Lee, Seung-Ho;Seo, Seung-Woo
    • Journal of Communications and Networks
    • /
    • 제12권1호
    • /
    • pp.74-85
    • /
    • 2010
  • For the purpose of compromising hosts, attackers including infected hosts initially perform a portscan using IP addresses in order to find vulnerable hosts. Considerable research related to portscan detection has been done and many algorithms have been proposed and implemented in the network intrusion detection system (NIDS). In order to distinguish portscanners from remote hosts, most portscan detection algorithms use a fixed threshold that is manually managed by the network manager. Because the threshold is a constant, even though the network environment or the characteristics of traffic can change, many false positives and false negatives are generated by NIDS. This reduces the efficiency of NIDS and imposes a high processing burden on a network management system (NMS). In this paper, in order to address this problem, we propose an automatic portscan detection system using an fast increase slow decrease (FISD) scheme, that will automatically and adaptively set the threshold based on statistical data for traffic during prior time periods. In particular, we focus on reducing false positives rather than false negatives, while the threshold is adaptively set within a range between minimum and maximum values. We also propose a new portscan detection algorithm, rate of increase in the number of failed connection request (RINF), which is much more suitable for our system and shows better performance than other existing algorithms. In terms of the implementation, we compare our scheme with other two simple threshold estimation methods for an adaptive threshold setting scheme. Also, we compare our detection algorithm with other three existing approaches for portscan detection using a real traffic trace. In summary, we show that FISD results in less false positives than other schemes and RINF can fast and accurately detect portscanners. We also show that the proposed system, including our scheme and algorithm, provides good performance in terms of the rate of false positives.

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • 제14권9호
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

The Hangul 4 State Bar Code System for the Automatic processing of Mail Items (우편물 자동처리를 위한 한글 4 State 바코드 시스템)

  • Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권1호
    • /
    • pp.146-155
    • /
    • 2000
  • This paper describes a 4-state bar code called HANGUL 4 ST that has been specifically designed for automatic processing of the letter mails, A HANGUL 4 ST bar code is a necessary data base that is applied data capture and data carrier with it all the information necessary for sorting, the amount capture for transportation of mail items, and valued-added services such as indicia, tracking and trace. The 4-state bar code information contents are composed of a postal code, delivery point, customer information including customer identification number and name, and parity bits for error detect and correct. The data density capability of HANGUL 4 St allows all useful sorting data and customer data to be encoded on one label. This supports better automatic processing in mail items, higher level of customer service and more efficient operation.

  • PDF

A Study on Attitude Estimation of UAV Using Image Processing (영상 처리를 이용한 UAV의 자세 추정에 관한 연구)

  • Paul, Quiroz;Hyeon, Ju-Ha;Moon, Yong-Ho;Ha, Seok-Wun
    • Journal of Convergence for Information Technology
    • /
    • 제7권5호
    • /
    • pp.137-148
    • /
    • 2017
  • Recently, researchers are actively addressed to utilize Unmanned Aerial Vehicles(UAV) for military and industry applications. One of these applications is to trace the preceding flight when it is necessary to track the route of the suspicious reconnaissance aircraft in secret, and it is necessary to estimate the attitude of the target flight such as Roll, Yaw, and Pitch angles in each instant. In this paper, we propose a method for estimating in real time the attitude of a target aircraft using the video information that is provide by an external camera of a following aircraft. Various image processing methods such as color space division, template matching, and statistical methods such as linear regression were applied to detect and estimate key points and Euler angles. As a result of comparing the X-plane flight data with the estimated flight data through the simulation experiment, it is shown that the proposed method can be an effective method to estimate the flight attitude information of the previous flight.

A Brute-force Technique for the Stepping Stone Self-Diagnosis of Interactive Services on Linux Servers (리눅스 서버에서 인터렉티브 서비스 Stepping Stone 자가진단을 위한 brute-force 기법)

  • Kang, Koo-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • 제20권5호
    • /
    • pp.41-51
    • /
    • 2015
  • In order to hide their identities, intruders on the Internet often attack targets indirectly by staging their attacks through intermediate hosts known as stepping stones. In this paper, we propose a brute-force technique to detect the stepping stone behavior on a Linux server where some shell processes remotely logged into using interactive services are trying to connect other hosts using the same interactive services such as Telnet, Secure Shell, and rlogin. The proposed scheme can provide an absolute solution even for the encrypted connections using SSH because it traces the system calls of all processes concerned with the interactive service daemon and their child processes. We also implement the proposed technique on a CentOS 6.5 x86_64 environment by the ptrace system call and a simple shell script using strace utility. Finally the experimental results show that the proposed scheme works perfectly under test scenarios.