• Title/Summary/Keyword: Tracing Technology

Search Result 383, Processing Time 0.031 seconds

Review of the Hidden Rays of Diffraction

  • Kim, Se-Yun
    • Journal of electromagnetic engineering and science
    • /
    • v.15 no.1
    • /
    • pp.1-5
    • /
    • 2015
  • A high-frequency analysis technique, called the hidden rays of diffraction (HRD), is reviewed in this paper. The physical optics and the rigorous diffraction coefficients of a perfectly conducting wedge illuminated by a plane wave are compared. The physical existence of hidden rays on the shadow boundary is explained in view of the geometric theory of diffraction (GTD). In particular, a systematic tracing of hidden rays and its visualization are precisely described by introducing the concept of the supplementary boundary. The physical meaning of the null-field condition in the complementary region is also explained.

Analysis of Knit Fabric Structure with its Voxel Data

  • Shinohara, T.;Takayama, J.;Ohyama, S.;Kobayashi, A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.53-56
    • /
    • 2003
  • For identifying how a sample knit fabric is woven a method to obtain positional information of each yarn of the sample from voxel data made out of its x-ray CT images is newly proposed in this paper. The positional information is obtained by tracing the each yarn. The each yarn is traced by estimating a direction of the yarn in a certain small region in which the yarn can be regarded as straight and moving the region slightly along the estimated direction alternately. The yarn direction is estimated by correlating the voxel data in the region with a three-dimensional yarn model. The effectiveness of this method is confirmed by applying the method to voxel data made out of CT images of a knit fabric experimentally.

  • PDF

A minimizing method of baseline wandering using a difference signal in ECG (심전도 차신호를 이용한 기저선 변동의 최소화 방법)

  • Ju, Jangkyu;Lee, Ki Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.1 no.1
    • /
    • pp.7-12
    • /
    • 2008
  • This paper studies a method to minimize the baseline wandering that make hard to extract R-wave in ECG. This method uses a difference signal between ECG and ascending slope tracing waves to minimize the baseline wandering. When the slope of ECG signal maintains the value or falls, the ascending slope tracing wave follows ECG signal directly, and this wave holds that value of ECG signal when the slope begins to rises in a certain time(=hold time). After this hold time, this wave traces ECG signal again. This method has been applied to MIT/BIH database to verify its efficacy and validity in practical applications.

  • PDF

Establishment and Promotion Strategy of Lifetime Tracing(Traceibility) System of Agricultural Products using RFID (농작물이력추적시스템 정착 및 활성화 방안에 관한 연구)

  • Kim, Jong-Sam;Lee, Kook-Chul;Lee, Sung-Hyun
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.05a
    • /
    • pp.415-427
    • /
    • 2009
  • Diffusion of information technology such as internet has brought a great influence on modern society and industrial development. Currently wide-spread RFID/USN technology has become a central momentum of this rapid changes for the establishment of ubiquitous society in the future. Historically agricultural products has drawn research interest due to its importance of human life. A standard monitoring system throughout of life cycle of the agricultural products should be developed and careful monitoring process should be introduced. In this paper, by way of case study, current lifetime tracing systems are evaluated and critical drawbacks and issues are also developed. In addition, some implications and guidelines to improve the tracing performance of the products are also suggested.

  • PDF

Research Regarding Filter Composition and Motor control for Yagi-Antenna Remote Tracking System (야기 안테나가 적용된 원격추적시스템을 위한 필터구성 및 모터 제어에 관한 연구)

  • You, Chong-Ho;Song, Beob-Seong;Hwang, In-Gab
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1039-1046
    • /
    • 2016
  • To study a habit and life patten of a wild animal, this paper do a research on the location tracing system of wild animal by yagi-antenna low pass filter, angle tracking technology. Commonly, VHF Radio Telemetry is used for the location tracing system of wild animal. Considering movement, Previous yagi-antenna has 4-element and has advantage of portability but the other advantages are small and preference is weak. To make the advantage of yagi-antenna higher than previous one, Supposed technology adapt to 6-element and make out Narrow space yagi-antenna technology. Also, It supposes that AOA (:Angle of arrival) technology is applied to detecting technology for a close direction from received signal. Based on this study suggest that position tracing technology is so as to figure out a life patten and habit of a wild animal which live in a certain area.

Fast Hand-Gesture Recognition Algorithm For Embedded System (임베디드 시스템을 위한 고속의 손동작 인식 알고리즘)

  • Hwang, Dong-Hyun;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1349-1354
    • /
    • 2017
  • In this paper, we propose a fast hand-gesture recognition algorithm for embedded system. Existing hand-gesture recognition algorithm has a difficulty to use in a low performance system such as embedded systems and mobile devices because of high computational complexity of contour tracing method that extracts all points of hand contour. Instead of using algorithms based on contour tracing, the proposed algorithm uses concentric-circle tracing method to estimate the abstracted contour of fingers, then classify hand-gestures by extracting features. The proposed algorithm has an average recognition rate of 95% and an average execution time of 1.29ms, which shows a maximum performance improvement of 44% compared with algorithm using the existing contour tracing method. It is confirmed that the algorithm can be used in a low performance system such as embedded systems and mobile devices.

A Traitor Tracing Using an Efficient Key Renewal in Embedded System (임베디드 시스템에서 효율적인 키 갱신을 적용한 Traitor Tracing)

  • Park, Jong-Hyuk;Lee, Deok-Gyu;Yeo, Sang-Soo;Kim, Tai-Hoon;Lee, Seung;Cho, Seong-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.245-254
    • /
    • 2008
  • If the broadcast message is sent, first of all, the privileged users will decode the session key by using his or her personal key, which the user got previously. The user willget the digital information through this session key. As shown above, the user will obtain messages or session keys using the keys transmitted from a broadcaster, which process requires effective ways for the broadcaster to generate and distribute keys. In addition, when a user wants to withdraw or sign up, an effective process to renew a key is required. It is also necessary to chase and check users' malicious activities or attacking others. This paper presents a method called Traitor Tracing to solve all these problems. Traitor tracing can check attackers and trace them. It also utilizes a proactive way for each user to have effective renewal cycle to generate keys.

  • PDF

A Secure Agent Communication Mechanism for Intruder Tracing System (침입자 추적 시스템의 에이전트 통신 보안을 위한 메커니즘)

  • 최진우;황선태;우종우;정주영;최대식
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.654-662
    • /
    • 2002
  • As the Internet technology becomes a major information infrastructure, an emerging problem is the tremendous increase of malicious computer intrusions. The present Intrusion Detection System (IDS) serves a useful purpose for detecting such intrusions, but the current situation requires more active response mechanism other than simple detection. This paper describes a multi-agent based tracing system against the intruders when the system is attacked. The focus of the study lies on the secure communication mechanism for the agent message communication. We have extended parameters on the KQML protocol, and apt)lied the public key encryption approach, The limitation might be the requirements of two-way authentication for every communication through the broker agent. This model ma)r not improve the efficiency, but it provides a concrete secure communication. Also this is one important factor to protect the agent and the tracing server during the tracing process.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

Interference Analysis in an Urban Mesh Network Operating in the 60-GHz Band

  • Rasekh, Maryam Eslami;Farzaneh, Forouhar
    • ETRI Journal
    • /
    • v.35 no.5
    • /
    • pp.775-785
    • /
    • 2013
  • Because of their exclusive features, millimeter wave directive mesh networks can be considered for small cell backhaul support in urban environments. For this purpose, a network of closely spaced stations has been considered with very directive line-of-sight links operating in the 60-GHz band. An attempt is made to evaluate channel response and interference behavior in such a network, taking into account the effect of building blockage. A simple grid of building blocks is considered as the propagation environment, and wave propagation is simulated using 2.5-dimensional (2.5D) ray tracing (2D with ground effect) to calculate the received signal at different nodes in the network. The results are compared with free space predictions and used to evaluate interference at all nodes in the channel and describe certain characteristics of links, such as the delay profile and the correlation length.