• Title/Summary/Keyword: suitable code

Search Result 486, Processing Time 0.033 seconds

Location Information Hiding Way Of HD Black Box Recording process (HD 블랙박스 녹화과정에서의 위치정보 은익방법)

  • Seok, Jin-Hwan;Yoon, Jong-Chul;Hong, Jong-Sung;Han, Chan-Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.17 no.1
    • /
    • pp.10-17
    • /
    • 2016
  • GPS location information storage included in the HD black box is using a unique manner for each manufacturer does not have a specific standard. In this paper, in order to overcome the limitations of the storage space and thereby the image quality according to store GPS position information deteriorate to solve the problems that cause, we propose the location information concealment method included in the HDTV video content using a essential hidden region. HDTV video content is a Border Extender of 8 lines in the frame to the bottom of the compression will be required. This was inserted into the image of a gray scale used in block form in order to space the current position information is concealed to prevent image degradation. The proposed method was confirmed using real HD black box, there are more difficult to interpret the format of the ASCII code re-edit the location information when the compression effect disappears with the existing security zones added. Therefore, the proposed method is suitable for location-based services, such as Facebook or Youtube videos.

An Automatic Identification System of Biological Resources based on 2D Barcode and UCC/EAN-128 (2차원 바코드와 UCC/EAN-128을 이용한 생물자원 자동인식시스템)

  • Chu, Min-Seok;Ryu, Keun-Ho;Kim, Jun-Woo;Kim, Hung-Tae;Han, Bok-Ghee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.861-872
    • /
    • 2008
  • As rapid development of computing environment, field of automatic identification research which interoperates with various physical objects and digital information is making active progress. Although the automatic identification system is widely used in various industries, application of automatic identification system in the field of medical health doesn't reach other industry. Therefore research in medical health supplies such as medical equipment, blood, human tissues and etc is on progress. This paper suggests the application of automatic identification technology for biological resources which is core research material in human genome research. First of all, user environment requirements for the introduction of automatic identification technology are defined and through the experiments and research, barcode is selected as a suitable tag interface. Data Matrix which is 2D barcode symbology is chosen and data schema is designed based on UCC/EAN-128 for international defecto standard. To showapplicability of proposed method when applied to actual environment, we developed, tested and evaluated application as following methods. Experiments of barcode read time at 196 and 75 below zero which is actual temperature where biological resources are preserved resulted read speed of average of 1.6 second and the data schema satisfies requirements for the biological resources application. Therefore suggested method can provide data reliability as well as rapid input of data in biological resources information processing.

Effect of Grid, Turbulence Modeling and Discretization on the Solution of CFD (격자, 난류모형 및 이산화 방법이 유동해석 결과에 미치는 영향)

  • Park, Dong-Woo;Yoon, Hyun-Sik
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.4
    • /
    • pp.419-425
    • /
    • 2014
  • The current work investigated the variation of numerical solutions according to the grid number, the distance of the first grid point off the ship surface, turbulence modeling and discretization. The subject vessel is KVLCC. A commercial code, Gridgen V15 and FLUENT were used the generation of the ship hull surface and spatial system and flow computation. The first part of examination, the effect of solutions were accessed depending on the grid number, turbulence modeling and discretization. The second part was focus on the suitable selection of the distance of the first grid point off the ship surface: $Y_P+$. When grid number and discretization were fixed the same value, the friction resistance showed differences within 1 % but the pressure resistance showed big differences 9 % depending on the turbulence modeling. When $Y_P+$ were set 30 and 50 for the same discretization, friction resistance showed almost same results within 1 % according to the turbulence modeling. However, when $Y_P+$ were fixed 100, friction resistance showed more differences of 3 % compared to $Y_P+$ of 30 and 50. Whereas pressure resistance showed big differences of 10 % regardless of turbulence modeling. When turbulence modeling and discretization were set the same value, friction, pressure and total resistance showed almost same result within 0.3 % depending on the grid number. Lastly, When turbulence modeling and discretization were fixed the same value, the friction resistance showed differences within 5~8 % but the pressure resistance showed small differences depending on the $Y_P+$.

PS-Net : Personalized Secure Wi-Fi Networks (PS-Net : 개인별 보안 Wi-Fi 네트워크)

  • Lee, Nam-Seh;Lee, Ju-Ho;Jeong, Choong-Kyo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.497-505
    • /
    • 2015
  • Existing Wi-Fi networks require users to follow network settings of the AP (Access Point), resulting in inconveniences for users, and the password of the AP is shared by all users connected to the AP, causing security information leaks as time goes by. We propose, in this work, a personalized secure Wi-Fi network, in which each user is assigned her own virtual Wi-Fi network. One virtual Wi-Fi per user makes the user-centric network configuration possible. A user sets a pair of her own SSID and password on her device a priori, and the AP publishes its public key in a suitable way. The AP also maintains an open Wi-Fi channel, to which users can connect anytime. On user's request, the user device sends a connection request message containing a pair of SSID and password encrypted with the AP's public key. Receiving the connection request message, the AP instantiates a new virtual AP secured with the pair of SSID and password, which is dedicated to that single user device. This virtual network is securer because the password is not shared among users. It is more convenient because the network adapts itself to the user device. Experiments show that these advantages are obtained with negligible degradation in the throughput performance.

Fabrication and Performance Evaluation of MR-16 Lamp Series with Narrow Angular Distribution of Luminous Intensity Using an Aspherical Planar-convex 2×2 Fly-eye Lens Type (평면-비구면 2×2 fly-eye 렌즈형태의 2차 렌즈를 사용한 고효율의 좁은 배광각을 갖는 MR-16 램프 시리즈 제작 및 성능평가)

  • Chu, Kyung-duk;Ryu, Jae Myung;Hong, Chun-Gang;Jeong, Youn Hong;Jo, Jae Heung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.25-33
    • /
    • 2017
  • This paper reports the optical design of the MR-16 lamp series with a LED second lens and an aspherical plano-convex lens suitable for a simple and rapid injection molding fabrication method. The fabrication and performance evaluation of the MR-16 lamp series, which was designed with a narrow angular distribution of luminous intensity, were conducted to replace halogen lamps with LED lamps. Four types of LED lamps were fabricated, which have angular distributions of luminous intensity of $22.4^{\circ}$, $31.1^{\circ}$, $37.3^{\circ}$, and $59.9^{\circ}$ and luminous efficiencies of 76.5 lm/W, 75.2 lm/W, 72.0 lm/W, and 77.8 lm/W, respectively, while their spreading angles with an illuminance uniformity of 81% were $3^{\circ}$, $15^{\circ}$, $22^{\circ}$, and $49^{\circ}$, respectively. After eliminating a yellow tail of the LED lamps using a diffusion sheet, the angular distributions of the luminous intensity were measured to be $20.8^{\circ}$, $31.5^{\circ}$, $37.8^{\circ}$, and $68.7^{\circ}$.

Determination of Carbendazim in Commercial Agricultural Products by LC-MS/MS (LC-MS/MS를 이용한 농산물 중 카벤다짐 분석)

  • Hwang, Lae-Hwong;Lee, Sung-Deuk;Kim, Jeong-Gon;Kim, Ji-Young;Park, So-Hyun;Kim, Ji-Hae;Park, Jung-Hyun;Han, Chang-Ho;Kim, Mu-Sang
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.2
    • /
    • pp.141-146
    • /
    • 2017
  • A rapid and precise method using LC-MS/MS was developed for carbendazim analysis in agricultural products. This compound was extracted with acetonitrile from agricultural products and cleaned up by solid-phase extraction procedure. The limit of detection and quantification were 0.001 mg/kg and 0.004 mg/kg, respectively. The mean recoveries and precision from 4 agricultural products, soybean sprout and mungbean sprout were in the range of 83.3-86.4% and 0.2-3.0% spiked at 1.0 mg/kg and those were in the range of 77.3-90.1% and 1.3-3.8% spiked at 0.02 mg/kg. The present method is faster and more precise compared with the multi-residue method of Korean Food Code. Therefore, we conclude that this method is suitable for carbendazim determination in a wide range of agricultural products.

Automated Clothing Analysis System through Image Analysis (이미지 분석을 통한 자동화 의류 분석 시스템)

  • Choi, Moon-hyuk;Lee, Seok-jun;Lee, Hak-jae;Kim, So-yeong;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.313-315
    • /
    • 2019
  • Although Korea's fashion market has negative growth, it has been growing again since 2018. This phenomenon means that people are becoming more interested in fashion. As interest in fashion grows, people visit various community sites for reference to find a suitable coordination for themselves. Most community sites, however, are manually categorizing each garment. Not only do these tasks take a lot of time, but they also make it difficult to search for multiple clothing at the same time. In other words, I can't choose what I want at the same time, and if I choose what I want, I have to look at what the model is wearing and refer to it. The problem with this may not help because the coordination in which the model provided is worn is more likely to be the one that the user does not want. In this paper, when the image is uploaded to improve the problem, the clothing is analyzed with AI analysis model and automatically classified and stored. Therefore, not only can you search for one clothes in the existing way, but you can also search for multiple clothes at the same time. The service is expected to allow more people to easily find and refer to the code for themselves.

  • PDF

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

Establishment of WBS·CBS-based Construction Information Classification System for Efficient Construction Cost Analysis and Prediction of High-tech Facilities (하이테크 공장의 효율적 건설 사업비 분석 및 예측을 위한 WBS·CBS 기반 건설정보 분류체계 구축)

  • Choi, Seong Hoon;Kim, Jinchul;Kwon, Soonwook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.8
    • /
    • pp.356-366
    • /
    • 2021
  • The high-tech industry, a leader in the national economy, has a larger investment cost compared to general buildings, a shorter construction period, and requires continuous investment. Therefore, accurate construction cost prediction and quick decision-making are important factors for efficient cost and process management. Overseas, the construction information classification system has been standardized since 1980 and has been continuously developed, improving construction productivity by systematically collecting and utilizing project life cycle information. At domestic construction sites, attempts have been made to standardize the classification system of construction information, but it is difficult to achieve continuous standardization and systematization due to the absence of a standardization body and differences in cost and process management methods for each construction company. Particular, in the case of the high-tech industry, the standardization and systematization level of the construction information classification system for high-tech facility construction is very low due to problems such as large scale, numerous types of work, complex construction and security. Therefore, the purpose of this study is to construct a construction information classification system suitable for high-tech facility construction through collection, classification, and analysis of related project data constructed in Korea. Based on the WBS (Work Breakdown Structure) and CBS (Cost Breakdown Structure) classified and analyzed through this study, a code system through hierarchical classification was proposed, and the cost model of buildings by linking WBS and CBS was three-dimensionalized and the utilized method was presented. Through this, an information classification system based on inter-relationships can be developed beyond the one-way tree structure, which is a general construction information classification system, and effects such as shortening of construction period and cost reduction will be maximized.

Evaluation on Side Resistance of Drilled Shafts Constructed on Sandy Gravel and Gravel Layers in Nakdong River Estuary (낙동강 하구 모래 자갈 및 자갈층에 시공된 현장타설말뚝의 주면마찰력 평가)

  • Dong-Lo Choi;Tae-Hyung Kim;Byeong-Han Jeon;Jun-Seo Jeon;Chea-Min, Kim
    • Journal of the Korean Geosynthetics Society
    • /
    • v.22 no.3
    • /
    • pp.1-10
    • /
    • 2023
  • Recently, numerous structures have been constructed near the Nakdong river estuary, with pile foundations embedded in sand and gravel layers. In this study, the side resistance for six drilled shafts embedded in that region was evaluated based on the results of bi-directional and static axial compressive pile load tests. Subsequently, these results were compared with the side resistance calculated using domestic and foreign design codes such as FHWA (1999), KDS (2021), and AIJ (2004). Based on the test results, the evaluated side resistances ranged from 120 to 444kPa. However, the estimated values obtained from the design codes ranged from 69.3 to 170kPa, which were less than 50% of the evaluated values. It was observed that the empirical methods and correlations used in design codes provide a conservative estimation of the side resistance for drilled shafts embedded in sand and gravel layers. It implies that a suitable domestic approach should be developed to accurately estimate the side resistance of pile in sandy gravel and gravel layers near the Nakdong river estuary.