• Title/Summary/Keyword: 식별방법

Search Result 2,309, Processing Time 0.034 seconds

A study on intra-pulse modulation recognition using fearture parameters (특징인자를 활용한 펄스 내 변조 형태 식별방법에 관한 연구)

  • Yu, KiHun;Han, JinWoo;Park, ByungKoo;Lee, DongWon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.754-756
    • /
    • 2013
  • The modern Electronic Warfare Receivers are required to the current radar technologies like the Low Probability of Intercept(LPI) radars to avoid detection. LPI radars have features of intra-pulse modulation differ from existing radar signals. This features require counterworks such as signal confirmation and identification. Hence this paper presents a study on intra-pulse modulation recognition. The proposed method automatically recognizes intra-pulse modulation types such as LFM and NLFM using classifiers extracted from the features of each intra-pulse modulation. Several simulations are also conducted and the simulation results indicate the performance of the given method.

  • PDF

The Design of Circulation System of Digital Music Contents in P2P Service (P2P에서의 음악 콘텐츠 유통 시스템 설계)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.83-91
    • /
    • 2009
  • In this paper, we propose a new design of circulation system of digital music contents in P2P service. It has functions of contents recognition, management of copyright DB, clearing house to perform payment system of P2P service. In P2P service each user provides his music contents, but in other circulation system, service providers provide their music contents. Therefore it is very difficult for each provider to recognize whatever the quality of distributing contents are good or not. Most circulation systems use hash technology or contents recognition technology for the recognition of contents. For the usability and efficiency this proposed system provides the combining technology of hash processing and contents recognition.

  • PDF

해양사고 후 사고대응 및 사건전개 시나리오 식별 및 분석

  • Na, Seong;Gang, Min-Seok;Choe, Hyeok-Jin;Seo, Yu-Taek
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2015.07a
    • /
    • pp.69-71
    • /
    • 2015
  • 해양사고는 발생 직후의 적절한 초기대응 여부에 따라 사고 이후 다양한 사건 전개 양상을 보이게 되며, 이러한, 해양사고 발생 시 초기 대응을 효과적으로 수행하기 위해서는 발생한 해양사고의 속성을 명확하게 파악하는 작업이 선행되어야 한다. 또한, 얼마나 빨리 사고 상황에 대한 정확한 정보를 수집하고, 사고 대응을 위하여 필요한 장비 / 물자를 조달할 수 있느냐에 따라 신속한 사고 대응이 될 수도, 그렇지 못할 수도 있다. 이렇듯, 효과적이고 신속한 초기 대응을 위해서는 선박 종류 및 사고 종류 별 다양한 조건의 선박 사고에 대한 정보를 갖춘 사고 대응 시스템이 마련되어야 한다. 본 연구에서는, 해양사고 발생 이후 전개되는 시나리오들에 대한 위험도를 비교 평가할 수 있는 방법론을 개발하기 위한 일환으로, 해양사고 대응 사례 조사를 통하여 해양사고 대응 시 필요한 정보들을 식별하고, 사고 대응 시 사용되거나 고려되었던 대응 방법들을 식별하여 정리하였다. 또한, 식별된 정보들을 바탕으로, 유조선, 컨테이너선 및 여객선에 대한 해양사고 발생 후 사건전개 시나리오들을 식별 및 분석하였다.

  • PDF

Study about Component Identification Method Based On RUP (RUP 기반의 컴포넌트 식별 방법에 관한 연구)

  • Choe, Mi-Suk;Yun, Yong-Ik;Park, Jae-Nyeon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.91-102
    • /
    • 2002
  • We need a component-based system to reflect software changes in user's requirements, to implement a system at a rapid speed as well as to efficiently manage the system in a maintenance phase and to easily change software. Moreover, the component-based system has a merit in development cost. However, existing component development methodology for implement of component-based system is inefficient in object identification for component identification. Moreover, the existing component development methodology also fails to provide any method to identify system component. It merely provides procedures and methods to identify business component focused on a whole system domain. In addition, it has another problem that it considerably relies on developer's experiences and intuitions for component identification. Therefore, according to this paper, RUP (Rational Unified Process) is applied from a requirement analysis phase to an object identification phase in order to improve the inefficiency of object identification. In addition, this paper procedures and methods for system component identification, and identifies business components based on the identified system component, rather than on the whole system domain. This paper also provides and applies cohesion metric and coupling metric so as to overcome the problem that component identification depends on developer's intuitions and experiences. Accordingly, the component identification method proposed in this paper, may identify components more effectively based on facility of object identification, functional reusability of components, traceability, and independence of components.

Research Trends on External Event Identification and Screening Methods for Safety Assessment of Nuclear Power Plant (원자력발전소 안전성 평가를 위한 외부사건 식별 및 선별 방법 연구동향)

  • Kim, Dongchang;Kwag, Shinyoung;Kim, Jitae;Eem, Seunghyun
    • Journal of the Society of Disaster Information
    • /
    • v.18 no.2
    • /
    • pp.252-260
    • /
    • 2022
  • Purpose: As the intensity and frequency of natural hazards are increasing due to climate change, external events that affecting nuclear power plants(NPPs) may increase. NPPs must be protected from external events such as natural hazards and human-induced hazards. External events that may occur in NPPs should be identified, and external events that may affect NPPs should be identified. This study introduces the methodology of identification and screening methods for external events by literature review. Method: The literature survey was conducted on the identification and screening methods of external events for probabilistic safety assessment of NPPs. In addition, the regulations on the identification and screening of external events were investigated. Result: In order to minimize the cost of external event impact analysis of nuclear power plants, research on identifying and screening external events is being conducted. In general, in the identification process, all events that can occur at the NPPs are identified. In the screening process, external events are selected based on qualitative and quantitative criteria in most studies. Conclusions: The process of identifying and screening external events affecting NPPs is becoming important. This paper, summarize on how to identify and screen external events for a probabilistic safety assessment of NPPs. It is judged that research on bounding analysis and conservative analysis methods performed in the quantitative screening process of external events is necessary.

Unique Feature Identifier for Utilizing Digital Map (수치지도의 활용을 위한 단일식별자)

  • Cho, Woo-Sug
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.6 no.1 s.11
    • /
    • pp.27-34
    • /
    • 1998
  • A Unique Feature Identifier(UFID) is a way of referring to a feature, generally representing a tangible feature in the real world. In other words, a UFID uniquely identifies the related feature in the database and is normally used to link two or more databases together. This paper presents a UFID system aiming at the internal uses for National Geography Institute(NGI) as well as external uses for National Geographic Information System(NGIS) generally to link datasets together. The advantage of the proposed type of UFID lies in the meaningful nature of the identifier in providing a direct spatial index - administrative area and feature code. The checksum character proposed in this research is designed to remove any uncertainty about the number being corrupt. It will account lot digit transposition during manual input as well as corruption in transfer or processing.

  • PDF

Improving A Text Independent Speaker Identification System By Frame Level Likelihood Normalization (프레임단위유사도정규화를 이용한 문맥독립화자식별시스템의 성능 향상)

  • 김민정;석수영;정현열;정호열
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.487-490
    • /
    • 2001
  • 본 논문에서는 기존의 Caussian Mixture Model을 이용한 실시간문맥독립화자인식시스템의 성능을 향상시키기 위하여 화자검증시스템에서 좋은 결과를 나타내는 유사도정규화 ( Likelihood Normalization )방법을 화자식별시스템에 적용하여 시스템을 구현하였으며, 인식실험한 결과에 대해 보고한다. 시스템은 화자모델생성단과 화자식별단으로 구성하였으며, 화자모델생성단에서는, 화자발성의 음향학적 특징을 잘 표현할 수 있는 GMM(Gaussian Mixture Model)을 이용하여 화자모델을 작성하였으며. GMM의 파라미터를 최적화하기 위하여 MLE(Maximum Likelihood Estimation)방법을 사용하였다. 화자식별단에서는 학습된 데이터와 테스트용 데이터로부터 ML(Maximum Likelihood)을 이용하여 프레임단위로 유사도를 계산하였다. 계산된 유사도는 유사도 정규화 과정을 거쳐 스코어( SC)로 표현하였으며, 가장 높은 스코어를 가지는 화자를 인식화자로 결정한다. 화자인식에서 발성의 종류로는 문맥독립 문장을 사용하였다. 인식실험을 위해서는 ETRI445 DB와 KLE452 DB를 사용하였으며. 특징파라미터로서는 켑스트럼계수 및 회귀계수값만을 사용하였다. 인식실험에서는 등록화자의 수를 달리하여 일반적인 화자식별방법과 프레임단위유사도정규화방법으로 각각 인식실험을 하였다. 인식실험결과, 프레임단위유사도정규화방법이 인식화자수가 많아지는 경우에 일반적인 방법보다 향상된 인식률을 얻을수 있었다.

  • PDF

On sample size selection for disernment of plain and cipher text using the design of experiments (실험계획법을 이용한 평문.암호문 식별방법의 표본크기 선택에 관한 연구)

  • 차경준
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.71-84
    • /
    • 1999
  • The randomness test for a sequence from an encription algorithm has an important role to make differences between plain and cipher text. Thus it is necessary to investigate and analyze the currently used randomness tests. Also in real time point of views it would be helpful to know a minimum sample size which gives discernment of plain and cipher text. In this paper we analyze the rate of successes for widely used nonparametric randomness tests to discern plain and cipher text through experiments. Moreover for given sample sizes an optimal sample size for each randomness test is proposed using the design of experiments.

De-identification Techniques for Big Data and Issues (빅데이타 비식별화 기술과 이슈)

  • Woo, SungHee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.750-753
    • /
    • 2017
  • Recently, the processing and utilization of big data, which is generated by the spread of smartphone, SNS, and the internet of things, is emerging as a new growth engine of ICT field. However, in order to utilize such big data, De-identification of personal information should be done. De-identification removes identifying information from a data set so that individual data cannot be linked with specific individuals. De-identification can reduce the privacy risk associated with collecting, processing, archiving, distributing or publishing information, thus it attempts to balance the contradictory goals of using and sharing personal information while protecting privacy. De-identified information has also been re-identified and has been controversial for the protection of personal information, but the number of instances where personal information such as big data is de-identified and processed is increasing. In addition, many de-identification guidelines have been introduced and a method for de-identification of personal information has been proposed. Therefore, in this study, we describe the big data de-identification process and follow-up management, and then compare and analyze de-identification methods. Finally we provide personal information protection issues and solutions.

  • PDF