• Title/Summary/Keyword: 식별 시스템

Search Result 2,521, Processing Time 0.025 seconds

Building a GIS Database for Analyzing the Integrated Information on Aquatic Ecosystem Health and Its Application (수생태계 건강성 통합정보 분석을 위한 GIS DB 구축 및 활용에 관한 연구)

  • Jo, Myung-Hee;Lee, Su-Hyung;Choi, Hee-Lak;Jang, Sung-Hyun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.4
    • /
    • pp.189-203
    • /
    • 2013
  • The purpose of this study is to build a GIS database that can utilized to provide a multi-dimensional analysis of aquatic health ecosystem. Especially, it was to build a GIS database for comprehensive analysis using the aquatic ecosystem health. So we collected data on aquatic ecosystem health assessment, Korea Reach File(KRF), Stream Naturalness and Water Environmental Information System, and detailed analysis of the collected data was performed. In addition, the core objects were extracted from individual data and a related entity was derived by pulling out the items associated with thematic characteristics and classifying them. The establishment of GIS database makes it possible to support the decision making for the user to quickly understand the information of water environment. Therefore, the database will provide the information for the effective management on water environment.

A Study on the Method of High-Speed Reading of Postal 4-state Bar Code for Supporting Automatic Processing (우편용 4-state 바코드 고속판독 방법에 관한 연구)

  • Park, Moon-Sung;Kim, Hye-Kyu;Jung, Hoe-Kyung
    • The KIPS Transactions:PartD
    • /
    • v.8D no.3
    • /
    • pp.285-294
    • /
    • 2001
  • Recently many efforts on the development of automatic processing system for delivery sequency sorting have been performed in ETRI, which requires the use of postal 4-state bar code system to encode delivery points. This paper addresses the issue on the extension of read range and the improvement of image processing method. For the improvement of image processing procedure, applied information acquisition method through basic two thresholds onto the horizontal axial line of gray image based on reference information of 4-state bar code symbology. Symbol values are computed after creating two threshold values based on the obtained information through search of horizontal axial values. The implementation result of 4-state bar code reader are obtained the symbol values within 30~60 msec (58,000~116,000 mail item/hour)without noise removal or image rotation in spite of the incline $\pm 45^{\circ}$.

  • PDF

An Automatic Identification System of Biological Resources based on 2D Barcode and UCC/EAN-128 (2차원 바코드와 UCC/EAN-128을 이용한 생물자원 자동인식시스템)

  • Chu, Min-Seok;Ryu, Keun-Ho;Kim, Jun-Woo;Kim, Hung-Tae;Han, Bok-Ghee
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.861-872
    • /
    • 2008
  • As rapid development of computing environment, field of automatic identification research which interoperates with various physical objects and digital information is making active progress. Although the automatic identification system is widely used in various industries, application of automatic identification system in the field of medical health doesn't reach other industry. Therefore research in medical health supplies such as medical equipment, blood, human tissues and etc is on progress. This paper suggests the application of automatic identification technology for biological resources which is core research material in human genome research. First of all, user environment requirements for the introduction of automatic identification technology are defined and through the experiments and research, barcode is selected as a suitable tag interface. Data Matrix which is 2D barcode symbology is chosen and data schema is designed based on UCC/EAN-128 for international defecto standard. To showapplicability of proposed method when applied to actual environment, we developed, tested and evaluated application as following methods. Experiments of barcode read time at 196 and 75 below zero which is actual temperature where biological resources are preserved resulted read speed of average of 1.6 second and the data schema satisfies requirements for the biological resources application. Therefore suggested method can provide data reliability as well as rapid input of data in biological resources information processing.

Security Requirements Analysis on IP Camera via Threat Modeling and Common Criteria (보안위협모델링과 국제공통평가기준을 이용한 IP Camera 보안요구사항 분석)

  • Park, Jisoo;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.121-134
    • /
    • 2017
  • With rapid increasing the development and use of IoT Devices, requirements for safe IoT devices and services such as reliability, security are also increasing. In Security engineering, SDLC (Secure Development Life Cycle) is applied to make the trustworthy system. Secure Development Life Cycle has 4 big steps, Security requirements, Design, Implementation and Operation and each step has own goals and activities. Deriving security requirements, the first step of SDLC, must be accurate and objective because it affect the rest of the SDLC. For accurate and objective security requirements, Threat modeling is used. And the results of the threat modeling can satisfy the completeness of scope of analysis and the traceability of threats. In many countries, academic and IT company, a lot of researches about drawing security requirements systematically are being done. But in domestic, awareness and researches about deriving security requirements systematically are lacking. So in this paper, I described about method and process to drawing security requirements systematically by using threat modeling including DFD, STRIDE, Attack Library and Attack Tree. And also security requirements are described via Common Criteria for delivering objective meaning and broad use of them.

Simulating the Availability of Integrated GNSS Positioning in Dense Urban Areas (통합 GNSS 환경에서 도시공간 위성측위의 가용성 평가 시뮬레이션)

  • Suh, Yong-Cheol;Lee, Yang-Won
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.3
    • /
    • pp.231-238
    • /
    • 2007
  • This paper describes the availability of the forthcoming integrated GNSS(Global Navigation Positioning System) positioning that includes GPS(Global Positioning System), Galileo, and QZSS(Quasi-Zenith Satellites System). We built a signal propagation model that identifies direct, multipath, and diffraction signals, using the principles of specular reflection and ray tracing technique. The signal propagation model was combined with 3D GIS(three-dimensional geographic information system) in order to measure the satellite visibility and positioning error factors, such as the number of visible satellites, average elevation of visible satellites, optimized DOP(dilution of position) values, and the portion of multipath-producing satellites. Since Galileo and QZSS will not be fully operational until 2010, we used a simulation in comparing GPS and GNSS positioning for a $1km{\times}1km$ developed area in Shinjuku, Tokyo. To account for local terrain variation. we divided the target area into 40,000 $5m{\times}5m$ grid cells. The number of visible satellites and that of multipath-free satellites will be greatly increased in the integrated GNSS environment while the average elevation of visible satellites will be higher in the GPS positioning. Much decreased PDOP(position dilution of precision) values indicate the appropriate satellite/user geometry of the integrated GNSS; however, in dense urban areas, multipath mitigation will be more important than the satellite/user geometry. Thus, the efforts for applying current technologies of multipath mitigation to the future GNSS environment will be necessary.

A Study of SIL Allocation with a Multi-Phase Fuzzy Risk Graph Model (다단계 퍼지 리스크 그래프 모델을 적용한 SIL 할당에 관한 연구)

  • Yang, Heekap;Lee, Jongwoo
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.2
    • /
    • pp.170-186
    • /
    • 2016
  • This paper introduces a multi-phase fuzzy risk graph model, representing a method for determining for SIL values for railway industry systems. The purpose of this paper is to compensate for the shortcomings of qualitative determination, which are associated with input value ambiguity and the subjectivity problem of expert judgement. The multi-phase fuzzy risk graph model has two phases. The first involves the determination of the conventional risk graph input values of the consequence, exposure, avoidance and demand rates using fuzzy theory. For the first step of fuzzification this paper proposes detailed input parameters. The fuzzy inference and the defuzzification results from the first step will be utilized as input parameters for the second step of the fuzzy model. The second step is to determine the safety integrity level and tolerable hazard rate corresponding to be identified hazard in the railway industry. To validate the results of the proposed the multi-phase fuzzy risk graph, it is compared with the results of a safety analysis of a level crossing system in the CENELEC SC 9XA WG A0 report. This model will be adapted for determining safety requirements at the early concept design stages in the railway business.

Design and evaluation of a VPRS-based misbehavior detection scheme for VANETs (차량애드혹망을 위한 가변정밀도 러프집합 기반 부정행위 탐지 방법의 설계 및 평가)

  • Kim, Chil-Hwa;Bae, Ihn-Han
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.6
    • /
    • pp.1153-1166
    • /
    • 2011
  • Detecting misbehavior in vehicular ad-hoc networks is very important problem with wide range of implications including safety related and congestion avoidance applications. Most misbehavior detection schemes are concerned with detection of malicious nodes. In most situations, vehicles would send wrong information because of selfish reasons of their owners. Because of rational behavior, it is more important to detect false information than to identify misbehaving nodes. In this paper, we propose the variable precision rough sets based misbehavior detection scheme which detects false alert message and misbehaving nodes by observing their action after sending out the alert messages. In the proposed scheme, the alert information system, alert profile is constructed from valid actions of moving nodes in vehicular ad-hoc networks. Once a moving vehicle receives an alert message from another vehicle, it finds out the alert type from the alert message. When the vehicle later receives a beacon from alert raised vehicle after an elapse of time, then it computes the relative classification error by using variable precision rough sets from the alert information system. If the relative classification error is lager than the maximum allowable relative classification error of the alert type, the vehicle decides the message as false alert message. Th performance of the proposed scheme is evaluated as two metrics: correct ratio and incorrect ratio through a simulation.

Speech Activity Detection using Lip Movement Image Signals (입술 움직임 영상 선호를 이용한 음성 구간 검출)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.289-297
    • /
    • 2010
  • In this paper, A method to prevent the external acoustic noise from being misrecognized as the speech recognition object is presented in the speech activity detection process for the speech recognition. Also this paper confirmed besides the acoustic energy to the lip movement image signals. First of all, the successive images are obtained through the image camera for personal computer and the lip movement whether or not is discriminated. The next, the lip movement image signal data is stored in the shared memory and shares with the speech recognition process. In the mean time, the acoustic energy whether or not by the utterance of a speaker is verified by confirming data stored in the shared memory in the speech activity detection process which is the preprocess phase of the speech recognition. Finally, as a experimental result of linking the speech recognition processor and the image processor, it is confirmed to be normal progression to the output of the speech recognition result if face to the image camera and speak. On the other hand, it is confirmed not to the output the result of the speech recognition if does not face to the image camera and speak. Also, the initial feature values under off-line are replaced by them. Similarly, the initial template image captured while off-line is replaced with a template image captured under on-line, so the discrimination of the lip movement image tracking is raised. An image processing test bed was implemented to confirm the lip movement image tracking process visually and to analyze the related parameters on a real-time basis. As a result of linking the speech and image processing system, the interworking rate shows 99.3% in the various illumination environments.

Trend Analysis in Maker Movement Using Text Mining (텍스트 마이닝을 이용한 메이커 운동의 트렌드 분석)

  • Park, Chanhyuk;Kim, Ja-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.12
    • /
    • pp.468-488
    • /
    • 2018
  • The maker movement is a phenomenon of society and culture where people who make necessary things come together and share knowledge and experience through creativity. However, as the maker movement has grown rapidly over the past decade, there is still a lack of consensus for how far they will be viewed as a maker movement. We need to look at how the maker movement has changed so far in order to find the direction of development of the maker movement. This study analyzes the media articles using text-based big data analysis methodology to understand how the issue of the maker movement has changed in general media. In particular, we apply Keyword Network Analysis and DTM(Dynamic Topic Model) to analyze changes of interest according to time. The Keyword Network Analysis derives major keywords at the word level in order to analyze the evolution of the maker movement, and DTM helps to identify changes in interest in different areas of the maker movement at three levels: word, topic, and document. As a result, we identified major topics such as start-ups, makerspaces, and maker education, and the major keywords have changed from 3D printer and enterprise to education.

Flight Test Safety Risk Assessment and Mitigation (비행시험 안전 리스크 평가 및 완화 연구)

  • Kim, Mu-Geun;Yoo, Beong-Seon;Han, Jeongho;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.6
    • /
    • pp.537-544
    • /
    • 2018
  • A national comprehensive aviation test center is being constructed for the purpose of flight tests for development and modification of aircraft or flight inspections for the development of navaids. Flight testing is a high-risk task, so strict risk management processes are required prior to operation. In addition, since the flight test center is subject to the airdrome regulations under the current law, the introduction of the safety management system will enhance safety as usual in ordinary airports. The establishment of a safety management system based on ICAO criteria is an optimal means of ensuring safe and effective operation of the test center and may mitigate the risks that may arise during flight testing. This paper focuses on risk assessment and mitigation required for safety management at the flight test center. We conducted risk assessments on the flight hazards identified in the previous study. Then the high risk group of hazards were selected and risk mitigation techniques such as avoidance, reduction, acceptance, and control were applied.