• Title/Summary/Keyword: 코드추적

Search Result 265, Processing Time 0.024 seconds

RFID Code System for Traceability of Medical Herb (한약재 이력 정보 추적을 위한 RFID 코드체계)

  • Kim, Chul;Kim, Sang-Kyun;Kim, Jin-Hyun;Song, Mi-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.973-977
    • /
    • 2009
  • The tracing system means that the system can follows, traces, and records every steps of production and delivery of goods and its ingredient. Specially, Koreans have big concern about food tracing system which is influential for health directly. We were more interested in medical herb using in oriental medicine than any other things. We proposed the process and design of tracing system for medical herb based on RFID(Radio Frequency IDentification) technology in this research. This study shows current medical herb tracing ways and RFID code system by using for world standard. Firstly, We designed the new process of traceability of medical herb with various preceding references based on RFID technology. Secondly we suggest that RFID code configuration using the international standard code(ISO code) and korean agricultural and marine products code for the proposed process. RFID code system is very important because this plays a means of identification for tracing about medical herb. The proposed code system have the elements as Issuing Agency Code, Issuer Number, inspection information, inheritance flag, area code, modified agricultural and marine products code, serial number in 96 Bit length. Lastly We defined the code-generation process in the tracing system.

Construction of Phase Tracking Codebooks Based on Lloyd-Max Vector Quantization (Lloyd-Max 벡터 양자화 기반의 위상 추적 코드북 구성)

  • Park, Jaeyong;Kim, Jaewon;Yoo, Hyung-Gil;Sung, Wonjin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.72-73
    • /
    • 2010
  • 본 논문에서는 안테나 당 전력제한 조건 하의 다중 입출력 빔포밍 시스템을 위한 위상 추적 코드북을 제안한다. 위상 추적 빔포밍 방식은 인접한 프레임 정보의 차이만을 활용한다는 점에서 기존의 위상 조정 방식과 차별화 되며, 궤환 정보량의 감소 이득을 얻을 수 있다. 이러한 위상 추적 코드북 구성을 위하여 위상 조정 코드북의 목적함수를 새롭게 변형하여 Lloyd-Max 알고리듬에 적용한다. 성능평가를 위하여 위상 조정 코드북과의 신호 대 잡음비의 비교 수행하며, 이를 이용하여 제안하는 코드북의 효율성을 입증한다.

  • PDF

The Next Generation Malware Information Collection Architecture for Cybercrime Investigation

  • Cho, Ho-Mook;Bae, Chang-Su;Jang, Jaehoon;Choi, Sang-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.11
    • /
    • pp.123-129
    • /
    • 2020
  • Recently, cybercrime has become increasingly difficult to track by applying new technologies such as virtualization technology and distribution tracking avoidance. etc. Therefore, there is a limit to the technology of tracking distributors based on malicious code information through static and dynamic analysis methods. In addition, in the field of cyber investigation, it is more important to track down malicious code distributors than to analyze malicious codes themselves. Accordingly, in this paper, we propose a next-generation malicious code information collection architecture to efficiently track down malicious code distributors by converging traditional analysis methods and recent information collection methods such as OSINT and Intelligence. The architecture we propose in this paper is based on the differences between the existing malicious code analysis system and the investigation point's analysis system, which relates the necessary elemental technologies from the perspective of cybercrime. Thus, the proposed architecture could be a key approach to tracking distributors in cyber criminal investigations.

A Code Tracking Circuit Using a Linear Clipper-Gaussian Filter As a Countermeasure against Follow Jamming in FHSS Systems (FHSS 시스템에서 추적 재머에 대항하는 선형 제한-가우시안 필터를 이용한 코드 추적 회로)

  • Koh, Dong-Hwan;Kim, Young-Je;Kim, Whan-Woo;Eun, Chang-Soo;Kim, Yong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.2
    • /
    • pp.152-161
    • /
    • 2009
  • As follow jamming signals in a FHSS system cause malfuctioning in the code tracking circuits using early-late gates, we need a code tracking circuit that is robust against the follow jamming signals. In this paper, we propose a code tracking circuit using a linear clipper-Gaussian filter algorithm to remedy the malfunctioning due to the follow jamming signals in FHSS systems. We investigate the mechanism of the malfunctioning of the code tracking circuit and verify that the proposed linear clipper-Gaussian filter metigates the problem through mathematical analysis and computer simulations.

Colluders Tracing on the Collusion Codes of Multimedia Fingerprinting Codes based on BIBD (BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.79-86
    • /
    • 2009
  • In this paper, it has the performance metrics and the utility evaluation of the collusion codes about multimedia fingerprinting code based on BIBD and then the tracing algorithm of all colluders is proposed. Among the collusion codes, the bit stream of "all 0" or "all 1" are generated, also same collusion code and bit reversed code with user's fingerprinting code are generated. Thus there was occurred some problems, in which a colluder is deciding to anti-colluder or anti-colluder is deciding to colluder. In this paper, for the performance metrics and the utility evaluation of the collude codes, the experiment onto the total solution is processed by the logical collusion operation added with a partially processed averaging attack in the past papers. The proposed performance metrics and the utility evaluation about the collusion code generated from multimedia fingerprinting code based on BIBD is operated. Through the experiment, it confirmed that the ratio of colluder tracing is 100%.

Active Code based Real-Time Traceback System (액티브코드 기반의 실시간 역추적 시스템)

  • 지정훈;남택용;손승원
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.487-489
    • /
    • 2002
  • 본 논문에서는 액티브코드를 이용한 실시간 역추적시스템에 대하여 논한다. 본 시스템은 우회공격의 연결특성을 이용하여 TCP 응용프로그램의 응답메시지에 액티브코드를 덧붙였다. 덧붙여진 액티브코드는 침입자의 근원지 소스측으로 실시간 이동하면서 네트워크 중간노드에서 침입자의 공격에 유연하게 대응한다. 또한, 본 시스템에서는 데이터은닉기법을 적용하여 중간 경유호스트에서 별도의 역추적 시스템을 도입할 필요가 없도록 기존의 환경에 투명성을 부여하였다. 이러한 방법을 통해, 기존의 호스트기반역추적 시스템의 신뢰성문제와 deployment문제를 해결하였다. 본 시스템을 통하여 기존의 네트워크환경에 최소한의 변경으로 침입자의 공격에 실시간적이며 능동적인 대응을 할 수 있다.

  • PDF

Susceptibility of Spoofing On A GPS L1 C/A Signal Tracking Loop (GPS L1 C/A 신호추적루프에서의 기만에 의한 영향)

  • Im, Sung-Hyuck;Im, Jun-Hyuck;Song, Jong-Hwa;Baek, Seung-Woock;Lee, In-Won;Lee, Dae-Yearl;Jee, Gyu-In
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2011
  • In this paper, code and carrier tracking error which resulted from spoofing signal was analyzed by simulation. For a start, the types of spoofing signals and methods were classified. For the simulation, search spoofing method is assumed because a perfect position and velocity are not generally informed to spoofing device. In most cases, the tracking error is increased but a complete deception does not happen because of the inherent anti-spoofing characteristics of the GPS signal.

A New Design Method of a Code Tracking Loop using C/N0 in a GPS Receiver (C/N0 추정치를 이용한 GPS 수신기의 코드 추적 루프 설계)

  • Lim, Deok-Won;Jin, Mi-Hyun;Lee, Sang-Jeong;Hoe, Moon-Boem;Nam, Gi-Wook
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.4
    • /
    • pp.495-501
    • /
    • 2011
  • The characteristics of a discriminator estimating a tracking error in a signal tracking loop of a GPS receiver can be affected by the noise power, and the slope of the discriminator function is actually lowered as the noise power increases. In this paper, an algorithm to compensate the lowered slope of the function using the estimated C/N0 is studied, and a new design method of a code tracking which provides more accurate tracking error than a conventional one by adopting the compensation algorithm is proposed. Through the experimental results, finally, it has been check that the accuracy of the proposed DLL is enhanced about 50% when the dynamics of the vehicle is 20g/s.

Random PRF Pulse Design for Signal Processing Unit of Small Tracking Radar (소형 추적 레이더 신호처리기용 Random PRF 펄스 설계)

  • Hong-Rak Kim;Man-Hee Lee;Sung-Ho Park;Youn-Jin Kim
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.2
    • /
    • pp.59-64
    • /
    • 2024
  • The small tracking radar randomly changes the transmission period to avoid deceptive signals such as RGPO (Range Gaet Pull Off) operated on the target. Since the code repeats after a specific section, it becomes difficult to avoid a deceptive signal when the repetition is exposed. In this paper, a more realistic transmission pulse code is generated by adding random code generation through FPGA and system white noise. We present the research results of code generation that generates PRF that can avoid repetition while using pseudo-random code in EPROM using FPGA. Also, the result of designing random PRF pulse was confirmed by applying it to tracking radar.

Traitor Traceability of Colluded Multimedia Fingerprinting code Using Hamming Distance on XOR Collusion Attack (XOR 공모공격에서 해밍거리를 이용한 공모된 멀티미디어 핑거프린팅 코드의 부정자 추적)

  • Chung, Il Yong;Rhee, Kang Hyeon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.175-180
    • /
    • 2013
  • For the traitor tracing of multimedia content, this paper presents the classification algorithm of XOR collusion attack types using hamming distance, which applies to the colluded fingerprinting codes. The conventional traitor decision hinges on the colluded fingerprinting code used by a correlation coefficient, but the proposed scheme uses hamming distance. While XOR collusion attack employing a correlation coefficient is impossible to trace the traitors about 50% colluders due to a serious XOR linear problem, our method improves the performance of traceability to trace at least 1 traitor using hamming distance, and thus, the functional behavior of the proposed traitor traceability is coincided with Probability Scheme.