• Title/Summary/Keyword: 코드화

Search Result 1,696, Processing Time 0.028 seconds

Vehicle License Plate Recognition System on PDA for Illegal Parking Car Regulation (주정차 단속을 위한 PDA 기반의 자동차번호판 인식 시스템)

  • Yoon Hee-Joo;Cho Hoon;Koo Kyung-Mo;Cha Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.792-795
    • /
    • 2006
  • In this paper, we propose a method of vehicle license plate recognition on PDA for illegal parking car regulation. we classified three kinds of vehicle license plates being used down to date since the introduction of each vehicle license Plate using features of each one. And we recognized vehicle license plates segmentation the AreaName, the AreaCode, the TypeCharacter and the Numbers. A 88.7% recognition accuracy was obtained through the experiment of the proposed vehicle license plate recognition system using the obtained images of PDA.

  • PDF

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

Survey and Proposal of Plagiarism Inspection Supporting System for Cultural Contents (문화콘텐츠 진위 판정 지원 시스템의 고찰 및 제안)

  • Cho, Dong-Uk
    • The KIPS Transactions:PartD
    • /
    • v.11D no.2
    • /
    • pp.471-478
    • /
    • 2004
  • This paper describes the plagiarism inspection supporting system of typical cultural contents or properties such as game programs, cultural contents of natural language documents and art works and proposes the cultural contents the plagiarism inspection supporting system For this, firstly, a survey of plagiarism inspection methods and tools for supporting Plagiarism inspection about programs, cultural contents of natural language documents are discussed. Secondly, the technical method for supporting plagiarism inspection of cultural art works by analyzing the drawing characteristics of authors is proposed. Finally, the experimental results show the effectiveness of this paper.

Optical implementation of optical switching by use of a multimode planar waveguide and hologram filters (다중모드 평면 도파로와 홀로그램 필터를 이용한 광신호 교환의 광학적 구현)

  • Shin, Dong-Hak
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.563-568
    • /
    • 2008
  • We present a method to implement an $M{\times}N$ switching system by use of an $M{\times}1$ multimode planar waveguide and N hologram filters. The $M{\times}1$ multimode planar waveguide provides the pass of optical signals and changes the output speckle patterns by applying an electrical signal. The complex speckle patterns generated from the multimode planar waveguide are recorded into the N hologram filters and used as the code for destination. The feasibility of our method is experimentally demonstrated.

A Study of the framework of search patterns for Hangul characters and its relationship with Hangout code for Hangeul Character based Index (한글 글자 단위 인덱스를 위한 검색 유형 정의 및 한글 부호계와의 연관성에 관한 연구)

  • Lee, Jung-Hwa;Lee, Jong-Min;Kim, Seong-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1083-1088
    • /
    • 2007
  • In this paper, We investigate the search patterns that are applied to the character based word search and make the search algorithm. We used to various hangout coded set that are KS X 1001 hangeul coded set and unicode 3.0 for the character based word search algorithm. In each case, We study of efficiency of algorithms that are related to hangeul coded set.

A Study on the Mobile Context construct Algorism Modeling for Ubiquitous (유비쿼터스 이동통신 한경 구축 알고리즘 구현에 관한 연구)

  • Kang, Myoung-Ku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.10
    • /
    • pp.1883-1889
    • /
    • 2008
  • In order to realize future ubiquitous, it needs to establish an environment witch service is provided to an user without user's awareness. This study suggests the mobile context awareness algorithm for that. With DB collected using LBS technology, it aims to recognize service status of a terminal and to maximize user's convenience by offering service through continuous inter-operability for various demand and environment of users against the status of a terminal. To realize the algorithm, it adds a terminal status deduction process to MSC. And then, it suggests the algorithm witch determines terminal status depending on status parameter defined by analyzing LBS-based short information by MSC. It realize C code.

A Study on Tainting Technique for leaking official certificates Malicious App Detection in Android (공인인증서 유출형 안드로이드 악성앱 탐지를 위한 Tainting 기법 활용 연구)

  • Yoon, Hanj Jae;Lee, Man Hee
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.27-35
    • /
    • 2018
  • The certificate is electronic information issued by an accredited certification body to certify an individual or to prevent forgery and alteration between communications. Certified certificates are stored in PCs and smart phones in the form of encrypted files and are used to prove individuals when using Internet banking and smart banking services. Among the rapidly growing Android-based malicious applications are malicious apps that leak personal information, especially certificates that exist in the form of files. This paper proposes a method for judging whether malicious codes leak certificates by using DroidBox, an Android-based dynamic analysis tool.

  • PDF

Analysis on GNSS Spoofing signal effects using SDR receiver (SDR 수신기를 이용한 위성항법 기만신호 효과도 분석)

  • Cho, Ji-haeng
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.2
    • /
    • pp.97-102
    • /
    • 2019
  • The GNSS(Global Navigation Satellite System) provides important information such as Position and Navigation, Timing(PNT) to various weapon systems in the military. as a result, applications that employ satellite navigation systems are increasing. therefore, a number of studies have been conducted to deceive the weapon systems that employ GNSS. GNSS spoofing denotes the transmission of counterfeit GNSS-like signals with the intention to produce a false position and time within the victim receiver. In order to deceive the victim receiver, spoofing signal should be synchronized with GNSS signal in doppler frequency and code phase, etc. In this paper, Civilian GPS L1 C/A spoofing signals have been evaluated and analyzed by SDR receiver.

A study on the cultural symbolic representation of animal imitation in Korean traditional dance (한국전통춤에서 동물모방의 문화기호학적 표상에 관한 연구)

  • Kim, Ji Won
    • 기호학연구
    • /
    • no.54
    • /
    • pp.37-63
    • /
    • 2018
  • In this study, we tried to represent representative animals in traditional dance and study about cultural symbolic representations that symbolize them, thus meaning Korean worship of animal worship and philosophy of life and discuss the identity of Korean traditional art. This is to ask fundamental questions about Korean culture and art, and to express the cultural philosophical reason for the representation of animal imitation. Therefore, Korean animal imitation dance was able to get a glimpse of Koreans' recognition of artistic value which is reflected in dance beyond simple cultural code. In other words, it was found that not only magic and sexual metaphors but also the adaptive attitude through natural friendly life and the ethical practice in reality were inspired by artistic aesthetics.

Diagnosis of Pet by Using FCM Clustering

  • Kim, Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.39-44
    • /
    • 2021
  • In this paper, we propose a method of disease diagnosis system that can diagnose the health status of household pets for the people who lack veterinary knowledge. The proposed diagnosis system holds 50 different kinds of diseases with the symptoms for each of them as a database to provide results from symptom input. Each disease database has its own symptom codes for a disease, and by using the disease database, FCM clustering technique is applied to disease which outputs membership degree to determine diseases close to the input symptom as a pet diagnosis result. The implementation results of the proposed pet diagnosis system were obtained by the number of selected symptoms and the possibility values of the diseases that have the selected symptoms being sorted in descending order to derive top 3 diseases closest to the pet's symptom.