• Title/Summary/Keyword: Code Scanning

Search Result 77, Processing Time 0.019 seconds

QR-code finder recognition using four directional scanning method (네 방향 스캔 방법을 이용한 QR코드 파인더 인식)

  • Lee, Yeon-Kyung;Yoo, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1187-1192
    • /
    • 2012
  • This paper describes a method to detect QR-code finders by four-direction scanning. The finder recognition is the first step in the QR-code recognition. If the finder is missing, QR-code recognition fails. The existing QR-code recognition method has a problem that the recognition performance decreases for perspectively distored images. To overcome the problem, we introduce four-direction scanning and a candidate set image to accurately detect QR-code finders. Using morphological operations detect the QR-code finder in the candidate set image robustly. To show the effectiveness of our method, we compared our method with the well-known existing method. The experimental result indicates that the proposed method is superior to the existing method in terms of the finder recognition performance.

Real Time Linux System Design (리얼 타임 리눅스 시스템 설계)

  • Lee, Ah Ri;Hong, Seon Hack
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.13-20
    • /
    • 2014
  • In this paper, we implemented the object scanning with nxtOSEK which is an open source platform. nxtOSEK consists of device driver of leJOS NXJ C/Assembly source code, TOPPERS/ATK(Automotive real time Kernel) and TOPPERS/JSP Real-Time Operating System source code that includes ARM7 specific porting part, and glue code make them work together. nxtOSEK can provide ANSI C by using GCC tool chain and C API and apply for real-time multi tasking features. We experimented the 3D scanning with ultra sonic and laser sensor which are made directly by laser module diode and experimented the measurement of scanning the object by knowing x, y, and z coordinates for every points that it scans. In this paper, the laser module is the dimension of $6{\times}10[mm]$ requiring 5volts/5[mW], and used the laser light of wavelength in the 650[nm] range. For detecting the object, we used the beacon detection algorithm and as the laser light swept the objects, the photodiode monitored the ambient light at interval of 10[ms] which is called a real time. We communicated the 3D scanning platform via bluetooth protocol with host platform and the results are displayed via DPlot graphic tool. And therefore we enhanced the functionality of the 3D scanner for identifying the image scanning with laser sensor modules compared to ultra sonic sensor.

Three-dimensional QR Code Using Integral Imaging (집적 영상을 활용한 3차원 QR code)

  • Kim, Youngjun;Cho, Ki-Ok;Han, Jaeseung;Cho, Myungjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2363-2369
    • /
    • 2016
  • In this paper, we propose three-dimensional (3D) quick-response (QR) code generation technique using passive 3D integral imaging and computational integral imaging reconstruction technique. In our proposed method, we divide 2D QR code into 4 planes with different reconstruction depths and then we generate 3D QR code using synthetic aperture integral imaging and computational reconstruction. In this 3D QR code generation process, we use integral imaging which is one of 3D imaging technologies. Finally, 3D QR code can be scanned by reconstructing and merging 3D QR codes at 4 different planes with computational reconstruction. Therefore, the security level for QR code scanning may be enhanced when QR code is scanned. To show that our proposed method can improve the security level for QR code scanning, in this paper, we carry out the optical experiments and computational reconstruction. In addition, we show that 3D QR code can be scanned when reconstruction depths are known.

Mobile Robot System Design for RFID-based Inventory Checking (RFID 기반 재고조사용 이동로봇 시스템의 설계)

  • Son, Min-Hyuk;Do, Yong-Tae
    • The Journal of Korea Robotics Society
    • /
    • v.6 no.1
    • /
    • pp.49-57
    • /
    • 2011
  • In many industries, the accurate and quick checking of goods in storage is of great importance. Most today's inventory checking is based on bar code scanning, but the relative position between a bar code and an optical scanner should be maintained in close distance and proper angle for the successful scanning. This requirement makes it difficult to fully automate the inventory information/control systems. The use of RFID technology can be a solution for overcoming this problem. The mobile robot presented in this paper is equipped with an RFID tag scanning system, that automates the otherwise manual or semi-automatic inventory checking process. We designed the robot system in a quite practical approach, and the developed system is close to the commercialization stage. In our experiments, the robot could collect information of goods stacked on shelves autonomously without any failure and maintain corresponding database while it navigated predefined paths between the shelves using vision.

Scanning Worm Detection Algorithm Using Network Traffic Analysis (네트워크 트래픽 특성 분석을 통한 스캐닝 웜 탐지 기법)

  • Kang, Shin-Hun;Kim, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.6
    • /
    • pp.474-481
    • /
    • 2008
  • Scanning worm increases network traffic load and result in severe network congestion because it is a self-replicating worm and send copies of itself to a number of hosts through the Internet. So an early detection system which can automatically detect scanning worms is needed to protect network from those attacks. Although many studies are conducted to detect scanning worms, most of them are focusing on the method using packet header information. The method using packet header information has long detection delay since it must examine the header information of all packets entering or leaving the network. Therefore we propose an algorithm to detect scanning worms using network traffic characteristics such as variance of traffic volume, differentiated traffic volume, mean of differentiated traffic volume, and product of mean traffic volume and mean of differentiated traffic volume. We verified the proposed algorithm by analyzing the normal traffic captured in the real network and the worm traffic generated by simulator. The proposed algorithm can detect CodeRed and Slammer which are not detected by existing algorithm. In addition, all worms were detected in early stage: Slammer was detected in 4 seconds and CodeRed and Witty were detected in 11 seconds.

A Evaluation of Shielding Deficiency by Means of Gamma Scanning Test (Gamma Scanning Test에 의한 대단위 차폐체의 결함 평가 연구)

  • Lee, B.J.;Seo, K.W.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.14 no.4
    • /
    • pp.228-236
    • /
    • 1995
  • In this paper the method to evaluate shielding deficiency by gamma scanning test was presented and verified theoretically by Monte Carlo code which is one of the best effective method for radiation shielding calculation. The cylindrical shielding model was selected to evaluate shielding deficiency by gamma scanning test. First, the reference shielding according to the design requirement of cask was fabricated specially and reference values were measured with Co-60 source and scintillation detector. As a result with which calculated the reference values, it is shown that maximum deficiency thickness for lead of true cylindrical shielding model was 12mm. To verify this, thickness of lead was calculated by MCNP code and maximum deficiency thickness was 11.6mm. The experimental result obtained by the use of reference shielding was in good agreement with the theoretical result within 4.1%. So, this method can be applied to inspect the shielding ability for great shielding or cask which the radioactive material is used. To perform measurement more exactly, the further work on the development of measuring equipment to display the results on the screen will be required.

  • PDF

Long Distance and High Resolution Three-Dimensional Scanning LIDAR with Coded Laser Pulse Waves (레이저 펄스 부호화를 이용한 원거리 고해상도 3D 스캐닝 라이다)

  • Kim, Gunzung;Park, Yongwan
    • Korean Journal of Optics and Photonics
    • /
    • v.27 no.4
    • /
    • pp.133-142
    • /
    • 2016
  • This paper presents the design and simulation of a three-dimensional pixel-by-pixel scanning light detection and ranging (LIDAR) system with a microelectromechanical system (MEMS) scanning mirror and direct sequence optical code division multiple access (DS-OCDMA) techniques. It measures a frame with $848{\times}480$ pixels at a refresh rate of 60 fps. The emitted laser pulse waves of each pixel are coded with DS-OCDMA techniques. The coded laser pulse waves include the pixel's position in the frame, and a checksum. The LIDAR emits the coded laser pulse waves periodically, without idle listening time to receive returning light at the receiver. The MEMS scanning mirror is used to deflect and steer the coded laser pulse waves to a specific target point. When all the pixels in a frame have been processed, the travel time is used by the pixel-by-pixel scanning LIDAR to generate point cloud data as the measured result.

Development of Electron Beam Monte Carlo Simulation and Analysis of SEM Imaging Characteristics (전자빔 몬테 카를로 시물레이션 프로그램 개발 및 전자현미경 이미징 특성 분석)

  • Kim, Heung-Bae
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.5
    • /
    • pp.554-562
    • /
    • 2012
  • Processing of Scanning electron microscope imaging has been analyzed in both secondary electron (SE) imaging and backscattered electron (BSE) image. Because of unique characteristics of both secondary electron and backscattered electron image, mechanism of imaging process and image quality are quite different each other. For the sake of characterize imaging process, Monte Carlo simulation code have been developed. It simulates electron penetration and depth profile in certain material. In addition, secondary electron and backscattered electron generation process as well as their spatial distribution and energy characteristics can be simulated. Geometries that has fundamental feature have been imaged using the developed Monte Carlo code. Two, SE and BSE images generation process will be discussed. BSE imaging process can be readily used to discriminate in both material and geometry by simply changing position and direction of BSE detector. The developed MC code could be useful to design BSE detector and their position. Furthermore, surface reconstruction technique is possibly developed at the further research efforts. Basics of Monte Carlo simulation method will be discussed as well as characteristics of SE and BSE images.

System implementation for Qshing attack detection (큐싱(Qshing) 공격 탐지를 위한 시스템 구현)

  • Hyun Chang Shin;Ju Hyung Lee;Jong Min Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.55-61
    • /
    • 2023
  • QR Code is a two-dimensional code in the form of a matrix that contains data in a square-shaped black-and-white grid pattern, and has recently been used in various fields. In particular, in order to prevent the spread of COVID-19, the usage increased rapidly by identifying the movement path in the form of a QR code that anyone can easily and conveniently use. As such, Qshing attacks and damages using QR codes are increasing in proportion to the usage of QR codes. Therefore, in this paper, a system was implemented to block movement to harmful sites and installation of malicious codes when scanning QR codes.

Optical system design for laser scanning unit (Laser Scanning Unit용 광학계 설계)

  • 임천석
    • Korean Journal of Optics and Photonics
    • /
    • v.10 no.1
    • /
    • pp.15-20
    • /
    • 1999
  • Laser Scanning Unit (LSU), which is one of the core parts of laser printer, consists of LD Module, cylinder lens, polygon mirror and f$\theta$ lens. After making an initial design on each part, we optimized the one which satisfies the user specification. The optimized optical system has diffraction limited performance for the slit size of 2.7 mm$\times$1.6 mm, f$\theta$ characteristics less than 0.3% and field curvature less 1.2 mm. We also calcurate tolerance of each part based on RSS(Root Sum Square) method to manufacture LSU for mass production.

  • PDF