• Title/Summary/Keyword: ID method

Search Result 695, Processing Time 0.026 seconds

Development of a Multi-template type Image Segmentation Algorithm for the Recognition of Semiconductor Wafer ID (반도체 웨이퍼 ID 인식을 위한 다중템플릿형 영상분할 알고리즘 개발)

  • Ahn, In-Mo
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.55 no.4
    • /
    • pp.167-175
    • /
    • 2006
  • This paper presents a method to segment semiconductor wafer ID on poor quality images. The method is based on multiple templates and normalized gray-level correlation (NGC) method. If the lighting condition is not so good and hence, we can not control the image quality, target image to be inspected presents poor quality ID and it is not easy to identify and then recognize the ID characters. Conventional several method to segment the interesting ID regions fails on the bad quality images. In this paper, we propose a multiple template method, which uses combinational relation of multiple templates from model templates to match several characters of the inspection images. To find out the optimal solution of multiple template model in ID regions, we introduce newly-developed snake algorithm. Experimental results using images from real FA environment are presented.

Abbreviated ID Conflict Management Method for Efficient Data Forwarding on Dynamic IoT Networks (동적 사물인터넷에서 효율적인 데이터 전달을 위한 축약 ID의 충돌 관리 기법)

  • Son, Sanghyun;Jung, Yeonsu;Jeon, Yongsu;Lee, Seungjin;Baek, Yunju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.200-201
    • /
    • 2016
  • Recently, according to era of Internet of Things was opened, various mobile devices connected to the internet using wireless communication. Many IoT devices have limited communication performance. Thus, these devices efficiently forward data using an abbreviated ID method. However, movement of devices causes abbreviated ID confliction, and These conflict degraded network performance. Therefore it is important management of ID conflict. In this paper, we proposed an abbreviated ID conflict management method to improve the efficiency of communication in the dynamic IoT network.

  • PDF

Study on Development of Automation System for Non-Contact Counting of ID Card (비접촉 ID카드 계수를 위한 자동화 시스템 개발)

  • Kang, Dae-Hwa;Hong, Jun-Hee;Guo, Yang-Yang;Lee, Hyok-Won
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.22 no.4
    • /
    • pp.652-657
    • /
    • 2013
  • In this study, we developed a counting method for non-contact ID cards using an optical fiber displacement sensor instead of the traditionally used friction counting method. The proposed method has the advantage of high speed and automated measurement. For counting non-contact ID cards, an H-type optical fiber sensor, jig part, and counting program are developed separately to build the system and adjust it. Through the experimental test results, it was confirmed that counting is possible with one type of international ID card and one type of financial security card based on ISO7810. Furthermore, by applying the proposed method to 100 ID cards 100 times repeatedly, it was confirmed that it has high accuracy and an error ratio of 0%. We experimentally demonstrated that the proposed counting method for non-contact ID cards using an optical fiber displacement sensor can perform measurements with high accuracy and high speed.

Development of an Image Segmentation Algorithm using Dynamic Programming for Object ID Marks in Automation Process (동적계획법을 이용한 자동화 공정에서의 제품 ID 마크 자동분할 알고리듬 개발)

  • 유동훈;안인모;김민성;강동중
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.726-733
    • /
    • 2004
  • This paper presents a method to segment object ID(identification) marks on poor quality images under uncontrolled lighting conditions of automated inspection process. The method is based on dynamic programming using multiple templates and normalized gray-level correlation (NGC) method. If the lighting condition is not good and hence, we can not control the image quality, target image to be inspected presents poor quality ID marks and it is not easy to identify and recognize the ID characters. Conventional several methods to segment the interesting ID mark regions fail on the bad quality images. In this paper, we propose a multiple template method, which uses combinational relation of multiple templates from model templates to match several characters of the inspection images. To increase the computation speed to segment the ID mark regions, we introduce the dynamic programming based algorithm. Experimental results using images from real factory automation(FA) environment are presented.

A control system of each product with a remote controller for Multi-vision which is composed of several products (Multi-Vision으로 구성된 제품들의 리모컨을 통한 개별 제어 시스템)

  • Bae, Sang-Ho;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.149-152
    • /
    • 2011
  • A Multi-Vision needs an image adjust of each product to make the same picture quality for all products when it's installed. Owing to this reason need individual control. This document request indivisual control method for each product with the Remote controller. To realize this method need make Set ID and Picture ID on the UI and need daisy chain of cable to connect Remocon code(IR Signal) In to Out, After allocation the Set ID for each product. Picture ID of the product which want to change picture quality make equal to Set ID. And the product which is same Set ID and Picture ID is only controlled through decoding of Remocon code to Scaler.

  • PDF

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.

Analysis of Stability Condition and Wideband Characteristics of 3D Isotropic Dispersion(ID)-FDTD Algorithm (3차원 ID-FDTD 알고리즘의 Stability Condition과 광대역 특성 분석)

  • Kim, Woo-Tae;Koh, Il-Suek;Yook, Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.22 no.4
    • /
    • pp.407-415
    • /
    • 2011
  • The stability condition and wideband characteristics of 3D ID-FDTD algorithm which has low dispersion error with isotropic dispersion are presented in this paper. 3D ID-FDTD method was proposed to improve the defect of the Yee FDTD such as the anisotropy and large dispersion error. The published paper calculated the stability condition of 3D ID-FDTD algorithm by using numerical method, however, it is thought that the examples were not sufficient to verify the stability condition. Thus, in this paper, various simulations are included in order to hold reliability under the conditions that the plane wave propagation is assumed with a single frequency and a wideband frequency. Also, the 3D ID-FDTD algorithm is compared to those that have the similar FDTD algorithm with ID-FDTD such as Forgy's method and non-standard FDTD method in a wideband. Finally, the radar cross section(RCS) for the large sphere with high dielectric constant is calculated.

IDREF-ID Attribute Reference Modeling of DTD for Legacy Database (Legacy 데이터베이스를 위한 DTD의 IDREF-ID 속성 관계 모델링)

  • 김정희;곽호영
    • Journal of Internet Computing and Services
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2002
  • A method of DID generating step is suggested for applying the XML technology to the information data extracted from the Legacy databases. The IDREF-ID attribute reference modeling is used for representing the complex relationship between tables and excluding the prearranged step of ID insertion. ID Insertion procedure is performed in parallel with investigating the relationship between the tables and the frequent search direction between the table data. As a result, ID insertion procedure can be performed simultaneously with understanding of the IDREF-ID relationship between tables, and DID are also generated.

  • PDF

Encoding Method for Transfer UserID to Contactless IC Card Reader (비접촉 IC카드 리더로의 UserID 전송을 위한 엔코딩 기법)

  • 조도연;박명순
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.385-387
    • /
    • 2004
  • 최근 지하철이나 버스 등의 교통수단을 이용하기 위해 비접촉식 카드를 이용한 IC카드 Reader가 많이 사용되고 있다. 이러한 IC카드 Header는 ID를 인증하기 위한 UserID를 Reader내부에 저장하고 있으며 UserID가 바뀔 때 마다 상위 시스템(서버)으로부터 전송받아 최신의 UserID를 가지고 있어야 한다. 교통시스템에서 사용되는 통신매체는 환경의 특수함으로 인해 낮은 전송속도를 이용하여 통신하고 있고, 그로인해 UserID를 전송할 때 시간이 많이 소모된다. UserID를 전송하는 동안에는 IC카드 Reader의 사용이 제한되기 때문에 UserID는 IC카드 Reader가 사용되지 않는 시간에 전송하고 있다. 많은 양의 UserID를 IC카드 Reader에 빠르게 전송하기 위해 UserID의 특성을 이용한 엔코딩(encoding) 기법을 적용 하여 UserID의 크기를 줄여 전송함으로써 전송시간을 줄이는 방법을 제안하였다.

  • PDF

Convenient User Authentication Mechanism Using only User Identification (사용자 ID만을 활용한 간편한 사용자 인증 방안)

  • Kim, Seon-Joo;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.501-508
    • /
    • 2015
  • Most web sites, information systems use the ID/Password technique to identify and authenticate users. But ID/Password technique is vulnerable to security. The user must remember the ID/Password and, the password should include alphabets, numbers, and special characters, not to be predicted easily. User also needs to change your password periodically. In this paper, we propose the user authentication method that the user authentication information stored in the external storage to authenticate a user. If another person knows the ID/Password, he can't log in a system without the external storage. Whenever a user logs in a system, authentication information is generated, and is stored in the external storage. Therefore, the proposed user authentication method is the traditional ID/Password security technique, but it enhances security and, increases user convenience.