• Title/Summary/Keyword: Identification Information

Search Result 4,763, Processing Time 0.034 seconds

Idle Slots Skipped Mechanism based Tag Identification Algorithm with Enhanced Collision Detection

  • Su, Jian;Xu, Ruoyu;Yu, ShiMing;Wang, BaoWei;Wang, Jiuru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2294-2309
    • /
    • 2020
  • In this article, a new Aloha-based tag identification protocol is presented to improve the reading efficiency of the EPC C1 Gen2-based UHF RFID system. Collision detection (CD) plays a vital role in tag identification process which determines the efficiency of anti-collision protocols since most Aloha-based protocols optimize the incoming frame length based on the collisions in current frame. Existing CD methods are ineffective in identifying collision, resulting in a degradation of identification performance. Our proposed algorithm adopts an enhanced CD (ECD) scheme based on the EPC C1 Gen2 standard to optimize identification performance. The ECD method can realize timely and effective CD by detecting the pulse width of the randomly sent by tags. According to the ECD, the reader detects the slot distribution and predicts tag cardinality in every collision slot. The tags involved in each collision slot are identified by independently assigned sub-frames. A large number of numerical results show that the proposed solution is superior to other existing anti-collision protocols in various performance evaluation metrics.

Classifier Combination Based Source Identification for Cell Phone Images

  • Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5087-5102
    • /
    • 2015
  • Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.

Microservice Identification by Partitioning Monolithic Web Applications Based on Use-Cases

  • Si-Hyun Kim;Daeil Jung;Norhayati Mohd Ali;Abu Bakar Md Sultan;Jaewon Oh
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.268-280
    • /
    • 2023
  • Several companies have migrated their existing monolithic web applications to microservice architectures. Consequently, research on the identification of microservices from monolithic web applications has been conducted. Meanwhile, the use-case model plays a crucial role in outlining the system's functionalities at a high level of abstraction, and studies have been conducted to identify microservices by utilizing this model. However, previous studies on microservice identification utilizing use-cases did not consider the components executed in the presentation layer. Unlike existing approaches, this paper proposes a technique that considers all three layers of web applications (presentation, business logic, and data access layers). Initially, the components used in the three layers of a web application are extracted by executing all the scenarios that constitute its use-cases. Thereafter, the usage rate of each component is determined for each use-case and the component is allocated to the use-case with the highest rate. Then, each use-case is realized as a microservice. To verify the proposed approach, microservice identification is performed using open-source web applications.

Problems of alternative means of Inhabitants Registration Identification Number on Internet and their Countermeasures (인터넷상의 주민등록번호 대체수단의 문제점들과 해결방법)

  • Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.45-53
    • /
    • 2008
  • As internet is wide spread, the number of internet service provider is increased. Internet service providers gather the personnel information with inhabitants registration identification number for the user management and the adult authentication. The personnel information is spreaded thorough the Internet by the system hacking, mismanagement and malicious resale. And the personnel information is used for spam email, phishing scams, etc. by malicious others. So the Ministry of Information and Communication Republic of Korea developments I-PIN system of the personnel identification. But, I-PIN has some problem the guideline for it and the method of 5 I-PIN services. In this paper, we analyze the problem about the guideline for I-PIN and the method of 5 I-PIN services. And we propose the countermeasure about the problem.

A Simple and Fast Anti-collision Protocol for Large-scale RFID Tags Identification

  • Jia, Xiaolin;Feng, Yuhao;Gu, Yajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1460-1478
    • /
    • 2020
  • This paper proposes a novel anti-collision protocol for large-scale RFID tags identification, named Bi-response Collision Tree Protocol (BCT). In BCT, two group of tags answer the reader's same query in two response-cycles respectively and independently according to the bi-response pattern. BCT improves the RFID tag identification performance significantly by decreasing the query cycles and the bits transmitted by the reader and tags during the identification. Computation and simulation results indicate that BCT improves the RFID tag identification performance effectively, e.g. the tag identification speed is improved more than 13.0%, 16.9%, and 22.9% compared to that of Collision Tree Protocol (CT), M-ary Collision Tree Protocol (MCT), and Dual Prefix Probe Scheme (DPPS) respectively when tags IDs are distributed uniformly.

An Efficient On-line Identification Approach to Rotor Resistance of Induction Motors Without Rotational Transducers

  • Lee, Sang-Hoon;Yoo, Ho-Sun;Ha, In-Joong
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.1
    • /
    • pp.86-93
    • /
    • 1998
  • In this paper, we propose an effective on-line identification method for rotor resistance, which is useful in making speed control of induction motors without rotational transducers robust with respect to the variation in rotor resistance. Our identification method for rotor resistance is based on the linearly perturbed equations of the closed-loop system for sensorless speed control about th operating point. Our identification method for rotor resistance uses only the information of stator currents and voltages. In can provide fairly good identification accuracy regardless of load conditions. Some experimental results are presented to demonstrate the practical use of our identification method. For our experimental work, we have built a sensorless control system, in which all algorithms are implemented on a DSP. Our experimental results confirm that our on-line identification method allows for high precision speed control of commercially available induction motors without rotational transducers.

  • PDF

Development of Individual Electronic Identification System Using the Inductive Transmission Method for Stockbreeding Management (개체관리를 위한 인덕터 전송방식의 개체인식 시스템 개발)

  • Ko, S.C.;Han, B.S.;Lee, J.;Kim, Y.J.;Lee, S.Y.
    • Journal of Biosystems Engineering
    • /
    • v.27 no.5
    • /
    • pp.451-458
    • /
    • 2002
  • This paper introduces that livestock can be effectively managed by an individual electronic identification system. The proposed system was composed of the original code transmitter, receiver, personal computer, micro-processor, and RS485 telecommunications module. In the individual electronic identification system, the signal including encoded information of a milk-cow was transmitted from an original code transmitter to a micro-processor through RS485 telecommunications module. The transmitted signal can be successfully displayed in a personal computer. This system can be managed by 9999 individuals with a original code transmitter. The recognition rate of an individual electronic identification system was 98.5% and also auto-feeder operates very well. an individual electronic identification system was developed for automation of stockbreeding management. To automate the breeding management, it is necessary to obtain and analyze the individual information distinguished from others preferentially.

An Implementation of User Identification System Using Hrbrid Biomitic Distances (복합 생체 척도 거리를 이용한 사용자 인증시스템의 구현)

  • 주동현;김두영
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.2
    • /
    • pp.23-29
    • /
    • 2002
  • In this paper we proposed the user identification system using hybrid biometric information and non-contact IC card to improve the accuracy of the system. The hybrid biometric information consists of the face image, the iris image, and the 4-digit voice password of user. And the non-contact IC card provides the base information of user If the distance between the sample hybrid biometric Information corresponding to the base information of user and the measured biometric information is less than the given threshold value, the identification is accepted. Otherwise it is rejected. Through the result of experimentation, this paper shows that the proposed method has better identification rate than the conventional identification method.

  • PDF

A Study on Model Identification of Electro-Hydraulic Servo Systems (전기-유압 서보 시스템의 모델규명에 관한 연구)

  • 엄상오;황이철;박영산
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.907-914
    • /
    • 1999
  • This paper studies on the model identification of electro-hydraulic servo systems, which are composed of servo valves, double-rod cylinder and load mass. The identified plant is described as a discrete-time ARX or ARMAX model which is respectively obtained from the identification algorithms of least square error method, instrumental variable method and prediction error method. where a nominal model and the variation of model parameters are quantitatively evaluated.

  • PDF

GMM based Speaker Identification using Pitch Information (피치 정보를 이용한 GMM 기반의 화자 식별)

  • Park Taesun;Hahn Minsoo
    • MALSORI
    • /
    • no.47
    • /
    • pp.121-129
    • /
    • 2003
  • This paper describes the use of pitch information for speaker identification. The recognition system is a GMM based one with 4 connected Korean digits speech database. The mean of the pitch period in voiced sections of speech are shown to be ,useful at discriminating between speakers. Utilizing this feature with Gaussian mixture model in the speaker identification system gave a marked improvement, maximum 6% improvement comparing to the baseline Gaussian mixture model.

  • PDF