• Title/Summary/Keyword: Individual code

Search Result 291, Processing Time 0.027 seconds

Key Technology for Food-Safety Traceability Based on a Combined Two-Dimensional Code

  • Zhonghua Li;Xinghua Sun;Ting Yan;Dong Yang;Guiliang Feng
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.139-148
    • /
    • 2023
  • Current food-traceability platforms suffer from problems such as inconsistent traceability standards, a lack of public credibility, and slow access to data. In this work, a combined code and identification method was designed that can achieve more secure product traceability using the dual anti-counterfeiting technology of a QR code and a hidden code. When the QR code is blurry, the hidden code can still be used to effectively identify food information. Based on this combined code, a food-safety traceability platform was developed. The platform follows unified encoding standards and provides standardized interfaces. Based on this innovation, the platform not only can serve individual food-traceability systems development, but also connect existing traceability systems. These will help to solve the problems such as non-standard traceability content, inconsistent processes, and incompatible system software. The experimental results show that the combined code has higher accuracy. The food-safety traceability platform based on the combined code improves the safety of the traceability process and the integrity of the traceability information. The innovation of this paper is invoking the combined code united the QR code's rapidity and the hidden code's reliability, developing a platform that uses a unified coding standard and provides a standardized interface to resolve the differences between multi-food-traceability systems. Among similar systems, it is the only one that has been connected to the national QR code identification platform. The project has made profits and has significant economic and social benefits.

Introduction to a New Reasoning Technique: Code Arrangement-Based Reasoning (새로운 추론 기법 소개: 코드배열기반 추론)

  • Kang, Min-Cheol;Im, Ho-Youn
    • Asia pacific journal of information systems
    • /
    • v.14 no.3
    • /
    • pp.77-92
    • /
    • 2004
  • When humans make decisions, they differentiate classifications of individual attribute variables that affect the decisions according to the importance and pattern of each attribute variables. The present study examines the practicality of the proposed Code Arrangement-Based Reasoning(CABR), which resembles the human's way of reasoning. To this end, we developed a CABR technique that classifies each attribute variable affecting significant impacts on the target variable into a cluster and assigns a code to the cluster. For verifying the proposed technique, both case-based reasoning and CABR were used for the customer continuance judgment problem of an automobile insurance company. Results indicated that the performance of CABR is close to the one of the case-based reasoning. The CABR also shows the possibility of using bio-informatics techniques for organizational data analysis in the future.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Recognition of Passports using CDM Masking and ART2-based Hybrid Network

  • Kim, Kwang-Baek;Cho, Jae-Hyun;Woo, Young-Woon
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.213-217
    • /
    • 2008
  • This paper proposes a novel method for the recognition of passports based on the CDM(Conditional Dilation Morphology) masking and the ART2-based RBF neural networks. For the extraction of individual codes for recognizing, this paper targets code sequence blocks including individual codes by applying Sobel masking, horizontal smearing and a contour tracking algorithm on the passport image. Individual codes are recovered and extracted from the binarized areas by applying CDM masking and vertical smearing. This paper also proposes an ART2-based hybrid network that adapts the ART2 network for the middle layer. This network is applied to the recognition of individual codes. The experiment results showed that the proposed method has superior in performance in the recognition of passport.

Function partitioning methods for malware variant similarity comparison (변종 악성코드 유사도 비교를 위한 코드영역의 함수 분할 방법)

  • Park, Chan-Kyu;Kim, Hyong-Shik;Lee, Tae Jin;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.321-330
    • /
    • 2015
  • There have been found many modified malwares which could avoid detection simply by replacing a sequence of characters or a part of code. Since the existing anti-virus program performs signature-based analysis, it is difficult to detect a malware which is slightly different from the well-known malware. This paper suggests a method of detecting modified malwares by extending a hash-value based code comparison. We generated hash values for individual functions and individual code blocks as well as the whole code, and thus use those values to find whether a pair of codes are similar in a certain degree. We also eliminated some numeric data such as constant and address before generating hash values to avoid incorrectness incurred from them. We found that the suggested method could effectively find inherent similarity between original malware and its derived ones.

Implementation of the Container ISO Code Recognition System for Real-Time Processing (실시간 처리를 위한 컨테이너 ISO코드 인식시스템의 구현)

  • Choi Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1478-1489
    • /
    • 2006
  • This paper describes system to extract ISO codes in container image. A container ISO code recognition system for real-time processing is made of 5 core parts which are container ISO code detection and image acquisition, ISO code region extraction, individual character extraction, character recognition and database. Among them, the accuracy of ISO code extraction can affect significantly the accuracy of system recognition rate, and also the more exact extraction of ISO code is required in various weather and environment conditions. The proposed system produces binary of the ISO code's template lesions using an adaptive thresholding, extracts candidate regions containing distribution of ISO code, and recognizes ISO codes as detecting a final region through the verifications by using character distribution characteristics of ISO code among the extracted candidates. Experimental results reveal that ISO codes can be efficiently extracted by the proposed method.

Development of a Computer Code, CONPAS, for an Integrated Level 2 PSA

  • Ahn, Kwang-Il;Kim, See-Darl;Song, Yong-Mann;Jin, Young-Ho;Park, Chung K.
    • Nuclear Engineering and Technology
    • /
    • v.30 no.1
    • /
    • pp.58-74
    • /
    • 1998
  • A PC window-based computer code, CONPAS (CONtainment Performance Analysis System), has been developed to integrate the numerical, graphical, and results-operation aspects of Level 2 probabilistic safety assessments (PSA) for nuclear power plants automatically. As a main logic for accident progression analysis, it employs a concept of the small containment phenomenological event tree (CPET) helpful to trace out visually individual accident progressions and of the detailed supporting event tree (DSET) for its detailed quantification. For the integrated analysis of Level 2 PSA, the code utilizes five distinct, but closely related modules. Its computational feasibility to real PSAs has been assessed through an application to the UCN 3&4 full scope Level 2 PSA. Compared with other existing computer codes for Level 2 PSA, the CONPAS code provides several advanced features: (1) systematic uncertainty analysis / importance analysis / sensitivity analysis, (2) table / graphical display & print, (3) employment of the recent Level 2 PSA technologies, and (4) highly effective user interface. The main purpose of this paper is to introduce the key features of CONPAS code and results of its feasibility study.

  • PDF

A control system of each product with a remote controller for Multi-vision which is composed of several products (Multi-Vision으로 구성된 제품들의 리모컨을 통한 개별 제어 시스템)

  • Bae, Sang-Ho;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.149-152
    • /
    • 2011
  • A Multi-Vision needs an image adjust of each product to make the same picture quality for all products when it's installed. Owing to this reason need individual control. This document request indivisual control method for each product with the Remote controller. To realize this method need make Set ID and Picture ID on the UI and need daisy chain of cable to connect Remocon code(IR Signal) In to Out, After allocation the Set ID for each product. Picture ID of the product which want to change picture quality make equal to Set ID. And the product which is same Set ID and Picture ID is only controlled through decoding of Remocon code to Scaler.

  • PDF

Off-Site Consequence Analysis for PWR and PHWR Types of Nuclear Power Plants Using MACCS II Code (MACCS II 코드를 이용한 국내 경수로 및 중수로형 원전의 소외결말분석)

  • Jeon, Ho-Jun;Chi, Moon-Goo;Hwang, Seok-Won
    • Journal of the Korean Society of Safety
    • /
    • v.26 no.5
    • /
    • pp.105-109
    • /
    • 2011
  • Since a severe accident, which happens in low frequency, can cause serious damages, the interests in off-site consequence analysis for a nuclear power plant have been increased after Chernobyl, TMI and Fukushima accidents. Consequences, which are the effects on health and environment caused by released radioisotopes, are evaluated using MACCS II code based on the method of Level 3 PSA. To perform a consequence analysis for the reference plants, the input data of the code were generated such as meteorological data, population distribution, release fractions, and so on. Using these input data, acute and lifetime dose as an organ, CCDF for early fatalities and latent cancer fatalities, and average individual risk were analyzed by using MACCS II code in this study. These results might contribute to establishing accident management plan and quantitative health object.

A Code Block Cipher Method to Protect Application Programs From Reverse Engineering (응용프로그램 역분석 방지를 위한 코드블록 암호화 방법)

  • Jung, Dong-Woo;Kim, Hyong-Shik;Park, Joong-Gil
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.85-96
    • /
    • 2008
  • One of the typical methods to prevent tampering and reverse engineering on executable codes is to encrypt them. This paper proposes a code block cipher method based on key chaining to encrypt the code. The block cipher by key chaining has been known to be inadequate for encrypting the code with control transfer, even though the key chaining has advantage of hiding the keys in blocks and making the individual keys different from block to block. This paper proposes a block transformation and duplication method to apply the block cipher by key chaining to the executable codes with control transfer instructions, and shows the idea works with the MIPS instruction set.