• Title/Summary/Keyword: Individual code

Search Result 289, Processing Time 0.022 seconds

A Study on the Plan of Research Color Code for Color Management in Fashion Industry (패션산업의 색채관리를 위한 조사용 컬러코드의 설계연구)

  • Lee, Kyung-Hee
    • Fashion & Textile Research Journal
    • /
    • v.6 no.3
    • /
    • pp.285-296
    • /
    • 2004
  • Fashion business must reflect the seasonable fashion trend because fashion has change always, and therefore fashion business has a big risk at the attribute. Careful consideration should be given to the selection of a particular color code to meet the purpose of marketing research in various color products. It must be designed to grasp systematically and comprehensively the current trend of colors. The most suitable color code for meeting this proposition would be one based on the designation by color ranges. The ISCC-NBS method of designating colors, published in 1955, was established by dividing the color solid into 267 color name blocks. The detailed classification like the ISCC-NBS system is very appropriate to serve the purpose of giving all color names according to color ranges. But it is somewhat too complicated to answer the purpose of surveying the trend of colors and of comparing and evaluating the ups and downs in the popularity of the range of each individual color. I have worked out the most convenient method of designating colors in accordance with the type of investigation needed. It is the classification which involves four classification system in itself, fundamental, gross, medium, and minute. The fundamental classification system classifies hues and neutrals into 16ranges. The gross classification system divides the above 16 ranges into 30. The medium classification divides the above 30 ranges into 103 in terms of tones. The minute classification divides the above 103 ranges into 207 in terms of specipic hues.

Quality of Corporate Governance: A Review from the Literature

  • Rahman, Md. Musfiqur;Khatun, Naima
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.4 no.1
    • /
    • pp.59-66
    • /
    • 2017
  • The purpose of this paper is to review the quality of corporate governance from the prior empirical literature. This study finds that most of the researchers developed the self structured corporate governance index and few researchers used the corporate governance index provided by rating agencies. This study also finds that there is no uniform basis to measure the corporate governance quality and observed the variation in terms of overall and individual attributes of corporate governance; sub-indices of corporate governance; scoring system; weighted and un-weighted method; statistical method; time period; financial and non financial companies; code of corporate governance; listing requirement; disclosure practices; legal environment; firms characteristics; and country perspective. This study also observed that overall corporate governance quality is very low in most of the studies and even quality of corporate governance varies in the firms within the same country. This study recommends that the boundary of corporate governance quality should be defined based on the agreed set of rules and regulation, code of governance and practices. This study also suggests that the regulator and policy makers should more emphasize on code of corporate governance and regulatory framework and monitoring to improve the quality of corporate governance.

Design of Block Codes for Distributed Learning in VR/AR Transmission

  • Seo-Hee Hwang;Si-Yeon Pak;Jin-Ho Chung;Daehwan Kim;Yongwan Kim
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.300-305
    • /
    • 2023
  • Audience reactions in response to remote virtual performances must be compressed before being transmitted to the server. The server, which aggregates these data for group insights, requires a distribution code for the transfer. Recently, distributed learning algorithms such as federated learning have gained attention as alternatives that satisfy both the information security and efficiency requirements. In distributed learning, no individual user has access to complete information, and the objective is to achieve a learning effect similar to that achieved with the entire information. It is therefore important to distribute interdependent information among users and subsequently aggregate this information following training. In this paper, we present a new extension technique for minimal code that allows a new minimal code with a different length and Hamming weight to be generated through the product of any vector and a given minimal code. Thus, the proposed technique can generate minimal codes with previously unknown parameters. We also present a scenario wherein these combined methods can be applied.

Developing GPS Code Multipath Grid Map (CMGM) of Domestic Reference Station (국내 기준국의 GPS 코드 다중경로오차 격자지도 생성)

  • Gyu Min Kim;Gimin Kim;Chandeok Park
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.13 no.1
    • /
    • pp.85-92
    • /
    • 2024
  • This study develops a Global Positioning System (GPS) Code Multipath Grid Map (CMGM) of each individual domestic reference station from the extracted code multipath of measurement data. Multipath corresponds to signal reflection/refraction caused by obstacles around the receiver antenna, and it is a major source of error that cannot be eliminated by differencing. From the receiver-independent exchange format (RINEX) data for two days, the associated code multipath of a satellite tracking arc is extracted. These code multipath data go through bias correction and interpolation to yield the CMGM with respect to the azimuth and elevation angles. The effect of the CMGM on multipath mitigation is then quantitatively analyzed to improve the Root Mean Square (RMS) of averaged pseudo multipath. Furthermore, the single point positioning (SPP) accuracy is analyzed in terms of the RMS of the horizontal and vertical errors. During two weeks in February 2023, the RMSs of the averaged pseudo multipath for five reference stations decreased by about 40% on average after CMGM application. Also, the SPP accuracies increased by about 7% for horizontal errors and about 10% for vertical errors on average after CMGM application. The overall quantitative analysis indicates that the proposed approach will reduce the convergence time of Differential Global Navigation Satellite System (DGNSS), Real-Time Kinematic (RTK), and Precise Point Positioning (PPP)-RTK correction information in real-time to use measurement data whose code multipath is corrected and mitigated by the CMGM.

Safety Assessment on the Incineration Disposal of Regulation Exempt Waste by RESRAD Code (RESRAD 코드를 활용한 규제해제 폐기물 소각처분에 대한 안정성 평가)

  • Kim, Hui-Gyeong;Han, Sang-Wook;Park, Su-Ri;Kim, Byung-Jick
    • Journal of radiological science and technology
    • /
    • v.41 no.1
    • /
    • pp.67-73
    • /
    • 2018
  • In this paper, risk assessment was conducted to verify self - disposal requirements by landfill for exempted incineration ash by using Resrad Ver.6.5 computer code. The result of risk assessment by landfill for the incineration by-product is that individual dose is $6.91{\times}10^{-2}{\mu}Sv\;y-1$ and collective dose is $3.475{\times}10^{-7}man-Sv\;y-1$. It proved that the result meets reference dose of individual dose $10{\mu}Sv\;y-1$ and collective dose 1 man-Sv y-1 for general public. According to the current 'Nuclear Safety Commission Notice [No. 2014-3]', it states that the exempted wastes can be disposed of by incineration, landfill and recycling. However, most of recently documents and papers related to exempted wastes are disposed of by landfill and recyling and it could not confirm the case of exempt by incineration. If the national consensus is derived and treating the waste by using process of incineration is activated, it could be considered to treat low level of radiation wastewater and activated carbon excluded from exempted waste because of nuclide $^3H$ and $^{14}C$.

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.

Study of matching user operation name and operation classification code (ICD-9-CM) (Through OCS program use facilitation at operating room) (사용자 수술명과 수술분류 code (ICD-9-CM) 일치율 향상에 관한 연구 (수술실 OCS program 사용 활성화를 통하여))

  • Choi, Hyang-Ha;Kim, Mi-Young;Kim, Do-Jin;Yu, Ji-Won;Chang, Jung-Hwa;Park, Su-Jung;Park, Jae-Sung
    • Quality Improvement in Health Care
    • /
    • v.12 no.1
    • /
    • pp.104-112
    • /
    • 2006
  • Background : The necessity of unify and standardize codes used at hospital has been emphasized since OCS (Order Communicating System) was adopted. Therefore, the purpose of this study were to standardize operation code by continuous training of the ICD-9-CM code that is used as standard code in OCS program at operating room. Method : In 400 operation data, operation code entered in OCS program at operating room was compared to operation name recorded in medical record. In addition, a matching rate between input data of operation code by medical record department and computing input data of operation code in 3,710 cases was compared for each department. User operation name and operation code were matched and major diagnosis by operation department and operation name were also matched. Results : User operation name was reflected in operation classification code in detail, and operation code entered on user was registered. Input rate and matching rate of operation code were gradually improved after improvement activity. In particular, a matching rate was high at ophthalmology where operation name is segmented. Plastic surgery and orthopedics with a lot of emergency operation and comprehensive operation name show low input rates. Conclusions : As the medical field makes progress in computerlization, awareness of information exchange and sharing becomes higher. Among codes to classified medical institution, codes related to surgical operation are all different by user of hospital and department. Computerlization and standardization is essential. And when efforts of standardization continue in alliance with individual hospital and institution, initiative of preparing medical policy data at a national level will be accelerated.

  • PDF

Development of an Electronic Identification Unit for Automatic Dairy Farm Management (가축 사양 관리 자동화를 위한 전자 개체 인식 장치 개발)

  • Cho, S.I.;Ryu, K.H.;An, K.J.;Kim, Y.Y.;You, G.Y.
    • Journal of Animal Environmental Science
    • /
    • v.8 no.2
    • /
    • pp.63-72
    • /
    • 2002
  • In Korea, a need of automatic dairy farm management system has been increased to lower production cost and to strengthen international competition. However, the present management system was mostly relied on foreign technologies and caused some problems in post management and after-sales services. Therefore, though there is a problem of price and quality at present, domestic technologies of the management system should be developed for the long run. This study was conducted to develop an electronic identification unit for an automatic dairy farm management system. The developed system was consisted of a tag, a reader, a switching circuit, and a personal computer. The tag attachable to each individual cow was developed to transmit individual radio frequency(RF) code into the air with modulation of ASK(amplitude shift keying). And the switching circuit was added to avoid confusion on reception and transmittance. The reader attached to a feeding device was developed to transmit activating signal periodically and to identify code of the individual tag when the tag was approached to the device. The reader was consisted of an active filter, a detecter, a comparator and a microcontroller. The test result was feasible enough to apply it for the automatic farm management system and the identified maximum distance was about 37cm.

  • PDF

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Recognition of the Passport by Using Fuzzy Binarization and Enhanced Fuzzy Neural Networks

  • Kim, Kwang-Baek
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.603-607
    • /
    • 2003
  • The judgment of forged passports plays an important role in the immigration control system, for which the automatic and accurate processing is required because of the rapid increase of travelers. So, as the preprocessing phase for the judgment of forged passports, this paper proposed the novel method for the recognition of passport based on the fuzzy binarization and the fuzzy RBF neural network newly proposed. first, for the extraction of individual codes being recognized, the paper extracts code sequence blocks including individual codes by applying the Sobel masking, the horizontal smearing and the contour tracking algorithm in turn to the passport image, binarizes the extracted blocks by using the fuzzy binarization based on the membership function of trapezoid type, and, as the last step, recovers and extracts individual codes from the binarized areas by applying the CDM masking and the vertical smearing. Next, the paper proposed the enhanced fuzzy RBF neural network that adapts the enhanced fuzzy ART network to the middle layer and applied to the recognition of individual codes. The results of the experiment for performance evaluation on the real passport images showed that the proposed method in the paper has the improved performance in the recognition of passport.

  • PDF