• Title/Summary/Keyword: SEED algorithm

Search Result 198, Processing Time 0.028 seconds

Development of an Automatic Seeding System Using Machine Vision for Seed Line-up of Cucurbitaceous Vegetables (기계시각을 이용한 박과채소 종자 정렬파종시스템 개발)

  • Kim, Dong-Eok;Cho, Han-Keun;Chang, Yu-Seob;Kim, Jong-Goo;Kim, Hyeon-Hwan;Son, Jae-Ryoung
    • Journal of Biosystems Engineering
    • /
    • v.32 no.3
    • /
    • pp.179-189
    • /
    • 2007
  • Most of the seeds of cucurbitaceous rootstock species used for grafting were mainly sown by hand. This study was carried out to develop an on-line discriminating algorithm of seed direction using machine vision and an automatic seeding system. The seeding system was composed of a supplying device, feeding device, machine vision system, reversing device, seeding device and system control section. Machine vision was composed of a color CCD camera, frame grabber, image inspection chamber, lighting and personal computer. The seed image was segmented into a region of seed part and background part using thresholding technique in which H value of HSI color coordinate system. A seed direction was discriminated by comparing position between the center of circumscribed rectangle to a seed and the center of seed image. It took about 49ms to identify and redirect seed. Line-up status of seed was good the more than 95% of a sowed seed. Seeding capacity of this system was shown to be 10,140 grains per hour, which is three times faster than that of a typical worker.

The Design for the Web Based Cluster System Accounting applying SEED (SEED를 이용한 Web기반 클러스터시스템 어카운팅 설계)

  • 오충식
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2003.11a
    • /
    • pp.113-119
    • /
    • 2003
  • Both the highly developed computing environment and the rapid increase of the internet users enable the present web based cluster system accounting service to help many users access to numerous data at high speed. However, the information security of users and data is also as important as the convenience of the systematic environment. Especially, the significance of damage to the individuals and organizations resulted from the data outflow, hacking and malicious coding has risen up to one of the most essential problems in the internet service business. In this study, I suggest a more safe web based cluster system accounting service solution applying SEED, the Korean Telecommunications Technology Association (TTA) standard encryption algorithm.

  • PDF

A Plan of SEED Algorithm apply to XML Encryption (SEED 알고리즘과 XML Encryption 적용 방안)

  • 차무홍;신동규;신동일;김주한;이재승
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.489-493
    • /
    • 2003
  • ebXML, Web Services와 같은 XML을 기반으로 한 프레임워크 기술들이 발전하고 IT 환경이 복잡해지면서 정보보안 기술의 발달과 그 필요성이 더욱 많이 요구되고 있다. UN공식 표준 언어인 XML 문서를 보호화기 위한 보안 메커니즘 가운데 정보의 기밀성을 보장하기 위해 XML 암호화에 대한 관심은 더욱 커지고 있는 상황이지만 XML 암호화 표준 명세에는 국내 표준 암호화 알고리즘인 SEED 암호화 알고리즘은 포함 되어있지 않다. 따라서 ebXML, Web Services등을 국내 표준으로 비준 할 때에 국내 표준암호화의 적용 방안이 필요하므로 본 논문은 국제 표준인 XML 암호화 명세에 국내 표준 암호화 알고리즘인 SEED암호화 알고리즘의 적용방안을 연구한다.

  • PDF

Machine-part Grouping Algorithm Using a Branch and Bound Method (분지한계법을 이용한 기계-부품 그룹형성 최적해법)

  • 박수관;이근희
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.18 no.34
    • /
    • pp.123-128
    • /
    • 1995
  • The grouping of parts into families and machines into cells poses an important problem in the design and planning of the flexible manufacturing system(FMS). This paper proposes a new optimal algorithm of forming machine-part groups to maximize the similarity, based on branching from seed machine and bounding on a completed part. This algorithm is illustrated with numerical example. This algorithm could be applied to the generalized machine-part grouping problem.

  • PDF

A Study on the Design of Key Scheduler Block Cryptosystem using PRN (PRN을 이용한 키 스케줄러 블록암호시스템 설계에 관한 연구)

  • 김종협;김환용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.2
    • /
    • pp.112-121
    • /
    • 2003
  • Information Protection and cryptography technology is developed with if but solved problem of real time processing and secret maintain. Therefore this paper is Proposed new PRN-SEED(Pseudo-Random Number-SEED) for the increasing secret rate and processing rate perform performance analysis with existed other cryptography algorithms. Proposed new PRN-SEED crypto-algorithm increase in the processing rate than existed algorithms use bit and byte mixed operation with RNG(Random Number Generator). PRN-SEED that performs simultaneous operations have higher 1.03 in the processing rate and 2 in the cryptosystem performance than existed cryptosystems. Implementation for PRN-SEED use Synopsys Design Analyser Ver. 1999.10, samsung KG75 library and Synopsys VHDL Debegger. As a simulation result, symmetric cryptosystem DES operate 416Mbps at the 40MHz and Rijndael operate 612Mbps at the 50MHz. PRN-SEED cryptosystem have gate counting 10K and operate 430Mbps at the 40MHz and 630Mbps at the 50MHz.

  • PDF

Design of AES/SEED Encription Module and Implemention of Multi-Level Security System (AES/SEED암호화 모듈 설계와 멀티레벨 보안 시스템 구현)

  • 박덕용;최경문;김현성;차재원;김영철
    • Proceedings of the IEEK Conference
    • /
    • 2003.07b
    • /
    • pp.1133-1136
    • /
    • 2003
  • This paper has been studied about the implemention of the data-encription processor and imformation security system. Also in the paper, the brief contents of the verification of the data-encryption algorithm and the method of using HDL-level sources implemented is described. And then this paper has been designed for multi-level data secure system to verify and analyze the data-encryption processor implemented as VHDL.

  • PDF

Development of On-line Sorting System for Detection of Infected Seed Potatoes Using Visible Near-Infrared Transmittance Spectral Technique (가시광 및 근적외선 투과분광법을 이용한 감염 씨감자 온라인 선별시스템 개발)

  • Kim, Dae Yong;Mo, Changyeun;Kang, Jun-Soon;Cho, Byoung-Kwan
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.35 no.1
    • /
    • pp.1-11
    • /
    • 2015
  • In this study, an online seed potato sorting system using a visible and near infrared (40 1100 nm) transmittance spectral technique and statistical model was evaluated for the nondestructive determination of infected and sound seed potatoes. Seed potatoes that had been artificially infected with Pectobacterium atrosepticum, which is known to cause a soil borne disease infection, were prepared for the experiments. After acquiring transmittance spectra from sound and infected seed potatoes, a determination algorithm for detecting infected seed potatoes was developed using the partial least square discriminant analysis method. The coefficient of determination($R^2_p$) of the prediction model was 0.943, and the classification accuracy was above 99% (n = 80) for discriminating diseased seed potatoes from sound ones. This online sorting system has good potential for developing a technique to detect agricultural products that are infected and contaminated by pathogens.

Gene Expression Data Analysis Using Seed Clustering (시드 클러스터링 방법에 의한 유전자 발현 데이터 분석)

  • Shin Myoung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.1
    • /
    • pp.1-7
    • /
    • 2005
  • Cluster analysis of microarray data has been often used to find biologically relevant Broups of genes based on their expression levels. Since many functionally related genes tend to be co-expressed, by identifying groups of genes with similar expression profiles, the functionalities of unknown genes can be inferred from those of known genes in the same group. In this Paper we address a novel clustering approach, called seed clustering, and investigate its applicability for microarray data analysis. In the seed clustering method, seed genes are first extracted by computational analysis of their expression profiles and then clusters are generated by taking the seed genes as prototype vectors for target clusters. Since it has strong mathematical foundations, the seed clustering method produces the stable and consistent results in a systematic way. Also, our empirical results indicate that the automatically extracted seed genes are well representative of potential clusters hidden in the data, and that its performance is favorable compared to current approaches.

A Study on S-Function in SEED Cryptosystem (SEED암호에서 S-함수에 대한 고찰)

  • Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1295-1305
    • /
    • 2017
  • There is SEED cryptosystem in domestic block cipher standard. This code was drafted by the Korea Information Security Agency (KISA) in October 1998 and underwent a public verification process in December of the same year, which resulted in the final amendment to improve safety and performance. Unlike DES, it is a 128-bit block cipher that has been passed through various processes and established in 2005 as an international standard. It is a block cipher with a pastel structure like DES, but the input bit block has been increased to 128 bits, double DES. In this paper, first, we introduce the general algorithm of SEED cryptosystem and analyzed mathematically generating principle of key-value which is used in F-function. Secondly, we developed a table that calculates the exponent of the primitive element ${\alpha}$ corresponding to the 8-bit input value of the S-function and finally analyzed calculating principle of S-function designed in G-function through the new theorem and example. Through this course, we hope that it is to be suggest the ideas and background theory needed in developing new cryptosystem to cover the weakness of SEED cryptosystem.

Adaptation of Secure Algorithm of Short Messaging Services(SMS) on CDMA Network (CDMA에서 단문 메시지 서비스(SMS)의 보안 적용 알고리즘)

  • Kim Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.8
    • /
    • pp.30-37
    • /
    • 2006
  • At the present, Short Messaging Transfer Protocol Standard described under TIA/EIA/IS-637-A does not cover the measures for security at all. Sequentially, in case of necessity, it seems to be a better idea that security functions are made up for current short messaging transfer protocol. This paper proposes security mechanisms including algorithms and protocols for Short Messaging Services(SMS) which present not only high levels of confidentiality and integrity but also appropriate level of authentication.

  • PDF