• Title/Summary/Keyword: applications identification

Search Result 771, Processing Time 0.021 seconds

Application-Level Traffic Monitoring and an Analysis on IP Networks

  • Kim, Myung-Sup;Won, Young-J.;Hong, James Won-Ki
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.22-42
    • /
    • 2005
  • Traditional traffic identification methods based on wellknown port numbers are not appropriate for the identification of new types of Internet applications. This paper proposes a new method to identify current Internet traffic, which is a preliminary but essential step toward traffic characterization. We categorized most current network-based applications into several classes according to their traffic patterns. Then, using this categorization, we developed a flow grouping method that determines the application name of traffic flows. We have incorporated our method into NG-MON, a traffic analysis system, to analyze Internet traffic between our enterprise network and the Internet, and characterized all the traffic according to their application types.

A Study on RFID Applications to Packaging (RFID의 패키징 적용에 관한 연구)

  • Lee, Soo-Yong;Kim, Jai-Neung
    • KOREAN JOURNAL OF PACKAGING SCIENCE & TECHNOLOGY
    • /
    • v.14 no.1
    • /
    • pp.15-22
    • /
    • 2008
  • The excitement over radio frequency identification (RFID) technology has gained momentum in the last five years, with a diversification in the range of applications. Besides academic research into radio frequency identification (RFID) has proliferated over the last few years, however there is much to be desired on Packaging industry. In this paper, we present a literature reviews of researches of RFID system on Packaging, especially focused on RFID system standardization into packaging. There is not any packaging standard or guidance about tag locations, classification with the materials and so on. Therefore it hampers reduction of the distribution costs on political and corporate sides, and lack consistency of applying RFID system. The main focus of this review paper is to establish a constituency about legislating RFID system standard on packaging. It is hoped that the review will be a good resource for future research in order to applly RFID system to Packaging industry effectively.

  • PDF

DETERMINATION OF THE FLEXURAL RIGIDITY OF A BEAM FROM LIMITED BOUNDARY MEASUREMENTS

  • LESNIC DANIEL
    • Journal of applied mathematics & informatics
    • /
    • v.20 no.1_2
    • /
    • pp.17-34
    • /
    • 2006
  • Inverse coefficient identification problems associated with the fourth-order Sturm-Liouville operator in the steady state Euler-Bernoulli beam equation are investigated. Unlike previous studies in which spectral data are used as additional information, in this paper only boundary information is used, hence non-destructive tests can be employed in practical applications.

QFD and AHP Studies for Technical and System Requirements of RFID Military Applications (QFD와 AHP를 이용한 RFID의 군 요구기술 분석과 향후 적용분야 선정에 관한 연구)

  • Lee, Chul-Ung;Kim, Jin-Tae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.4
    • /
    • pp.105-115
    • /
    • 2007
  • This study identifies technical barriers and trends on Radio Frequency Identification(RFID) applications for military force, and investigates technical requirements for the RFID implementation on military information systems, based on the preliminary research results from the introductory RFID applications on Ammunition Information System(AIS). We first obtain technical requirements using the Quality Function Deployment(QFD) methods, and identify the areas for research and developments. Furthermore, based on the survey results from military experts and users, we provide the potential application areas for military RFID implementation. Conversely, a technology and research roadmap for RFID in the military system is developed.

Reviews on innovations and applications in structural health monitoring for infrastructures

  • Li, Hong-Nan;Yi, Ting-Hua;Ren, Liang;Li, Dong-Sheng;Huo, Lin-Sheng
    • Structural Monitoring and Maintenance
    • /
    • v.1 no.1
    • /
    • pp.1-45
    • /
    • 2014
  • The developments and implementations of the structural health monitoring (SHM) system for large infrastructures have been gradually recognized by researchers, engineers and administrative authorities in the last decades. This paper summarizes an updated review on innovations and applications in SHM for infrastructures carried out by researchers at Dalian University of Technology. Invented sensors and data acquisition system are firstly briefly described. And then, some proposed theories and methods including the sensing technology, sensor placement method, signal processing and data fusion, system identification and damage detection are discussed in details. Following those, the activities on the standardization of SHM and several case applications on specific types of structure are reviewed. Finally, existing problems and promising research efforts in the field of SHM are given.

An Analysis of Applications and Issues in Library RFID System (도서관 RFID 시스템의 어플리케이션 및 문제점 분석에 관한 연구)

  • Lee, Eung-Bong
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.27-43
    • /
    • 2008
  • This paper analyzes feasibility studies regarding the structure, applications and issues of the library RFID system. In this study, the structure and principle, operation mode and middleware of library RFID system are reviewed in detail, Finally this paper analyzed and proposed the RFID applications that could be efficient to information management and user service of library and the major problems and improvements of library RFID system.

Diversification of User Authentication by Writing Applet on Java Card (자바카드 애플릿 설정에 따른 사용자 인증의 다각화)

  • Song, Young-Sang;Shin, In-Chul
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.89-95
    • /
    • 2009
  • Recently, IC cards are used to protect personal information and to have user verification. Among them, the usage of Java Cards which can contain applications after issuing are increasing and installing several applets on Java card is possible. When Java Cards are used, applet works after completing user identification. In this paper, we designed, embodied and verified the mechanism of user identification process according to PIN setting of applets; Stored_PIN, Install_PIN and Update_PIN. These several applications of Java cards will be used for user identification independently or multiply, while using diverse user identification.

  • PDF

Outlying Cell Identification Method Using Interaction Estimates of Log-linear Models

  • Hong, Chong Sun;Jung, Min Jung
    • Communications for Statistical Applications and Methods
    • /
    • v.10 no.2
    • /
    • pp.291-303
    • /
    • 2003
  • This work is proposed an alternative identification method of outlying cell which is one of important issues in categorical data analysis. One finds that there is a strong relationship between the location of an outlying cell and the corresponding parameter estimates of the well-fitted log-linear model. Among parameters of log-linear model, an outlying cell is affected by interaction terms rather than main effect terms. Hence one could identify an outlying cell by investigating of parameter estimates in an appropriate log-linear model.

A Study on System Identification using Haar Functions (Haar함수를 이용한 시스템 동정에 관한 연구)

  • 안두수;채영무;이명규
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.36 no.4
    • /
    • pp.287-292
    • /
    • 1987
  • This paper deals with applications of Haar functions to parameter identification of linear systems. It is first introuduced to a new operational matrix which relates Haar functions and their integrations. The matrix can be used to identify the parameters of unknown linear systems by a least squares estimation. And then, the state equation of given systems is transformed into a computationally convenient algebraic form. This approach provides a more efficient method for the system identification problem.

  • PDF

A Study on Effective Identification of Targets Flying in Formation ISAR Images (ISAR 영상을 이용한 효과적인 편대비행 표적식별 연구)

  • Cha, Sang-Bin;Choi, In-Oh;Jung, Joo-Ho;Park, Sang-Hong
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.1
    • /
    • pp.67-76
    • /
    • 2022
  • Monostatic/Bistatic inverse synthetic aperture radar (ISAR) images are two-dimensional radar cross section (RCS) distributions of a target. When there are many targets in a single radar beam, ISAR images are generated with targets overlapped, so it is difficult to perform the targets identification using the trained database. In addition, it is inefficient to perform target identification using only single monostatic and bistatic ISAR images separately because each method has its own advantages and weaknesses. Therefore, this paper analyzes multiple targets identification performances using monostatic/bistatic ISAR images and proposes a method of identification through fusion of two ISAR images. To identify multiple targets, we use image combination technique using trained single target images. Simulation results show effectiveness of proposed method.