• Title, Summary, Keyword: check digit

Search Result 6, Processing Time 0.036 seconds

Error Correcting using the Check digit on Barcode, and the present and future of Barcode (바코드에 있어서 체크숫자를 이용한 오류수정과 바코드의 현재와 미래)

  • Kim, Hwa-Joon
    • Journal for History of Mathematics
    • /
    • v.21 no.2
    • /
    • pp.103-118
    • /
    • 2008
  • Barcode technology is becoming an essential tool for every companies, and this makes help us to gain time, analysis of goods, an inventory control, a prevention of burglar and so on. In this paper, we have treated about the history of barcode, its error correcting using the check digit, and the present and future of barcode. We wish roles of mathematician on new barcode system which it bring on an economical efficiency and stability.

  • PDF

SIMULTANEOUS RANDOM ERROR CORRECTION AND BURST ERROR DETECTION IN LEE WEIGHT CODES

  • Jain, Sapna
    • Honam Mathematical Journal
    • /
    • v.30 no.1
    • /
    • pp.33-45
    • /
    • 2008
  • Lee weight is more appropriate for some practical situations than Hamming weight as it takes into account magnitude of each digit of the word. In this paper, we obtain a sufficient condition over the number of parity check digits for codes correcting random errors and simultaneously detecting burst errors with Lee weight consideration.

Phasing Procedure with Automatic Identification in the ARQ mode of the NBDP (NBDP시스템의 ARQ모드에 있어서 자동식별 위상동기)

  • 이흥기;김기문
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.1
    • /
    • pp.79-85
    • /
    • 1998
  • The 9-digit MMSI(Maritime Mobile Service Identity) in the NBDP is converted to the 7-digit identity signal, used to identify to the phase of and to synchronize to the clock of the ISS(Information Sending Station) automatically for phasing procedure between radio stations. In this paper, algorithms for the automatic identification phasing procedures and for conversions, calculations between 7-signals and 9-identity, those check-numbers in the phasing procedures for calling of the NBDP are discussed and designed. And a method of the faster locking and phasing for calling than that of recommended by ITU-R is suggested and implemented.

  • PDF

A study on Effective Feature Parameters Comparison for Speaker Recognition (화자인식에 효과적인 특징벡터에 관한 비교연구)

  • Park TaeSun;Kim Sang-Jin;Kwang Moon;Hahn Minsoo
    • Proceedings of the KSPS conference
    • /
    • /
    • pp.145-148
    • /
    • 2003
  • In this paper, we carried out comparative study about various feature parameters for the effective speaker recognition such as LPC, LPCC, MFCC, Log Area Ratio, Reflection Coefficients, Inverse Sine, and Delta Parameter. We also adopted cepstral liftering and cepstral mean subtraction methods to check their usefulness. Our recognition system is HMM based one with 4 connected-Korean-digit speech database. Various experimental results will help to select the most effective parameter for speaker recognition.

  • PDF

A survey on cancer screening among the middle-aged in Pusan area (부산시 일부지역 중년남녀의 암 조기검진 수검 실태 조사)

  • 황선경;어용숙;조영란;서지민;이윤미;정인숙;주현옥
    • Korean Journal of Health Education and Promotion
    • /
    • v.19 no.3
    • /
    • pp.135-152
    • /
    • 2002
  • Objectives: Cancer is the most frequent cause of death in Korea. Cancer screenings can save lives through early detection and their effect can be enhanced by regular repeat adherence rather than one-time screening. The aim of this study was to investigate major cancer screening rates and the reasons for not having screening for providing the basic data required. Materials and Methods: The study sample were recruited from the parents of students in 3 different middle and high schools in Pusan. 428 participants(l93 of males, 214 of females) completed a structured self-administered questionnaire from Dec. 21 to 31, 2001 and the response rate was 73.8%. Data were analyzed using descriptive statistics with SPSS Win 10.0. Results: The cancer screening rates of the subjects(male and female respectively) who have had one or more in their life-time were about 36.3% and 34.6% in gastroendoscopy for stomach cancer, about 11.1 % and 8.5% in stool hemocult test and colonoscopy for colon cancer, 13.5% and 9.3% in prostate-antigen test and rectal digit exam for prostate cancer, 36.4% in mammograpy for breast cancer, and 59.3% in Pap smear test for cervical cancer. And the higher proportions of having regular screening were 36.0% in Pap smear test for cervical cancer and 11.7% in mammograpy for breast cancer. The reasons related to not having screening tests were found that ‘seem to be healthy’ was 44.8%∼58.9% and the most common reason and the following was ‘not having opportunity for check-up’. The most common reason related to not having regular screening tests were ‘for the finding of previous check-up was normal’.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.