• Title/Summary/Keyword: tag collection

Search Result 75, Processing Time 0.023 seconds

Study on Habitat Selection of Odontobutis interrupta using PIT Telemetry (PIT telemetry를 이용한 얼록동사리의 서식지 선택 연구)

  • Jun-Wan Kim;Kyu-Jin Kim;Beom-Myeong Choi;Ju-Duk Yoon;Min-Ho Jang
    • Korean Journal of Ecology and Environment
    • /
    • v.55 no.4
    • /
    • pp.294-304
    • /
    • 2022
  • This study carried out from March 2021 to October 2021 in the upper part (St. 1) and middle part (St. 2) section of Yongsu stream, a branch of the Geum river, using PIT telemetry to understand the movement patterns and habitat characteristics of Odontobutis interrupta, a Korean endemic species. O. interrupta collection was used kick net (5×5 mm) and fish trap (5×5 mm). After collecting fish, PIT tag insertion was performed immediately in the site. Reader (HPR Plus Reader, biomark, USA) and portable Antenna (BP Plus Portable Antenna, biomark, USA) were used for detection of fish to monitoring the tagged O. interrupta. As a result of PIT telemetry applied to 70 individuals, mean movement distance was 36.5 (SE, ±6.6) m. There was a significant difference between total length and movement distance (P≤0.05). O. interrupta was mainly identified in average water depth, 36.2±1.9 cm, average water velocity, 0.03±0.07 m s-1 and average distance from watershed, 4.4±0.3 m. Extent of rock used for habitat was varied from 32 to 4,000 cm2. There was no statistical difference between the area of the first selected rock and the area of the after selected rock (P>0.05). but there was significant difference between total length and the area of the rock except for detection before 24 hours (P<0.01). Therefore, to restore the habitat, it is considered necessary to create various substrate structures by providing various habitat environments (water depth, flow rate, stone, etc.) for each individual size.

A Design and Implementation of RSS Data Collecting Engine based on Web 2.0 (웹 2.0 기반 RSS 데이터 수집 엔진의 설계 및 구현)

  • Kang, Pil-Gu;Kim, Jae-Hwan;Lee, Sang-Jun;Chae, Jin-Seok
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1496-1506
    • /
    • 2007
  • The environment of web service has changed a great deal due to the progress of internet technology and positive participation of users. The established web service is static and passive, but the recent web service is becoming dynamic and active. Web 2.0 reflects current web service change well. The primary feature of web 2.0 is positive participation of users. Since the size of generated information is becoming larger, it is highly required to share the information fast and correctly. The technology to satisfy this need is web syndication and tagging in web 2.0. The web syndication makes feeds for another site or users to receive the content of web site. In addition, the tagging is the kernel of a information. Many internet users share rapidly the information through tag search. In this paper, we propose the efficient technique to improve the web 2.0 technology such as web syndication and tagging by using the data collection engine. Data collection engine has stored in a database, a user's Web site to use the information. and it has a user's Web site with access to updated data to collect. The experimental results show that our approach can improve the search speed up to 3.14 times better than the existing method and reduce the size of data up to 66% for building associated tags.

  • PDF

A Study on the Performane Requirement of Precise Digital Map for Road Lane Recognition (차로 구분이 가능한 정밀전자지도의 성능 요구사항에 관한 연구)

  • Kang, Woo-Yong;Lee, Eun-Sung;Lee, Geon-Woo;Park, Jae-Ik;Choi, Kwang-Sik;Heo, Moon-Beom
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.1
    • /
    • pp.47-53
    • /
    • 2011
  • To enable the efficient operation of ITS, it is necessary to collect location data for vehicles on the road. In the case of futuristic transportation systems like ubiquitous transportation and smart highway, a method of data collection that is advanced enough to incorporate road lane recognition is required. To meet this requirement, technology based on radio frequency identification (RFID) has been researched. However, RFID may fail to yield accurate location information during high-speed driving because of the time required for communication between the tag and the reader. Moreover, installing tags across all roads necessarily incurs an enormous cost. One cost-saving alternative currently being researched is to utilize GNSS (global navigation satellite system) carrierbased location information where available. For lane recognition using GNSS, a precise digital map for determining vehicle position by lane is needed in addition to the carrier-based GNSS location data. A "precise digital map" is a map containing the location information of each road lane to enable lane recognition. At present, precise digital maps are being created for lane recognition experiments by measuring the lanes in the test area. However, such work is being carried out through comparison with vehicle driving information, without definitions being established for detailed performance specifications. Therefore, this study analyzes the performance requirements of a precise digital map capable of lane recognition based on the accuracy of GNSS location information and the accuracy of the precise digital map. To analyze the performance of the precise digital map, simulations are carried out. The results show that to have high performance of this system, we need under 0.5m accuracy of the precise digital map.

Discovery Methods of Similar Web Service Operations by Learning Ontologies (온톨로지 학습에 의한 유사 웹 서비스 오퍼레이션 발견 방법)

  • Lee, Yong-Ju
    • The KIPS Transactions:PartD
    • /
    • v.18D no.2
    • /
    • pp.133-142
    • /
    • 2011
  • To ensure the successful employment of semantic web services, it is essential that they rely on the use of high quality ontologies. However, building such ontologies is difficult and costly, thus hampering web service deployment. This study automatically builds ontologies from WSDL documents and their underlying semantics, and presents discovery methods of similar web service operations using these ontologies. The key ingredient is techniques that cluster parameters in the collection of web services into semantically meaningful concepts, and capture the hierarchical relationships between the words contained in the tag. We implement an operation retrieval system for web services. This system finds out a ranked set of similar operations using a novel similarity measurement method, and selects the most optimal operation which satisfies user's requirements. It can be directly used for the web services composition.

PPNC: Privacy Preserving Scheme for Random Linear Network Coding in Smart Grid

  • He, Shiming;Zeng, Weini;Xie, Kun;Yang, Hongming;Lai, Mingyong;Su, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.3
    • /
    • pp.1510-1532
    • /
    • 2017
  • In smart grid, privacy implications to individuals and their families are an important issue because of the fine-grained usage data collection. Wireless communications are utilized by many utility companies to obtain information. Network coding is exploited in smart grids, to enhance network performance in terms of throughput, delay, robustness, and energy consumption. However, random linear network coding introduces a new challenge for privacy preserving due to the encoding of data and updating of coefficients in forwarder nodes. We propose a distributed privacy preserving scheme for random linear network coding in smart grid that considers the converged flows character of the smart grid and exploits a homomorphic encryption function to decrease the complexities in the forwarder node. It offers a data confidentiality privacy preserving feature, which can efficiently thwart traffic analysis. The data of the packet is encrypted and the tag of the packet is encrypted by a homomorphic encryption function. The forwarder node random linearly codes the encrypted data and directly processes the cryptotext tags based on the homomorphism feature. Extensive security analysis and performance evaluations demonstrate the validity and efficiency of the proposed scheme.

A Study on the Improved Method for Mutual Suppression between of RFID is expected System and Algorithm (무선인식 시스템(RFID)에 적합한 알고리즘 분석 및 전파특성에 관한 연구)

  • Kang, Jeong-Yong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.44 no.3
    • /
    • pp.23-30
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.

Performance Improvements of DFSA(Dynamic Frame Slotted Aloha) Algorithm through Estimation of Intial frame Size (초기 프레임 크기 예측을 통한 DFSA(Dynamic Frame Slotted Aloha) 알고리즘 성능 개선)

  • Lee, Kang-Won;Lee, Moon-Hyung;Lee, Hyun-Kyo;Lim, Kyoung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1517-1530
    • /
    • 2017
  • Traditional anti-collision algorithms determine slot size of initial frame based on the information of number of collision slots, idle slots, and success slots. Since there is no information about collision at the beginning of tag information collection, traditional anti-collision algorithms can not determine the initial frame size. Considering that performance of anti-collision algorithm is very sensitive to initial slot size traditional anti-collision algorithms need some improvements. In this study two methods are proposed to determine slot size of initial frame efficiently, through which we can improve the performance of dynamic frame slotted aloha algorithm. To verify the performance of proposed algorithms, 2.4GHz RFID system is used. Throughput and delay time are derived through simulation, which is developed using JAVA. We have seen that proposed algorithm improves throughput by 9.6% and delay time by 9.8%.

An Identification of the Image Retrieval Domain from the Perspective of Library and Information Science with Author Co-citation and Author Bibliographic Coupling Analyses

  • Yoon, JungWon;Chung, EunKyung;Byun, Jihye
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.4
    • /
    • pp.99-124
    • /
    • 2015
  • As the improvement of digital technologies increases the use of images from various fields, the domain of image retrieval has evolved and become a growing topic of research in the Library and Information Science field. The purpose of this study is to identify the knowledge structure of the image retrieval domain by using the author co-citation analysis and author bibliographic coupling as analytical tools in order to understand the domain's past and present. The data set for this study is 245 articles with 8,031 cited articles in the field of image retrieval from 1998 to 2013, from the Web of Science citation database. According to the results of author co-citation analysis for the past of the image retrieval domain, our findings demonstrate that the intellectual structure of image retrieval in the LIS field consists of predominantly user-oriented approaches, but also includes some areas influenced by the CBIR area. More specifically, the user-oriented approach contains six specific areas which include image needs, information seeking, image needs and search behavior, image indexing and access, indexing of image collection, and web image search. On the other hand, for CBIR approaches, it contains feature-based image indexing, shape-based indexing, and IR & CBIR. The recent trends of image retrieval based on the results from author bibliographic coupling analysis show that the domain is expanding to emerging areas of medical images, multimedia, ontology- and tag-based indexing which thus reflects a new paradigm of information environment.

Improving development environment for embedded software (내장 소프트웨어를 위한 개발 환경의 개선)

  • AHN, ILSOO
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • RFID systems have been widely used in various fields such as logistics, distribution, food, security, traffic and others. A RFID middleware, one of the key components of the RFID system, perform an important role in many functions such as filtering, grouping, reporting tag data according to given user specifications and so on. However, manual test data generation is very hard because the inputs of the RFID middleware are generated according to the RFID middleware standards and complex encoding rules. To solve this problem, in this paper, we propose a black box test technique based on RFID middleware standards. Firstly, we define ten types of input conversion rules to generate new test data from existing test data based on the standard specifications. And then, using these input conversion rules, we generate various additional test data automatically. To validate the effectiveness of generated test data, we measure coverage of generated test data on actual RFID middleware. The results show that our test data achieve 78% statement coverage and 58% branch coverage in the classes of filtering and grouping, 79% statement coverage and 64% branch coverage in the classes of reporting.

  • PDF

Smartphone NFC based Access Control System (스마트폰 NFC 기반의 출입관리 시스템)

  • Bae, Sang-Jung;Jeon, Soon-Yeong;Lee, Sang-Hwa;Lee, Chan-Ho;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.596-597
    • /
    • 2016
  • Recently a variety of companies as the growing importance of big data are in the process of research and development for large-scale data collection and management. In addition, a situation that collects all necessary data inside and outside the enterprise to improve the manufacturing environment and the service environment. In this paper, we collect to ingest the mouth-time work for companies within the temple. Also, in conjunction with the NFC tag of the smart phone and employee information stored in the database. Utilizing this determines whether or not the employee attendance and the authority to automatically access to the database or resource within the enterprise. The proposed system is considered to be able to increase the accessibility and efficiency of a database or a resource in the enterprise.

  • PDF