• Title/Summary/Keyword: variety identification

Search Result 445, Processing Time 0.027 seconds

Performance Analysis of FSA Algorithm for Tag Identification in RFID Systems (RFID 시스템에서 태그 식별을 위한 SFSA 알고리즘의 성능 분석)

  • Lim, In-Taek;Choi, Jin-Oh;Choi, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.563-566
    • /
    • 2008
  • In RFID system. when a variety of tags are present in the interrogation zone of a single reader at the same time, the system requires a multiple tag identification scheme that allows the reader to read data from the individual tags. Anti-collision algorithms required for the multiple tag identification are essential for the implementation of RFID system. This paper analyzed the performance of SFSA algorithm, which is easy to implement. According to the analytical results, the algorithm's performances are closely related with the number of tags and the frame size.

  • PDF

On the Hazard Identification Methods for the Realization of Functional Safety Standards (기능안전 표준들의 구현을 위한 기능 중심의 위험원 식별 방법)

  • Jung, Ho Jeon;Lee, Jae Chon;Oh, Seong Keun
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.3
    • /
    • pp.105-112
    • /
    • 2013
  • To meet the growing needs from a variety of stakeholders, the development of modern systems is getting more complex and thus, the systems failure in the actual operations can potentially become more serious. This is why several international or military standards on systems safety have been published. In spite of the importance of meeting those standards such as IEC 61508 and ISO 26262 in the systems development, the associated practical methods seem deficient since those standards do not provide them. The objective of this paper is to present a method to identify potential hazards in fulfilling the requirements of the safety standards. In particular, the approach taken here is based on applying the functional analysis that covers several levels of the system under development. Note, however, that in the most of the conventional methods for hazards identification, the analysis has been focused on the failure at or underneath the component level of the system. The hazards identification method in this paper would cover the level up to the system by utilizing the functions-oriented approach. The case study of the safety enhancement for locomotive cabs is also discussed.

Measurement of a Customer Satisfaction Index for Improvement of Mobile RFID Services in Korea

  • Park, Yong-Jae;Heo, Pil-Sun;Rim, Myung-Hwan
    • ETRI Journal
    • /
    • v.30 no.5
    • /
    • pp.634-643
    • /
    • 2008
  • One of the ubiquitous technology fields that have received the most attention recently from technology communities worldwide is mobile radio frequency identification (RFID). Mobile handsets loaded with RFID readers enable the identification and retrieval of information on RFID tagged objects. In Korea, a variety of mobile RFID services are currently being piloted, and their commercial roll-out looks imminent. The goal of this study is to propose, ahead of the commercial launch of mobile RFID services, a customer satisfaction index (CSI) model for this service category and to then measure the CSI to derive practical implications for their providers and pointers related to the improvement of service. A web survey was conducted on Korean mobile phone subscribers who had participated in a mobile RFID pilot program. Using the results of this survey, we tested the CSI model and its hypotheses by employing a partial least-squares-based structural equation model analysis and calculated the index. We further conducted an importance-performance analysis in order to provide insights that may be useful for improving the quality of mobile RFID services.

  • PDF

A SOA Service Identification Model Based on Hierarchical Ontology (계층적 온톨로지 기반의 SOA서비스 식별 모델)

  • Park, Sei-Kwon;Choi, Ko-Bong
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.323-340
    • /
    • 2013
  • As the importance of collaboration becomes critical in today's open and complex business environment network, the issues and solutions on compatibility and reusability between different kinds of applications are being increasingly important as well in systems analysis and design. And therefore, service-centered SOA is receiving attention in such business environment as a strategic approach that makes possible for prompt action according to the needs of users and business process. Various implementation methodologies have been proposed for SOA, however, in practical aspects most of them have some problems since they fail to propose specific policies in definition and identification of services for the exact user requirements and business situations. To solve or alleviate those problems, this paper suggests a new service identification model based on hierarchical ontology, where three different ontologies such as business ontology, context ontology and service ontology are proposed to define the relationship and design the link between user requirements, business process, applications and services. Through a suggested methodology in this paper, it would be possible to provide proactive services that meets a variety of business environments and demands of user. Also, since the information can be modified adaptively and dynamically by hierarchical ontology, this study is expected to play a positive role in increasing the flexibility of systems and business environments.

Analysis of Twin in Mg Alloys Using Electron Backscatter Diffraction Technique

  • Lee, Jong Youn;Kim, Won Tae;Kim, Do Hyang
    • Applied Microscopy
    • /
    • v.44 no.1
    • /
    • pp.34-39
    • /
    • 2014
  • Electron backscatter diffraction (EBSD) is widely used for quantitative microstructural analysis of the crystallographic nature of variety of materials such as metals, minerals, and ceramics. EBSD can provide a wide range of information on materials including grain size, grain orientation, texture, and phase identity. In the case of metallic alloys, EBSD now has become an essential technique to analyze the texture, particularly when severe deformation is applied to the alloys. In addition, EBSD can be one of the very useful tools in identification of twin, particularly in Mg alloys. In Mg alloys different type of twin can occur depending on the c/a ratio and stacking fault energy on the twinning plane. Such an occurrence of different type of twin can be most effectively analyzed using EBSD technique. In this article, the recent development of Mg alloys and occurrence of twin in Mg are reviewed. Then, recently published example for identification of tension and compression twins in AZ31 and ZX31 is introduced to explain how EBSD can be used for identification of twin in Mg.

Aircraft Identification and Orientation Estimention Using Multi-Layer Neural Network (다층 신경망을 사용한 항공기 인식 및 3차원 방향 추정)

  • Kim, Dae-Young;Chien, Sung-Il;Son, Hyon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.1
    • /
    • pp.35-45
    • /
    • 1991
  • Multi layer neural network using backpropagation learning algorithm is used to achieve identification and orientation estimation of different classes of aircraft in the variety of 3-D orientations. In-plane distortion invarient$(L,\;{\Phi})$ feature was extracted from each aircraft image to be used for training neural network aircraft classifier. For aircraft identification the optimum structure of the neural network classifier is studied to obtain high classification performance. Effective reductioin of learning time was achieved by using modified backpropagation learning algorithm and varying, learning parameters.

  • PDF

A comparative study of machine learning methods for automated identification of radioisotopes using NaI gamma-ray spectra

  • Galib, S.M.;Bhowmik, P.K.;Avachat, A.V.;Lee, H.K.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.12
    • /
    • pp.4072-4079
    • /
    • 2021
  • This article presents a study on the state-of-the-art methods for automated radioactive material detection and identification, using gamma-ray spectra and modern machine learning methods. The recent developments inspired this in deep learning algorithms, and the proposed method provided better performance than the current state-of-the-art models. Machine learning models such as: fully connected, recurrent, convolutional, and gradient boosted decision trees, are applied under a wide variety of testing conditions, and their advantage and disadvantage are discussed. Furthermore, a hybrid model is developed by combining the fully-connected and convolutional neural network, which shows the best performance among the different machine learning models. These improvements are represented by the model's test performance metric (i.e., F1 score) of 93.33% with an improvement of 2%-12% than the state-of-the-art model at various conditions. The experimental results show that fusion of classical neural networks and modern deep learning architecture is a suitable choice for interpreting gamma spectra data where real-time and remote detection is necessary.

Review of the suitability to introduce new identity verification means in South Korea : Focused on Block Chain and FIDO (우리나라의 본인확인수단에 관한 신규 인증수단의 도입 적합성 검토 : Block Chain과 FIDO를 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.85-93
    • /
    • 2018
  • This study investigates the suitability of the blockchain and FIDO among non-face-to-face authentication means in order to secure diversity of identfication means operated in South Korea. In order to do this, the study selected and analyzed seven conformance criteria (universality, persistence, uniqueness, convenience, security, applicability, and economics), and the results were appropriate. Accordingly, in order to apply the blockchain and FIDO as the identification means, the related regulations and notices should be revised to improve the identification procedure. In addition, differentiated certification standards should be established for each service field to apply various authentication means as well as existing identification means, and the authentication means should be continuously developed and linked with the service. In the future, the identification means will bring security of the information circulation environment in the IoT, so it should be implemented in a variety of services by supporting application of identification means.

A Study on vertical mode system identification for a single tilt wing UAV (단일 틸트윙 방식 무인기의 수직모드 시스템 식별 기법 연구)

  • Seo, Ilwon;Kim, Seungkeun;Suk, Jinyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.11
    • /
    • pp.937-946
    • /
    • 2014
  • This paper presents system identification of a single tilt wing UAV. A Modified Equation Error Method(MEEM) and Extended Kalman Filter(EKF) are used for the identification of a single tilt wing UAV system in frequency-domain and time-domain, respectively. Simulated flight data is obtained from CNUX-3's vertical mode linear simulation with realistic sensor noise. System identification performance is analyzed with respect to a variety of design parameters of the MEEM. Also, High accuracy Fourier Transform(HFT) is applied to enhance the performance of MEEM. The results of the MEEM is compared with those of the EKF. Design parameters of the MEEM and initial conditions of the EKF are decided from optimization.

Potent Antitumor Activity of SB31 and Identification of Active Compound

  • Kim, Yong;Kim, Song-Bae;Bang, Seong-Cheol;Ahn, Byung-Zun
    • Proceedings of the PSK Conference
    • /
    • 2002.10a
    • /
    • pp.233.3-234
    • /
    • 2002
  • SB31, an extract of Pulsatilla koreana, has been tried as an antitumor agent by traditional medicine pratitioner in Korea for the past 30 years, SB31 was evaluated for cytotoxic and antitumor activity against a variety of cancer cell lines. The SB31 exhibited 5-6 fold less cytotoxic activity against normal mononuclear cells (ED$\sub$50/. 1.1 mg/$m\ell$) than against cancer cell lines (ED$\sub$50/ 0.14-0.19mg/$m\ell$). (omitted)

  • PDF