• Title/Summary/Keyword: BIN

Search Result 10,727, Processing Time 0.047 seconds

크기가 다양한 bin-packing 문제에 대한 algorithm

  • 강장하;박성수
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.205-206
    • /
    • 2000
  • In this paper, we consider variable sized bin packing problem, where the objective is not to minimize the total space used in the packing but to minimize the total cost of the packing when the cost of unit size of each bin does not increase as the bin size increases. A heuristic algorithm is described, and analyzed in two special cases: 1) b$\sub$m/|…|b$_1$and w$\sub$n/|…|w$_1$, and 2) b$\sub$m/|…|b$_1$, where b$\sub$i/ denotes the size of i-th type of bin and w$\sub$j/ denotes the size of j-th item. In the case 1), the algorithm guarantees optimality, and in the case 2), it guarantees asymptotic worst-case performance bounds of l1/9.

  • PDF

A Study on Intelligent Robot Bin-Picking System with CCD Camera and Laser Sensor (CCD카메라와 레이저 센서를 조합한 지능형 로봇 빈-피킹에 관한 연구)

  • Shin, Chan-Bai;Kim, Jin-Dae;Lee, Jeh-Won
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.231-233
    • /
    • 2007
  • In this paper we present a new visual approach for the robust bin-picking in a two-step concept for a vision driven automatic handling robot. The technology described here is based on two types of sensors: 3D laser scanner and CCD video camera. The geometry and pose(position and orientation) information of bin contents was reconstructed from the camera and laser sensor. these information can be employed to guide the robotic arm. A new thinning algorithm and constrained hough transform method is also explained in this paper. Consequently, the developed bin-picking demonstrate the successful operation with 3D hole object.

  • PDF

Experimental Technique for Trafficability on Soft Benthic Terrain (I) : Soil bin (해저 연약지반 주행성능 실험기법 연구 (I) : 주행실험토조)

  • Choi, Jong-Su;Hong, Sup;Kim, Hyung-Woo
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.224-228
    • /
    • 2002
  • To study the trafficability on soft and cohesive benthic terrain, a soil bin is designed and constructed. The information of shear strength of pacific seafloor and the results of dimensional analysis of vehicle-train system are used as basic datum for concept design of soil bin. Cohesive benthic terrain is modeled by means of bentonite-water mixture. The shear strength of the mixture is measured by motorized shear meter. Several facilities are constructed for mixing and evening modeled soil, transporting vehicle model. The shear strength in soil bin is investigated for depth, age and velocity. The result of this study is used as basic information to the experiment, study for development of crawler on benthic terrain.

  • PDF

Design and Implementation of a Class Pile Converter for Embedded Java Virtual Machine (내장형 자바가상기계를 위한 클래스 파일 변환기의 설계 및 구현)

  • 지정훈;양희재
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.67-69
    • /
    • 2003
  • 자바는 서로 다른 종류의 컴퓨터 시스템에서 동일하게 동작하는 플랫폼 독립적인 특성을 가지고 있다. 자바가 상기계(JVM)는 클래스 파일을 읽어 들여 인터프리팅하여 실행한다. 보조기억장치가 없는 내장형 시스템에서는 메모리에 클래스 파일이 위치하는데 클래스 파일에는 디버깅등의 목적으로 사용하는 정보와 클래스, 상수, 필드, 메소드 둥의 정보들을 포함하고 있기 때문에 내장형 시스템에서 사용하기에 적합하지 않다. 본 논문에서는 클래스 파일을 변환하여 내장형 시스템에서 시스템의 효율적인 자원 사용과 성능을 향상시킬 수 있도록 클래스 파일을 변환 해주는 도구인 cls2bin을 설계 및 구현하였다. c1s2bin은 클래스 파일에서 동작에 필요하지 않은 정보들을 제거하고 인터프리팅 될 수 있는 새로운 이미지(bin) 파일을 생성한다 cls2bin의 동작과정과 bin 파일 포맷을 살펴봄으로서 내장형 시스템에서 효율적인 자원사용과 내부정보의 접근 방법을 고찰하였으며 그 결과로 내장형 자바 시스템에서의 개선된 클래스 파일의 형태를 정의하고자 한다.

  • PDF

Viewing Angle Switching using Hybrid Aligned Nematic Liquid Crystal Display Driven by a Fringe-Field

  • Chin, Mi-Hyung;Jeong, Eun;Lim, Young-Jin;Kim, Jin-Ho;Srivastava, Anoop Kumar;Lee, Seung-Hee
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.1386-1389
    • /
    • 2008
  • Conventional viewing angle switching electrode requires pixel division and additional liquid crystal panel. Hence the conventional viewing angle switching has low aperture ratio and high thickness. In this paper we proposed new viewing angle switching using hybrid aligned nematic mode by fringe-field electrode field (named HAN-FFS) with single liquid crystal panel. The fringe-field switching electrode is located at the bottom, and the additional common electrode is located at the top of the cell to control viewing angle. The proposed device is free from additional liquid crystal panel and pixel division. Consequently, the suggested structure has not only high aperture ratio but also show an excellent potential for viewing angle switching.

  • PDF

Photocatalytic degradation and antibacterial investigation of nano synthesized Ag3VO4 particles @PAN nanofibers

  • Saud, Prem Singh;Ghouri, Zafar Khan;Pant, Bishweshwar;An, Taehee;Lee, Joong Hee;Park, Mira;Kim, Hak-Yong
    • Carbon letters
    • /
    • v.18
    • /
    • pp.30-36
    • /
    • 2016
  • Well-dispersed Ag3VO4 nanoparticles @polyacrylonitrile (PAN) nanofibers were synthesized by an easily controlled, template-free method as a photo-catalyst for the degradation of methylene blue. Their structural, optical, and photocatalytic properties have been studied by X-ray diffraction, transmission electron microscopy, field-emission scanning electron microscopy equipped with rapid energy dispersive analysis of X-ray, photoluminescence, and ultraviolet-visible spectroscopy. The characterization procedures revealed that the obtained material is PAN nanofibers decorated by Ag3VO4 nanoparticles. Photocatalytic degradation of methylene blue investigated in an aqueous solution under irradiation showed 99% degradation of the dye within 75 min. Finally, the antibacterial performance of Ag3VO4 nanoparticles @PAN composite nanofibers was experimentally verified by the destruction of Escherichia coli. These results suggest that the developed inexpensive and functional nanomaterials can serve as a non-precious catalyst for environmental applications.

Obesity Level Prediction Based on Data Mining Techniques

  • Alqahtani, Asma;Albuainin, Fatima;Alrayes, Rana;Al muhanna, Noura;Alyahyan, Eyman;Aldahasi, Ezaz
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.103-111
    • /
    • 2021
  • Obesity affects individuals of all gender and ages worldwide; consequently, several studies have performed great works to define factors causing it. This study develops an effective method to trace obesity levels based on supervised data mining techniques such as Random Forest and Multi-Layer Perception (MLP), so as to tackle this universal epidemic. Notably, the dataset was from countries like Mexico, Peru, and Colombia in the 14- 61year age group, with varying eating habits and physical conditions. The data includes 2111 instances and 17 attributes labelled using NObesity, which facilitates categorization of data using Overweight Levels l I and II, Insufficient Weight, Normal Weight, as well as Obesity Type I to III. This study found that the highest accuracy was achieved by Random Forest algorithm in comparison to the MLP algorithm, with an overall classification rate of 96.7%.

A Review on the CPU Scheduling Algorithms: Comparative Study

  • Ali, Shahad M.;Alshahrani, Razan F.;Hadadi, Amjad H.;Alghamdi, Tahany A.;Almuhsin, Fatimah H.;El-Sharawy, Enas E.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.19-26
    • /
    • 2021
  • CPU is considered the main and most important resource in the computer system. The CPU scheduling is defined as a procedure that determines which process will enter the CPU to be executed, and another process will be waiting for its turn to be performed. CPU management scheduling algorithms are the major service in the operating systems that fulfill the maximum utilization of the CPU. This article aims to review the studies on the CPU scheduling algorithms towards comparing which is the best algorithm. After we conducted a review of the Round Robin, Shortest Job First, First Come First Served, and Priority algorithms, we found that several researchers have suggested various ways to improve CPU optimization criteria through different algorithms to improve the waiting time, response time, and turnaround time but there is no algorithm is better in all criteria.

Applications of 5G and 6G in Smart Health Services

  • Al-Jawad, Fatimah;Alessa, Raghad;Alhammad, Sukainah;Ali, Batoola;Al-Qanbar, Majd;Rahman, Atta-ur
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.173-182
    • /
    • 2022
  • Healthcare organizations are overwhelmingly embracing smart value-based care strategies, which focuses on providing superior treatment at a significantly lower cost and quality of service (QoS). For these purposes, fifth generation (5G) of mobile service provides an innumerable improvement that clearly outperforms previous generations e.g., 3G and 4G. However, as with most advancements, 5G is projected to introduce new challenges, prompting the community to think about what comes next. This research was conducted to examine the most recent smart 5G technology applications and the solutions they provide to the healthcare industry. Finally, the paper discusses how the upcoming 6G technology has the potential to transform the future of healthcare sector even beyond the current 5G systems.

Reviewing And Analysis of The Deadlock Handling Methods

  • El-Sharawy, Enas E.;Ahmed, Thowiba E;Alshammari, Reem H;Alsubaie, Wafaa;Almuhanna, Norah;Alqahtani, Asma
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.230-236
    • /
    • 2022
  • Objectives: The primary goal of this article is to compare the multiple algorithms used for deadlock handling methods and then outline the common method in deadlock handling methods. Methods: The article methodology begins with introducing a literature review studying different algorithms used in deadlock detection and many algorithms for deadlocks prevented, recovered, and avoided. Discussion and analysis of the literature review were done to classify and compare the studied algorithms. Findings: The results showed that the deadlock detection method solves the deadlock. As soon as the real-time deadlock detection algorithm is identified and indicated, it performs better than the non-real-time deadlock detection algorithm. Our novelty the statistics that we get from the percentages of reviewing outcomes that show the most effective rate of 47% is in deadlock prevention. Then deadlock detection and recovery with 28% finally, a rate of 25% for deadlock avoidance.