• Title/Summary/Keyword: Block-based

Search Result 4,485, Processing Time 0.036 seconds

Block layout method in the block stockyard based on the genetic algorithm

  • Roh, Myung-Il
    • Ocean Systems Engineering
    • /
    • v.2 no.4
    • /
    • pp.271-287
    • /
    • 2012
  • Due to its large size, a ship is first divided into scores of blocks and then each block is constructed through various shops, such as the assembly shop, the painting shop, and the outfitting shop. However, each block may not be directly moved to the next shop and may be temporarily laid at a block stockyard because the working time in each shop is different from each other. If blocks are laid at the block stockyard without any planning, the rearrangement of the blocks by a transporter is required because the blocks have the different in and out time. In this study, a block layout method based on the genetic algorithm was proposed in order to minimize the rearrangement of the blocks in the block stockyard. To evaluate the applicability of the proposed method, it was applied to simple layout problems of the block stockyard. The result shows that the proposed method can yield a block layout that minimizes the total relocation cost of moving obstacle blocks in the block stockyard.

SHIP BLOCK ARRANGEMENT SYSTEM BASED ON IMAGE PROCESSING

  • Park, Jeong-Ho;Choi, Wan-Sik
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.104-106
    • /
    • 2008
  • This paper proposes an image based method for arranging ship blocks in a dockyard. The problem of appropriately arranging numerous blocks has to be carefully planned because it has close relation to the effectiveness of the whole working process. To implement the system, the block shape and feature points have to be obtained from block image. The block arrangement system can be implemented by the fusion of the block shape extraction and image matching technology.

  • PDF

Hybrid copy-move-forgery detection algorithm fusing keypoint-based and block-based approaches (특징점 기반 방식과 블록 기반 방식을 융합한 효율적인 CMF 위조 검출 방법)

  • Park, Chun-Su
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.7-13
    • /
    • 2018
  • The methods for detecting copy move frogery (CMF) are divided into two categories, block-based methods and keypoint-based methods. Block-based methods have a high computational cost because a large number of blocks should be examined for CMF detection. In addition, the forgery detection may fail if a tampered region undergoes geometric transformation. On the contrary, keypoint-based methods can overcome the disadvantages of the block-based approach, but it can not detect a tampered region if the CMF forgery occurs in the low entropy region of the image. Therefore, in this paper, we propose a method to detect CMF forgery in all areas of image by combining keypoint-based and block-based methods. The proposed method first performs keypoint-based CMF detection on the entire image. Then, the areas for which the forgery check is not performed are selected and the block-based CMF detection is performed for them. Therefore, the proposed CMF detection method makes it possible to detect CMF forgery occurring in all areas of the image. Experimental results show that the proposed method achieves better forgery detection performance than conventional methods.

Efficient Image Specific Block Based LCD Backlight Nonideality and Cross-talk Compensation (Image에 따른 효과적인 LCD 백라이트 Block 단위 Nonideality 및 Cross-talk Compensation)

  • Han, Won-Jin;You, Jae-Hee
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.4
    • /
    • pp.38-48
    • /
    • 2011
  • Block based LCD backlight nonideality and crosstalk compensation methodologies are proposed based on the analysis of backlight profiles and image pixel homogeneity. Large computation complexity required in the conventional compensations is minimized without the degradation of image qualities by optimizing image block size, image area inside the block to be excluded from the compensation computation and the required backlight range to be computed. The optimization results of computation complexity as well as image qualities are verified for the proposed compensation by real image data simulations.

Block-based subband/DCT coding (블록단위 대역분할/DCT 부호화)

  • 김정권;이상욱;이충웅
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.2
    • /
    • pp.97-105
    • /
    • 1998
  • Subband/DCT coding has been introduced in order to transmit images of various resultions using one given image-codec, for nowadays there are various grades of quality in visual communication services. However, subband/DCT results in the increawse of multiplication number and memory size. In order to resolve this problem, we propose block-based subband/DCT coding in this paper. In block-based subband/DCT, the number of multiplications is not only reduced because we combine subband decomposistion with DCT, but the size of memory is also reduced because images can be parallel-processed block by block. We show that the number of multiplications is reduced, by analyzing the property ofblock-based subband/DCT matrix mathematically, and examine the performance of proposed coder, which adopts JPEG as backhand-coder after block-based subband/DCT.

  • PDF

E-mail System Model based on Ethereum (이더리움 기반 이메일 시스템 모델)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.

Smoke Detection using Block-based Difference Images and Projections (블록기반 차영상과 투영 그래프를 이용한 연기검출)

  • Kim, Dong-Keun;Kim, Won-Ho
    • The KIPS Transactions:PartB
    • /
    • v.14B no.5
    • /
    • pp.361-368
    • /
    • 2007
  • In this paper, we propose a smoke detection method which is based on block-wise difference of image frames in video. Our proposed method is composed of three steps which are (a) the detection step of the changed regions against the background, (b) the background update step, and (c) the smoke determination step from the changed regions. We first construct the block mean Image of frames in video. And to extract the changed regions against the background, we use a block-wise difference between background's block mean image and a current input frame's block mean image. After applying projections in block-based difference images, we can determine the changed regions as rectangles using projections of difference images. we propose a update scheme of background's block mean image using the projections. We decide the smoke region using the femoral statistics of the central position and YUV color in the changed region.

Online Monitoring of Ship Block Construction Equipment Based on the Internet of Things and Public Cloud: Take the Intelligent Tire Frame as an Example

  • Cai, Qiuyan;Jing, Xuwen;Chen, Yu;Liu, Jinfeng;Kang, Chao;Li, Bingqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.3970-3990
    • /
    • 2021
  • In view of the problems of insufficient data collection and processing capability of multi-source heterogeneous equipment, and low visibility of equipment status at the ship block construction site. A data collection method for ship block construction equipment based on wireless sensor network (WSN) technology and a data processing method based on edge computing were proposed. Based on the Browser/Server (B/S) architecture and the OneNET platform, an online monitoring system for ship block construction equipment was designed and developed, which realized the visual online monitoring and management of the ship block construction equipment status. Not only that, the feasibility and reliability of the monitoring system were verified by using the intelligent tire frame system as the application object. The research of this project can lay the foundation for the ship block construction equipment management and the ship block intelligent construction, and ultimately improve the quality and efficiency of ship block construction.

Structural Analysis and Derivation of Vulnerability for BlockChain based System (블록체인 기반 시스템의 구조적 분석과 취약점 도출)

  • Kim, Jang-Hwan
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.115-121
    • /
    • 2019
  • I analyzed the structure of a block-chain system and a block-chain-based service system. It is a decentralized book encryption system software technology that does not require a third party to secure trust between the two parties. Block chains are structured in a linked list structure. The block chain manage transaction information by blocking the transaction information, in conjunction with other blocks. As a result, I have discovered structural weaknesses in current block-chain systems and block-chain-based service systems. Once these possible structural problems are resolved, I expect that the block-chain-based service system will make various industrial contributions.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.