• Title/Summary/Keyword: C language

Search Result 1,646, Processing Time 0.03 seconds

Recognizing that a person doesn't put on a safety cap using DSP. (DSP(Digital signal proccesor)를 이용한 산업현장에서의 안전모 미착용 인식 기술)

  • Lee, Yong-Woog;Song, Kang-Suk;Jeong, Moo-Il;Lim, Chul-Hoo;Moon, Sung-Mo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.530-533
    • /
    • 2009
  • This paper proposes a method of recognizing that a person doesn't put on a safety cap using image processing method in DSP(Digital Signal Processor). It processes inputted images by image input devices that equipped in a industrial settings. If the method recognizes a person that doesn't put on a safety cap, a system transfers relevant recognition result to a supervisor and takes proper measures. If an accident happens and someone doesn't put on a safety cap, additional casualities could be. Proposed method can nip additional casualties in the bud. To recognize that a person don't put on a safety cap, images are processed by object abstraction, removal of noise, decision of a thing or a person, abstraction of a head part in a image, recognizing whether a man puts on a safety cap using HSV color space or not, and so on. Image input and image process are processed by DSP. And C language-based codes are optimized by an eignefunction(Intrinsics) for speed improvement of algorithms.

  • PDF

New generation software of structural analysis and design optimization--JIFEX

  • Gu, Yuanxian;Zhang, Hongwu;Guan, Zhenqun;Kang, Zhan;Li, Yunpeng;Zhong, Wanxie
    • Structural Engineering and Mechanics
    • /
    • v.7 no.6
    • /
    • pp.589-599
    • /
    • 1999
  • This paper presents the development and applications of the software package JIFEX, a new finite element system which can be used for structural analysis and optimum design by the modern computer hardware and software technologies such as MS Windows95/NT and Pentium PC platforms. The complete system of JIFEX is programmed with $C/C^{++}$ language to make full use of advanced facilities of MS Windows95/NT. In the system, the finite element data pre-processing, based on the most popular CAD package AutoCAD (R13, R14), has been implemented, so that the finite element modeling could be integrated with geometric modeling of CAD. The system not only has interactive graphics facility for data post-processing, but also realizes the real-time computing visualization by means of the Dynamic Data Exchange (DDE) technique. Running on the Pentium computers, JIFEX can solve large-scale finite element analysis problems such as the ones with more than 60000 nodes in the finite element model.

ANP-based Decision Support System Design for Selecting Function of Weapon Systems (무기체계의 기능 선정을 위한 ANP 기반의 의사결정 지원시스템 설계)

  • Oh, Seongryeong;Seo, Yoonho
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.3
    • /
    • pp.85-95
    • /
    • 2016
  • In National Defense field, the importance of M&S and T&E has been increased due to complexity of modern Weapon System. And research reducing time and cost is being conducted continually on using limited resources efficiently. In the existing research, Weapon System's Performance Evaluation System using the Process-based method has been in progress. But, Objective basis or scientific method is insufficient in selecting appropriate function of a target to performance evaluation. Due to this, it's difficult to select functions suitable to the situation in same type. Also, Requirements of user and interrelation of evaluation factors can't be reflected systematically. In this research, it proposes the method to reflecting requirements of user, interrelation of elements in realistic situation for selecting evaluation object in Performance Evaluation Simulation. First, Evaluation Objects is selected using ANP which is multi-criterion decision making method. Second, decision support system is constructed using Programming Language(C#) based on the research result.

Classification and analysis of error types for deep learning-based Korean spelling correction (딥러닝 기반 한국어 맞춤법 교정을 위한 오류 유형 분류 및 분석)

  • Koo, Seonmin;Park, Chanjun;So, Aram;Lim, Heuiseok
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.12
    • /
    • pp.65-74
    • /
    • 2021
  • Recently, studies on Korean spelling correction have been actively conducted based on machine translation and automatic noise generation. These methods generate noise and use as train and data set. This has limitation in that it is difficult to accurately measure performance because it is unlikely that noise other than the noise used for learning is included in the test set In addition, there is no practical error type standard, so the type of error used in each study is different, making qualitative analysis difficult. This paper proposes new 'error type classification' for deep learning-based Korean spelling correction research, and error analysis perform on existing commercialized Korean spelling correctors (System A, B, C). As a result of analysis, it was found the three correction systems did not perform well in correcting other error types presented in this paper other than spacing, and hardly recognized errors in word order or tense.

Expansion Joint Motion Analysis using Hall Effect Sensor and 9-Axis Sensor (Hall Effect Sensor와 9-Axis Sensor를 이용한 Expansion Joint 모션 분석)

  • Kwag, Tae-Hong;Kim, Sang-Hyun;Kim, Won-Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.347-354
    • /
    • 2021
  • In the equipment industry such as chemical plants, high temperature, high pressure, and toxic fluids move between various facilities through piping. The movement and damage of pipes due to changes in the surrounding environment such as temperature changes, vibrations, earthquakes, and ground subsidence often lead to major accidents involving personal injury. In order to prevent such an accident, various types of expansion joints are used to absorb and supplement various shocks applied to the pipe to prevent accidents in advance. Therefore, it is very important to measure the deformation of the used expansion joint and predict its lifespan to prevent a major accident. In this paper, the deformation of the expansion joint was understood as a kind of motion, and the change was measured using a Hall Effect Sensor and a 9-Axis Sensor. In addition, we studied a system that can predict the deformation of expansion joints by collecting and analyzing the measured data using a general-purpose microcomputer (Arduino Board) and C language.

Novel Vulnerability against Dummy Based Side-Channel Countermeasures - Case Study: XMEGA (더미 기반 부채널 분석 대응기법 신규 취약점 - Case Study: XMEGA)

  • Lee, JongHyeok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.287-297
    • /
    • 2019
  • When cryptographic algorithms are implemented to provide countermeasures against the side-channel analysis, designers frequently employ the combined countermeasures between the first-order masking scheme and hiding schemes. Their combination can be enough to offer security and efficiency. However, if dummy operations can be distinguished from real operations, an attacker can extract the secret key with lower complexity than the intended attack complexity by the designer inserting the dummy operations. In this paper, we categorize types of variables used in a dummy operation when C language is employed. Then, we present the novel vulnerability that can distinguish dummy operations for all cases where the hiding schemes are applied using different types of variables. Moreover, the countermeasure is provided to prevent the novel vulnerability.

Implementation and performance evaluation of PIPO lightweight block ciphers on the web (웹상에서의 PIPO 경량 블록암호 구현 및 성능 평가)

  • Lim, Se-Jin;Kim, Won-Woong;Kang, Yea-Jun;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.731-742
    • /
    • 2022
  • PIPO is the latest domestic lightweight block cipher announced in ICISC'20, which is characterized by being lightweight to facilitate implementation on IoT with limited resources. In this paper, PIPO 64/128-bit and 64/256-bit were implemented using web-based languages such as Javascript and WebAsembly. Two methods of performance evaluation were conducted by implementing bitsice and TLU, and the performance was compared by implementing Looped written using for statements and Unrolled written for statements. It performs performance evaluations in various web browsers such as Google Chrome, Mozilla Firefox, Opera, and Microsoft Edge, as well as OS-specific environments such as Windows, Linux, Mac, iOS, and Android. In addition, a performance comparison was performed with PIPO implemented in C language. This can be used as an indicator for applying PIPO block cipher on the web.

The Antimicrobial Activity of Gwankeibujalijung-tang Against Streptococcus pneumoniae 59 Isolated from the Mouth of a Common Cold Patient (감기환자의 구강에서 분리된 Streptoccous pneumoniae 59에 대한 관계부자이중탕(官桂附子理中湯)의 효과)

  • Lee, Sang-Yun;Seo, Bu-Il;Park, Ji-Ha;Roh, Seong-Soo;Lee, Eun-Sook;Kim, Yong-Hyun
    • The Korea Journal of Herbology
    • /
    • v.24 no.1
    • /
    • pp.49-57
    • /
    • 2009
  • Objectives:I want to examine the antimicrobial activity of Gwankeibujalijung-tang against Streptococcus pneumoniae 59 isolated from the mouth of a common cold patient. Methods: Antimicrobial activity was assayed through the hot water extract from Gwankeibujalijung-tang against Streptococcus pneumoniae 59 isolated from the mouth of a common cold patient. Results: The size of inhibition zone of Gwankeibujalijung-tang extract was 9.83 $\pm$ 0.11 mm. The optimal pH and temperature for the growth of isolated Streptococcus pneumoniae 59 were 7.0 and 37$^{\circ}C$, respectively. The minimum inhibitory concentration of Gwankeibujalijung-tang extract was 12 $\mu\ell$ and the antimicrobial activity of Gwankeibujalijung-tang extract was not destroyed by the heat (121$^{\circ}C$ for 15 min) and not affected by pH. Conclusions: Reviewing this experimental result, it appeared that Gwankeibujalijung-tang had efficacy against Streptococcus pneumoniae 59 isolated from the mouth of a common cold patient.

Implementation of a drone using the PID control of an 8-bit microcontroller (8bit 마이크로컨트롤러의 PID제어를 이용한 드론 구현)

  • Lee, Donghee;Moon, Sangook
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.9
    • /
    • pp.81-90
    • /
    • 2016
  • Recently drones have become popular enough to be one of the hobby. The drone refers to an unmanned aerial vehicle which can fly and be steered by a radio wave without a pilot and it has a airplane or helicopter shape. The drone was first started to be used from military purpose, but its usage has been expanded to the private such as construction site, crop-dusting, field discovery, freight shipping and drones to prevent cheating. However the drone that we can see often in the market is expansive, hard to be repaired when it broken down and has a discomfort of the short flight time. In this paper, to solve an uncomfortable talk on the cheap 8-bits microcontrollers ATmega128 Using drone for implementation. Axes gyroscope and accelerometers mcu between posture an attitude control, communications through drone control, pid. Receiver input them into transmitter signals of movements to control drone c the programming was implemented in on the basis of language. drone using ATmega128 microcontroller is possible hovering, By utilizing a pin that are not required for control it can be used as a drone for a variety of uses.

Design and Implementation of Birthmark Technique for Unity Application

  • Heewan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.85-93
    • /
    • 2023
  • Software birthmark refers to a unique feature inherent in software that can be extracted from program binaries even in the absence of the original source code of the program. Like human genetic information, the similarity between programs can be calculated numerically, so it can be used to determine whether software is stolen or copied. In this paper, we propose a new birthmark technique for Android applications developed using Unity. The source codes of Unity-based Android applications use C# language, and since the core logic of the program is included in the DLL module, it must be approached in a different way from normal Android applications. In this paper, a Unity birthmark extraction and comparison system was implemented, and reliability and resilience were evaluated. The use of the Unity birthmark technique proposed in this paper is expected to be effective in preventing illegal copy or code theft of the Unity-based Android applications.