• Title/Summary/Keyword: CONTAIN Code

Search Result 87, Processing Time 0.022 seconds

The Study on the Medical Image Compression using the Characteristics of Human Visual System (인간 시각 장치의 특성을 이용한 의학 영상 압축에 관한 연구)

  • Chee, Young-Joon;Park, Kwang-Seok
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1993 no.05
    • /
    • pp.38-41
    • /
    • 1993
  • For efficient transmission and storage of digital images, the requirements of image compression is incresing. Because the medical images contain diagnostic information small distortion has been more important factor than the low rate in such images. Generally the distortion in image is the difference of pixel values. However the image is percieved by human visual systems. So it is reasonable that human visual system characteristics be used as criteria of the image compression. In this paper, the Just Noticeable Difference curve is used as criteria of determining the homogeniety of a block and acceptibility of distortions. And Block Truncation Coding using spatial masking effect of eyes is adopted to code the blocks which contain line components. And small blocks which varies slowly can be approximated to polynomial functions successfully. We proposed the hybrid block coding scheme based on the block characteristics and human visual system characteristics. Simulation to several kinds of the medical images using this method showed that medical images can be compressed 5:1 - 10:1 without noticeable distortion.

  • PDF

Depth Image based Chinese Learning Machine System Using Adjusted Chain Code (깊이 영상 기반 적응적 체인 코드를 이용한 한자 학습 시스템)

  • Kim, Kisang;Choi, Hyung-Il
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.545-554
    • /
    • 2014
  • In this paper, we propose online Chinese character learning machine with a depth camera, where a system presents a Chinese character on a screen and a user is supposed to draw the presented Chinese character by his or her hand gesture. We develop the hand tracking method and suggest the adjusted chain code to represent constituent strokes of a Chinese character. For hand tracking, a fingertip is detected and verified. The adjusted chain code is designed to contain the information on order and relative length of each constituent stroke as well as the information on the directional variation of sample points. Such information is very efficient for a real-time match process and checking incorrectly drawn parts of a stroke.

Accuracy of Ultrasonic Flaw Sizing using DAC Techniques for Pressure Vessels Welds of Nuclear Power Plant (초음파 DAC 기법을 이용한 압력용기 용접부의 지시 크기측정 정확도 평가)

  • Kim, Jae Dong;Lim, Hyung Taik;Doh, Eui Soon
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.11 no.2
    • /
    • pp.20-24
    • /
    • 2015
  • During refueling Outage, In-service inspections(ISIs) for the Nuclear Power Plant components are mandatory requirement in accordance with ASME Code Sec. XI. Especially, in current ultrasonic testing is one of the most important NDT techniques that are used for volumetric examination methods for nuclear power plant components, and accurate sizing of flaw indication by UT is essential to assure the integrity of the components. However, ASME code specifies minimum requirement for vessel examination procedure, and so far many different flaw sizing approaches have been tried to apply. Through the Round Robin Test(RRT), the accuracy of ultrasonic flaw sizing using DAC techniques was measured with the mock-ups simulating typical pressure vessel welds. These mock-ups contain artificially introduced flaws of known size and location. This paper shows experimental comparison data on the accuracy of techniques using such as 6dB drop, 50%DAC, 20%DAC and 20%DAC with beam spread correction, and also shows that diverse DAC techniques can be effectively applied to the assessment of the flaw sizing for pressure vessel welds in the stage of welding and fabrication.

Correction of the holotype citations of three vascular plants at the herbarium of the National Institute of Biological Resources, Korea

  • Jang, Hyun-Do;Oh, Hyun-Kyung;Hyun, Chang-Woo;Nam, Gi-Heum
    • Journal of Species Research
    • /
    • v.9 no.3
    • /
    • pp.218-220
    • /
    • 2020
  • A holotype is an element to which the name of a taxon is permanently attached and is key material that facilitates taxonomic research. However, type citation or designation errors due to typographical errors or inadvertent mistakes often exist. When reviewing recently published literature for the type specimens of vascular plants in the herbarium of the National Institute of Biological Resources, we observed that three species, Isoetes laosiensis, Isoetes coreana, and Huperzia jejuensis, had errors, and the actual holotype information and the type descriptions of the protologues did not match. The name Isoetes laosiensis had a collecting number error, while Isoetes coreana and Huperzia jejuensis had collector errors. According to Article 9.2 of the International Code of Nomenclature for algae, fungi, and plants (Shenzhen code), if a holotype designation in the protologue of the name of a taxon is found to contain errors such as collector, collecting number, and illustration errors, the errors are to be corrected. We, therefore, corrected the errors in holotypes of three species, with no alterations made to the intents of the original authors.

Statistical Analysis of Supersonic Downflows in Sunspot Penumbrae

  • Kim, Hyunnam;Solanki, Sami K.;Lagg, Andreas;Kim, Kap-Sung
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.39 no.1
    • /
    • pp.75.1-75.1
    • /
    • 2014
  • Sunspot penumbrae show supersonic downflow patches along the periphery. These patches are believed to be the return channels of the Evershed flow. There was previous study to investigate their structure in detail using Hinode SOT/SP observations (M. van Noort et al. 2013) but their data sample was only two sunspots. To make general description it needs to check more sunspot sample. We selected 242 downflow patches of 17 sunspots using Hinode SOT/SP observations from 2006 to 2012. Height-dependent maps of atmospheric parameters of these downflows was produced by using HeLix which was height dependent LTE inversion code of Stokes profiles. The inversion code at high resolution allows for the accurate determination of small scale structures. The recovered atmospheric structure of three layers indicates that regions with very high downflow velocities contain very strong magnetic fields reaching up to 7kG. The higher downflow velocity patches have bigger patch size. Magnetic fields of downflow patches are more vertical while penumbra shows horizontal field and neighbor of downflow patches have opposite polarity. Temperature of downflow patches at highest layer have more strong value than penumbra at deepest layer. The direction of velocity of downflow patches at highest layer have two branches. These result shows that we can expect some heating precess in the middle of layer.

  • PDF

Centralized Educational Certificate Authentication System Using QR Cod Tag (QR코드를 이용한 통합 교육 자격 입증 시스템)

  • Abdurhman, Hamdi;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.271-274
    • /
    • 2017
  • An educational institution issued a degree certificate to those students who have successfully completed all studies included in different levels of the degree program. The degree certificate presented by the University is of major significance in the person's life but the fabrication and circulation of fake certificates is inexpensive because a paper document can easily be forged with the availability of advance printing and copying technologies. So, there is a need to adopt a centralized authentication process that can verify and ensure the authenticity of a document. In order to prevent the spread of fake degree certificates a method is proposed where the integrity of the contents with in the certificate can be verified with the use of and Smart Phone Application. A Quick Response (QR) Code will contain a digital signature over the data such as degree holder's name, major program, Grade Point Average (GPA) obtained etc. Which will be signed by university authorities after the registration in central system and deployed in university. In order to verify the digital signature a person need to use a specific smart phone application which will scan and authenticate the certificate without gaining access to a user's security credentials such as password.

  • PDF

A Study on the IDL Compiler using the Marshal Buffer Management

  • Kim, Dong-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.843-847
    • /
    • 2005
  • The development of distributed application in the standardized CORBA(Common Object Request Broker Architecture) environments reduces the developing time and maintaining cost of the systems. Because of these advantages, the development of application is being progressed in the several fields using the CORBA environments. The programmers in the CORBA environments usually develop the application programs using the CORBA IDL(Interface Definition Language). The IDL files are compiled by IDL compiler and translated into the stubs and skeleton codes which are mapped onto particular target language. The stubs produced by IDL compilers processes the marshaling a data into message buffer. Before a stub can marshal a data into its message buffer, the stub must ensure that the buffer has at least enough free space to contain the encoded representation of the data. But, the stubs produced by typical IDL compilers check the amount of free buffer space before every atomic data is marshaled, and if necessary, expand the message buffer. These repeated tests are wasteful and incidence of overheads, especially if the marshal buffer space must be continually expanded. Thus, the performance of the application program may be poor. In this paper, we suggest the way that the stub code is maintain the enough free space before marshaling the data into message buffer. This methods were analyzes the overall storage requirements of every message that will be exchanged between client and server. For these analysis, in the Front End of compiler has maintain the information that the storage requirements and alignment constraints for data types. Thus, stub code is optimized and the performance of application program is increased.

  • PDF

Report on 'Bifidus' yogurt products in the Korean domestic market reflecting its regulated counting of Bifidobacteria according to revised Food Code 2015 (2015년 개정된 식품공전에 따른 국내 시장에서 'Bifidus' 요구르트 제품에 대한 비피더스균수 조사)

  • Cho, Yong Soo;Chun, Su-Hyun;Lee, Kwang-Won
    • Food Science and Industry
    • /
    • v.51 no.1
    • /
    • pp.72-80
    • /
    • 2018
  • Yogurt, which has long been consumed as a longevity food, is characterized by a large number of lactic acid bacteria. The sales of yogurt market have increased for the past three years due to research findings that the intestinal microbial environment is closely associated with many human diseases and the well-being trend of recent consumers. The recent trends in the yogurt market have focused to low sugar content, functionalities such as enhanced immunity, and yogurt for freezing. In addition, recent yogurt products tend to be labeled for certain lactic acid bacteria having functionality in their products. Many yogurts have names of specific lactic acid bacteria on their products, such as 'Activia' and 'Bifidus'. We monitored the 'Bifidus' products in the market for reflecting its regulated counting in their products required to contain more than 10 million Bifidobacteria according to the revised lactic acid bacteria-counting test of Food Code 2015.

A Hybrid Multiuser Detection Algorithm for Outer Space DS-UWB Ad-hoc Network with Strong Narrowband Interference

  • Yin, Zhendong;Kuang, Yunsheng;Sun, Hongjian;Wu, Zhilu;Tang, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.5
    • /
    • pp.1316-1332
    • /
    • 2012
  • Formation flying is an important technology that enables high cost-effective organization of outer space aircrafts. The ad-hoc wireless network based on direct-sequence ultra-wideband (DS-UWB) techniques is seen as an effective means of establishing wireless communication links between aircrafts. In this paper, based on the theory of matched filter and error bits correction, a hybrid detection algorithm is proposed for realizing multiuser detection (MUD) when the DS-UWB technique is used in the ad-hoc wireless network. The matched filter is used to generate a candidate code set which may contain several error bits. The error bits are then recognized and corrected by an novel error-bit corrector, which consists of two steps: code mapping and clustering. In the former step, based on the modified optimum MUD decision function, a novel mapping function is presented that maps the output candidate codes into a feature space for differentiating the right and wrong codes. In the latter step, the codes are clustered into the right and wrong sets by using the K-means clustering approach. Additionally, in order to prevent some right codes being wrongly classified, a sign judgment method is proposed that reduces the bit error rate (BER) of the system. Compared with the traditional detection approaches, e.g., matched filter, minimum mean square error (MMSE) and decorrelation receiver (DEC), the proposed algorithm can considerably improve the BER performance of the system because of its high probability of recognizing wrong codes. Simulation results show that the proposed algorithm can almost achieve the BER performance of the optimum MUD (OMD). Furthermore, compared with OMD, the proposed algorithm has lower computational complexity, and its BER performance is less sensitive to the number of users.

Development and evaluation of punching shear database for flat slab-column connections without shear reinforcement

  • Derogar, Shahram;Ince, Ceren;Mandal, Parthasarathi
    • Structural Engineering and Mechanics
    • /
    • v.66 no.2
    • /
    • pp.203-215
    • /
    • 2018
  • A large body of experiments have been conducted to date to evaluate the punching shear strength of flat slab-column connections, but it is noted that only a few of them have been considered for the development of the ACI Code provisions. The limited test results used for the development of the code provisions fall short of predicting accurately the punching shear strength of such connections. In an effort to address this shortfall and to gain an insight into the factors that control the punching shear strength of flat slab-column connections, we report a qualified database of 650 punching shear test results in this article. All slabs examined in this database were tested under gravity loading and do not contain shear reinforcement. In order to justify including any test result for evaluation punching shear database, we have developed an approved set of criteria. Carefully established set of criteria represent the actual characteristics of structures that include minimum compressive strength, effective depths of slab, flexural and compression reinforcement ratio and column size. The key parameters that significantly affect the punching shear strength of flat slab-column connections are then examined using ACI 318-14 expression. The results reported here have paramount significance on the range of applicability of the ACI Code provision and seem to indicate that the ACI provisions do not sufficiently capture many trends identified through regression of the principal parameters, and fall on the unsafe side for the prediction of the punching shear strength of flat slab-column connections.