• Title/Summary/Keyword: Code extraction

Search Result 193, Processing Time 0.015 seconds

Implementation of the Container ISO Code Recognition System for Real-Time Processing (실시간 처리를 위한 컨테이너 ISO코드 인식시스템의 구현)

  • Choi Tae-Wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1478-1489
    • /
    • 2006
  • This paper describes system to extract ISO codes in container image. A container ISO code recognition system for real-time processing is made of 5 core parts which are container ISO code detection and image acquisition, ISO code region extraction, individual character extraction, character recognition and database. Among them, the accuracy of ISO code extraction can affect significantly the accuracy of system recognition rate, and also the more exact extraction of ISO code is required in various weather and environment conditions. The proposed system produces binary of the ISO code's template lesions using an adaptive thresholding, extracts candidate regions containing distribution of ISO code, and recognizes ISO codes as detecting a final region through the verifications by using character distribution characteristics of ISO code among the extracted candidates. Experimental results reveal that ISO codes can be efficiently extracted by the proposed method.

Application Consideration of Machine Learning Techniques in Satellite Systems

  • Jin-keun Hong
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.48-60
    • /
    • 2024
  • With the exponential growth of satellite data utilization, machine learning has become pivotal in enhancing innovation and cybersecurity in satellite systems. This paper investigates the role of machine learning techniques in identifying and mitigating vulnerabilities and code smells within satellite software. We explore satellite system architecture and survey applications like vulnerability analysis, source code refactoring, and security flaw detection, emphasizing feature extraction methodologies such as Abstract Syntax Trees (AST) and Control Flow Graphs (CFG). We present practical examples of feature extraction and training models using machine learning techniques like Random Forests, Support Vector Machines, and Gradient Boosting. Additionally, we review open-access satellite datasets and address prevalent code smells through systematic refactoring solutions. By integrating continuous code review and refactoring into satellite software development, this research aims to improve maintainability, scalability, and cybersecurity, providing novel insights for the advancement of satellite software development and security. The value of this paper lies in its focus on addressing the identification of vulnerabilities and resolution of code smells in satellite software. In terms of the authors' contributions, we detail methods for applying machine learning to identify potential vulnerabilities and code smells in satellite software. Furthermore, the study presents techniques for feature extraction and model training, utilizing Abstract Syntax Trees (AST) and Control Flow Graphs (CFG) to extract relevant features for machine learning training. Regarding the results, we discuss the analysis of vulnerabilities, the identification of code smells, maintenance, and security enhancement through practical examples. This underscores the significant improvement in the maintainability and scalability of satellite software through continuous code review and refactoring.

The Parallelism Extraction in Loops with Procedure Calls (프로시저 호출을 가진 루프에서 병렬성 추출)

  • 장유숙;박두순
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.3
    • /
    • pp.270-279
    • /
    • 2001
  • Since most program execution time is spent in the loop structure, extracting parallelism from sequential loop programs hale been focused. But, most programs hare implicit parallelism of interprocedure. This paper presents a generalized Parallelism extraction in loop\ulcorner with procedure calls. Most parallelization of loops with Procedure calls just focus on the uniform code which data dependency distance is constant. We presents algorithms which can be applied with uniform code, nonuniform code, and complex code. The proposed algorithm, loop extraction, loop embedding and procedure cloning transformation methods evaluate using CRAY-T3E. The result of performance evaluation is that proposed algorithm is an effect.

  • PDF

Korean Standard Classification of Functioning, Disability and Health (KCF) Code Linking on Natural Language with Extract Algorithm (자연어 알고리즘을 활용한 한국표준건강분류(KCF) 코드 검색)

  • Nyeon-Sik Choi;Ju-Min Song
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.18 no.1
    • /
    • pp.77-86
    • /
    • 2023
  • PURPOSE: This study developed an experimental algorithm, which is similar or identical to semantic linking for KCF codes, even if it converted existing semantic code linking methods to morphological code extraction methods. The purpose of this study was to verify the applicability of the system. METHODS: An experimental algorithm was developed as a morphological extraction method using code-specific words in the KCF code descriptions. The algorithm was designed in five stages that extracted KCF code using natural language paragraphs. For verification, 80 clinical natural language experimental cases were defined. Data acquisition for the study was conducted with the deliberation and approval of the bioethics committee of the relevant institution. Each case was linked by experts and was extracted through the System. The linking accuracy index model was used to compare the KCF code linking by experts with those extracted from the system. RESULTS: The accuracy was checked using the linking accuracy index model for each case. The analysis was divided into five sections using the accuracy range. The section with less than 25% was compared; the first experimental accuracy was 61.24%. In the second, the accuracy was 42.50%. The accuracy was improved to 30.59% in the section by only a weight adjustment. The accuracy can be improved by adjusting several independent variables applied to the system. CONCLUSION: This paper suggested and verified a way to easily extract and utilize KCF codes even if they are not experts. KCF requires the system for utilization, and additional study will be needed.

A Study on the Hand-written Number Recognition by HMM(Hidden Markov Model) (HMM을 이용한 수기숫자 인식에 관한 연구)

  • Cho Meen Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.121-125
    • /
    • 2004
  • In the most of recognizing systems of hand-written numbers. extraction of feature shape by using character elements shapes and a method of morphological analysis by using then extraction of feature shapes were usually used. In this paper, however, peculiar chain-code is used, and differential code which gets minimal value by differentiating the chain-code which is generated by the peculiar chain-code is made. We found this differential code is very successful in discriminating hand-written numbers according to the result of applying to most of the hand-written numbers. Testing recognition of hand-written numbers by HMM network. From the results, we can recognize of 96.1 percentage hand-written numbers but can not recognize extremely distorted hand-written numbers.

  • PDF

An XML-based Comment Management System for C Source Code (XML에 기반을 둔 C 원시 코드의 주석 관리 시스템)

  • Park, Geun-Ok;Lim, Jong-Tae
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.799-808
    • /
    • 2004
  • Well documented, simplified and clarified source code is required for the mission critical application software area in which C programing language is generally used. We suggest an XML_based comment management system for C source code. The comment management system is composed of 6 modules including comment user module, reviewer module, comment extraction module, comment traceability link module, comment tag definition module and storage management module. The XML comment tags defined in this paper cover categories of the development process activities applying the IEEE standard 1028 and IEEE standard 1012. The XML Schema Is used to insert comments into C source code and to extract XML tags from C source code and the XSL-FO is used fur the visual display professing o( comment extraction results.

Line Segments Extraction by using Chain Code Tracking of Edge Map from Aerial Images (항공영상으로부터 에지 맵의 체인코드 추적에 의한 선소추출)

  • Lee Kyu-won;Woo Dong-min
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.709-713
    • /
    • 2005
  • A new algorithm is proposed for the extraction of line segments to construct 3D wire-frame models of building from the high-resolution aerial images. The purpose of this study Is the accurate and effective extraction of line segments, considering the problems such as discordance of lines and blurred edges existing in the conventional methods. Using the edge map extracted from aerial images, chain code tracking of edges was performed. Then, we extract the line segments considering the strength of edges and the direction of them. SUSAN (Smallest Uni-value Segment Assimilating Nucleus) algorithm proposed by Smith was used to extract an edge map. The proposed algorithm consists of 4 steps: removal of the horizontal, vertical and diagonal components of edges to reduce non-candidate point of line segments based on the chain code tracking of the edge map, removal of contiguous points, removal of the same angle points, and the extraction of the start and end points to be line segments. By comparing the proposed algorithm with Boldt algorithm, better results were obtained regarding the extraction of the representative line segments of buildings, having relatively less extraction of unnecessary line segments.

Design and Implementation of Virtual Aquarium

  • Bak, Seon-Hui;Lee, Heeman
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.43-49
    • /
    • 2016
  • This paper presents the design and implementation of virtual aquarium by generating 3D models of fishes that are colored by viewers in an aim to create interaction among viewers and aquarium. The virtual aquarium system is composed of multiple texture extraction modules, a single interface module and a single display module. The texture extraction module recognize the QR code on the canvas to get information of the predefined mapping table and then extract the texture data for the corresponding 3D model. The scanned image is segmented and warp transformed onto the texture image by using the mapping information. The extracted texture is transferred to the interface module to save on the server computer and the interface module sends the fish code and texture information to the display module. The display module generates a fish on the virtual aquarium by using predefined 3D model with the transmitted texture. The fishes on the virtual aquarium have three different swimming methods: self-swimming, autonomous swimming, and leader-following swimming. The three different swimming methods are discussed in this paper. The future study will be the implementation of virtual aquarium based on storytelling to further increase interactions with the viewer.

Automatic Extraction of Abstract Components for supporting Model-driven Development of Components (모델기반 컴포넌트 개발방법론의 지원을 위한 추상컴포넌트 자동 추출기법)

  • Yun, Sang Kwon;Park, Min Gyu;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.8
    • /
    • pp.543-554
    • /
    • 2013
  • Model-Driven Development(MDD) helps developers verify requirements and design issues of a software system in the early stage of development process by taking advantage of a software model which is the most highly abstracted form of a software system. In practice, however, many software systems have been developed through a code-centric method that builds a software system bottom-up rather than top-down. So, without support of appropriate tools, it is not easy to introduce MDD to real development process. Although there are many researches about extracting a model from code to help developers introduce MDD to code-centrically developed system, most of them only extracted base-level models. However, using concept of abstract component one can continuously extract higher level model from base-level model. In this paper we propose a practical method for automatic extraction of base level abstract component from source code, which is the first stage of continuous extraction process of abstract component, and validate the method by implementing an extraction tool based on the method. Target code chosen is the source code of TinyOS, an operating system for wireless sensor networks. The tool is applied to the source code of TinyOS, written in nesC language.

Design and Implementation of a Data Extraction Tool for Analyzing Software Changes

  • Lee, Yong-Hyeon;Kim, Kisub;Lee, Jaekwon;Jung, Woosung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.8
    • /
    • pp.65-75
    • /
    • 2016
  • In this paper, we present a novel approach to help MSR researchers obtain necessary data with a tool, termed General Purpose Extractor for Source code (GPES). GPES has a single function extracts high-quality data, e.g., the version history, abstract syntax tree (AST), changed code diff, and software quality metrics. Moreover, features such as an AST of other languages or new software metrics can be extended easily given that GPES has a flexible data model and a component-based design. We conducted several case studies to evaluate the usefulness and effectiveness of our tool. Case studies show that researchers can reduce the overall cost of data analysis by transforming the data into the required formats.