• Title/Summary/Keyword: Code extraction

Search Result 193, Processing Time 0.03 seconds

Numerical study on the flow characteristics of horizontal tube bundle (Tube-bundle형 열교환기의 액막 유동에 관한 시뮬레이션)

  • Kim, Pil-Hwan;Choi, Du-Youl;Woo, Ju-Sik;Jeong, Hyo-Min;Chung, Han-Shik;Kim, Kyeong-Seok
    • Proceedings of the SAREK Conference
    • /
    • 2009.06a
    • /
    • pp.1256-1261
    • /
    • 2009
  • Seawater amounts to 70% of the earth and represents a quite unlimited resource for the production of fresh water by desalination processes and for the extraction of dissolved salts present in it. Recently, the falling film evaporation has increased in interest as an efficient method for seawater desalination system. In the desalination system, the flow characteristics of the falling film is very important issue to make highly efficient system. So, this study is taken to investigate numerically the falling film thickness on the inlet Renold Number ranges are 400 to 700. Numerical simulations are performed using FLUENT6.3.26, a commercial CFD code.

  • PDF

A Feature Extraction Method in Iris Image for Biometrics (생체인식을 위한 홍채영상의 특징 추출)

  • Kim Sin-Hong;Cho Yong-Hwan;Kim Tae-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.59-64
    • /
    • 2005
  • The biometrics of iris is a very accurate authentication method. The biometrics of iris can recognize and identify a person for shortly. But the image of iris is changed by transformation of body in the life. The existing iris authentication system has problem that can be mis-recognized. In this paper, we proposed and implemented Renewable Iris Authentication Algorithm(RIAA) for biometrics in authentication system. This algorithm tries to present a new way to people identification, we show contour line when shift take photograph in regular side. Namely, it generate iris code based on boundary of projection or submergence side and compared to original, so that it describes iris identification method to people identification.

  • PDF

Development of ISI UT Auto Flaw Evaluation and Acceptance Module of Nuclear Power Plants (원전 ISI UT 자동 결함평가 및 판정 모듈 개발)

  • Park, Ik-Keun;Park, Un-Su;Kim, Hyun-Mook;Kim, Chung-Seok;Um, Byong-Guk;Lee, Jong-Po
    • Proceedings of the KSME Conference
    • /
    • 2000.11a
    • /
    • pp.212-218
    • /
    • 2000
  • The importance and role of pre-/in-service inspection(PSI/ISI) for nuclear power plant(NPP) components are intimately related to plant design, safety, reliability, operation, etc. In this paper, for an effective and efficient management of large amounts of PSI/ISI data in NPPs, an intelligent database program(WS-IDPIN) for PSI/ISI data management of NPP was developed. WS-IDPIN program enables the prompt extraction of previously conducted PSI/ISI conditions and results so that the time-consuming data management, painstaking data processing and analysis in the past are avoided. Furthermore, development of ISI UT auto flaw evaluation and acceptance module based on ASME Code Sec. XI were presented. This module can be used for any angle beam examination from flat plate to spherical shapes as selected by the proper azimuthal angle. This program can be further developed as a unique PSI/ISI data management expert system.

  • PDF

Performance analysis of Savonius Rotor for Wave Energy Conversion using CFD

  • Zullah, Mohammed Aisd;Choi, Young-Do;Kim, Kyu-Han;Lee, Young-Ho
    • 한국신재생에너지학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.600-605
    • /
    • 2009
  • A general purpose viscous flow solver Ansys CFX is used to study a Savonius type wave energy converter in a 3D numerical viscous wave tank. This paper presents the results of a computational fluid dynamics (CFD) analysis of the effect of blade configuration on the performance of 3 bladed Savonius rotors for wave energy extraction. A piston-type wave generator was incorporated in the computational domain to generate the desired incident waves. A complete OWC system with a 3-bladed Savonius rotor was modeled in a three dimensional numerical wave tank and the hydrodynamic conversion efficiency was estimated. The flow over the rotors is assumed to be two-dimensional (2D), viscous, turbulent and unsteady. The CFX code is used with a solver of the coupled conservation equations of mass, momentum and energy, with an implicit time scheme and with the adoption of the hexahedral mesh and the moving mesh techniques in areas of moving surfaces. Turbulence is modeled with the k.e model. Simulations were carried out simultaneously for the rotor angle and the helical twist. The results indicate that the developed models are suitable to analyze the water flows both in the chamber and in the turbine. For the turbine, the numerical results of torque were compared for all the cases.

  • PDF

Content-based Retrieval System using Image Shape Features (영상 형태 특징을 이용한 내용 기반 검색 시스템)

  • 황병곤;정성호;이상열
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.6 no.1
    • /
    • pp.33-38
    • /
    • 2001
  • In this paper, we present an image retrieval system using shape features. The preprocessing to gain shape feature includes edge extraction using chain code. The shape features consist of center of mass, standard deviation, ratio of major axis and minor axis length. The similarity is estimated as comparing the features of query image with the features of images in database. Thus, the candidates of images are retrieved according to the order of similarity. The result of an experimentation is dullness for scale, rotation and translation. We evaluate the performance of shape features for image retrieval on a database with over 170 images. The Recall and the Precision is each 0.72 and 0.83 in the result of average experiment. So the proposed method is presented useful method.

  • PDF

Finger Vein Recognition Using Generalized Local Line Binary Pattern

  • Lu, Yu;Yoon, Sook;Xie, Shan Juan;Yang, Jucheng;Wang, Zhihui;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1766-1784
    • /
    • 2014
  • Finger vein images contain rich oriented features. Local line binary pattern (LLBP) is a good oriented feature representation method extended from local binary pattern (LBP), but it is limited in that it can only extract horizontal and vertical line patterns, so effective information in an image may not be exploited and fully utilized. In this paper, an orientation-selectable LLBP method, called generalized local line binary pattern (GLLBP), is proposed for finger vein recognition. GLLBP extends LLBP for line pattern extraction into any orientation. To effectually improve the matching accuracy, the soft power metric is employed to calculate the matching score. Furthermore, to fully utilize the oriented features in an image, the matching scores from the line patterns with the best discriminative ability are fused using the Hamacher rule to achieve the final matching score for the last recognition. Experimental results on our database, MMCBNU_6000, show that the proposed method performs much better than state-of-the-art algorithms that use the oriented features and local features, such as LBP, LLBP, Gabor filter, steerable filter and local direction code (LDC).

An Evaluation of Applying Knowledge Base to Academic Information Service

  • Lee, Seok-Hyoung;Kim, Hwan-Min;Choe, Ho-Seop
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.1
    • /
    • pp.81-95
    • /
    • 2013
  • Through a series of precise text handling processes, including automatic extraction of information from documents with knowledge from various fields, recognition of entity names, detection of core topics, analysis of the relations between the extracted information and topics, and automatic inference of new knowledge, the most efficient knowledge base of the relevant field is created, and plans to apply these to the information knowledge management and service are the core requirements necessary for intellectualization of information. In this paper, the knowledge base, which is a necessary core resource and comprehensive technology for intellectualization of science and technology information, is described and the usability of academic information services using it is evaluated. The knowledge base proposed in this article is an amalgamation of information expression and knowledge storage, composed of identifying code systems from terms to documents, by integrating terminologies, word intelligent networks, topic networks, classification systems, and authority data.

Implementation of HMM-Based Speech Recognizer Using TMS320C6711 DSP

  • Bae Hyojoon;Jung Sungyun;Son Jongmok;Kwon Hongseok;Kim Siho;Bae Keunsung
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.391-394
    • /
    • 2004
  • This paper focuses on the DSP implementation of an HMM-based speech recognizer that can handle several hundred words of vocabulary size as well as speaker independency. First, we develop an HMM-based speech recognition system on the PC that operates on the frame basis with parallel processing of feature extraction and Viterbi decoding to make the processing delay as small as possible. Many techniques such as linear discriminant analysis, state-based Gaussian selection, and phonetic tied mixture model are employed for reduction of computational burden and memory size. The system is then properly optimized and compiled on the TMS320C6711 DSP for real-time operation. The implemented system uses 486kbytes of memory for data and acoustic models, and 24.5kbytes for program code. Maximum required time of 29.2ms for processing a frame of 32ms of speech validates real-time operation of the implemented system.

  • PDF

Threats according to the Type of Software Updates and White-List Construction Scheme for Advanced Security (소프트웨어 업데이트 유형별 위협요소와 안전성 강화를 위한 화이트리스트 구성 방안)

  • Lee, Daesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1369-1374
    • /
    • 2014
  • In case of APT attacks, the update server is being used as a means of dissemination, the update program is running malicious code or data in applications such as anti-virus signature is vulnerable to manipulation, SW Update threat identification and prevention measures are urgently required. This paper presents a natiional and international SW update structure, update process exploits and response measures to examine, Through the extraction/analysis of a domestic famous SW update log, we are willing to select the necessary component of the normal program update to identify a white list.

A Study on the Verbal Image of Interior Decoration Trend from the Year 2000 (2000년 이후 인테리어 데코레이션 트랜드의 언어심상에 관한 연구)

  • Kim, Joo-Yun;Han, Hyo-Jung;Lee, Hye-Kyung
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.6 s.59
    • /
    • pp.238-246
    • /
    • 2006
  • Recent trends of interior design have a focus on creation of more various meanings rather than past ideology which sought after the compatibility to the function of modem design. These trends requires integral understanding of social and cultural ideologies with a sens of values for a certain periods. In addition, they also require creativity which able to read, find and solve consumer's diverse demand and desire. Considering the effort of trend forecasting in Korea is still heavily rely on the foreign trend shows, it is natural to attempt to study the analytical forecasting methodology based upon more systematic principles which lead to more objective outcome, when the understanding, forcasting and analysis of interior decoration trend are required. In this thesis, the analysis and forecasting of interior decoration trend are studied by means of verbal image code process which involves the induction of design concept through data extraction, classification and analysis, in order to understanding and satisfying the diversified consumer's demand and trend. The coding process of verbal image is understanding as general concept. by extracting common elements from abstract and individual image, and/or specific concept. Therefore, it is proposed that the database building and data mining process of verbal Image, and subsequent development of programming skill can be applied as more efficient tool for various verbal image process.