• Title/Summary/Keyword: Pattern file

Search Result 155, Processing Time 0.029 seconds

A Vertex-Detecting of Hanguel Patterns Using Nested Contour Shape (중첩윤곽 형상에 의한 한글패턴의 정점검출)

  • Koh, Chan;Lee, Dai-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.112-123
    • /
    • 1990
  • This paper presents a vertex-detecting of Hanguel patterns using nested contour shape. Inputed binary character patterns are transformed by distance transformation method and make a new file of transferred data by analysis of charactersitcs. A new vertex-detecting algorithm for recognizing Hanguel patterns using the two data files is proposed. This algorithm is able to reduce the projecting parts of Hanguel pattern, separate the connecting parts between different strokes, set the code number by transformed value of coorked features. It makes the output of results in order to apply the Hanguel recognition.

  • PDF

Directly Nano-precision Feature Patterning on Thin Metal Layer using Top-down Building Approach in nRP Process (나노 복화공정의 역방향 적층법을 이용한 직접적 나노패턴 생성에 관한 연구)

  • 박상후;임태우;양동열;공홍진
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.21 no.6
    • /
    • pp.153-159
    • /
    • 2004
  • In this study, a new process to pattern directly on a thin metal layer using improved nano replication printing (nRP) process is suggested to evaluate the possibilities of fabricating a stamp for nano-imprinting. In the nRP process, any figure can be replicated from a bitmap figure file in the range of several micrometers with nano-scaled details. In the process, liquid-state resins are polymerized by two-photon absorption which is induced by femto-second laser. A thin gold layer was sputtered on a glass plate and then, designed patterns or figures were developed on the gold layer by newly developed top-down building approach. Generally, stamps fur nano-imprinting have been fabricated by using the costly electron-beam lithography process combined with a reactive ion-etching process. Through this study, the effectiveness of the improved nRP process is evaluated to make a stamp with the resolution of around 200nm with reduced cost.

Application and Research of Monte Carlo Sampling Algorithm in Music Generation

  • MIN, Jun;WANG, Lei;PANG, Junwei;HAN, Huihui;Li, Dongyang;ZHANG, Maoqing;HUANG, Yantai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3355-3372
    • /
    • 2022
  • Composing music is an inspired yet challenging task, in that the process involves many considerations such as assigning pitches, determining rhythm, and arranging accompaniment. Algorithmic composition aims to develop algorithms for music composition. Recently, algorithmic composition using artificial intelligence technologies received considerable attention. In particular, computational intelligence is widely used and achieves promising results in the creation of music. This paper attempts to provide a survey on the music generation based on the Monte Carlo (MC) algorithm. First, transform the MIDI music format files to digital data. Among these data, use the logistic fitting method to fit the time series, obtain the time distribution regular pattern. Except for time series, the converted data also includes duration, pitch, and velocity. Second, using MC simulation to deal with them summed up their distribution law respectively. The two main control parameters are the value of discrete sampling and standard deviation. Processing the above parameters and converting the data to MIDI file, then compared with the output generated by LSTM neural network, evaluate the music comprehensively.

Effects of Mo Content on Surface Characteristics of Dental Ni-Ti Alloys (치과용 Ni-Ti합금의 표면특성에 미치는 Mo함량의 영향)

  • Han-Cheol Choe;Jae-Un Kim;Sun-Kyun ark
    • Corrosion Science and Technology
    • /
    • v.22 no.1
    • /
    • pp.64-72
    • /
    • 2023
  • Ni-Ti shape memory alloy for dental nerve treatment devices was prepared by adding Mo to Ni-Ti alloy to improve flexibility and fatigue fracture characteristics and simultaneously increase corrosion resistance. Surface properties of the alloy were evaluated. Microstructure analysis of the Ni-Ti-xMo alloy revealed that the amount of needle-like structure increased with increasing Mo content. The shape of the precipitate showed a pattern in which a long needle-like structure gradually disappeared and changed into a small spherical shape. As a result of XRD analysis of the Ni-Ti-xMo alloy, R-phase structure appeared as Mo was added. R-phase and B2 structure were mainly observed. As a result of DSC analysis, phase transformation of the Ti-Ni-Mo alloy showed a two-step phase change of B2-R-B19' transformation with two exothermic peaks and one endothermic peak. As Mo content increased, R-phase formation temperature gradually decreased. As a result of measuring surface hardness of the Ti-Ni-Mo alloy, change in hardness value due to the phase change tended to decrease with increasing Mo content. As a result of the corrosion test, the corrosion potential and pitting potential increased while the current density tended to decrease with increasing Mo content.

Development of Radar Beam Steering Measurement System and measurement Boresight Error (레이다 빔조향 특성 측정 장치 개발 및 보어 사이트 에러 측정)

  • Yong-kil Kwak
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.546-551
    • /
    • 2023
  • In this study, a beam steering measurement system was developed to perform functions such as far-field beam steering and near-field beam focusing for TX/RX modes in the near file of the AESA radar. The beam steering measurement system consists of a spherical near-field scanner, an antenna positioner, a near-field controller, a network analyzer, a radar control system, a verification radar, a simulated radio, and an AESA radar. Using the developed system, the characteristics of TX/RX patterns before and after installation of radome to AESA radar were measured, and the beam pattern was analyzed through conversion to far field-after near-field measurement.The boresight error of the radar antenna device was measured, and it was confirmed that the main lobes were formed the same before and after the simulated radar dome was mounted.

One Hundred Scopus Citations to a Non-Scopus Indexed Article: A Case Study

  • Bakthavachalam Elango
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.4
    • /
    • pp.82-91
    • /
    • 2023
  • Receiving 100 citations from indexed journals is not a common occurrence, although it does happen very rarely, and it is even more uncommon for a non-indexed article. Given this, the purpose of this present study is to perform a bibliometric analysis of 100 cited Scopus articles to a non-Scopus indexed article, using a case study of the article titled "Authorship trends and collaboration pattern in the marine sciences literature: A scientometric study" which was published by Elango and Rajendran in the International Journal of Information Dissemination and Technology in 2012. On October 15, 2022, the Scopus database was searched with the article title in the references field, and the resulting bibliographic data was exported as a comma-separated values file. The tools utilized for this analysis were ScientoPy, the Bibliometrix R Package, and VOSviewer. Based on the findings, most of the cited articles were published within the last three years, and international researchers have given more recognition compared to Indian researchers. The most popular topics were found to be bibliometrics, bibliometric analysis, and bibliometrix. The fact that all 100 cited articles were published across various subject disciplines used by Scopus to categorise sources demonstrates how well-established the citing article is within the scientific community.

Digital Camera Identification Based on Interpolation Pattern Used Lens Distortion Correction (디지털 카메라의 렌즈 왜곡 보정에 사용된 보간 패턴 추출을 통한 카메라 식별 방법)

  • Hwang, Min-Gu;Kim, Dong-Min;Har, Dong-Hwan
    • Journal of Internet Computing and Services
    • /
    • v.13 no.3
    • /
    • pp.49-59
    • /
    • 2012
  • Throughout developing digital technology, reproduction of image is growing better day by day. And at the same time, diverse image editing softwares are developed to manage images easily. In the process of editing images, those programs could delete or modify EXIF files which have the original image information; therefore images without the origin source are widely spread on the web site after editing. This matter could affect analysis of images due to the distortion of originality. Especially in the court of law, the source of evidence should be expressed clearly; therefore digital image EXIF file without deletion or distortion could not be the objective evidence. In this research, we try to trace the identification of a digital camera in order to solve digital images originality, and also we focus on lens distortion correction algorism which is used in digital image processing. Lens distortion correction uses mapping algorism, and at this moment it also uses interpolation algorism to prevent aliasing artifact and reconstruction artifact. At this point interpolation shows the similar mapping pattern; therefore we want to find out the interpolation evidence. We propose a minimum filter algorism in order to detect interpolation pattern and adjust the same minimum filter coefficient in two areas; one has interpolation and the second has no interpolation. Throughout DFT, we confirm frequency character between each area. Based on this result, we make the final detection map by using differences between two areas. In other words, thereby the area which has the interpolation caused by mapping is adjusted using minimum filter for detection algorism; the second area which has no interpolation tends to different frequency character.

A Dynamic Recommendation System Using User Log Analysis and Document Similarity in Clusters (사용자 로그 분석과 클러스터 내의 문서 유사도를 이용한 동적 추천 시스템)

  • 김진수;김태용;최준혁;임기욱;이정현
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.5
    • /
    • pp.586-594
    • /
    • 2004
  • Because web documents become creation and disappearance rapidly, users require the recommend system that offers users to browse the web document conveniently and correctly. One largely untapped source of knowledge about large data collections is contained in the cumulative experiences of individuals finding useful information in the collection. Recommendation systems attempt to extract such useful information by capturing and mining one or more measures of the usefulness of the data. The existing Information Filtering system has the shortcoming that it must have user's profile. And Collaborative Filtering system has the shortcoming that users have to rate each web document first and in high-quantity, low-quality environments, users may cover only a tiny percentage of documents available. And dynamic recommendation system using the user browsing pattern also provides users with unrelated web documents. This paper classifies these web documents using the similarity between the web documents under the web document type and extracts the user browsing sequential pattern DB using the users' session information based on the web server log file. When user approaches the web document, the proposed Dynamic recommendation system recommends Top N-associated web documents set that has high similarity between current web document and other web documents and recommends set that has sequential specificity using the extracted informations and users' session information.

The Automation Model of Ransomware Analysis and Detection Pattern (랜섬웨어 분석 및 탐지패턴 자동화 모델에 관한 연구)

  • Lee, Hoo-Ki;Seong, Jong-Hyuk;Kim, Yu-Cheon;Kim, Jong-Bae;Gim, Gwang-Yong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1581-1588
    • /
    • 2017
  • Recently, circulating ransomware is becoming intelligent and sophisticated through a spreading new viruses and variants, targeted spreading using social engineering attack, malvertising that circulate a large quantity of ransomware by hacking advertising server, or RaaS(Ransomware-as-a- Service), from the existing attack way that encrypt the files and demand money. In particular, it makes it difficult to track down attackers by bypassing security solutions, disabling parameter checking via file encryption, and attacking target-based ransomware with APT(Advanced Persistent Threat) attacks. For remove the threat of ransomware, various detection techniques are developed, but, it is very hard to respond to new and varietal ransomware. Accordingly, in this paper, find out a making Signature-based Detection Patterns and problems, and present a pattern automation model of ransomware detecting for responding to ransomware more actively. This study is expected to be applicable to various forms in enterprise or public security control center.

Design and Analysis of Data File Protection based on the Stream Cipher (데이터파일의 보호를 위한 스트림 암호방식 설계와 해석)

  • 이경원;이중한;김정호;오창석
    • The Journal of the Korea Contents Association
    • /
    • v.4 no.1
    • /
    • pp.55-66
    • /
    • 2004
  • Recently, as the personal computers are supplied rapidly, they formed the nucleus of the computer system. But, because of the easiness that anyone uses them to go near easily, it is the fact that the security of personal computer is weakness. So, in the paper, 1 propose the technical method that minimizes the loss and leakage of important data. This paper implemented a crypto system for security of data file on personal computer and assistance storage medium. The way of encryption/decryption is applied by complexity method which mixed Diffie-Hellman key exchange protocol, a typical RC4(Rivest Cipher version 4) algorithm of stream cipher and a typical MD5(Message Digest version 5) of Hash Function. For valuation implemented crypto system, three criteria is presented, which are crypto complexity, processing time and pattern matching. And according to analysis the three criteria the crypto system is verified the security, efficiency and usefulness. The crypto system is programmed with Visual C++ language of Microsoft. And so, as this is software system, we shall have a technical security system at a minimum cost for all personal computer.

  • PDF