• Title/Summary/Keyword: Process map

Search Result 1,759, Processing Time 0.032 seconds

A Roll-Bite Profile Map Approach for the Prediction of Front End Bending in Plate Rolling (후판 압연공정에서 선단부 굽힘 예측을 위한 롤 바이트 형상맵 기법에 관한 연구)

  • Byon, S.M.;Lee, J.H.;Kim, S.R.
    • Transactions of Materials Processing
    • /
    • v.20 no.4
    • /
    • pp.284-290
    • /
    • 2011
  • The front end bending(FEB) behavior of material that usually occurs in plate rolling is investigated. In this paper, a rollbite profile map approach that systematically predicts the FEB slope is presented. It is based on the concurrent use of shape factors and reduction ratios to ensure an accurate value of the FEB and its slope. In order to obtain the unit roll-bite profile map, the FEB slope model was decomposed into a temperature deviation component and a roll-velocity deviation component. By mapping the results of a series of finite element analyses to the unit functions of the roll-bite profile map, it was possible to obtain a realistic prediction of the FEB slope applicable to an actual plate rolling process. Thereby, the usefulness of the present approach is clearly demonstrated.

Depth Map Generation Algorithm from Single Defocused Image (흐린 초점의 단일영상에서 깊이맵 생성 알고리즘)

  • Lee, Yong-Hwan;Kim, Youngseop
    • Journal of the Semiconductor & Display Technology
    • /
    • v.15 no.3
    • /
    • pp.67-71
    • /
    • 2016
  • This paper addresses a problem of defocus map recovery from single image. We describe a simple effective approach to estimate the spatial value of defocus blur at the edge location of the image. At first, we perform a re-blurring process using Gaussian function with input image, and calculate a gradient magnitude ratio with blurring amount between input image and re-blurred image. Then we get a full defocus map by propagating the blur amount at the edge location. Experimental result reveals that our method outperforms a reliable estimation of depth map, and shows that our algorithm is robust to noise, inaccurate edge location and interferences of neighboring edges within input image.

An EV Range in HDRI Acquisition as a Luminance Map Creation (휘도맵의 작성을 위한 HDRI 획득에 있어서 EV의 범위)

  • Hong, Sung-De
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.24 no.10
    • /
    • pp.5-12
    • /
    • 2010
  • The purpose of this study is to present the EV range in HDRI acquisition process to create luminance map. The proposed method in this study is to capture the scene at EV ${\pm}0$ that is the longest exposure points and reference point in the scene. With this reference point, sets of 25 LDRI test case were taken manually at ${\pm}2$ EV using the aperture-priority manual mode. The 25 HDRIs were created using Adobe Photoshop. The HDRIs were then imported Radiance lighting simulation program to be analyzed into falsecolor. The analysis results of the 25 HDRIs test case are 50[%] of the all tested case have a margin of error of 10[%]. In case of f/5.6, the luminance map generated with HDRI were similar to the spot luminance meter. As a result, the EV range to reduce error of luminance map generated with HDRI is EV $+2{\sim}{\pm}0{\sim}-10$.

Practical Construction of Tsunami Inundation Map Corresponding to Disaster Forecast/Warning Systems (지진해일 예경보에 따른 범람도의 실용적 작성)

  • Jeon, Young-Joon;Choi, Jun-Woo;Yoon, Sung-Bum
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.775-778
    • /
    • 2008
  • In general, forecast tsunami heights announced for tsunami warning are computed by using a linear tsunami model with coarse grids which leads the underestimation of inundation area. Thus, an accurate tsunami inundation map corresponding to the forecast tsunami height is indispensible for an emergency evacuation plan. A practical way to construct a relatively accurate tsunami inundation map was proposed in this study for the quantitative forecast of inundation area. This procedure can be introduced as in the followings: The fault dislocations of potential tsunami sources generating a specific tsunami height near an interested area are found by using a linear tsunami model. Based on these fault dislocations, maximum inundation envelops of the interested area are computed and illustrated by using nonlinear inundation numerical model. In this study, the tsunami inundation map for Imwon area was constructed according to 11 potential tsunami sources, and the validity of this process was examined.

  • PDF

Design of Superconducting Synchronous Motor using EMF-Inductance Map (EMF-Inductance Map을 이용한 초전도 동기 전동기의 설계)

  • Lee, Ji-Young;Bahn, Ji-Hyung;Hong, Jung-Pyo;Jo, Young-Sik;Kwon, Young-Kil
    • Proceedings of the KIEE Conference
    • /
    • 2005.07b
    • /
    • pp.1213-1215
    • /
    • 2005
  • For synchronous motor, back-EMF and inductance have mainly effect on the characteristics of the motor. Therefore inductance and back-EMF ranges should be limited to obtain desirable characteristics, and it is possible to get design goal easily by adjusting those two parameters. In this paper EMF-Inductance Map(E-L Map) is presented in order to predict the performance of a motor in initial design. By applying the E-L map to design process of 1MW super-conducting synchronous motor it's usefulness is verified.

  • PDF

Improving Field Investigation Process of Digital Mapping with Location-based Image Data (위치기반 영상자료를 이용한 수치지도 현지 지리조사 공정 개선)

  • Hwang, Jin-Sang;Yoon, Hong-Sic;Jung, Tae-Jun;Park, Jeong-Ki;Kim, Chang-Woo
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.6
    • /
    • pp.613-620
    • /
    • 2010
  • This study focused on the improvement of field investigation process of digital mapping by location-based image data and structured digital map. We analyzed previous methods to find the parts to be improved and suggested new methods. Main concepts of new methods are conducting investigation work indoor and linked the work with map editing for carrying out both work simultaneously by using location-based image data and structured digital map. Pilot project were carried out to compare suggested new methods with previous methods and the applicability were analyzed.

Efficient Knowledge Base Construction Mechanism Based on Knowledge Map and Database Metaphor

  • Kim, Jin-Sung;Lee, Kun-Chang;Chung, Nam-Ho
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.05a
    • /
    • pp.9-12
    • /
    • 2004
  • Developing an efficient knowledge base construction mechanism as an input method for expert systems (ES) development is of extreme importance due to the fact that an input process takes a lot of time and cost in constructing an ES. Most ES require experts to explicit their tacit knowledge into a form of explicit knowledge base with a full sentence. In addition, the explicit knowledge bases were composed of strict grammar and keywords. To overcome these limitations, this paper proposes a knowledge conceptualization and construction mechanism for automated knowledge acquisition, allowing an efficient decision. To this purpose, we extended traditional knowledge map (KM) construction process to dynamic knowledge map (DKM) and combined this algorithm with relational database (RDB). In the experiment section, we used medical data to show the efficiency of our proposed mechanism. Each rule in the DKM was characterized by the name of disease, clinical attributes and their treatments. Experimental results with various disease show that the proposed system is superior in terms of understanding and convenience of use.

  • PDF

An Efficient Image Encryption Scheme Based on Quintuple Encryption Using Gumowski-Mira and Tent Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • International Journal of Contents
    • /
    • v.11 no.4
    • /
    • pp.56-69
    • /
    • 2015
  • This paper proposes an efficient image encryption scheme based on quintuple encryption using two chaotic maps. The encryption process is realized with quintuple encryption by calling the encrypt(E) and decrypt(D) functions five times with five different keys in the form EDEEE. The decryption process is accomplished in the reverse direction by invoking the encrypt and decrypt functions in the form DDDED. The keys for the quintuple encryption/decryption processes are generated by using a Tent map. The chaotic values for the encrypt/decrypt operations are generated by using a Gumowski-Mira map. The encrypt function E is composed of three stages: permutation, pixel value rotation and diffusion. The permutation stage scrambles all the rows and columns to chaotically generated positions. This stage reduces the correlation radically among the neighboring pixels. The pixel value rotation stage circularly rotates all the pixels either left or right, and the amount of rotation is based on chaotic values. The last stage performs the diffusion four times by scanning the image in four different directions: Horizontally, Vertically, Principal diagonally and Secondary diagonally. Each of the four diffusion steps performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. This stage ensures the resistance against the differential attacks. The security and performance of the proposed method is investigated thoroughly by using key space, statistical, differential, entropy and performance analysis. The experimental results confirm that the proposed scheme is computationally fast with security intact.

Image Encryption Based on Quadruple Encryption using Henon and Circle Chaotic Maps

  • Hanchinamani, Gururaj;Kulkarni, Linganagouda
    • Journal of Multimedia Information System
    • /
    • v.2 no.2
    • /
    • pp.193-206
    • /
    • 2015
  • In this paper a new approach for image encryption based on quadruple encryption with dual chaotic maps is proposed. The encryption process is performed with quadruple encryption by invoking the encrypt and decrypt routines with different keys in the sequence EDEE. The decryption process is performed in the reverse direction DDED. The key generation for the quadruple encryption is achieved with a 1D Circle map. The chaotic values for the encrypt and decrypt routines are generated by using a 2D Henon map. The Encrypt routine E is composed of three stages i.e. permutation, pixel value rotation and diffusion. The permutation is achieved by: row and column scrambling with chaotic values, exchanging the lower and the upper principal and secondary diagonal elements based on the chaotic values. The second stage circularly rotates all the pixel values based on the chaotic values. The last stage performs the diffusion in two directions (forward and backward) with two previously diffused pixels and two chaotic values. The security and performance of the proposed scheme are assessed thoroughly by using the key space, statistical, differential, entropy and performance analysis. The proposed scheme is computationally fast with security intact.

Developing Warning Map for Risk Monitoring on Personal Information Security (개인정보보호를 위한 리스크 모니터링: 경고맵)

  • Lee, Youngjai;Shin, Sangchul;Min, Geumyoung
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.4
    • /
    • pp.33-40
    • /
    • 2008
  • Personal information security has been as risk ever since the development of information technology increased its internet use. As personal information security is compromised there will be a rise in personal privacy conflicts and this will become an important social issue. The following research is a presentation of the warning map for risk monitoring on personal information security. First, the personal information security process is identified then defined. Second, in order to achieve the personal information security's objective, a survey was taken and the data was collected. Third, factor in the Fishbone Diagram's analysis and figure out the key indicators that include metric and threshold. Last, develop the warning map which has the matrix table composed of the process and the risk. It displays the warning based on the threshold and the value of key indicators related to risks.

  • PDF