• 제목/요약/키워드: Technology technique

검색결과 13,077건 처리시간 0.045초

The 2-DOF Control system design for Quadruple-Tank process using Root Locus Technique.

  • Arjin, Numsomran;Thanit, Trisuwannawat;Kitti, Tirasesth
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1371-1374
    • /
    • 2004
  • The control system design of 2-DOF for SISO process by root locus technique is not complicated and efficiently. It can design the control system to have the transient and steady state responses, and do not adjust the gain of process controller later. However, due to control system design for MIMO process, by root locus technique, there is not exact method. This paper is presents the control system design method for Quadruple-Tank Process, by using root locus technique for the structure of 2-DOF control system. The design procedures are first decentralized then using the relative gain array, and finally 2-DOF controller design is applied.

  • PDF

Performance Comparison of the JPED and Full Frame Bit Allocation Techniques for Medical Image Compression

  • 안창범;노덕우;이종수
    • 대한의용생체공학회:학술대회논문집
    • /
    • 대한의용생체공학회 1992년도 춘계학술대회
    • /
    • pp.58-63
    • /
    • 1992
  • The discrete cosine transform (DCT)-based progressive coding standard proposed by the International Standardization Orgnnization (ISO) Joint Photographic Experts Groups (JPEG) is investigated for medical image compression and the performance of the JPEG is compared to that of the full-frame bit-allocation (FFBA) technique. From the comparison, the JPEG standard appeals superior to the FFBA technique in the following aspects: 1) JPEG achieves higher compression than the FFBA technique with less mean square error. 2) Less Gibb's artifact is observed in the compressed images by the JPEG. 3) Computational time for the JPEG is about one-fourth or the FFBA technique. Other attractive points of the JPEG include: Implementation of the JPEG with VLSIs is commercially available in relative low price and the JPEG compression format can easily be interchangeable with other applications.

  • PDF

A Hybrid Approach for Regression Testing in Interprocedural Program

  • Singh, Yogesh;Kaur, Arvinder;Suri, Bharti
    • Journal of Information Processing Systems
    • /
    • 제6권1호
    • /
    • pp.21-32
    • /
    • 2010
  • Software maintenance is one of the major activities of the software development life cycle. Due to the time and cost constraint it is not possible to perform exhaustive regression testing. Thus, there is a need for a technique that selects and prioritizes the effective and important test cases so that the testing effort is reduced. In an analogous study we have proposed a new variable based algorithm that works on variables using the hybrid technique. However, in the real world the programs consist of multiple modules. Hence, in this work we propose a regression testing algorithm that works on interprocedural programs. In order to validate and analyze this technique we have used various programs. The result shows that the performance and accuracy of this technique is very high.

Enhanced technique for Arabic handwriting recognition using deep belief network and a morphological algorithm for solving ligature segmentation

  • Essa, Nada;El-Daydamony, Eman;Mohamed, Ahmed Atwan
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.774-787
    • /
    • 2018
  • Arabic handwriting segmentation and recognition is an area of research that has not yet been fully understood. Dealing with Arabic ligature segmentation, where the Arabic characters are connected and unconstrained naturally, is one of the fundamental problems when dealing with the Arabic script. Arabic character-recognition techniques consider ligatures as new classes in addition to the classes of the Arabic characters. This paper introduces an enhanced technique for Arabic handwriting recognition using the deep belief network (DBN) and a new morphological algorithm for ligature segmentation. There are two main stages for the implementation of this technique. The first stage involves an enhanced technique of the Sari segmentation algorithm, where a new ligature segmentation algorithm is developed. The second stage involves the Arabic character recognition using DBNs and support vector machines (SVMs). The two stages are tested on the IFN/ENIT and HACDB databases, and the results obtained proved the effectiveness of the proposed algorithm compared with other existing systems.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

밀리미터파 탐색기에서 ESPRIT 기법을 이용한 탄도 미사일 탄두 식별 신호처리 기법 개발 (A Study on Signal Processing of Ballistic Missile Warhead Discrimination Using ESPRIT in Millimeter-Wave(Ka-Band) Seeker)

  • 최각규;한승구;조희진;김효태;김경태;송성찬;나영진
    • 한국전자파학회논문지
    • /
    • 제23권2호
    • /
    • pp.266-269
    • /
    • 2012
  • 본 논문은 탄도 미사일의 탄두를 식별하는 신호 처리 기법의 개발에 관하여 소개한다. 요격 미사일이 적 미사일을 파괴하기 위해서 적 미사일 탄두 위치의 정보가 필요하다. 적 미사일을 탐지하고 위치를 찾기 위해 요격미사일의 밀리미터파 탐색기(millimeter-wave seeker)는 chirp 파형을 사용하여 HRRPs(High Resolution Range Profiles)을 발생시킨다. 표적의 산란점(scattering center)을 찾아내기 위해 대표적인 스펙트럼 추정 방법(spectral estimation technique)인 ESPRIT(Estimation of Signal Parameters by Rotational Invariance Technique) 기법을 HRRPs에 적용하였다. 1차원 산란점의 정보를 이용하고 미사일의 길이를 추정함으로써 탄두의 위치를 식별하였다. 시뮬레이션 결과는 이러한 신호 처리 기법이 탄도 미사일의 탄두 식별에 적용하기에 효율적임을 보여준다.

Detection of Lung Nodule on Temporal Subtraction Images Based on Artificial Neural Network

  • Tokisa, Takumi;Miyake, Noriaki;Maeda, Shinya;Kim, Hyoung-Seop;Tan, Joo Kooi;Ishikawa, Seiji;Murakami, Seiichi;Aoki, Takatoshi
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제12권2호
    • /
    • pp.137-142
    • /
    • 2012
  • The temporal subtraction technique as one of computer aided diagnosis has been introduced in medical fields to enhance the interval changes such as formation of new lesions and changes in existing abnormalities on deference image. With the temporal subtraction technique radiologists can easily detect lung nodules on visual screening. Until now, two-dimensional temporal subtraction imaging technique has been introduced for the clinical test. We have developed new temporal subtraction method to remove the subtraction artifacts which is caused by mis-registration on temporal subtraction images of lungs on MDCT images. In this paper, we propose a new computer aided diagnosis scheme for automatic enhancing the lung nodules from the temporal subtraction of thoracic MDCT images. At first, the candidates regions included nodules are detected by the multiple threshold technique in terms of the pixel value on the temporal subtraction images. Then, a rule-base method and artificial neural networks is utilized to remove the false positives of nodule candidates which is obtained temporal subtraction images. We have applied our detection of lung nodules to 30 thoracic MDCT image sets including lung nodules. With the detection method, satisfactory experimental results are obtained. Some experimental results are shown with discussion.

A microcomputer controlled alignment system using moire sensors

  • Takada, Yutaka;Seike, Yoshiyuki;Uchida, Yoshiyuki;Akao, Yasuo;Yamada, Jun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1991년도 한국자동제어학술회의논문집(국제학술편); KOEX, Seoul; 22-24 Oct. 1991
    • /
    • pp.1961-1965
    • /
    • 1991
  • This paper deals with an automatic and precision alignment technique for proximity printing in x-ray lithography, using two pairs of moire gratings, with moire signals from each pair being 180.deg. out of phase with each other. We constructed an automatic and precision alignment experimental system which could measure both transmitted moire signals and reflected moire signals at the same time. The automatic alignment was achieved using transmitted moire signals and also reflected moire signals as a control signal for a stage driver. The alignment position of the system was monitored not only by a control signal but also by a non-control signal. The effect of transmitted and reflected moire signals upon alignment accuracy was discussed. We concluded that the technique using diffracted moire signals is a viable automatic and precision alignment technique.

  • PDF

An Image Steganography Scheme based on LSB++ and RHTF for Resisting Statistical Steganalysis

  • Nag, Amitava;Choudhary, Soni;Basu, Suryadip;Dawn, Subham
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제5권4호
    • /
    • pp.250-255
    • /
    • 2016
  • Steganography is the art and science of secure communication. It focuses on both security and camouflage. Steganographic techniques must produce the resultant stego-image with less distortion and high resistance to steganalysis attack. This paper is mainly concerned with two steganographic techniques-least significant bit (LSB)++ and the reversible histogram transformation function (RHTF). LSB++ is likely to produce less distortion in the output image to avoid suspicion, but it is vulnerable to steganalysis attacks. RHTF using a mod function technique is capable of resisting the most popular and efficient steganalysis attacks, such as the regular-singular pair attack and chi-squared detection steganalysis, but it produces a lot of distortion in the output image. In this paper, we propose a new steganographic technique by combining both methods. The experimental results show that the proposed technique overcomes the respective drawbacks of each method.

2-DOF Control System Designed By Root Locus Technique.

  • Thepmanee, T.;Sirisantisamrid, K.;Numsomran, A.;Kongratana, V.;Tirasesth, K.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2000년도 제15차 학술회의논문집
    • /
    • pp.503-503
    • /
    • 2000
  • This paper presents the design technique of the using of PlI, PID and PIDA Controllers in order to achieve the desired transient and steady state responses. The merit of the proposed technique is any tuning method is not being required. By using of the forward controller, so that all given specifications to be designed can be obtained via the root locus approach.

  • PDF