• 제목/요약/키워드: binary number

검색결과 769건 처리시간 0.027초

Advanced Liver Segmentation by Using Pixel Ratio in Abdominal CT Image

  • Yoo, Seung-Wha;Cho, Jun-Sik;Noh, Seung-Mo;Shin, Kyung-Suk;Park, Jong-Won
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -1
    • /
    • pp.39-42
    • /
    • 2000
  • In our study, by observing and analyzing normal liver in abdominal CT image, we estimated gray value range and generated binary image. In the binary image, we achieved the number of hole which is located between pixels. Depending on the ratio, we processed the input image to 4 kinds of mesh images to remove the noise part that has the different ratio. With the Union image of 4 kinds of mesh images, we generated the template representing general outline of liver and subtracted from the binary image so the we can represent the organ boundary to be minute. With results of proposed method, processing time is reduced compared with existing method and we compared the result image to manual image of medical specialists.

  • PDF

이진영상에서 바운딩 서클의 빠른 계산방법 (Fast Computation of the Radius of a Bounding Circle in a Binary Image)

  • 김회율;유광석
    • 대한전기학회논문지:시스템및제어부문D
    • /
    • 제54권7호
    • /
    • pp.453-457
    • /
    • 2005
  • With the expansion of Internet, a variety of image databases are widely used and it is needed to select the part of an image what he wants. In contents-based image retrieval system, Zernikie moment and ART Descriptors are used fur shape descriptors in MPEC-7. This paper presents a fast computation method to determine the radius of a bounding circle that encloses an object in a binary image. With conventional methods, the whole area of the image should be scanned first and the distance from every pixel to the center point be computed. The proposed 4-directional scan method and fast circle-drawing algorithm is utilized to minimize the scanning area and reduce the number of operations fur computing the distance. Experimental results show that proposed method saves the computation time to determine the radius of a bounding circle efficiently.

Solvolyses of t-Butyl Halides in Binary Mixtures of Methanol with 1,2-Dimethoxyethane, 1,2-Dichloroethane and Pyridine

  • Yeol Sakong;Shi Choon Kim;Jin Sung Kim;Ikchoon Lee
    • Bulletin of the Korean Chemical Society
    • /
    • 제11권2호
    • /
    • pp.99-105
    • /
    • 1990
  • The Gutmann acceptor number(AN), solvatochromic parameters $({\alpha},{\beta}\;and\;{\pi}^{\ast})$ and hydrogen bonding equilibrium constants (KHB) were determined for three binary systems of methanol with 1,2-dimethoxyethane(DME), 1,2-dichloroethane(DCE) and pyridine (PYD). The solvolysis rate constants of t-butyl chloride, bromide and iodide were also determined in the three binary systems. Solvent properties and solvolysis rates have been discussed in the light of various solvent parameters. Solvolysis of t-butyl halides are most conveniently explained by the two-stage mechanism involving ion-pair intermediate with the ion-pair formation for chloride and ion pair dissociation for iodide as rate limiting.

NEW RESULTS ON THE PSEUDOREDUNDANCY

  • Greferath, Marcus;Liu, Zihui;Wu, Xin-Wen;Zumbragel, Jens
    • 대한수학회보
    • /
    • 제56권1호
    • /
    • pp.111-130
    • /
    • 2019
  • The concepts of pseudocodeword and pseudoweight play a fundamental role in the finite-length analysis of LDPC codes. The pseudoredundancy of a binary linear code is defined as the minimum number of rows in a parity-check matrix such that the corresponding minimum pseudoweight equals its minimum Hamming distance. By using the value assignment of Chen and Kløve we present new results on the pseudocodeword redundancy of binary linear codes. In particular, we give several upper bounds on the pseudoredundancies of certain codes with repeated and added coordinates and of certain shortened subcodes. We also investigate several kinds of k-dimensional binary codes and compute their exact pseudocodeword redundancy.

The alternative Method to Finish Modular Exponentiation and Point Multiplication Processes

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권7호
    • /
    • pp.2610-2630
    • /
    • 2021
  • The aim of this paper is to propose the alternative algorithm to finish the process in public key cryptography. In general, the proposed method can be selected to finish both of modular exponentiation and point multiplication. Although this method is not the best method in all cases, it may be the most efficient method when the condition responds well to this approach. Assuming that the binary system of the exponent or the multiplier is considered and it is divided into groups, the binary system is in excellent condition when the number of groups is small. Each group is generated from a number of 0 that is adjacent to each other. The main idea behind the proposed method is to convert the exponent or the multiplier as the subtraction between two integers. For these integers, it is impossible that the bit which is equal to 1 will be assigned in the same position. The experiment is split into two sections. The first section is an experiment to examine the modular exponentiation. The results demonstrate that the cost of completing the modular multiplication is decreased if the number of groups is very small. In tables 7 - 9, four modular multiplications are required when there is one group, although number of bits which are equal to 0 in each table is different. The second component is the experiment to examine the point multiplication process in Elliptic Curves Cryptography. The findings demonstrate that if the number of groups is small, the costs to compute point additions are low. In tables 10 - 12, assigning one group is appeared, number of point addition is one when the multiplier of a point is an even number. However, three-point additions are required when the multiplier is an odd number. As a result, the proposed method is an alternative way that should be used when the number of groups is minimal in order to save the costs.

Stoichiometry and Stability of Complexes Formed between 18-Crown-6 as well as Digenzo-18-Crown-6 Ligands and a Few Metal Ions in Some Non-aqueous Binary Systems Using Square Wave Polarography

  • A. Nezhadali, Gh. Rounaghi;M. Chamasaz
    • Bulletin of the Korean Chemical Society
    • /
    • 제21권7호
    • /
    • pp.685-689
    • /
    • 2000
  • The complexation reaction between Pb2+,TI and Cd2+ions and macrocyclic ligands, 18-crown-6 ( 18C6) and dibenzo- 18-crown-6 (DB 18C6), was studied in dimethylsulfoxide (DMSO)-nitromethane (NM) and dimethyl-formamide (DMF)-nitromethane binary system s by square wave polarography (SWP) technique. The stoichiometry and stability of the complexes were determined by monitoring the shifts in half-waves or peak potentials of the polarographic waves of metal ions against the Iigand concentration. In most cases, the stability constants of complexes increase with increasing amounts of the nitromethane in mixed binary solvents used in this study. The complexes formed between 18C6 and DB18C6 and these metal cations in all cases had a stoichiometry of 1 : 1. The results obtained show that there is an inverse relationship between the formation constant of complexes and the donor number of solvents based on a Gatmann donocity scale and the stability constants show a high sensitivity to the composition of the mixed solvent systems. A linear behavior was observed for variation of log Kf of I8C6 complexes vs the composition of the mixed solvent systems in NM/DMSO and NM/DMF,but a non-linear behavior was observed in the case of DB 18C6 complexes in these binary systems. In most of the systems investigated, the Pb2+ cation forms a more stable complex with the 18C6 than other two cations and the order of selectivity of this Iigand for cations is: Pb2+ > TI+,Cd2+.

HisCoM-mimi: software for hierarchical structural component analysis for miRNA-mRNA integration model for binary phenotypes

  • Kim, Yongkang;Park, Taesung
    • Genomics & Informatics
    • /
    • 제17권1호
    • /
    • pp.10.1-10.3
    • /
    • 2019
  • To identify miRNA-mRNA interaction pairs associated with binary phenotypes, we propose a hierarchical structural component model for miRNA-mRNA integration (HisCoM-mimi). Information on known mRNA targets provided by TargetScan is used to perform HisCoM-mimi. However, multiple databases can be used to find miRNA-mRNA signatures with known biological information through different algorithms. To take these additional databases into account, we present our advanced application software for HisCoM-mimi for binary phenotypes. The proposed HisCoM-mimi supports both TargetScan and miRTarBase, which provides manually-verified information initially gathered by text-mining the literature. By integrating information from miRTarBase into HisCoM-mimi, a broad range of target information derived from the research literature can be analyzed. Another improvement of the new HisCoM-mimi approach is the inclusion of updated algorithms to provide the lasso and elastic-net penalties for users who want to fit a model with a smaller number of selected miRNAs and mRNAs. We expect that our HisCoM-mimi software will make advanced methods accessible to researchers who want to identify miRNA-mRNA interaction pairs related with binary phenotypes.

Gamma ray exposure buildup factor and shielding features for some binary alloys using MCNP-5 simulation code

  • Rammah, Y.S.;Mahmoud, K.A.;Mohammed, Faras Q.;Sayyed, M.I.;Tashlykov, O.L.;El-Mallawany, R.
    • Nuclear Engineering and Technology
    • /
    • 제53권8호
    • /
    • pp.2661-2668
    • /
    • 2021
  • Gamma radiation shielding features for three series of binary alloys identified as (Pb-Sn), (Pb-Zn), and (Zn-Sn) have been investigated. The mass attenuation coefficients (µ/ρ) for the selected alloys were simulated using the MCNP-5 code in the energy range between 0.01 and 15 MeV. Moreover, the (µ/ρ) values were computed using WinXCOM database in the same energy range to validate the simulation results. Results reveal a good agreement between the simulated and computed values. The half value layer (HVL), mean free path (MFP), effective atomic number (Zeff) and exposure buildup factor (EBF) were evaluated for the selected binary alloys. Results showed that the PS1, PZ1, and ZS2 alloys have the best shielding parameters and better than the commercially standard and available radiation shielding materials. Therefore, the investigated alloys can be used as effective radiation shielding materials against gamma ray with energies between 0.01 and 15 MeV.

음성 명료도 향상을 위한 학습 기반의 신호 대 잡음 비 추정을 이용한 이산 마스크 추정 방법 (Binary Mask Estimation using Training-based SNR Estimation for Improving Speech Intelligibility)

  • 김기백
    • 방송공학회논문지
    • /
    • 제17권6호
    • /
    • pp.1061-1068
    • /
    • 2012
  • 본 논문에서는 시간-주파수 영역에서의 이산 마스킹을 이용하여 잡음환경 음성의 음성 명료도를 높이는 방법에 대해 다루고자 한다. 잡음이 섞여 있는 음성신호를 시간-주파수 영역으로 분해하여, 상대적으로 잡음이 많이 섞여 있는 시간-주파수 영역의 신호를 마스크 "0"을 할당하여 제거함으로써 음성명료도를 향상시킬 수 있다. 이러한 이산 마스크를 추정하기 위해서는 각 시간-주파수 영역에서 신호 대 잡음 비를 추정하여 문턱값과 비교해야 하는데, 본 논문에서는 학습 기반의 신호 대 잡음 비 추정방법을 사용하여 문턱값과 비교하여 이산 마스크를 추정한다. 신호 대 잡음 비와 비교하기 위한 문턱값은 모든 주파수 대역에 대해 동일한 값을 이용하는 고정 문턱값 외에도 주파수 대역에 따라 학습 데이터의 분포로부터 최적의 값을 사용하는 최적 문턱값을 제안한다. 제안된 이산 마스크 추정 방법은 잡음 환경 데이터에 적용한 후, 피험자에게 들려주어 음성 명료도를 측정한다.

핫스팟 접근영역 인식에 기반한 바이너리 코드 역전 기법을 사용한 저전력 IoT MCU 코드 메모리 인터페이스 구조 연구 (Low-Power IoT Microcontroller Code Memory Interface using Binary Code Inversion Technique Based on Hot-Spot Access Region Detection)

  • 박대진
    • 대한임베디드공학회논문지
    • /
    • 제11권2호
    • /
    • pp.97-105
    • /
    • 2016
  • Microcontrollers (MCUs) for endpoint smart sensor devices of internet-of-thing (IoT) are being implemented as system-on-chip (SoC) with on-chip instruction flash memory, in which user firmware is embedded. MCUs directly fetch binary code-based instructions through bit-line sense amplifier (S/A) integrated with on-chip flash memory. The S/A compares bit cell current with reference current to identify which data are programmed. The S/A in reading '0' (erased) cell data consumes a large sink current, which is greater than off-current for '1' (programmed) cell data. The main motivation of our approach is to reduce the number of accesses of erased cells by binary code level transformation. This paper proposes a built-in write/read path architecture using binary code inversion method based on hot-spot region detection of instruction code access to reduce sensing current in S/A. From the profiling result of instruction access patterns, hot-spot region of an original compiled binary code is conditionally inverted with the proposed bit-inversion techniques. The de-inversion hardware only consumes small logic current instead of analog sink current in S/A and it is integrated with the conventional S/A to restore original binary instructions. The proposed techniques are applied to the fully-custom designed MCU with ARM Cortex-M0$^{TM}$ using 0.18um Magnachip Flash-embedded CMOS process and the benefits in terms of power consumption reduction are evaluated for Dhrystone$^{TM}$ benchmark. The profiling environment of instruction code executions is implemented by extending commercial ARM KEIL$^{TM}$ MDK (MCU Development Kit) with our custom-designed access analyzer.