• Title/Summary/Keyword: binary processing

Search Result 732, Processing Time 0.024 seconds

Variation in Microstructural Homogeneity and Mechanical Properties of Extruded Mg-5Bi Alloy Via Controlling Billet Shape (빌렛 형상 제어를 통한 Mg-5Bi 합금 압출재의 조직 균일도 및 기계적 물성 변화)

  • Jin, S.C.;Cha, J.W.;Park, S.H.
    • Transactions of Materials Processing
    • /
    • v.31 no.6
    • /
    • pp.344-350
    • /
    • 2022
  • Extruded Mg-Bi binary alloys are known to have an undesirable bimodal grain structure containing a large amount of coarse unrecrystallized grains. Accordingly, to improve the microstructural homogeneity of extruded Mg-Bi alloys, it is necessary to promote the dynamic recrystallization (DRX) behavior during hot extrusion. An effective way to promote DRX is an increase in nucleation sites for DRX through a pre-deformation process before extrusion, such as cold pre-forging and hot pre-compression. However, the application of these pre-deformation processes increases the cost of final extruded Mg products because of an increase in energy consumption and decrease in productivity. Therefore, a low-cost new continuous process with high productivity is required to improve the microstructural homogeneity and mechanical properties of extruded Mg alloys without a drastic increase in the entire process cost. This study proposes a new extrusion method using an extrusion billet with a truncated cone shape (i.e., tapered billet) instead of a conventional extrusion billet with a cylindrical shape. When the hot extrusion of a Mg-5Bi alloy is conducted using the tapered billet, the DRX behavior during extrusion is considerably promoted. The DRX fraction and average grain size of the extruded alloy significantly increase and decrease from 65% to 91% and from 225 ㎛ to 49 ㎛, respectively. Consequently, the extruded Mg-5Bi alloy fabricated using the tapered billet has a finer homogeneous grain structure and higher tensile elongation than the extruded counterpart fabricated using the cylindrical billet.

Preparation of Photocurable Slurry for DLP 3D Printing Process using Synthesized Yttrium Oxyfluoride Powder (합성 불산화 이트륨 분말을 이용한 DLP 3D 프린팅용 광경화성 슬러리 제조)

  • Kim, Eunsung;Han, Kyusung;Choi, Junghoon;Kim, Jinho;Kim, Ungsoo
    • Korean Journal of Materials Research
    • /
    • v.31 no.9
    • /
    • pp.532-538
    • /
    • 2021
  • In this study, a spray dryer is used to make granules of Y2O3 and YF3, and then Y5O4F7 is synthesized following heat treatment of them under Ar gas atmosphere at 600 ℃. Single and binary monomer mixtures are compared and analyzed to optimize photocurable monomer system for DLP 3D printing. The mixture of HEA and TMPTA at 8:2 ratio exhibits the highest photocuring properties and low viscosity with shear thinning behavior. The optimized photocurable monomer and synthesized Y5O4F7 are therefore mixed and applied to printing process at variable solid contents (60, 70, 80, & 85 wt.%) and light exposure times. Under optimal light exposure conditions (initial exposure time: 1.2 s, basic exposure time: 5 s), YOF composites at 60, 70 & 80 wt.% solid contents are successfully printed. As a result of measuring the size of the printed samples compared to the dimensions of the designed bar type specimen, the deviation is found to increase as the YOF solid content increases. This shows that it is necessary to maximize the photocuring activity of the monomer system and to optimize the exposure time when printing using a high-solids ceramic slurry.

Bidirectional LSTM based light-weighted malware detection model using Windows PE format binary data (윈도우 PE 포맷 바이너리 데이터를 활용한 Bidirectional LSTM 기반 경량 악성코드 탐지모델)

  • PARK, Kwang-Yun;LEE, Soo-Jin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.87-93
    • /
    • 2022
  • Since 99% of PCs operating in the defense domain use the Windows operating system, detection and response of Window-based malware is very important to keep the defense cyberspace safe. This paper proposes a model capable of detecting malware in a Windows PE (Portable Executable) format. The detection model was designed with an emphasis on rapid update of the training model to efficiently cope with rapidly increasing malware rather than the detection accuracy. Therefore, in order to improve the training speed, the detection model was designed based on a Bidirectional LSTM (Long Short Term Memory) network that can detect malware with minimal sequence data without complicated pre-processing. The experiment was conducted using the EMBER2018 dataset, As a result of training the model with feature sets consisting of three type of sequence data(Byte-Entropy Histogram, Byte Histogram, and String Distribution), accuracy of 90.79% was achieved. Meanwhile, it was confirmed that the training time was shortened to 1/4 compared to the existing detection model, enabling rapid update of the detection model to respond to new types of malware on the surge.

A Study on the Dataset of the Korean Multi-class Emotion Analysis in Radio Listeners' Messages (라디오 청취자 문자 사연을 활용한 한국어 다중 감정 분석용 데이터셋연구)

  • Jaeah, Lee;Gooman, Park
    • Journal of Broadcast Engineering
    • /
    • v.27 no.6
    • /
    • pp.940-943
    • /
    • 2022
  • This study aims to analyze the Korean dataset by performing Korean sentence Emotion Analysis in the radio listeners' text messages collected personally. Currently, in Korea, research on the Emotion Analysis of Korean sentences is variously continuing. However, it is difficult to expect high accuracy of Emotion Analysis due to the linguistic characteristics of Korean. In addition, a lot of research has been done on Binary Sentiment Analysis that allows positive/negative classification only, but Multi-class Emotion Analysis that is classified into three or more emotions requires more research. In this regard, it is necessary to consider and analyze the Korean dataset to increase the accuracy of Multi-class Emotion Analysis for Korean. In this paper, we analyzed why Korean Emotion Analysis is difficult in the process of conducting Emotion Analysis through surveys and experiments, proposed a method for creating a dataset that can improve accuracy and can be used as a basis for Emotion Analysis of Korean sentences.

Porting gcc Based eCos OS and PROFINET Communication Stack to IAR (gcc 기반 eCos 운영체제 및 PROFINET 통신 스택의 IAR 포팅 방법)

  • Jin Ho Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.4
    • /
    • pp.127-134
    • /
    • 2023
  • This paper describes how to port the eCos operating system and PROFINET communication stack developed based on gcc to the IAR compiler. The eCos operating system provides basic functions such as multi-thread, TCP/IP, and device driver for PROFINET operation, so there is no need to change it when developing PROFINET applications. Therefore, in this study, we reuse an eCos library built with gcc and it link with PROFINET communication stack that are ported to IAR complier. Due to the different of the gcc and IAR linker, symbol definitions and address of the constructors should be changed using the external tool that generates symbol definitions and address of the constructors from MAP file. In order to verify the proposed method, it was confirmed that the actual I/O was operating normally through PROFINET IRT communication by connecting to the Siemens PLC. IAR compiler has better performance in both the compile time and the size of the generated binary. The proposed method in this study is expected to help port various open sources as well as eCos and PROFINET communication stacks to other compilers.

Performance Comparison of Transformer-based Intrusion Detection Model According to the Change of Character Encoding (문자 인코딩 방식의 변화에 따른 트랜스포머 기반 침입탐지 모델의 탐지성능 비교)

  • Kwan-Jae Kim;Soo-Jin Lee
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.41-49
    • /
    • 2024
  • A tokenizer, which is a key component of the Transformer model, lacks the ability to effectively comprehend numerical data. Therefore, to develop a Transformer-based intrusion detection model that can operate within a real-world network environment by training packet payloads as sentences, it is necessary to convert the hexadecimal packet payloads into a character-based format. In this study, we applied three character encoding methods to convert packet payloads into numeric or character format and analyzed how detection performance changes when training them on transformer architecture. The experimental dataset was generated by extracting packet payloads from PCAP files included in the UNSW-NB15 dataset, and the RoBERTa was used as the training model. The experimental results demonstrate that the ISO-8859-1 encoding scheme achieves the highest performance in both binary and multi-class classification. In addition, when the number of tokens is set to 512 and the maximum number of epochs is set to 15, the multi-class classification accuracy is improved to 88.77%.

Performance Test for the Long Distance Sprayer by an Image Processing (영상처리를 이용한 광역방제기 팬의 성능실험)

  • Min, B.R.;Kim, D.W.;Seo, K.W.;Hong, J.T.;Kim, W.;Choi, J.H.;Lee, D.W.
    • Journal of Animal Environmental Science
    • /
    • v.14 no.3
    • /
    • pp.159-166
    • /
    • 2008
  • This research was carried out to test and analyze capacity of the long distance sprayer fan in large livestock farmhouses. Long distance sprayer was manufactured to be able to spray a lot of water, which was a solvent for agricultural chemicals and black dye with the maximum spraying distance of 140 m and the effective spraying distance of 100 m. The spraying quantity and the distance were measured the intensity values of images within A4 papers, which absorbed the agricultural chemicals by spraying by binary image processing. These A4 papers were fixed upon the height of 1 m from soil ground at regular 10 m interval. After the A4 papers were collected and analyzed the intensity values of gray level. Gray level was ranged from 0 to 255, where 0 was black and 255 was white. A4 paper was fallen down from the stick at 10 m distance, because there were too large amount of sprayed water with black dye. Also, the paper showed low gray level at distance 30 m because of dropping lots of black water. The intensity value of gray level was showed almost less than 200 on the A4 papers between the distance 20 m and 100 m, which meant equality of spraying quantity. Additionally, it was possible to spay agricultural chemicals of until 180 m. Throughout this research, long distance sprayer could apply for preventing hoof-and-mouth disease in large livestock farmhouses.

  • PDF

Structural Properties of MO-SiO$_2$(M=Zn, Sn, In, Ag, Ni) by Sol-Gel Method (졸겔법으로 제조된 MO-$SiO_2$(M=Zn,Sn,In,Ag,Ni)의 구조특성)

  • Sin, Yong-Uk;Kim, Sang-U
    • Korean Journal of Materials Research
    • /
    • v.11 no.7
    • /
    • pp.603-608
    • /
    • 2001
  • $MO-SiO_2$ (M = Zn, Sn, In, Ag, Ni) binary silica gels were synthesized by sol-gel method and their structural change with the kind of metal ions was characterized by XRD, FT- IR and $^{29}$Si-NMR. Although X-ray analysis showed partial recrystallization of $AgNO_3$ in $Ag-SiO_2$gel, crystalline phase formed by the bonding between metal ion and the silica matrix didn't appear in all $MO-SiO_2$ gels. The FT-IR analysis showed that Zn, Sn and in partially formed Si-O-M bonding in silica matrix and made an shift of absorption peak to by Si-O-Si symmetrical vibration. In addition, $^{29}Si-NMR$ studies showed that Zn, Sn and In didn't affect sol-gel process of silica and were linked with non-bridging oxygen of the linear silica structure, which formed imperfect network because of low temperature sol-gel process. Ag and Ni make a role of catalysis on sol-gel process, resulting in densifying the silica network structure.

  • PDF

The Research of Shape Recognition Algorithm for Image Processing of Cucumber Harvest Robot (오이수확로봇의 영상처리를 위한 형상인식 알고리즘에 관한 연구)

  • Min, Byeong-Ro;Lim, Ki-Taek;Lee, Dae-Weon
    • Journal of Bio-Environment Control
    • /
    • v.20 no.2
    • /
    • pp.63-71
    • /
    • 2011
  • Pattern recognition of a cucumber were conducted to detect directly the binary images by using thresholding method, which have the threshold level at the optimum intensity value. By restricting conditions of learning pattern, output patterns could be extracted from the same and similar input patterns by the algorithm. The algorithm of pattern recognition was developed to determine the position of the cucumber from a real image within working condition. The algorithm, designed and developed for this project, learned two, three or four learning pattern, and each learning pattern applied it to twenty sample patterns. The restored success rate of output pattern to sample pattern form two, three or four learning pattern was 65.0%, 45.0%, 12.5% respectively. The more number of learning pattern had, the more number of different out pattern detected when it was conversed. Detection of feature pattern of cucumber was processed by using auto scanning with real image of 30 by 30 pixel. The computing times required to execute the processing time of cucumber recognition took 0.5 to 1 second. Also, five real images tested, false pattern to the learning pattern is found that it has an elimination rate which is range from 96 to 98%. Some output patterns was recognized as a cucumber by the algorithm with the conditions. the rate of false recognition was range from 0.1 to 4.2%.

The Recognition of Occluded 2-D Objects Using the String Matching and Hash Retrieval Algorithm (스트링 매칭과 해시 검색을 이용한 겹쳐진 이차원 물체의 인식)

  • Kim, Kwan-Dong;Lee, Ji-Yong;Lee, Byeong-Gon;Ahn, Jae-Hyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.7
    • /
    • pp.1923-1932
    • /
    • 1998
  • This paper deals with a 2-D objects recognition algorithm. And in this paper, we present an algorithm which can reduce the computation time in model retrieval by means of hashing technique instead of using the binary~tree method. In this paper, we treat an object boundary as a string of structural units and use an attributed string matching algorithm to compute similarity measure between two strings. We select from the privileged strings a privileged string wIth mmimal eccentricity. This privileged string is treated as the reference string. And thell we wllstructed hash table using the distance between privileged string and the reference string as a key value. Once the database of all model strings is built, the recognition proceeds by segmenting the scene into a polygonal approximation. The distance between privileged string extracted from the scene and the reference string is used for model hypothesis rerieval from the table. As a result of the computer simulation, the proposed method can recognize objects only computing, the distance 2-3tiems, while previous method should compute the distance 8-10 times for model retrieval.

  • PDF