• Title/Summary/Keyword: chain code

Search Result 220, Processing Time 0.022 seconds

A Study on the Vision Algorithm for the Inspection of very small RF-Chip Inductor (초소형 RF-chip inductor의 외관 검사 알고리즘에 관한 연구)

  • Kim Kee-Soon;Kim Gi-Young;Kim Joon-Seek
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.1
    • /
    • pp.89-96
    • /
    • 2000
  • In this paper, we propose a vision algorithm for the inspection of very small RF-chip inductor which is used in mobile-communication terminal. The proposed method divides coil part from the inductor body by local adaptive thresholding and integral projection method. After dividing work, the coil components are extracted by thinning and labelling techniques. The test items are the number of turns, the intervals in coil, and the measure of uniformity between the extracted lines. If the values of these are more than the specific value a tested product is decided bad one. In the simulation, the proposed method has a good performance.

  • PDF

Digit Recognition for Vehicle License Plate Based on Opened Enclosure (열림방향을 이용한 자동차번호판 숫자인식)

  • Zheng, Liu;Kim, Dong-Wook
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.453-459
    • /
    • 2015
  • In this paper, we propose a new digit recognition method based on opened enclosure. In the proposed method, each digit is divided into two parts, an upper part and a lower part, which are based on a cutting line that is modified depending on the number of intersection points. In the simulation, the performance evaluation through the data acquisition and application of the proposed algorithm was carried out and the result was presented.

Performance Analysis of Soft Handoff Region Ratio in CDMA System Considering System Capacity and Traffic Load (CDMA망에서 시스템 용량과 트래픽 부하의 변화를 반영한 핸드오프 영역 비율에 대한 성능분석)

  • Jung, Sung-Hwan;Hong, Jung-Wan;Lee, Sang-Cheon;Lie, Chang-Hoon
    • IE interfaces
    • /
    • v.20 no.2
    • /
    • pp.216-226
    • /
    • 2007
  • In code-division multiple-access (CDMA) systems with soft handoff, mobile station (MS) within soft handoff region can use multiple radio channels and receive their signals from multiple base stations (BSs) simultaneously. In this paper, the effects of soft handoff region ratio (SHRR) on reverse link of a CDMA cellular system are analytically investigated. In order to analyze the network performance and quality of service (QoS) perceived by users more realistically, both the soft capacity increasing factor and the traffic load variation affected by SHRR are jointly considered and a two-dimensional continuous time Markov chain (CTMC) model is built. In the numerical example, it is observed that the optimal guard channel exists according the variations of the traffic load and propagation conditions when the proper value of SHRR is determined.

Applying Reverse Engineering through extracting Models from Code Visualization (코드 가시화부터 모델링 추출을 통한 역공학 적용)

  • Kwon, Haeun;Park, Bokyung;Yi, Keunsang;Park, Young B.;Kim, Youngsoo;Kim, R. Youngchul
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.646-649
    • /
    • 2014
  • 최근 레가시 소프트웨어 기능의 증가와 범위가 넓어져, 결함으로 발생하는 사고의 피해 규모가 증가하고 있다. 그로 인해 소프트웨어의 고품질화가 절대적으로 필요하다. 기존 NIPA의 소프트웨어 가시화는 코드로부터 아키텍처 추출을 중점을 고려한다. 이로부터 역공학 기법을 통한 객체지향 코드의 정적 분석과 가시화로 모델(클래스 모델, 순차적 모델, 패키지 모델, 그리고 유스 케이스 모델)과 요구사항을 추출하고자 한다. 이에 앞서 기존에 구축한 Tool-chain에서 가시화를 통한 클래스 모델 추출을 먼저 시도한다. 본 논문에서는 객체지향 패러다임에 맞게 수정된 결합도 측정 방법을 제안하고 추출된 UML 클래스 다이어그램에 적용한다. 그 방법은 측정된 결합도를 클래스 간 의존 관계와 비교하고 UML 클래스 다이어그램에 표현하는 것이다. 이를 통해 기존 레가시 소프트웨어의 재개발 과정에서 설계 문서의 추출과 고품질화가 가능하다.

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

Detection of Emetic Bacillus cereus from Ready-to-eat Foods in Markets and its Production of Cereulide under Simulated Conditions

  • Kim, Heesun;Chang, Hyeja
    • Journal of the FoodService Safety
    • /
    • v.1 no.1
    • /
    • pp.9-18
    • /
    • 2020
  • B. cereus-produced cereulide as an emetic toxin is commonly isolated in starch-based cooked foods. This study examined the prevalence of B. cereus from ready-to-eat foods in markets by polymerase chain reaction analysis and determined the relationship between the level of B. cereus and the quantity of cereulide in the sample after different storage times and temperatures. The prevalence of general B. cereus in 43 starch foods was 32.6%, and the level of B. cereus ranged from 0.5 to 1.95 log cfu/g, meeting the Korea Food Code Specifications of 3 log CFU/g of B. cereus. No samples revealed emetic B. cereus. Fried rice samples were inoculated with a cereulide-producing reference strain, B. cereus NCCP 14796, to determine the level of B. cereus and the quantity of cereulide in the samples after storage for 0, 4, 6, 8, 20, 24, 30, 48, 72, and 96 h at 7, 25, 35, and 57℃. The average levels of B. cereus at 7, 25, 35, and 57℃ were 4.38, 7.31, 7.88, and 3.82 log cfu/g, and the levels of cereulide were 150.41, 1680.70, 2652.65, and 77.83 ㎍/mL, respectively, showing a significant difference according to the incubation time (P<0.05) and temperature (P<0.001).

REPEATED-ROOT CONSTACYCLIC CODES OF LENGTH 2ps OVER GALOIS RINGS

  • Klin-eam, Chakkrid;Sriwirach, Wateekorn
    • Bulletin of the Korean Mathematical Society
    • /
    • v.56 no.1
    • /
    • pp.131-150
    • /
    • 2019
  • In this paper, we consider the structure of ${\gamma}$-constacyclic codes of length $2p^s$ over the Galois ring $GR(p^a,m)$ for any unit ${\gamma}$ of the form ${\xi}_0+p{\xi}_1+p^2z$, where $z{\in}GR(p^a,m)$ and ${\xi}_0$, ${\xi}_1$ are nonzero elements of the set ${\mathcal{T}}(p,m)$. Here ${\mathcal{T}}(p,m)$ denotes a complete set of representatives of the cosets ${\frac{GR(p^a,m)}{pGR(p^a,m)}}={\mathbb{F}}p^m$ in $GR(p^a,m)$. When ${\gamma}$ is not a square, the rings ${\mathcal{R}}_p(a,m,{\gamma})=\frac{GR(p^a,m)[x]}{{\langle}x^2p^s-{\gamma}{\rangle}}$ is a chain ring with maximal ideal ${\langle}x^2-{\delta}{\rangle}$, where ${\delta}p^s={\xi}_0$, and the number of codewords of ${\gamma}$-constacyclic code are provided. Furthermore, the self-orthogonal and self-dual ${\gamma}$-constacyclic codes of length $2p^s$ over $GR(p^a,m)$ are also established. Finally, we determine the Rosenbloom-Tsfasman (RT) distances and weight distributions of all such codes.

Incorporating Recognition in Catfish Counting Algorithm Using Artificial Neural Network and Geometry

  • Aliyu, Ibrahim;Gana, Kolo Jonathan;Musa, Aibinu Abiodun;Adegboye, Mutiu Adesina;Lim, Chang Gyoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4866-4888
    • /
    • 2020
  • One major and time-consuming task in fish production is obtaining an accurate estimate of the number of fish produced. In most Nigerian farms, fish counting is performed manually. Digital image processing (DIP) is an inexpensive solution, but its accuracy is affected by noise, overlapping fish, and interfering objects. This study developed a catfish recognition and counting algorithm that introduces detection before counting and consists of six steps: image acquisition, pre-processing, segmentation, feature extraction, recognition, and counting. Images were acquired and pre-processed. The segmentation was performed by applying three methods: image binarization using Otsu thresholding, morphological operations using fill hole, dilation, and opening operations, and boundary segmentation using edge detection. The boundary features were extracted using a chain code algorithm and Fourier descriptors (CH-FD), which were used to train an artificial neural network (ANN) to perform the recognition. The new counting approach, based on the geometry of the fish, was applied to determine the number of fish and was found to be suitable for counting fish of any size and handling overlap. The accuracies of the segmentation algorithm, boundary pixel and Fourier descriptors (BD-FD), and the proposed CH-FD method were 90.34%, 96.6%, and 100% respectively. The proposed counting algorithm demonstrated 100% accuracy.

Metric based Performance Measurement of Software Development Methodologies from Traditional to DevOps Automation Culture

  • Poonam Narang;Pooja Mittal
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.107-114
    • /
    • 2023
  • Successful implementations of DevOps practices significantly improvise software efficiency, collaboration and security. Most of the organizations are adopting DevOps for faster and quality software delivery. DevOps brings development and operation teams together to overcome all kind of communication gaps responsible for software failures. It relies on different sets of alternative tools to automate the tasks of continuous integration, testing, delivery, deployment and monitoring. Although DevOps is followed for being very reliable and responsible environment for quality software delivery yet it lacks many quantifiable aspects to prove it on the top of other traditional and agile development methods. This research evaluates quantitative performance of DevOps and traditional/ agile development methods based on software metrics. This research includes three sample projects or code repositories to quantify the results and for DevOps integrated selective tool chain; current research considers our earlier proposed and implemented DevOps hybrid model of integrated automation tools. For result discussion and validation, tabular and graphical comparisons have also been included to retrieve best performer model. This comparative and evaluative research will be of much advantage to our young researchers/ students to get well versed with automotive environment of DevOps, latest emerging buzzword of development industries.

Investigation of Hygiene Indicator Organisms and Listeria monocytogenes Contamination in Smoked Salmon Oncorhynchus keta Distributed in Korea (국내 유통 중인 훈제 연어(Oncorhynchus keta)의 위생지표세균 및 Listeria monocytogenes 오염도 조사)

  • Su-Jeong Lee;Eun-Woo Lee;Won Je Jang
    • Korean Journal of Fisheries and Aquatic Sciences
    • /
    • v.56 no.5
    • /
    • pp.721-727
    • /
    • 2023
  • This study was conducted to evaluate the level of microbial contamination in smoked salmon products sold in hypermarkets in major metropolitan cities in Korea. Listeria monocytogenes is the primary cause of smoked and raw salmon product recalls. Here, we used L. monocytogenes as a bacterial hygiene indicator and investigated the microbial contamination level of frozen/refrigerated smoked salmon products collected from hyper markets. Contamination levels were analyzed by seasons, manufacturers, and consumption regions. For hygiene indicator bacteria, total bacteria count, coliforms, and Escherichia coli were examined according to the food code established by the Ministry of Food and Drug Safety, and polymerase chain reaction (PCR) was performed to detect Listeria sp. The highest contamination level was observed in spring in Busan among five consumption regions. Listeria was detected at a level of 2.1% among all samples collected. And especially L. monocytogenes was detected in two cases from the samples collected from Daegu and Daejeon. Sanitary standards and specifications should be established according to the contamination level of smoked salmon products investigated in this study, and continuous monitoring is necessary.