• Title/Summary/Keyword: chain code

Search Result 220, Processing Time 0.024 seconds

Design and Implementation of Video Chatting System using Digital Pen and Handwriting Recognition Technology (디지털펜과 필기체인식 기술을 이용한 화상채팅 시스템 설계 및 구현)

  • Seo, Young-Ho;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.387-390
    • /
    • 2014
  • 본 논문에서는 현대사회에서 응용분야가 광범위하고, 높은 인식율과 빠른 처리속도를 위하여 많은 연구가 진행되어왔던 오프라인 필기체 인식 중 디지털 펜을 위한 새로운 필기체 문자 인식 시스템과 이를 이용한 화상 채팅 시스템을 제안한다. 이 시스템의 문자 인식에 필요한 처리는 체인코드에 기반하며 유니코드와 획 코드를 이용하여 처리하는 필기체 문자 인식 시스템으로, 일반적으로 터치 패널이 없는 데스크 탑 과 노트북에서도 터치 펜 기능을 가능하게 하는 디지털 펜을 위한 필기체 문자 인식 시스템이며 화상 채팅은 WSAEventSelect Model을 사용하여 제작한 시스템이다.

  • PDF

Target Detection Technique in a DBS(Doppler Beam Sharpening) Image (DBS(Doppler Beam Sharpening) 영상에서 표적 탐지 방안)

  • Kong, Young-Joo;Kwon, Jun-Beom;Kim, Hong-Rak;Woo, Seon-Keol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.5
    • /
    • pp.373-381
    • /
    • 2017
  • DBS(Doppler Beam Sharpening) algorithm is a way to improve azimuth resolution performance in radar. Since DBS image includes the is information about the search area of radar, various clutter components exist besides the target to be detected. To detect and track the desired target in a DBS image, it must be able to identify a target and the clutter components. In this paper, we describe how to use image size and terrain information(DTED) to identify the target in a DBS image. By using morphological filter and chain code, it acquires image size and excludes the clutter components. By matching with DTED, we determine target.

Gesture Recognition Method using Tree Classification and Multiclass SVM (다중 클래스 SVM과 트리 분류를 이용한 제스처 인식 방법)

  • Oh, Juhee;Kim, Taehyub;Hong, Hyunki
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.238-245
    • /
    • 2013
  • Gesture recognition has been widely one of the research areas for natural user interface. This paper presents a novel gesture recognition method using tree classification and multiclass SVM(Support Vector Machine). In the learning step, 3D trajectory of human gesture obtained by a Kinect sensor is classified into the tree nodes according to their distributions. The gestures are resampled and we obtain the histogram of the chain code from the normalized data. Then multiclass SVM is applied to the classified gestures in the node. The input gesture classified using the constructed tree is recognized with multiclass SVM.

Best Practices on Validation and Extraction of Object oriented Designs with Code Visualization Tool-chain (코드 가시화 툴체인 기반 UML 설계 추출 및 검증 사례)

  • Lee, Won-Young;Kim, Robert YoungChul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.79-86
    • /
    • 2022
  • This paper focuses on realizing design improvement and high quality through visualization of reverse engineering-based software. As new technologies and complex software emerge in various areas of the fourth industry in the future, software verification with both stability and reliability is becoming an issue. We propose a reverse engineering-based UML design extraction and visualization for high-quality software ranging from simple computational software to machine learning-based data-oriented software. Through this study, it is expected to improve software quality through design improvement by checking the accuracy of the target design and identifying the code complexity.

Nucleotide sequence analysis of a second set of the polyketide synthase .betha.-ketoacyl synthase and chain length factor genes from the salinomycin-producing streptomyces albus

  • Hyun, Chang-Gu;Park, Kwan-Hyung;C.Richard Hutchinson;Suh, Joo-Won
    • Journal of Microbiology
    • /
    • v.35 no.1
    • /
    • pp.40-46
    • /
    • 1997
  • The pWHM220 cosmid with a 24-kb insert cloned from Streptomyces albus ATCC 21838 induces the biosynthesis of a polysther antibiotic similar to salinomycin in Streptomyces invidans. We have analyzed this region by DNA sequencing as well as Southern blot hybridization with type I and type II polyketide synthase (PKS) probes. Surprisingly, we found another set of type II SKS genes only 10-kb from the original PKS genes, salABCDE. The DNA sequence revealed two complete open reading frames (ORFs) named salB2 and salC2, and one partial ORF that does not resemble any known DNA or deduced protein sequence. The salC2 should code for chain length determining factor while the deduced amino acid sequence encoded by salB2 exhibits high similarity to .betha.-ketoacyl synthase from different PKS gene clusters. The highest identity was found for .betha.-keetoacyl synthases from S. argillaceus (MtmP. 59.1% identity), the mithramycin producer and from S. venezuelae ISP5230 (JadA, 52.3% identity), the jadomycin producer. The SalC2 protein clearly resembles its counterparts in order aromatic PKS gene clusters that are believed to influence the length of the polyketide chain. The highest identities observed were to that of S. argillaceus (MtmK, 62.3%) and S. venezuelae ISP 5230 (JadB, 55.1%) proteins, Moreover, the deduced amino acid sequences of the salB2 and salC2 products were 29.0% identical.

  • PDF

A Control Volume Scheme for Three-Dimensional Transport: Buffer and Matrix Effects on a Decay Chain Transport in the Repository

  • Lee, Y.M.;Y.S. Hwang;Kim, S.G.;C.H. Kang
    • Nuclear Engineering and Technology
    • /
    • v.34 no.3
    • /
    • pp.218-231
    • /
    • 2002
  • Using a three-dimensional numerical code, B3R developed for nuclide transport of an arbitrary length of decay chain in the buffer between the canister and adjacent rock in a high- level radioactive waste repository by adopting a finite difference method utilizing the control- volume scheme, some illustrative calculations have been done. A linear sorption isotherm, nuclide transport due to diffusion in the buffer and the rock matrix, and advection and dispersion along thin rigid parallel fractures existing in a saturated porous rock matrix as well as diffusion through the fracture wall into the matrix is assumed. In such kind of repository, buffer and rock matrix are known to be important physico-chemical harriers in nuclide retardation. To show effects of buffer and rock matrix on nuclide transport in HLW repository and also to demonstrate usefulness of B3R, several cases of breakthrough curves as well as three- dimensional plots of concentration isopleths associated with these two barriers are introduced for a typical case of decay chain of $^{234}$ Ulongrightarrow$^{230}$ Thlongrightarrow$^{226}$ Ra, which is the most important chain as far as the human environment is concerned.

A Study on Smart Contract for Personal Information Protection (개인정보보호를 위한 스마트컨트랙트 연구)

  • Kim, Young-Hun
    • Journal of Digital Convergence
    • /
    • v.17 no.3
    • /
    • pp.215-220
    • /
    • 2019
  • The block chain technology is a technique that prevents manipulation of data and ensures integrity and reliability. Ethereum is building a smart contract environment as a type of encryptionenabled system based on block chains. Smart contracts can be implemented when conditions are met, thus increasing confidence in digital data. However, smart contracts that are being tried in various ways are not covered by information security and personal information protection. The structure in which the network participant can view the open transaction ledger is exposed to data or personal information listed in the block chain. In this study, it is possible to manage the data of personal information recorded in the block chain directly. This study is protected personal information by preventing the exposure of personal information and by executing time code, it is possible to erase recorded information after a certain period of time has elapsed. Based on the proposed system in the future, it is necessary to study the additional management techniques of unknown code defects or personal information protection.

A Design of Traceable and Privacy-Preserving Authentication in Vehicular Networks (VANET 환경에서 프라이버시를 보호하면서 사고 발생 시 추적 가능한 인증 프로토콜)

  • Kim, Sung-Hoon;Kim, Bum-Han;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.115-124
    • /
    • 2008
  • In vehicular networks, vehicles should be able to authenticate each other to securely communicate with network-based infrastructure, and their locations and identifiers should not be exposed from the communication messages. however, when an accident occurs, the investigating authorities have to trace down its origin. As vehicles communicate not only with RSUs(Road Side Units) but also with other vehicles, it is important to minimize the number of communication flows among the vehicles while the communication satisfies the several security properties such as anonymity, authenticity, and traceability. In our paper, when the mutual authentication protocol is working between vehicles and RSUs, the protocol offers the traceability with privacy protection using pseudonym and MAC (Message Authentication Code) chain. And also by using MAC-chain as one-time pseudonyms, our protocol does not need a separate way to manage pseudonyms.

Calculation of Low-Energy Reactor Neutrino Spectra for Reactor Neutrino Experiments

  • Riyana, Eka Sapta;Suda, Shoya;Ishibashi, Kenji;Matsuura, Hideaki;Katakura, Jun-ichi
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.2
    • /
    • pp.155-159
    • /
    • 2016
  • Background: Nuclear reactors produce a great number of antielectron neutrinos mainly from beta-decay chains of fission products. Such neutrinos have energies mostly in MeV range. We are interested in neutrinos in a region of keV, since they may take part in special weak interactions. We calculate reactor antineutrino spectra especially in the low energy region. In this work we present neutrino spectrum from a typical pressurized water reactor (PWR) reactor core. Materials and Methods: To calculate neutrino spectra, we need information about all generated nuclides that emit neutrinos. They are mainly fission fragments, reaction products and trans-uranium nuclides that undergo negative beta decay. Information in relation to trans-uranium nuclide compositions and its evolution in time (burn-up process) were provided by a reactor code MVP-BURN. We used typical PWR parameter input for MVP-BURN code and assumed the reactor to be operated continuously for 1 year (12 months) in a steady thermal power (3.4 GWth). The PWR has three fuel compositions of 2.0, 3.5 and 4.1 wt% $^{235}U$ contents. For preliminary calculation we adopted a standard burn-up chain model provided by MVP-BURN. The chain model treated 21 heavy nuclides and 50 fission products. The MVB-BURN code utilized JENDL 3.3 as nuclear data library. Results and Discussion: We confirm that the antielectron neutrino flux in the low energy region increases with burn-up of nuclear fuel. The antielectron-neutrino spectrum in low energy region is influenced by beta emitter nuclides with low Q value in beta decay (e.g. $^{241}Pu$) which is influenced by burp-up level: Low energy antielectron-neutrino spectra or emission rates increase when beta emitters with low Q value in beta decay accumulate Conclusion: Our result shows the flux of low energy reactor neutrinos increases with burn-up of nuclear fuel.

A Study on the Applicability of Character Recognition Technology for Construction Supply Chain Management of Structural Steel Components and Precast Concrete Works (철골 및 PC 공사의 물류관리를 위한 문자 인식 기술의 적용성 검토)

  • Kim, Jun-Sik;Chin, Sangyoon;Yoon, Su-Won
    • Korean Journal of Construction Engineering and Management
    • /
    • v.15 no.4
    • /
    • pp.20-29
    • /
    • 2014
  • As construction projects increase their complexity, variety, and scale, various recognition applications (such as RFID, bar-code etc.) have been tried for managing material effectively in construction projects. However, existing recognition applications for construction material management have some limitations that cause additional works (such as attaching RFID tag), additional cost (labor cost, recognition device cost, etc.), and cognitive impairment of workers. Therefore, this study proposed a character recognition technology as an alternative of previous recognition technologies such as RFID, bar-code, etc. The technical feasibility of proposed technology was validated by three recognition tests. Additionally, this study proposed code the structure to manage materials using the character recognition technology. The effects of character recognition technology are presented by comparing with existing RFID-based logistics processes.