• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.031 seconds

A Study on the development of Automated Optical Glass Inspection System (광학용 유리자동검사기 개발에 관한 연구)

  • 구마끼
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1998.03a
    • /
    • pp.82-87
    • /
    • 1998
  • Laser printer, faximile and copy machine are a few examples of OA(office automation) system. In such a system, the reflecting mirror has been employed for transmitting a target image to optical device. Therefore, to develope a good quality of optical system, the quality control of optical mirror was required. In recent years, considerable efforts have been directed toward the development of automated optical glass inspection system because the inspection is eye-fatigue and monotonous job for humans to perform. In this paper, we propose a inspection system applying algorithm of image processing for detecting defects of optical glass such as pinhole, scratch. From the experiments, the proposed inspection system shows reliable results.

  • PDF

Time-Aware Wear Leveling by Combining Garbage Collector and Static Wear Leveler for NAND Flash Memory System

  • Hwang, Sang-Ho;Kwak, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.1-8
    • /
    • 2017
  • In this paper, we propose a new hybrid wear leveling technique for NAND Flash memory, called Time-Aware Wear Leveling (TAWL). Our proposal prolongs the lifetime of NAND Flash memory by using dynamic wear leveling technique which considers the wear level of hot blocks as well as static wear leveling technique which considers the wear level of the whole blocks. TAWL also reduces the overhead of garbage collection by separating hot data and cold data using update frequency rate. We showed that TAWL enhanced the lifetime of NAND flash memory up to 220% compared with previous wear leveling techniques and our technique also reduced the number of copy operations of garbage collections by separating hot and cold data up to 45%.

Two Varieties of Subject Scrambling in FNQ-constructions

  • Son, Gwangrak
    • Language and Information
    • /
    • v.19 no.1
    • /
    • pp.59-73
    • /
    • 2015
  • In the traditional Locality approach to floating numeral quantifiers in Korean and Japanese, two subject positions have been identified for external merge, one in Spec, vP and the other in Spec, TP (Saito 1985, Miyagawa 1989, 2013, Miyagawa and Arikawa 2007, etc.). In this paper, I show that the two external merger positions of the subject are unnecessary in the grammar of Korean and Japanese. Rather, by accepting the minimalist assumption of the VP-Internal Subject Hypothesis (Kitagawa 1986, Sportiche 1988, Koopman and Sportiche 1991), we are better able to explain a variety of bewildering phenomena that arise in scrambling contexts of FNQ-constructions.

  • PDF

HIGH-SPEED SOFTWARE FRAME SYNCHRONIZER USING CIRCULAR BUFFER

  • Koo, In-Hoi;Ahn, Sang-II;Kim, Tae-Hoon;SaKong, Young-Bo
    • Proceedings of the KSRS Conference
    • /
    • 2008.10a
    • /
    • pp.228-231
    • /
    • 2008
  • For a satellite data communication, the technology of frame synchronization is widely used between a sender and a receiver. Last year, we suggested zero-loss frame synchronization [1] using pattern search and using bits threshold search algorithm that is based on SIMD technology [2,3]. This algorithm could solve both of hardware and software drawbacks, which are frame loss and low processing performance. However, this algorithm didn't optimize the processing of output data, synchronized data, which caused overhead to the memory allocation and the memory copy. Consequently, the performance of the frame synchronizer application was degraded. In this paper, we enhance previous work using a circular buffer in order to optimize the output data processing. The performance comparison with the previous algorithm shows that the enhanced proposed approach dramatically outperforms in the output data processing speed.

  • PDF

A VLSI implementation of image processor for facsimile and digital copier (팩시밀리 및 디지털 복사기를 위한 고속 영상 처리기의 VLSI구현)

  • 박창대;정영훈;김형수;김진수;권오준;홍기상;장동구;박기용;김윤수
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.1
    • /
    • pp.105-113
    • /
    • 1998
  • A new image processor is implemented for high-speed digital copiers and facsimiles. The imgage processor performs CCD and CIS interface, pre-processing, enlargement andreduction of gray level image, and various halftoning algorithms. Implemented halftoning algorithms are simple thresholding, fuzzy based mixed mode thresholding, dithering, and edge enhanced error diffusion. The result of binarization is transferred to a printer with serial or paralel output ports. Line by line pipelined data prodessing architecture is employed with time sharing access of the external memory. In receiving mode, it converts the resolution of received binary image for compatibility with conventional facsimile. In copy mode, a line of A3 paper with 400 dpi is processed with in 2.5 ms. The prototype of image processor was implemented usig Laser Programmable Gate Array (LPGA) with 0.8.mu.m technology.

  • PDF

Design of Object-Oriented Cideo Controller based on Stack (스택기반 객체 지향형 영상 제어기 설계)

  • 박주현;김영민
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.7
    • /
    • pp.69-77
    • /
    • 1998
  • In this paper, a controller is designed for efficient controlling of video data with object-oriented feature. The need of controlling video data in an object unit is on the rise for the reason of rapidly growing demand for high-quality video services. We propose a programmable architecture with stack buffers which can minimize a scheduling overhead by having separate buffes for genral data and return addresses. The buffers are veyr useful for move and copy operations for multitasking and task switching. The controller offers extended instructions that process several data types including 32bit integrer type. Operation speed of the controller is from 77MHz to 44MHz.

  • PDF

Early Termination of Block Vector Search for Fast Encoding of HEVC Screen Content Coding

  • Ma, Jonghyun;Sim, Donggyu
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.6
    • /
    • pp.388-392
    • /
    • 2014
  • This paper proposes an early termination method of a block vector search for fast encoding of high efficiency video coding (HEVC) screen content coding (SCC). In the proposed algorithm, two blocks indicated by two block vector predictors (BVPs) were first employed as an intra block copy (IBC) search. If the sum of absolute difference (SAD) value of the block is less than a threshold defined empirically, an IBC BV search is terminated early. The initial threshold for early termination is derived by statistical analysis and it can be modified adaptively based on a quantization parameter (QP). The proposed algorithm is evaluated on SCM-2.0 under all intra (AI) coding configurations. Experimental results show that the proposed algorithm reduces IBC BV search time by 29.23% on average while the average BD-rate loss is 0.41% under the HEVC SCC common test conditions (CTC).

Connection Frequency Buffer Aware Routing Protocol for Delay Tolerant Network

  • Ayub, Qaisar;Mohd Zahid, M. Soperi;Abdullah, Abdul Hanan;Rashid, Sulma
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.649-657
    • /
    • 2013
  • DTN flooding based routing protocol replicate the message copy to increase the delivery like hood that overloads the network resources. The probabilistic routing protocols reduce replication cost by forwarding the message to a node that holds high predictability value to meet its destination. However, the network traffic converges to high probable nodes and produce congestion that triggers the drop of previously stored messages. In this paper, we have proposed a routing protocol called as Connection frequency Buffer Aware Routing Protocol (CFBARP) that uses an adaptive method to maintain the information about the available buffer space at the receiver before message transmission. Furthermore, a frequency based method has been employed to determine the connection recurrence among nodes. The proposed strategy has performed well in terms of reducing message drop, message relay while increases the delivery probability.

ZCS-PFM Series Resonant High Frequency Inverter for Electromagnetic Induction Eddy Current-Heated Roller

  • Mun, Sang-Pil;Jung, Sang-Hwa;Kim, Chang-Il;Kim, Sang-Don;Nakaoka, Mutsuo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.05a
    • /
    • pp.419-422
    • /
    • 2008
  • This paper presents a novel prototype of ZCS-PFM high frequency series resonant Inverter using IGBT power module for electromagnetic induction eddy current-heated roller in copy and printing machines. The operating principle and unique features of this voltage source half bridge inverter with two additional soft commutation inductor snubber are presented Including the transformer modeling of induction heated rolling drum. This soft switching inverter can achieve stable zero current soft commutation under a discontinuous and continuous resonant load current for a widely specified power regulation processing. The experimental results and computer-aided analysis of this inverter are discussed from a practical point of view.

  • PDF

Security of Generalized Patchwork Algorithm for Audio Signal (오디오 신호에 적용된 Generalized Patchwork Algorithm의 안전성)

  • Kim Ki-Seob;Kim Hyoung-Joong;;Yang Jae-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked audio. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original audio. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the at-tacked audio by the available data from the polynomials to construct an attacked audio. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

  • PDF