• Title/Summary/Keyword: copy paper

Search Result 502, Processing Time 0.029 seconds

Design of Long Span Overhead Transmission Line using Special High-tension Wire (특수 고장력전선을 사용한 장경간 가공송전선로 설계)

  • Na, Sang-Yong;Ji, Pyeong-Shik
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.65 no.3
    • /
    • pp.183-187
    • /
    • 2016
  • Recently, power demand has been increasing every year according to variation of electrical equipments and temperature rise in summer season. So, much more overhead line is being demanded to copy with increasing power demand and operate reliable power system. This paper analysis the characteristics of long span overhead transmission line using special high-tension wire in such as a safety factor, coefficient of elasticity, and the coefficient of linear expansion. Based on the analysis, we proposed the effectiveness of special high-tension wire having much more advantages with respect to height of steel tower and dip compared with conventional ACSR in long span overhead transmission line.

Histogram-based Reversible Data Hiding Based on Pixel Differences with Prediction and Sorting

  • Chang, Ya-Fen;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3100-3116
    • /
    • 2012
  • Reversible data hiding enables the embedding of messages in a host image without any loss of host content, which is proposed for image authentication that if the watermarked image is deemed authentic, we can revert it to the exact copy of the original image before the embedding occurred. In this paper, we present an improved histogram-based reversible data hiding scheme based on prediction and sorting. A rhombus prediction is employed to explore the prediction for histogram-based embedding. Sorting the prediction has a good influence on increasing the embedding capacity. Characteristics of the pixel difference are used to achieve large hiding capacity while keeping low distortion. The proposed scheme exploits a two-stage embedding strategy to solve the problem about communicating peak points. We also present a histogram shifting technique to prevent overflow and underflow. Performance comparisons with other existing reversible data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

Developing Expert System for Restoration to the Original Character Form of Ancient Relics Based on Image Processing and Computer Graphics (문화재의 문자 복원을 위한 전문가 시스템 개발: 영상처리 및 컴퓨터 그래픽스 활용을 중심으로)

  • Moon, Ho-Seok;Sohn, Myung-Ho
    • Journal of Information Technology Services
    • /
    • v.7 no.4
    • /
    • pp.139-149
    • /
    • 2008
  • We propose expert system for restoration the original character form of ancient relics based on image processing and computer graphics. Letters engraved in relief like relics and intaglio like curved tombstones and letters engraved in plane or curved part of cultural asset may have been broken by a lot of rubbed copy, a long time and tide. In this paper, we suggest a new method for extracting and recovering the broken letters of cultural asset into an original form by using Z-map, morphological filter, and high frequency filter. Based on the suggested method. we develop the character recovering system.

Development of a Web Accelerator in the Kernel

  • Park, Jong-Gyu;Lim, Han-Na;Kim, Hag-Bae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.70.3-70
    • /
    • 2001
  • In this paper, we suggest a kernel level multi thread web accelerator (called the SCALA-AX), which significantly improves the performance of the web soerver. In comparison with a conventional proxy web cache that is generally called a caching server and a simple content-copy based system, the primary functions and goals of SCALA-AX are designed to maximize the content services of a front end web server with high performance. Specifically, the SCALA-AX runs on the kernel level of a web sorrel, based on the newest caching techniques. Moreover, the SCALA-AX supports the http 1.1 protocol and allows the dynamic pages as well as static pages to be processed.

  • PDF

A Novel Black Box Approach For Component Adaptation Technique

  • Jalender, B.;Govardhan, Dr. A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.81-90
    • /
    • 2022
  • There are several ways to improve software performance by using existing software. So, the developments of some programs are the most promising ways. However, traditional part programming studies usually assume that the components are recycled "as is". Existing models of component objects only provide limited support for partial adjustments, namely white box technologies ( copy-paste & inheritance) and the black-box methods (such as mixing and encapsulation). These technologies have problems related to recovery, efficiency, implementation of indirect costs, or their own problems. This paper suggests as JALTREE, The Black Box adaptation technology, which allows us for the implementation of previous components, but we need configurable the interface types, for measuring the adaptability. In this article we discussed the types of adjustments including component interfaces and component composition. An example of customizing JALTREE and component can be illustrated in several examples

Modeling of a controlled retransmission scheme for loss recovery in optical burst switching networks

  • Duong, Phuoc Dat;Nguyen, Hong Quoc;Dang, Thanh Chuong;Vo, Viet Minh Nhat
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.274-285
    • /
    • 2022
  • Retransmission in optical burst switching networks is a solution to recover data loss by retransmitting the dropped burst. The ingress node temporarily stores a copy of the complete burst and sends it each time it receives a retransmission request from the core node. Some retransmission schemes have been suggested, but uncontrolled retransmission often increases the network load, consumes more bandwidth, and consequently, increases the probability of contention. Controlled retransmission is therefore essential. This paper proposes a new controlled retransmission scheme for loss recovery, where the available bandwidth of wavelength channels and the burst lifetime are referred to as network conditions to determine whether to transmit a dropped burst. A retrial queue-based analysis model is also constructed to validate the proposed retransmission scheme. The simulation and analysis results show that the controlled retransmission scheme is more efficient than the previously suggested schemes regarding byte loss probability, successful retransmission rate, and network throughput.

A Study on Formative Characteristics of Digital Images: Focused on NFT Arts (디지털 이미지의 조형적 특성 연구: NFT 예술작품을 중심으로)

  • Kim, Hyesung
    • Journal of Information Technology Applications and Management
    • /
    • v.29 no.2
    • /
    • pp.1-15
    • /
    • 2022
  • Image has more power in the 21st century than ever before. With the advance in technology and media, image is either made or received more easily and promptly using digital technology. Because of that, it has been hard for digital images to gain value as a work of art. But after NFT technology was developed and then applied to digital images, we have come to distinguish the original from the copy of it. People are trying various ways to allow digital images to be acknowledged as art, and changing the nature of digital images that makes new paradigms in the history of art. Through NFT artworks rising as a new style, this paper analyzed and investigated the new properties and changing characteristics of digital images in order to anticipate the characteristics of artworks that the public produces, enjoys, and consumes. This study is grounded on experimental analysis methods, and this author expects that it can contribute to figuring out which kinds of visual culture and artworks digital image is influencing currently from various perspectives.

SEAS (Symbolic Editing and Design Aid System) (회로도면과 IC Mask Layout을 위한 2차원 Grphic Editor)

  • Jo, Jae-Joo;Cha, Gun-Up;Kim, Jung-Soon
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.1
    • /
    • pp.149-158
    • /
    • 1987
  • This paper describes the SEAS which is a 2-dimensional graphic editor for schematic circuit and IC mask layout. This system runs on general purpose computer and Tektronix 4110 series graphic terminal. With this system, user can edit schematic circuits and/or IC mask layout with 2 level hierarchy. This system supports more than 20 kinds of built-in symbol, user definable internal symbols, 60 macros, 16 function keys, 4 level on-screen menu operation and edit-in-place of cell in main drawing. And it provides editing functions such as reflection, rotation, move and copy of one or a group of elements, and modification of polygona geometry etc. To improve the excution speed, we used local memory of graphic terminal. For the portability of the program, the system is written in FORTRAN 77 programming language.

  • PDF

Manchu Script Letters Dataset Creation and Labeling

  • Aaron Daniel Snowberger;Choong Ho Lee
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.1
    • /
    • pp.80-87
    • /
    • 2024
  • The Manchu language holds historical significance, but a complete dataset of Manchu script letters for training optical character recognition machine-learning models is currently unavailable. Therefore, this paper describes the process of creating a robust dataset of extracted Manchu script letters. Rather than performing automatic letter segmentation based on whitespace or the thickness of the central word stem, an image of the Manchu script was manually inspected, and one copy of the desired letter was selected as a region of interest. This selected region of interest was used as a template to match all other occurrences of the same letter within the Manchu script image. Although the dataset in this study contained only 4,000 images of five Manchu script letters, these letters were collected from twenty-eight writing styles. A full dataset of Manchu letters is expected to be obtained through this process. The collected dataset was normalized and trained using a simple convolutional neural network to verify its effectiveness.

Conservation of information I -deacidification of paper materials- (정보자료의 보존대책 II. - 산성 종이자료의 탈산처리 -)

  • Chung Sung-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.265-294
    • /
    • 1993
  • At the present. one of the very important functions of the information center or library is to provide information service on time and to the right person. But it is impossible if the shape of the material is not complete. So it is important to keep the material of information complete. This study is on deacidification of paper materials for enhancing useful life of information. This study can be summerized as follews; The material needs deacidification is all of machine-made paper except neutral paper, and hand made paper which are below pH 6.5. The best way for the deacidification for the small amount of materals is to use aqueous deacidifiers such as Calcium Carbonate, Magnesuim Carbonate and Borax. For mass deacidification process, Methoxy Magnesuim Methyle Carbonate and Magnesuim Oxide, called

  • PDF