• Title/Summary/Keyword: foreign objects

Search Result 195, Processing Time 0.029 seconds

MPW Chip Implementation and Verification of High-performance Vector Inner Product Calculation Circuit for SVM-based Object Recognition (SVM 기반 사물 인식을 위한 고성능 벡터 내적 연산 회로의 MPW 칩 구현 및 검증)

  • Shin, Jaeho;Kim, Soojin;Cho, Kyeongsoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.11
    • /
    • pp.124-129
    • /
    • 2013
  • This paper proposes a high-performance vector inner product calculation circuit for real-time object recognition based on SVM algorithm. SVM algorithm shows a higher detection rate than other object recognition algorithms. However, it requires a huge amount of computational efforts. Since vector inner product calculation is one of the major operations of SVM algorithm, it is important to implement a high-performance vector inner product calculation circuit for real-time object recognition capability. The proposed circuit adopts the pipeline architecture with six stages to increase the operating speed and makes it possible to recognize objects in real time based on SVM. The proposed circuit was described in Verilog HDL at RTL. For silicon verification, an MPW chip was fabricated using TSMC 180nm standard cell library. The operation of the implemented MPW chip was verified on the test board with test application software developed for the chip verification.

The Interface between Syntax and Morphology: Taiwanese Verbal Complexes

  • Lin, Huei-Ling
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.308-319
    • /
    • 2002
  • Taiwanese abounds with verbal complexes. Among them, phasal complexes, resultative complexes, and directional complexes are alike in that their second component denotes some sort of result. Moreover, they behave similarly in that they can occur in V-ho-Y, V-e/be-Y, and V-bo-V forms. Despite the similarities, they still differ from one another in several aspects, such as whether objects are allowed inside or after the verbal complex, whether infixing changes their basic meaning, etc. This paper examines their individual properties carefully and proposes that these three types of complexes are all different from one another in their formation and thus the difference in their syntactic behavior. Directional complexes are syntactic phrases, resultative complexes are compounds derived in syntax, and while some phasal complexes are also syntactically derived compounds, others are compounds formed in the lexicon. This paper aims to argue that words (or compounds in this case) can be formed in syntax as well as in the lexicon.

  • PDF

Numerical Analysis of SMA Hybrid Composite Plate Subjected to Low-Velocity Impact

  • Kim, Eun-Ho;Roh, Jin-Ho;Lee, In
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.8 no.2
    • /
    • pp.76-81
    • /
    • 2007
  • The fiber reinforced laminated composite structures are very susceptible to be damaged when they are impacted by foreign objects. To increase the impact resistance of the laminated composite structures, shape memory alloy(SMA) thin film is embedded in the structure. For the numerical impact analysis of SMA hybrid composite structures, SMA modeling tool is developed to consider pseudoelastic effect of SMAs. Moreover, the damage analysis is considered using failure criteria and a simple damage model for reasonable impact analysis. The numerical results are verified with the experimental ones. Impact analyses for composite plate with pre-strained SMAs are numerically performed and the damage areas are investigated.

Mobile Vector Map Generalization Methods for Location Information Search

  • Choi, Jin-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.187-191
    • /
    • 2008
  • In the mobile environments for the vector map services, a map simplification work through the map generalization steps helps improve the readability of the map on a large scale. The generalization operations are various such as selection, aggregation, simplification, displacement, and so on, the formal operation algorithms have not been built yet. Because the algorithms require deep special knowledge and heuristic, which make it hard to automate the processes. This thesis proposes some map generalization algorithms specialized in mobile vector map services, based on previous works. This thesis will show the detail to adapt the approaches on the mobile environment, to display complex spatial objects efficiently on the mobile devices which have restriction on the resources.

A Study on the Function of Shopping-Centers through Place Marketing - A Case Study of the Dongdaemun Fashion-Market - (장소마케팅과 쇼핑센터의 역할 - 동대문 의류시장을 중심으로 -)

  • Soh, Hyun-Jae;Kang, Myoung-Gu
    • Journal of the Speleological Society of Korea
    • /
    • no.81
    • /
    • pp.25-34
    • /
    • 2007
  • These days cities are in the stage of inter-competition and emboss the placeness which they have. The marketing is emphasized for urban regeneration in backward cities and the dominant position in the urban competition. This study focuses on the place marketing with potential factors which the places have. In addition, this study intends to research the marketing through showing centers and the method to commercialize the places with the factors to success, Planning-Group, Place Identity and Place Image, and Public-private Partnerships, in the case of the Dongdaemun Market. Finally, the study intends to show politic significance for preferable objects of place marketing for the network of the fashion-cluster, differentiation of the rapid productivity, the foreign information centers, the dongdaemun sewing association, and the merchant association as the consequence of comparable analysis.

Development a wheel scanner using RFID technology (RFID기술을 이용한 휠 스캐너 개발)

  • Chung, Su-Young;Ko, Young-Ho;Park, Young-Dae;Kim, Chang-Wook
    • Proceedings of the KSR Conference
    • /
    • 2007.11a
    • /
    • pp.197-205
    • /
    • 2007
  • Radio frequency identification, or RFID, is a generic term for technologies that use radio wave to automatically identify people or objects. UHF RFID technology is used for everything from tracking goods within their supply chain, working in process and for other applications. If RFID is applied in wheel scanner that is a important equipment to measure a diameter, width, height of wheel, efficiency in maintenance will be improved because of checking data in real-time. In domestic technology, capacity of wheel scanner technology as well as RFID are less good than foreign goods there a up to current day a point of read range, anti-collision, a tolerance. Therefore, sturdy on the development of wheel scanner using RFID technology to measure wheel in maintenance of rolling stock was carried out in this paper.

  • PDF

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

An Implementation of Cyber View schema tool for Ubiquitous Data Integration and Management (유비쿼터스 데이터 관리를 위한 Cyber View 명세화 도구개발)

  • Park, Sang-Hyun;Min, Soo-Young;Ko, Jae-Jin;Ju, Hyun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.763-764
    • /
    • 2006
  • The rapid growth of Hardware technologies and Network fitted to us Ubiquitous Computing Life[1]. Ubiquitous Computing integrates computation into the environment, rather than having computers which are distinct objects. There are many computational things like a Sensor Network, RFID, GPS, Mobile devices, and so on. Ubiquitous Data Integration and Management are new paradigms. The goals of UDI Service Platform are data protection for the distributed data on pervasive computing devices and data distribution to appropriate users with best distribution policies. To implement the idea we evaluate the logical schema Cyber View that is a management tool.

  • PDF

LOCALIZATION TO THE PRODUCTION OF RADIOGRAPHIC IMAGE (X선상 형성과정에서 위치측정에 관하여)

  • Park T. W.
    • Journal of Korean Academy of Oral and Maxillofacial Radiology
    • /
    • v.11 no.1
    • /
    • pp.75-78
    • /
    • 1981
  • The diagnostic value of a intra oral film is related to projecting technic and interpretation. The intra-oral film is a single plane representation of a three dimensional object, therefore superimposition is inevitablly present. The purpose of this article is to show how foreign objects in the jaw may be localized. The author used double exposure technics, that are changed angulation of vertical or horizontal to one film. The obtained results are as fallow: 1. In the upper anterior region, the moving distance of the labially impacted reference object was greater than that of the palatally impacted one. 2. In the upper molar region, the moving distance of the mesiobuccal root apex was the greatest and that of palatal root apex was the shortest. 3. In the lower molar region, the change of the alveolar bone level in the buccal side was greater than that of lingual side.

  • PDF

Analysis of Self-driving Environment Using Threat Modeling (위협 모델링을 이용한 자율 주행 환경 분석)

  • Min-Ju Park;Ji-Eun Lee;Hyo-Jeong Park;Yeon-sup Lim
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.77-90
    • /
    • 2022
  • Domestic and foreign automakers compete to lead the autonomous vehicle industry through continuously developing self-driving technologies. These self-driving technologies are evolving with dependencies on the connection between vehicles and other objects such as the environment of cars and roads. Therefore, cyber security vulnerabilities become more likely to occur in the self-driving environment, so it is necessary to prepare for them carefully. In this paper, we model the threats in autonomous vehicles and make the checklist to securely countermeasure them.