• Title/Summary/Keyword: out-of-code

Search Result 1,935, Processing Time 0.031 seconds

Transformer Network for Container's BIC-code Recognition (컨테이너 BIC-code 인식을 위한 Transformer Network)

  • Kwon, HeeJoo;Kang, HyunSoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.1
    • /
    • pp.19-26
    • /
    • 2022
  • This paper presents a pre-processing method to facilitate the container's BIC-code recognition. We propose a network that can find ROI(Region Of Interests) containing a BIC-code region and estimate a homography matrix for warping. Taking the structure of STN(Spatial Transformer Networks), the proposed network consists of next 3 steps, ROI detection, homography matrix estimation, and warping using the homography estimated in the previous step. It contributes to improving the accuracy of BIC-code recognition by estimating ROI and matrix using the proposed network and correcting perspective distortion of ROI using the estimated matrix. For performance evaluation, five evaluators evaluated the output image as a perfect score of 5 and received an average of 4.25 points, and when visually checked, 224 out of 312 photos are accurately and perfectly corrected, containing ROI.

A Study on KAN Code ID for Promoting Distribution Information or Agricultural Products (농산물 유통 정보화 촉진을 위한 KAN코드 사용 확대에 관한 연구)

  • Ahn, Seung-Yong;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.5
    • /
    • pp.99-117
    • /
    • 2006
  • Consumers keep demanding for diversified high quality products, valuable services and safety. With this in mind, Distribution Industry is being updated rapidly to accomodate this demand. Meanwhile, Distribution Information Technology of agricultural products has been in slow progress with little in-depth studies. In this study, it has been analyzed the usage of Bar code which is the key element for agricultural Distribution Information Technology. The analysis was conducted through a survey utilizing questionnaire covering 5 Hypermarkets(Super-centers) including big 3 companies. Also, Japanese market trends have been studied to visit a Japan Government Organization concerned, GS1 Japan, an Agricultural Cooperative, an Agricultural Wholesale Market, and a Retail Company. If we could use KAN code for all agricultural products, we could collect and analyze the information of price and trade quantity of them. It opens a new era to understand the agricultural products supply and demand easily. This will certainly make a great contribution to the evolution of agricultural products distribution. From this research, it is suggested that collective efforts by suppliers, wholesalers, retailers and Government Officers are needed to make large scale mutual marketing Organizations, which specialize in sending out agricultural products. The Organization is recommended to standardize and pack every final agricultural products, to promote the use of KAN code.

A Study of LLVM-based Embedded System Performance Analyzer (LLVM 기반의 임베디드 시스템 성능 분석기의 연구)

  • Cho, Doosan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.577-582
    • /
    • 2022
  • For developing a new embedded system, an application program/an emulator and a compiler are developed simultaneously. In order to provide the optimal performance of all system components, local optimization should be carried out for the developing process. For this purpose, if a source-level performance analyzer is developed, it is possible to optimize the application program's source code by the performance evaluation. In general, the performance of an application program is determined in the loop iterations. The Intermediate Representation (IR) code generator generates IR code from the source code, and evaluates the execution time with the instructions in the intermediate representation code. If the source code is improved based on the evaluated result, better results can be obtained in the final application code. This study describes the source-level performance analyzer that can be used during the simultaneous development of the new embedded system and its application programs. The performance analyzer makes it possible to more quickly optimize the performance of the new embedded system.

PN code acquisition for the N-path RAKE receiver in the DS/CDMA systems (DS/CDMA 이동통신 시스템의 N-경로 RAKE 수신기를 위한 PN 코드동기)

  • 이한섭;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.6
    • /
    • pp.1510-1521
    • /
    • 1996
  • This paper presents acquisition algorithm and an improved detection technique for the DS/CDMA (direction sequence code division multiple access) RAKE receiver in multipath fading channel. The DS/CDMA systems use the RAKE receiver, an accurate code acquisition is required for the RAKE branches. The algorithmis able to findthe pseudonoise (PN) code delay estimates for the RAKE branches in a multipath fading channel. In this paper a numerical method and computer simulation simulation have been developed for the acquisition system. The detection probability and mean acquisition time are investigated asa performance measure of the system using the Monte Carlo method. And also in order to analyze the effect of the acquisition on the RAKE receiver this paper bring out the effect of integration time, doppler frequency, processing gain and the number of users on the acquired code phase.

  • PDF

Shear capacity equation for channel shear connectors in steel-concrete composite beams

  • Paknahad, Masoud;Shariati, Mahdi;Sedghi, Yadollah;Bazzaz, Mohammad;Khorami, Majid
    • Steel and Composite Structures
    • /
    • v.28 no.4
    • /
    • pp.483-494
    • /
    • 2018
  • In this research the effect of high strength concrete (HSC) on shear capability of the channel shear connectors (CSC) in the steel concrete composite floor system was estimated experimentally and analytically. The push-out test was carried out for assessing the accurateness of the proposed model (nonlinear and finite element model) for the test specimens. A parametric analysis was conducted for predicting the shear capacity of the connectors (CSC) in the HSC. Eight push-out specimens of different sizes with different strength levels were tested under the monotonic loading system. The aim of this study was to evaluate the efficacy of the National Building Code of Canada (NBC) of Canada for analysing the loading abilities of the CSC in the HSC. Using the experimental tests results and verifying the finite element results with them, it was then confirmed by the extended parametric studies that the Canadian Design Code was less efficient for predicting the capacity of the CSC in the HSC. Hence, an alternative equation was formulated for predicting the shear capacity of these connectors during the inclusion of HSC for designing the codes.

Magnetohydrodynamics Code Basics

  • RYU DONGSU
    • Journal of The Korean Astronomical Society
    • /
    • v.34 no.4
    • /
    • pp.209-213
    • /
    • 2001
  • This paper describes the numerical solution to the hyperbolic system of magnetohydrodynamic (MHD) equations. First, by pointing out the approximations involved, the deal MHD equations are presented. Next, the MHD waves as well as the associated shocks and discontinuities, are presented. Then, based on the hyperbolicity of the ideal MHD equations, the application of upwind schemes, which have been developed for hydrodynamics, is discussed to solve the equations numerically. As an definite example, one and multi-dimensional codes based on the Total Variation Diminishing scheme are presented. The treatment in the multi-dimensional code, which maintains ${\nabla}{\cdot}$B = 0, is described. Through tests, the robustness of the upwind schemes for MHDs is demonstrated.

  • PDF

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification (실행코드 암호화 및 무결성 검증을 적용한 안드로이드앱 보호 기법)

  • Shim, HyungJoon;Cho, Sangwook;Jeong, Younsik;Lee, Chanhee;Han, Sangchul;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.10 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

A Research Analysis of QR code based on big data in Korea

  • Lee, Eun-ji;Kim, Soo Kyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.9
    • /
    • pp.189-200
    • /
    • 2021
  • Recently, Information and Communication Technology and SMART Phone Technology have been rapidly developed. According to the increase of data use, the era of big data has come. With the approach of non-contact society, QR Codes are becoming inseparable in our lives. In this paper, we are trying to figure out the implications of QR Code research based on Big Data in Korea. The purpose of this study is to first examine the previous studies on "QR Code" and conduct an analysis on keywords by field using Big Data. Second, for data visualization WordCloud analysis and network analysis are performed on "QR Code" frequent keyword. Third, we would like to present the research direction to future researchers regarding "QR Code". In the results, First of all, research trends showed that research is on the rise and that various fields are being utilized. Second, the results of the analysis of frequent keyword resulted in similar results overall, with some differences depending on the field and year. Third, we found that the visualization results according to the frequent keyword were also analyzed in the same way as the frequent keyword analysis results. The practical implications of the theoretical findings are as follows. First, 'QR Code' needs to be studied as a means of information delivery, not as a technical aspect. Second, it can be seen that "QR Code" is developing reflecting social trends or issues. With both theoretical and practical implications, we are trying to provide the strategic ways of QR-code in future.

A Numerical Simulation for Contractive and Dilative Periodic Motion on Axisymmetric Body

  • Kim, Moon-Chan
    • Journal of Ship and Ocean Technology
    • /
    • v.3 no.1
    • /
    • pp.1-11
    • /
    • 1999
  • Numerical simulation for the axisymmetric body with contractive and dilative periodic motion is carried out. The present analysis shows that a propulsive force can be obtained in highly viscous fluid by the contractive and dilative motion of axisymmetric body. An axisymmetric code is developed with unstructured grid system for the simulation of complicated motion and geometry. It is validated by comparing with the results of Stokes approximation with the problem of uniform flow past a sphere in low Reynolds number($R_n$ = 1). The validated code is applied to the simulation of contractive and dilative periodic motion of body whose results are quantitatively compared with the two dimensional case. The simulation is extended to the analysis of waving surface with projecting part for finding out the difference of hydrodynamics performance according to variation of waving surface configuration. The present study will be the basic research for the development of the propulsor of an axisymmetric micro-hydro-machine.

  • PDF

New Postprocessing Methods for Rejectin Out-of-Vocabulary Words

  • Song, Myung-Gyu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.3E
    • /
    • pp.19-23
    • /
    • 1997
  • The goal of postprocessing in automatic speech recognition is to improve recognition performance by utterance verification at the output of recognition stage. It is focused on the effective rejection of out-of vocabulary words based on the confidence score of hypothesized candidate word. We present two methods for computing confidence scores. Both methods are based on the distance between each observation vector and the representative code vector, which is defined by the most likely code vector at each state. While the first method employs simple time normalization, the second one uses a normalization technique based on the concept of on-line garbage mode[1]. According to the speaker independent isolated words recognition experiment with discrete density HMM, the second method outperforms both the first one and conventional likelihood ratio scoring method[2].

  • PDF