• Title/Summary/Keyword: scan codes

Search Result 20, Processing Time 0.03 seconds

Low Power Scan Test Methodology Using Hybrid Adaptive Compression Algorithm (하이브리드 적응적 부호화 알고리즘을 이용한 저전력 스캔 테스트 방식)

  • Kim Yun-Hong;Jung Jun-Mo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.188-196
    • /
    • 2005
  • This paper presents a new test data compression and low power scan test method that can reduce test time and power consumption. A proposed method can reduce the scan-in power and test data volume using a modified scan cell reordering algorithm and hybrid adaptive encoding method. Hybrid test data compression method uses adaptively the Golomb codes and run-length codes according to length of runs in test data, which can reduce efficiently the test data volume compare to previous method. We apply a scan cell reordering technique to minimize the column hamming distance in scan vectors, which can reduce the scan-in power consumption and test data. Experimental results for ISCAS 89 benchmark circuits show that reduced test data and low power scan testing can be achieved in all cases. The proposed method showed an about a 17%-26% better compression ratio, 8%-22% better average power consumption and 13%-60% better peak power consumption than that of previous method.

  • PDF

Obstacle Avoidance of Mobile Robot using Scan Code Method (스캔코드법을 이용한 이동로봇의 장애물 회피)

  • Cho, Gyu-Sang
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2856-2858
    • /
    • 2000
  • This paper proposes a scan code method for obstacle avoidance of mobile robot. Obstacles detected in a circular window are converted to scan codes and then to the steering angle. The safe rotating radius is obtained by the scan code to avoid the collision between robot and obstacle and. the minimum distance for rotation is calculated. Effectiveness of the method is illustrated through simulations, and the results show that the proposed method can be efficiently implemented to an unknown environment.

  • PDF

Generalized SCAN Bit-Flipping Decoding Algorithm for Polar Code

  • Lou Chen;Guo Rui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1296-1309
    • /
    • 2023
  • In this paper, based on the soft cancellation (SCAN) bit-flipping (SCAN-BF) algorithm, a generalized SCAN bit-flipping (GSCAN-BF-Ω) decoding algorithm is carried out, where Ω represents the number of bits flipped or corrected at the same time. GSCAN-BF-Ω algorithm corrects the prior information of the code bits and flips the prior information of the unreliable information bits simultaneously to improve the block error rate (BLER) performance. Then, a joint threshold scheme for the GSCAN-BF-2 decoding algorithm is proposed to reduce the average decoding complexity by considering both the bit channel quality and the reliability of the coded bits. Simulation results show that the GSCAN-BF-Ω decoding algorithm reduces the average decoding latency while getting performance gains compared to the common multiple SCAN bit-flipping decoding algorithm. And the GSCAN-BF-2 decoding algorithm with the joint threshold reduces the average decoding latency further by approximately 50% with only a slight performance loss compared to the GSCAN-BF-2 decoding algorithm.

A Study on Technology Embedded English Classes Using QR Codes

  • Jeon, Young-Joo
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.1-6
    • /
    • 2015
  • The development of information and technology has brought plenty of changes to the educational environment. The prevalence of smart phones is particularly playing a huge role in shaping learning methods. Smart phones provide the opportunity to scan QR codes, which can greatly ease access to information. Due to a high recognition speed, recognition rate, and restoration rate, they can be useful tools for English teachers to use in their class. In this study, we suggest using QR codes for writing and picture descriptions. Based on this study, more research should invest in Technology Embedded English teaching models to create better English classes for students.

Recognition of Car License Plates Using Fuzzy Clustering Algorithm

  • Cho, Jae-Hyun;Lee, Jong-Hee
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.4
    • /
    • pp.444-447
    • /
    • 2008
  • In this paper, we proposed the recognition system of car license plates to mitigate traffic problems. The processing sequence of the proposed algorithm is as follows. At first, a license plate segment is extracted from an acquired car image using morphological features and color information, and noises are eliminated from the extracted license plate segment using line scan algorithm and Grassfire algorithm, and then individual codes are extracted from the license plate segment using edge tracking algorithm. Finally the extracted individual codes are recognized by an FCM algorithm. In order to evaluate performance of segment extraction and code recognition of the proposed method, we used 100 car images for experiment. In the results, we could verify the proposed method is more effective and recognition performance is improved in comparison with conventional car license plate recognition methods.

An Authentic Certification System of a Printed Color QR Code based on Convolutional Neural Network (인쇄된 컬러 QR코드의 합성곱 신경망 알고리즘에 의한 진위 판정 시스템)

  • Choi, Do-young;Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.3
    • /
    • pp.21-30
    • /
    • 2020
  • With the widespread of smartphones, the Quick response (QR) code became one of the most popular codes. In this paper, a new type of QR code is proposed to increase the storage capacities and also to contain private information by changing the colors and the shape of patterns in the codes. Then, for a variety of applications of the printed QR codes, this paper proposes an efficient authentic certification system, which is built on an conventional CNN (Convolutional neural network) architecture - VGGNet and classifies authentic or counterfeit with smartphones, easily. For authentic codes, the proposed system extracts the embedded private information. Through practical experiments with a printed QR code, it is shown that the proposed system can classify authentic or counterfeit code, perfectly, and also, are useful for extracting private information.

Multiple Transmit Focusing Method With Modified Orthogonal Golay Codes for Ultrasound Imaging (초음파 영상에서 변형된 직교 골레이 코드를 이용한 동시 다중 송신 집속 기법)

  • 김배형;송태경
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.3
    • /
    • pp.217-231
    • /
    • 2003
  • Coded excitation with complementary Golay sequences is an effective means to increase the SNR and penetration of ultrasound imaging. in which the two complementary binary codes are transmitted successively along each scan-line, reducing the imaging frame rate by half. This method suffers from low frame rate particularly when multiple transmit focusing is employed, since the frame rate will be further reduced in proportion to the number of focal zones. In this paper. a new ultrasound imaging technique based on simultaneous multiple transmit focusing using modified orthogonal Golay codes is proposed to improve lateral resolution with no accompanying decrease in the imaging frame rate, in which a pair of orthogonal Golay codes focused at two different focal depths are transmitted simultaneously. On receive, these modified orthogonal Golay codes are separately compressed into two short pulses and individually focused. These two focused beams are combined to form a frame of image with improved lateral resolution. The Golay codes were modified to improve the transmit power efficiency (TPE) for practical imaging. Computer simulations and experimental results show that the proposed method improves significantly the lateral resolution and penetration of ultrasound imaging compared with the conventional method.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

An Echo Processor for Medical Ultrasound Imaging Using a GPU with Massively Parallel Processing Architecture (병렬 처리 구조의 GPU를 이용한 의료 초음파 영상용 에코 신호 처리기)

  • Seo, Sin-Hyeok;Sohn, Hak-Yeol;Song, Tai-Kyong
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.871-872
    • /
    • 2008
  • The method and results of the software implementation of a echo processor for medical ultrasound imaging using a GPU (NVIDIA G80) is presented. The echo signal processing functions are modified in a SIMD manner suitable for the GPU's massively parallel processing architecture so that the GPU's 128 ALUs are utilized nearly 100%. The preliminary result for a frame of image composed of 128 scan lines, each having 10240 16-bit samples, shows that the echo processor can be inplemented at a high rate of 30 frames per second when implemented in C, which is close to the optimized assembly codes running on the TI's TMS320C6416 DSP.

  • PDF

CAD/CAM System development for Stereolitihography (광조형용 CAD/CAM 시스템 개발)

  • 홍삼열;김준안;반갑수;백인환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1996.04a
    • /
    • pp.592-596
    • /
    • 1996
  • The CAD/CAM System oriented to StereoLithographic Rapid Prototyping was constructed and developed. The software architecture uses a 586PC running the windows NT operating system. An .STL file brought into the software program can be verified in divers view points and focused for a detail of concern. A variety of Entity was applied to define an array of triangular facets and sliced loops. The system provides Edit, Scale, Orient, Copy and Divide commands to modify .STL model. The NC codes are created according to various laser beam scan pattern and the software show the parts on the platform before they are constructed. This system is written in Visual C and has been proved as a powerful tool for producing solid parts directly from a CAD modelling, using actual applications.

  • PDF