• Title/Summary/Keyword: and variety identification

Search Result 442, Processing Time 0.027 seconds

A Study of Minute Particles' Adhesion on a Rough Surface for a Cryogenic $CO_2$ Cleaning Process (극저온 $CO_2$ 세정공정을 위한 거친표면 위 미세입자의 점착특성 연구)

  • Seok, Jong-Won;Lee, Seong-Hoon;Kim, Pil-Kee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.1
    • /
    • pp.5-10
    • /
    • 2010
  • Among a variety of cleaning processes, the cryogenic carbon dioxide ($CO_2$) cleaning has merits because it is highly efficient in removing very fine particles, innoxious to humans and does not produce residuals after the cleaning, which enables us to extend its area of coverage in the semi-conductor fabrication society. However, the cryogenic carbon dioxide cleaning method has some technical research issues in aspect to particles' adhesion and removal. To resolve these issues, performing an analysis for the identification of particle adhesion mechanism is needed. In this study, a research was performed by a theoretical approach. To this end, we extended the G-T (Greenwood-Tripp) model by applying the JKR (Johnson-Kendall-Roberts) and Lennard-Jones potential theories and the statistical characteristics of rough surface to investigate and identify the contact, adhesion and deformation mechanisms of soft or hard particles on the rough substrate. The statistical characteristics of the rough surface were taken into account through the employment of the normal probability distribution function of the asperity peaks on the substrate surface. The effects of surface roughness on the pull-off force for these particles were examined and discussed.

Performance Improvement of a Real-time Traffic Identification System on a Multi-core CPU Environment (멀티 코어 환경에서 실시간 트래픽 분석 시스템 처리속도 향상)

  • Yoon, Sung-Ho;Park, Jun-Sang;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.348-356
    • /
    • 2012
  • The application traffic analysis is getting more and more challenging due to the huge amount of traffic from high-speed network link and variety of applications running on wired and wireless Internet devices. Multi-level combination of various analysis methods is desired to achieve high completeness and accuracy of analysis results for a real-time analysis system, while requires much of processing burden on the contrary. This paper proposes a novel architecture for a real-time traffic analysis system which improves the processing performance on multi-core CPU environment. The main contribution of the proposed architecture is an efficient parallel processing mechanism with multiple threads of various analysis methods. The feasibility of the proposed architecture was proved by implementing and deploying it on our campus network.

Simultaneous analysis of anthocyanins and flavonols in various flower colors of Rhododendron schlippenbachii (royal azalea)

  • Oh, Soo-Min;Chun, Jin-Hyuk;Lee, Min-Ki;Kim, Jung-Bong;Kim, Sun-Ju
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.1
    • /
    • pp.104-113
    • /
    • 2017
  • Anthocyanins contained in Rhododendron schlippenbachii (royal azalea) are expressed in a variety of colors and affect flower colors. R. schlippenbachii flowers of seven colors (white, red group: pink, deep pink, red, purple group: light purple, purple, deep purple) were collected from the garden around KT&G building in the college of agriculture and life science. Seven types of anthocyanins [cyanidin 3-O-diglucoside, cyanidin 3-O-arabinoside-5-O-glucoside, cyanidin 3-O-galactoside, peonidin 3-O-arabinoside-5-O-glucoside, cyanidin 3-O-glucoside, cyanidin 3-O-(6"-O-malonyl) arabinoside, cyanidin 3-O-(6"-O-coumaroyl) glucoside] turned out to be from the cyanidin and peonidin series in R. schlippenbachii flowers. Also, seven types of flavonols [azaleatin 3-O-glucoside, azaleatin 3-O-arabinoside, azaleatin 3-O-rhamnoside, quercetin 3-O-galacatoside, quercetin 3-O-glucoside, quercetin 3-O-arabinoside, quercetin 3-O-rhamnoside] were identified in R. schlippenbachii flowers. Total anthocyanin amounts decreased in R. schlippenbachii flowers in the following order: 'deep pink' (8.07) > 'red' (6.37) > 'pink' (5.35) > 'deep purple' (0.78) > 'purple' (0.43) > 'light purple' ($0.22mg{\cdot}g^{-1}$ dry weight, DW) > 'white' (not detected). Total flavonol amounts decreased in the following order: 'pink' (97.78) > 'deep pink' (63.79) > 'deep purple' (61.98) > 'white' (57.58) > 'light purple' (47.06) > 'purple' (46.76) > 'red' ($7.60mg{\cdot}g^{-1}$ dry weight, DW). This study provided the quantitative and qualitative information for the variation of anthocyanin and flavonol compounds in R. schlippenbachii flowers. Furthermore, this information can contribute to the identification of anthocyanin and flavonol compounds in other Rhododendron flowers.

Psychoanalytic Aspect of Obesity (비만의 정신분석적 고찰)

  • Lee, Moo-Suk
    • Korean Journal of Psychosomatic Medicine
    • /
    • v.3 no.2
    • /
    • pp.207-213
    • /
    • 1995
  • Author reviewed psychodynamics and psychoanalytic treatment of obesity. A variety of psychodynamics and unconscious conflicts have been described in obese patients : eating as a defense against depression, eating as a substitute for maternal love, obese body as a larger penis, and eating as a self-soothing. There was a gross neglect of certain normal parenting roles in obese family. The parenatal superego structure was not as perfectionistic. As with children and other patients with preoedipal pathology, in obese patients the analyst in addition to being transference object is a new and different object who promote healthy maturation. Because of obese parients, in there projective identification, can provoke intense countertransference, the analyst have to consider it. On the other hand, many analysts' countertransferences to superobese patients is that huge person recalls one's own childhood relationship with adults and bring forth a feeling of helplessness.

  • PDF

Face Recognition Evaluation of an Illumination Property of Subspace Based Feature Extractor (부분공간 기반 특징 추출기의 조명 변인에 대한 얼굴인식 성능 분석)

  • Kim, Kwang-Soo;Boo, Deok-Hee;Ahn, Jung-Ho;Kwak, Soo-Yeong;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.7
    • /
    • pp.681-687
    • /
    • 2007
  • Face recognition technique is very popular for a personal information security and user identification in recent years. However, the face recognition system is very hard to be implemented due to the difficulty where change in illumination, pose and facial expression. In this paper, we consider that an illumination change causing the variety of face appearance, virtual image data is generated and added to the D-LDA which was selected as the most suitable feature extractor. A less sensitive recognition system in illumination is represented in this paper. This way that consider nature of several illumination directions generate the virtual training image data that considered an illumination effect of the directions and the change of illumination density. As result of experiences, D-LDA has a less sensitive property in an illumination through ORL, Yale University and Pohang University face database.

A Review on Advanced Methodologies to Identify the Breast Cancer Classification using the Deep Learning Techniques

  • Bandaru, Satish Babu;Babu, G. Rama Mohan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.420-426
    • /
    • 2022
  • Breast cancer is among the cancers that may be healed as the disease diagnosed at early times before it is distributed through all the areas of the body. The Automatic Analysis of Diagnostic Tests (AAT) is an automated assistance for physicians that can deliver reliable findings to analyze the critically endangered diseases. Deep learning, a family of machine learning methods, has grown at an astonishing pace in recent years. It is used to search and render diagnoses in fields from banking to medicine to machine learning. We attempt to create a deep learning algorithm that can reliably diagnose the breast cancer in the mammogram. We want the algorithm to identify it as cancer, or this image is not cancer, allowing use of a full testing dataset of either strong clinical annotations in training data or the cancer status only, in which a few images of either cancers or noncancer were annotated. Even with this technique, the photographs would be annotated with the condition; an optional portion of the annotated image will then act as the mark. The final stage of the suggested system doesn't need any based labels to be accessible during model training. Furthermore, the results of the review process suggest that deep learning approaches have surpassed the extent of the level of state-of-of-the-the-the-art in tumor identification, feature extraction, and classification. in these three ways, the paper explains why learning algorithms were applied: train the network from scratch, transplanting certain deep learning concepts and constraints into a network, and (another way) reducing the amount of parameters in the trained nets, are two functions that help expand the scope of the networks. Researchers in economically developing countries have applied deep learning imaging devices to cancer detection; on the other hand, cancer chances have gone through the roof in Africa. Convolutional Neural Network (CNN) is a sort of deep learning that can aid you with a variety of other activities, such as speech recognition, image recognition, and classification. To accomplish this goal in this article, we will use CNN to categorize and identify breast cancer photographs from the available databases from the US Centers for Disease Control and Prevention.

Semantic Event Detection and Summary for TV Golf Program Using MPEG-7 Descriptors (MPEG-7 기술자를 이용한 TV 골프 프로그램의 이벤트검출 및 요약)

  • 김천석;이희경;남제호;강경옥;노용만
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.96-106
    • /
    • 2002
  • We introduce a novel scheme to characterize and index events in TV golf programs using MPEG-7 descriptors. Our goal is to identify and localize the golf events of interest to facilitate highlight-based video indexing and summarization. In particular, we analyze multiple (low-level) visual features using domain-specific model to create a perceptual relation for semantically meaningful(high-level) event identification. Furthermore, we summarize a TV golf program with TV-Anytime segmentation metadata, a standard form of an XML-based metadata description, in which the golf events are represented by temporally localized segments and segment groups of highlights. Experimental results show that our proposed technique provides reasonable performance for identifying a variety of golf events.

Introduction of Korea Oil Identification System(KOIS) (우리나라의 해상유출물질 감식.분석기법 연구)

  • Lee, Y.S.;Lee, S.J.;Kim, C.S.;Oh, H.J.;Kim, H.G.
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2006.05a
    • /
    • pp.85-92
    • /
    • 2006
  • Crude oil is complex mixture if thousands of different organic compound formed from a variety of organic materials that are chemically converted under differing geological conditions over long periods of time. Also oil composition varies according to crude source, refining, processing, handling and storage. The oil fingerprint method is application if specific knowledge of petrochemicals and use if sophisticated analytical equipment and techniques to identify the source(s) if oil pollution. KCG currently utilizes four primary analytical techniques: Gas Chromatography (GC), Fluorescence Spectroscopy(FL), Infrared Spectroscopy(IR) and Gas Chromatography mass spectrometer(GC/MS). Of all these techniques, GC technique are most widely used Gas Chromatography is used as a primary analytical method because high reliableness, high separating efficiency and repeatability.

  • PDF

Analysis of the Schedule Risk using PROMETHEE in Building Construction Management (건설관리에서의 PROMETHEE기반 공정 리스크 분석)

  • Lee, Jang-Young;Yoon, You-Sang;Jang, Myung-Houn;Suh, Sang-Wook
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.2
    • /
    • pp.25-34
    • /
    • 2010
  • The building construction projects include a variety of risk factors due to uncertainties. To succeed in the projects, it is important how risks are managed. Risk management is composed of identification, analysis and response. Especially, the risk analysis is important to objectively calculate significance of risk factors. This paper evaluates a method to find priorities of risks using the AHP(Analytic Hierarchy Process). The method has some defects; (1) the consistency becomes weak as the number of pair-wise compared risks is large, and (2) the input and output procedures are complex when risks are added to or removed from a risk database. Thus the paper adopts the PROMETHEE(Preference Ranking Organization METHod Enrichment Evaluations) analysis process which is able to overcome the limitation of the AHP restricted to 9 risk factors. The PROMETHEE makes the procedure of risk analysis simple, when the risk factors pull out and put in the risk database. The purpose of this study is to provide process of risk analysis to use the PROMETHEE.

Analysis of Users' Gestures by Application in Smartphone Touch Interfaces (스마트폰 터치 인터페이스에서 애플리케이션별 사용자 제스처의 분석)

  • Kim, Jisun;Bahn, Hyokyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.9-14
    • /
    • 2015
  • Touch interface is widely used in a smartphone instead of a keyboard or a keypad interface that has been adopted in a PC or a featurephone, respectively. Touch interface can recognize a variety of gestures that clearly represent the distinct features of each application's input. This paper analyzes users' gesture of each application captured by the touch interface of a smartphone. Specifically, we extract touch input traces from various application categories such as game, web browser, youtube, image and e-book viewer, video player, camera, and map applications, and then analyzed them. Through this analysis, we observed a certain unique characteristics of each application's touch input, and this can be utilized in various useful areas such as identification of an application user, prevention of running an application by an illegal user, or design of a new interface convenient to a specific user.