• Title/Summary/Keyword: code size

Search Result 1,095, Processing Time 0.031 seconds

The simulation of the liberation and size distribution of shredder products under the material characteristic coding method

  • Ni, Shiuh-Sheng;Wen, Shaw-Bing;Chu, Chung-Cheng
    • Proceedings of the IEEK Conference
    • /
    • 2001.10a
    • /
    • pp.693-698
    • /
    • 2001
  • This paper establishes a coding method system including the liberation and size distribution of recycling materials in the shredder operation. Every particle in the shredded product becomes a code number using the liberation model and size distribution equation transforming of weight percentage into particles number percentage. One set of database can be obtained after all particles have been coded. This database is suitable for the size reduction operation in the process simulation of waste recycling. Coupling with the developed air classification, sizing and separating operations, the whole process simulation will be completely established for diversified application. A typical simulation for the rolling cutting shredder product of waste TV had been demonstrated under this coding system. The breakage size distribution of Gaudin and Schumann equation were selected for the shredding operation simulation. The Gaudin's liberation model was suitable fur the liberation simulation. Both of these equations were transformed weight percentage into particles distribution for the necessary of particle coding method. A better recycling operation for this shredded solid waste can be concluded from the comparison of simulation results with their sorted grade, recovery or economic of materials in different processes.

  • PDF

Low-Complexity Multi-Size Circular Shifter for QC-LDPC Decoder Based on Two Serial Barrel-Rotators (두 개의 직렬 Barrel-Rotator를 이용한 QC-LDPC 복호기용 저면적 Multi-Size Circular Shifter)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1839-1844
    • /
    • 2015
  • The low-density parity-check(LDPC) code has been adopted in many communication standards due to its error correcting performance, and the quasi-cyclic LDPC(QC-LDPC) is widely used because of implementation easiness. In the QC-LDPC decoder, a cyclic-shifter is required to rotate data in various sizes. This kind of cyclic-shifters are called multi-size circular shifter(MSCS), and this paper proposes a low-complexity structure for MSCS. In the conventional serially-placed two barrel-rotators, the unnecessary multiplexers are revealed and removed, leading to low-complexity. The experimental results show that the area is reduced by about 12%.

New Bubble Size Distribution Model for Cryogenic High-speed Cavitating Flow

  • Ito, Yutaka;Tomitaka, Kazuhiro;Nagasaki, Takao
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2008.03a
    • /
    • pp.700-710
    • /
    • 2008
  • A Bubble size distribution model has been developed for the numerical simulation of cryogenic high-speed cavitating flow of the turbo-pumps in the liquid fuel rocket engine. The new model is based on the previous one proposed by the authors, in which the bubble number density was solved as a function of bubble size at each grid point of the calculation domain by means of Eulerian framework with respect to the bubble size coordinate. In the previous model, the growth/decay of bubbles due to pressure difference between bubble and liquid was solved exactly based on Rayleigh-Plesset equation. However, the unsteady heat transfer between liquid and bubble, which controls the evaporation/condensation rate, was approximated by a theoretical solution of unsteady heat conduction under a constant temperature difference. In the present study, the unsteady temperature field in the liquid around a bubble is also solved exactly in order to establish an accurate and efficient numerical simulation code for cavitating flows. The growth/decay of a single bubble and growth of bubbles with nucleation were successfully simulated by the proposed model.

  • PDF

A Study on High-Speed Extraction of Bar Code Region for Parcel Automatic Identification (소포 자동식별을 위한 바코드 관심영역 고속 추출에 관한 연구)

  • Park, Moon-Sung;Kim, Jin-Suk;Kim, Hye-Kyu;Jung, Hoe-Kyung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.915-924
    • /
    • 2002
  • Conventional Systems for parcel sorting consist of two sequences as loading the parcel into conveyor belt system and post-code input. Using bar code information, the parcels to be recorded and managed are recognized. This paper describes a 32 $\times$ 32 sized mini-block inspection to extract bar code Region of Interest (ROI) from the line Charged Coupled Device (CCD) camera capturing image of moving parcel at 2m/sec speed. Firstly, the Min-Max distribution of the mini-block has been applied to discard the background of parcel and region of conveying belts from the image. Secondly, the diagonal inspection has been used for the extraction of letters and bar code region. Five horizontal line scanning detects the number of edges and sizes and ROI has been acquired from the detection. The wrong detected area has been deleted by the comparison of group size from labeling processes. To correct excluded bar code region in mini-block processes and for analysis of bar code information, the extracted ROI 8 boundary points and decline distribution have been used with central axis line adjustment. The ROI extraction and central axis creation have become enable within 60~80msec, and the accuracy has been accomplished over 99.44 percentage.

Hierarchical Image Encryption System Using Orthogonal Method (직교성을 이용한 계층적 영상 암호화)

  • Kim, Nam-Jin;Seo, Dong-Hoan;Lee, Sung-Geun;Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.3
    • /
    • pp.231-239
    • /
    • 2006
  • In recent years, a hierarchical security architecture has been widely studied because it can efficiently protect information by allowing an authorized user access to the level of information. However, the conventional hierarchical decryption methods require several decryption keys for the high level information. In this paper, we propose a hierarchical image encryption using random phase masks and Walsh code having orthogonal characteristics. To decrypt the hierarchical level images by only one decryption key, we combine Walsh code into the hierarchical level system. For encryption process, we first perform a Fourier transform for the multiplication results of the original image and the random phase mask, and then expand the transformed pattern to be the same size and shape of Walsh code. The expanded pattern is finally encrypted by multiplying with the Walsh code image and the binary phase mask. We generate several encryption images as the same encryption process. The reconstruction image is detected on a CCD plane by a despread process and Fourier transform for the multiplication result of encryption image and hierarchical decryption keys which are generated by Walsh code and binary random phase image. Computer simulations demonstrate that the proposed technique can decrypt hierarchical information by using only one level decryption key image and it has a good robustness to the data loss such as random cropping.

ISO 3951, Sampling Procedures and Charts for Inspection by Variables for Percent Nonconforming (ISO 3951, 계량조정형 샘플링 검사규격)

  • Hong, Sung-Hoon;Lee, Seung-Hwan
    • Journal of Korean Society for Quality Management
    • /
    • v.23 no.1
    • /
    • pp.1-14
    • /
    • 1995
  • ISO 3951 (1989) Sampling Procedures and Charts for Inspection by Variables for Percent Nonconforming is an acceptable quality level (AQL) type sampling scheme. Sample size code letters and inspection levels in this International Standard correspond to those given in the ISO 2859 (1989), a standard for sampling plans by attributes. Two acceptance sampling procedures can be used ; tabular and graphical methods. The graphs could be used in less critical applications while the tabular method would be available for those familiar with MIL-STD-414 tables and to confirm the results of the graphs when needed. The sampling procedures of the ISO 3951 are matched to the ISO 2859 to enable us to move between them. Composite OC and ASN curves are given for AQL 2.5% and code letter F.

  • PDF

Numerical Analysis for Breakup of Liquid Jet in Crossflow (기체 유동에 수직 분사된 액체의 분해에 대한 수치적 해석)

  • Park, Sun-Il;Chang, Keun-Shik;Moon, Yun-Wan;Sah, Jong-Youb
    • Proceedings of the KSME Conference
    • /
    • 2004.11a
    • /
    • pp.1629-1633
    • /
    • 2004
  • Liquid is commonly introduced as transversal jets in venturi scrubber which is one of the gas cleaning equipments. The jet dynamics such as penetration and breakup is of fundamental importance to the dust-collection efficiency. We have developed a model that can numerically simulate the breakup of the liquid jet in crossflow. This simulation consists of models on liquid column, jet surface breakup, column fracture and secondary droplet breakup. These models have been embedded in the KIVA3-V code. We have calculated such parameters as the jet penetration, jet trajectory, droplet size, velocity field and the volume flux distribution. The results are compared with the experimental data in this paper.

  • PDF

A Numerical Study on Flow in a Water Jet (워터 제트내 유동장에 관한 수치해석 연구)

  • Kim, Ill-Soo;Park, Chang-Eun;Kim, Dae-Ho
    • 유체기계공업학회:학술대회논문집
    • /
    • 1998.12a
    • /
    • pp.27-32
    • /
    • 1998
  • This paper presents the development of a two-dimensional model for investigating the fluid flow in water jet and calculating the velocity and pressure distributions. The mathematical formulation as a standard k-$\epsilon$ model was solved employing a general thermofluid-mechanics computer program, PHOENICS code, which is based on the Semi-Implicit Method Pressure Linked Equations(SIMPLE) algorithm. The developed code was applied to water jet design to determine the nozzle size, and investigated the effect of the change of nozzle location. Calculated results showed that the flow pattern is not changed as the change of nozzle location.

  • PDF

Implementation and Analysis of Optimizers on Tuple codes (튜플 코드 상에서의 최적화기 구현과 분석)

  • 송진국
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.4
    • /
    • pp.723-736
    • /
    • 1999
  • Code optimization phase in a compiler are very important because the phase reduces the running time and the storage size of machine codes. I developed flow analyzers and optimizers on intermediate codes. The flow analyzers generate control-flow and data-flow information. The optimizers transform the intermediate codes into the improved codes using this information. This paper describes the development of flow analyzers and optimizers. I also examined the execution performance, the cost and the dependency of each optimization.

  • PDF

Performance Comparison of the CELM Encryption Algorithm (CELM 암호화 알고리즘의 성능 비교)

  • 박혜련;이종혁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.3
    • /
    • pp.481-486
    • /
    • 2002
  • In this paper, we propose CELM(Cascade ELM) to improve stability. We could realize as cascade connected each other key value with N degree equation which has a initial value. And we could know to be improved in stability with the nature of Chaos in simulation result. In efficiency, this CELM algorithm identified sire of encrypted code with size of source code and we could know more efficient than existing RSA and ECC. In speed, CELM took average 0.18㎳ degree to encrypt a file. Although it was slower than DES, it was faster than ECC of RSA.