• Title/Summary/Keyword: data processing technique

Search Result 2,003, Processing Time 0.035 seconds

Development of Multi-Laser Vision System For 3D Surface Scanning (3 차원 곡면 데이터 획득을 위한 멀티 레이져 비젼 시스템 개발)

  • Lee, J.H.;Kwon, K.Y.;Lee, H.C.;Doe, Y.C.;Choi, D.J.;Park, J.H.;Kim, D.K.;Park, Y.J.
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.768-772
    • /
    • 2008
  • Various scanning systems have been studied in many industrial areas to acquire a range data or to reconstruct an explicit 3D model. Currently optical technology has been used widely by virtue of noncontactness and high-accuracy. In this paper, we describe a 3D laser scanning system developped to reconstruct the 3D surface of a large-scale object such as a curved-plate of ship-hull. Our scanning system comprises of 4ch-parallel laser vision modules using a triangulation technique. For multi laser vision, calibration method based on least square technique is applied. In global scanning, an effective method without solving difficulty of matching problem among the scanning results of each camera is presented. Also minimal image processing algorithm and robot-based calibration technique are applied. A prototype had been implemented for testing.

  • PDF

The Thermocapillary Effect on Pure Conduction Mechanism in a Closed Square Cavity (수평 사각밀폐공간내의 전도열전달 기구에서 열모세관효과)

  • Yu, Jae-Bong;An, Do-Won;Yoo, Joo-Sik;Eom, Yong-Kyoon
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.29 no.11 s.242
    • /
    • pp.1209-1219
    • /
    • 2005
  • In a closed square cavity filled with a liquid, a cooling horizontal upper wall and a heating lower wall, the flow isn't generated under the ground-based condition when Rayleigh number is lower than 1700. In this mechanism, Ra=1534, Temperature and velocity fields near an air-bubble in silicon-oil under a cooled upper wall were investigated. Temperature and velocity fields is visualized using the thermo-sensitive liquid-crystal and light sheet visualization technique. The quantitative analysis fer the temperature and the flow fields were carried out by applying the image processing technique to the original data. The symmetry shape of two vortexes near an air bubble was observed. As the bubble size increased, the size of vortex and the magnitude of velocity increased. In spite of elapsed time, a pair of vortexes was the unique and steady-state flow in a square cavity and wasn't induced to the other flow in the surround region.

A Partition Technique of UML-based Software Models for Multi-Processor Embedded Systems (멀티프로세서용 임베디드 시스템을 위한 UML 기반 소프트웨어 모델의 분할 기법)

  • Kim, Jong-Phil;Hong, Jang-Eui
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.87-98
    • /
    • 2008
  • In company with the demand of powerful processing units for embedded systems, the method to develop embedded software is also required to support the demand in new approach. In order to improve the resource utilization and system performance, software modeling techniques have to consider the features of hardware architecture. This paper proposes a partitioning technique of UML-based software models, which focus the generation of the allocatable software components into multiprocessor architecture. Our partitioning technique, at first, transforms UML models to CBCFGs(Constraint-Based Control Flow Graphs), and then slices the CBCFGs with consideration of parallelism and data dependency. We believe that our proposition gives practical applicability in the areas of platform specific modeling and performance estimation in model-driven embedded software development.

Simple Image Stenography Technology for Large Scale Text (대용량 텍스트를 위한 손실 없는 영상 은닉기술)

  • Rhee, Keun-Moo
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1104-1107
    • /
    • 2008
  • These people where generally the image or the document nik technique silver document image, against the digital data of audio back all type the research is advanced being used with objective and the use which are various, is a d. Needs a low-end leveling instrument security text from the research which it sees and with substitution quantity the silver nik being simple it will be able to deliver the technique which is simple it embodied. It combined the text image first and the nose which is in the collar image of 24 bit depth which will reach ting it did and it rehabilitatedded and a higher officer technique and the result it used that the loss ratio of the text image to analyze is slight it was ascertained.

A Study on Efficient Data De-Identification Method for Blockchain DID

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.60-66
    • /
    • 2021
  • Blockchain is a technology that enables trust-based consensus and verification based on a decentralized network. Distributed ID (DID) is based on a decentralized structure, and users have the right to manage their own ID. Recently, interest in self-sovereign identity authentication is increasing. In this paper, as a method for transparent and safe sovereignty management of data, among data pseudonymization techniques for blockchain use, various methods for data encryption processing are examined. The public key technique (homomorphic encryption) has high flexibility and security because different algorithms are applied to the entire sentence for encryption and decryption. As a result, the computational efficiency decreases. The hash function method (MD5) can maintain flexibility and is higher than the security-related two-way encryption method, but there is a threat of collision. Zero-knowledge proof is based on public key encryption based on a mutual proof method, and complex formulas are applied to processes such as personal identification, key distribution, and digital signature. It requires consensus and verification process, so the operation efficiency is lowered to the level of O (logeN) ~ O(N2). In this paper, data encryption processing for blockchain DID, based on zero-knowledge proof, was proposed and a one-way encryption method considering data use range and frequency of use was proposed. Based on the content presented in the thesis, it is possible to process corrected zero-knowledge proof and to process data efficiently.

An Alloy Specification Based Automated Test Data Generation Technique (Alloy 명세 기반 자동 테스트 데이터 생성 기법)

  • Chung, In-Sang
    • The KIPS Transactions:PartD
    • /
    • v.14D no.2
    • /
    • pp.191-202
    • /
    • 2007
  • In general, test data generation techniques require the specification of an entire program path for automated test data generation. This paper presents a new way for generating test data automatically een without specifying a program path completely. For the ends, this paper presents a technique for transforming a program under test into Alloy which is the first order relational logic and then producing test data via Alloy analyzer. The proposed method reduces the burden of selecting a program path and also makes it easy to generate test data according to various test adequacy criteria. This paper illustrates the proposed method through simple, but illustrative examples.

Clustering Technique for Sequence Data Sets in Multidimensional Data Space (다차원 데이타 공간에서 시뭔스 데이타 세트를 위한 클러스터링 기법)

  • Lee, Seok-Lyong;LiIm, Tong-Hyeok;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.28 no.4
    • /
    • pp.655-664
    • /
    • 2001
  • The continuous data such as video streams and voice analog signals can be modeled as multidimensional data sequences(MDS's) in the feature space, In this paper, we investigate the clustering technique for multidimensional data sequence, Each sequence is represented by a small number by hyper rectangular clusters for subsequent storage and similarity search processing. We present a linear clustering algorithm that guarantees a predefined level of clustering quality and show its effectiveness via experiments on various video data sets.

  • PDF

Fast Visualization Technique and Visual Analytics System for Real-time Analyzing Stream Data (실시간 스트림 데이터 분석을 위한 시각화 가속 기술 및 시각적 분석 시스템)

  • Jeong, Seongmin;Yeon, Hanbyul;Jeong, Daekyo;Yoo, Sangbong;Kim, Seokyeon;Jang, Yun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.22 no.4
    • /
    • pp.21-30
    • /
    • 2016
  • Risk management system should be able to support a decision making within a short time to analyze stream data in real time. Many analytical systems consist of CPU computation and disk based database. However, it is more problematic when existing system analyzes stream data in real time. Stream data has various production periods from 1ms to 1 hour, 1day. One sensor generates small data but tens of thousands sensors generate huge amount of data. If hundreds of thousands sensors generate 1GB data per second, CPU based system cannot analyze the data in real time. For this reason, it requires fast processing speed and scalability for analyze stream data. In this paper, we present a fast visualization technique that consists of hybrid database and GPU computation. In order to evaluate our technique, we demonstrate a visual analytics system that analyzes pipeline leak using sensor and tweet data.

Scope Minimization of Join Queries using a Range Window on Streaming XML Data (스트리밍 XML 데이타에서 영역 윈도우를 사용한 조인 질의의 범위 최소화 기법)

  • Park, Seog;Kim, Mi-Sun
    • Journal of KIISE:Databases
    • /
    • v.33 no.2
    • /
    • pp.224-238
    • /
    • 2006
  • As XML became the standard of data exchange in the internet, the needs for effective query processing for XML data in streaming environment is increasing. Applying the existing database technique which processes data with the unit of tuple to the streaming XML data causes the out-of-memory problem due to limited memory volume. Likewise the cost for searching query path and accessing specific data may be remarkably increased because of special structure of XML. In a word it is unreasonable to apply the existing database system to the streaming environment that processes query for partial data, not the whole one. Thus, it should be able to search partial streaming data that rapidly satisfies join predicate through using low-capacity memory, based on a store technique suitable to streaming XML data. In this thesis, in order to study the store technique for low-capacity memory, the PCDATA and the CDATA-related parts, which can be used as predicate on join query, were fetched and saved. In addition, in an attempt to compare rapid join predicates, the range window of streaming XML data was set with the object of selectively joining windows that satisfies the query, based on Cardinality * and + among the structure information of DTD.

A Comparative Study on Rate of Error with Bisecting Angle Technique and Paralleling Technique (등각촬영법과 평행촬영법에서의 실책 비교 연구)

  • Lee, Kyeong-Hee;Park, Il-Soon;Jung, Jung-Ock
    • Journal of dental hygiene science
    • /
    • v.11 no.3
    • /
    • pp.155-161
    • /
    • 2011
  • The purpose of this study was to obtain data necessary for guiding students in the future by grasping which rate of error is made how much depending on a shooting technique in the filming of periapical radiograph. 14,402 films, which were instructed targeting students for the Department of Dental Hygiene at D Health College and S Health College, were analyzed. The following results were obtained by conducting questionnaire survey targeting 263 students who completed the shooting practice lesson of bisecting angle technique and paralleling technique. 1. In case of having shot with bisecting angle technique, the ratio of error was the highest in both maxillary and mandibular first molar. 2. In case of having shot with paralleling technique, the ratio of error was the highest in the maxillary bicuspid and the mandibular first molar. 3. As for ratio of error in light of a shooting technique, both bisecting angle technique and paralleling technique were indicated to be the highest in inaccuracy of film position. The bisecting angle technique was indicated to have the higher ratio of error compared to the paralleling technique. 4. As for ratio of error in light of the processing technique, both bisecting angle technique and paralleling technique were indicated to be the highest in dark image and light image. The bisecting angle technique was indicated to have the higher ratio of error compared to the paralleling technique. 5. Students were indicated to feel it to be most difficult for grasping the processing level in the film-developing process. As the above results, to reduce ratio of error given the periapical radiography, a method of reducing ratio of error given the periapical radiography is considered to be what correctly understands the morphological and anatomical structure inside the mouth and what acquires the shooting technique by filming several times with having enough time.