• Title/Summary/Keyword: process control techniques

Search Result 601, Processing Time 0.025 seconds

Color2Gray using Conventional Approaches in Black-and-White Photography (전통적 사진 기법에 기반한 컬러 영상의 흑백 변환)

  • Jang, Hyuk-Su;Choi, Min-Gyu
    • Journal of the Korea Computer Graphics Society
    • /
    • v.14 no.3
    • /
    • pp.1-9
    • /
    • 2008
  • This paper presents a novel optimization-based saliency-preserving method for converting color images to grayscale in a manner consistent with conventional approaches of black-and-white photographers. In black-and-white photography, a colored filter called a contrast filter has been commonly employed on a camera to lighten or darken selected colors. In addition, local exposure controls such as dodging and burning techniques are typically employed in the darkroom process to change the exposure of local areas within the print without affecting the overall exposure. Our method seeks a digital version of a conventional contrast filter to preserve visually-important image features. Furthermore, conventional burning and dodging techniques are addressed, together with image similarity weights, to give edge-aware local exposure control over the image space. Our method can be efficiently optimized on GPU. According to the experiments, CUDA implementation enables 1 megapixel color images to be converted to grayscale at interactive frames rates.

  • PDF

A Study of Fatigue Crack Growth Behaviour for Ferrite-Bainite Dual Phase Steel (Ferrite-Bainite dual phase 강의 피로균열진전 특성 평가)

  • Kim, Deok-Geun;Cho, Dong-Pil;Oh, Dong-Jin;Kim, Myung-Hyun
    • Journal of Welding and Joining
    • /
    • v.34 no.1
    • /
    • pp.41-46
    • /
    • 2016
  • With the recent increase in size of ships and offshore structures, there are more demand for thicker plates. As the thickness increases, it is known that fatigue life of the structures decrease. To improve the fatigue life, post weld treatments techniques, such as toe grinding, TIG dressing and hammer peening, are typically employed. However, these techniques require additional construction time and production cost. Therefore, it is of crucial interest steels with longer fatigue crack growth life compared to conventional steels. This study investigates fatigue crack growth rate (FCGR) behaviours of conventional EH36 steel and Ferrite-Bainite dual phase EH36 steel (F-B steel). F-B steel is known to have improved fatigue performance associated with the existence of two different phases. Ferrite-Bainite dual phase microstructures are obtained by special thermo mechanical control process (TMCP). FCGR behaviours are investigated by a series of constant stress-controlled FCGR tests. Considering all test conditions (ambient, low temperature, high stress ratio), it is shown that FCGR of F-B steel is slower than that of conventional EH36 steel. From the tensile tests and impact tests, F-B steel exhibits higher values of strength and impact energy leading to slower FCGR.

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

The use of spectroscopic Ellipsometey for the observation of diamond thin film growth by microwave plasma chemical vapor deposition (마이크로웨이브 플리즈마 화학기상증착에 의한 다이아몬드 박막의 성장 관찰을 위한 분광 Ellipsometry의 이용)

  • 홍병유
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.8 no.2
    • /
    • pp.240-248
    • /
    • 1998
  • The plasma chemical vapor deposition is one of the most utilized techniques for the diamond growth. As the applications of diamond thin films prepared by plasma chemical vapor deposition(CVD) techniques become more demanding, improved fine-tuning and control of the process are required. The important parameters in diamond film deposition include the substrate temperature, $CH_4/H_2$ gas flow ratio, total, gas pressure, and gas excitation power. With the spectroscopic ellipsometry, the substrate temperature as well as the various parameters of the film can be determined without the physical contact and the destructiveness under the extreme environment associated with the diamond film deposition. It is introduced how the real-time spectroscopic ellipsometry is used and the data are analyzed with the view of getting the growth condition and the accompanied features for a good quality of diamond films. And it is determined the important parameters during the diamond film growth, which include the final sample will be measured with Raman spectroscopy to confirm the diamond component included in the film.

  • PDF

Multi-Attribute based on Data Management Scheme in Big Data Environment (빅 데이터 환경에서 다중 속성 기반의 데이터 관리 기법)

  • Jeong, Yoon-Su;Kim, Yong-Tae;Park, Gil-Cheol
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.263-268
    • /
    • 2015
  • Put your information in the object-based sensors and mobile networks has been developed that correlate with ubiquitous information technology as the development of IT technology. However, a security solution is to have the data stored in the server, what minimal conditions. In this paper, we propose a data management method is applied to a hash chain of the properties of the multiple techniques to the data used by the big user and the data services to ensure safe handling large amounts of data being provided in the big data services. Improves the safety of the data tied to the hash chain for the classification to classify the attributes of the data attribute information according to the type of data used for the big data services, functions and characteristics of the proposed method. Also, the distributed processing of big data by utilizing the access control information of the hash chain to connect the data attribute information to a geographically dispersed data easily accessible techniques are proposed.

Development of Localized Roots Type Medium-Vacuum Pump (루츠형 중진공펌프 국산화 개발)

  • Tak, Bong-Yeol;Kim, Byung-Duk;Yang, Hea-Gyeong;Han, Gi-Young;Lee, So-A
    • The KSFM Journal of Fluid Machinery
    • /
    • v.14 no.3
    • /
    • pp.23-27
    • /
    • 2011
  • Due to a roots type medium vacuum pump is operated in condition of $1{\sim}10^{-3}$ torr vacuum, it could be applied for production and process of industrial parts, such as precise processing, vaporization, enrichment, separation, casting, metaling, welding, transportation. Therefore, the demand of this pump is increasing nowadays in our industrial markets of semiconductor, electric, electronic, automobile, material, environmental and transporting industries. However, the pumps are almost imported, because the domestic pumps are inferior in fields of vacuum range as under $10^{-1}$torr, relevant techniques(design, fabrication, casting, test, etc.) to the imported ones. In this study, essential parts of the development pump are designed with using of CFD and 3D decodes, FEM for analysing strength and deformation, generated heat, vibration and noise control, and are casted with using of mechanochemistry techniques for decreasing of weights, increasing of heat resistances and abrasion durability of materials for pump caing and impellers especially. Besides, in order to achieve ultimate vacuum around $10^{-3}$torr, this pump is composed of 6 stages, among which 1st stage is operated separately from remained stages. Additionally, a test rig for prototype pumps(300$m^3/h$ and 2,500$m^3/h$) is designed and procured as to apply for multi-staged rootz type vacuum pump, with modification of the test method recommended by KS B 6314 "Positive-displacement oil-sealed rotary vacuum pumps".

Study on the Connection with Public Authentication and Bio Authentication (공인인증서와 바이오인증 연계를 위한 연구)

  • Ryu, Gab-Sang
    • Journal of Internet of Things and Convergence
    • /
    • v.1 no.1
    • /
    • pp.39-44
    • /
    • 2015
  • Organization is increasing the authorizing process to use public certificate and bio information. Certificate, has evolved to be able to parallel distributes the bio authentication and portable bio-authentication device. Authentication using an individual's PC and smart devices continue to generalize, while convenience for authentication is increased by comparison Study on cooperation with the security at the network level's a weak situation. If ask authentication method through the cooperation of the public certificate and bio information work with current network access control, there is a possibility to develop a more powerful security policy. by cooperation weaknesses against vulnerable personal authentication techniques on security token in a reliable and secure personal authentication techniques, such as bio-recognition, Bio Information for identification and to prevent exposing a methodology suggest to validate whether or not to carry out in this paper. In addition, organize the scenario that can work with the 802.1x network authentication method, and presented a proposal aimed at realization.

Intermediate-Representation Translation Techniques to Improve Vulnerability Analysis Efficiency for Binary Files in Embedded Devices (임베디드 기기 바이너리 취약점 분석 효율성 제고를 위한 중간어 변환 기술)

  • Jeoung, Byeoung Ho;Kim, Yong Hyuk;Bae, Sung il;Im, Eul Gyu
    • Smart Media Journal
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2018
  • Utilizing sequence control and numerical computing, embedded devices are used in a variety of automated systems, including those at industrial sites, in accordance with their control program. Since embedded devices are used as a control system in corporate industrial complexes, nuclear power plants and public transport infrastructure nowadays, deliberate attacks on them can cause significant economic and social damages. Most attacks aimed at embedded devices are data-coded, code-modulated, and control-programmed. The control programs for industry-automated embedded devices are designed to represent circuit structures, unlike common programming languages, and most industrial automation control programs are designed with a graphical language, LAD, which is difficult to process static analysis. Because of these characteristics, the vulnerability analysis and security related studies for industry automation control programs have only progressed up to the formal verification, real-time monitoring levels. Furthermore, the static analysis of industrial automation control programs, which can detect vulnerabilities in advance and prepare for attacks, stays poorly researched. Therefore, this study suggests a method to present a discussion on an industry automation control program designed to represent the circuit structure to increase the efficiency of static analysis of embedded industrial automation programs. It also proposes a medium term translation technology exploiting LLVM IR to comprehensively analyze the industrial automation control programs of various manufacturers. By using LLVM IR, it is possible to perform integrated analysis on dynamic analysis. In this study, a prototype program that converts to a logical expression type of medium language was developed with regards to the S company's control program in order to verify our method.

A Study on Quality Verification Techniques of Bus Information System (버스정보시스템의 품질평가 기법 연구)

  • Kum, Ki-Jung;Kim, Won-Tae;Wang, Yi-Wan;Son, Seung-Neo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.6 no.1 s.12
    • /
    • pp.1-12
    • /
    • 2007
  • The objective of Bus Information System developed as a part of the ITS, provides the operation information of buses to passengers and managers. The system uses roadside antennas (reading electronic tags on board buses) to enable wireless communication each other and radio data communication to deliver information about buses and their locations. This information is used to estimate the arrival time of the bus which will be shown on the bus stop message board or via internet. Bus Information System or Bus Management System (BMS) is going ahead and set up in many local governments, and recently quality improvement of the BIS is considered as a very important element in expanding of business or management. Therefore this research wished to contribute rationalization of the system by maintaining optimum quality. An gang was chosen to apply overall quality control process and will be evaluated in terns of its propriety and performance. This study has led the improvement of service and promote the use of public transits, which is the best way to solve the city traffic problem by effective management of public transits.

  • PDF

A Study on Layer's Method Applied Long & Middle Hair Design (레이어 법칙을 활용한 긴 머리형과 중간 머리형의 디자인 연구)

  • Park, Sang-Kook;Seo, Yun-Kyung
    • Korean Journal of Human Ecology
    • /
    • v.18 no.3
    • /
    • pp.793-798
    • /
    • 2009
  • Hair cut is one of the best useful technical tool for hair styling. In this study using the rule of the layers of hair design, balanced for visual art, perceptual ability and form created by the principles of analysis and offer hair cuts and hair design of the representation of regions and even hair design as the basis of a student of Hair Beauty and all the people working in the field can create a variety of hair design puts the purpose to establish a basis. The result of this study can be outline as follows: First, the step line and the movement of the relationship between the law of the layers above and below the length of the same layer techniques, the same consists of a vertical cross-section of the overall round shape of the cut same layer is created and the appropriate volume and movement, the movement of low-layer round a little bit more feeling and expression is used when you want. High-layer used to want to move a lot of light and could see that. Second, the layer of the Law and over direction, lifting, section, the line control. weight control and analyzed by principle and the principle of the process of forming the written form was unknown. Third, hair design, the expansion of the expressive power of the law of the layers, and the section of the over direction depends on the presence of line control to express the length of the outline I had to, lifting the weight to adjust form controls, and the expression of Hair Design will be expanding the width. A hair designer, a layer style to create a zone he thought the law of the first layer formative area To further the reach will be a lot of research, leading up formative aspects of this research thesis do not have missing parts, or as a result of the Beauty of Hair Design and the width of a hair design education in the field can perform to help feed the reference materials that will be.