http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Applying Boolean logic algorithm for photomask pattern design
Wen-Hsing Kao,Bo-Shen Liou,Wen-Hsiang Shen,Yung-Lung Tsou 한국정보기술융합학회 2013 JoC Vol.4 No.2
The reason for the trend in high-level large-area photomasks is that mask size is becoming larger and the line size and gap design is becoming thinner. In addition, the uniformity requirements for producing photomasks are becoming stricter. Consequently, the difficulties faced in manufacturing photomasks have substantially increased and a particular graphic process is required to assist with improving the yield of photomask production. During the etching process of mask production, a non-uniform etching rate produces an inferior uniformity of the critical dimensions. The reasons for the inferior etching rate results include the uniformity of the photomask pattern, the spin speed of the etching machine, and the nozzle of the etching arms. This research focuses on the photomask pattern line-width compensation for improving uniformity and precision. The research combines logical operations to select the patterns that are necessary for special compensation, adding the appropriate compensation value to the pattern and combining it with the original pattern to generate a complete photomask pattern to compensate for the inferior etching rate that produces inferior line-width uniformity.
A Difference Expansion Based Reversible Data Hiding Algorithm Using Edge-Oriented Prediction
Wen-Chao Yang,Ling-Hwei Chen,Chang-Hsing Lee 보안공학연구지원센터 2014 International Journal of Security and Its Applicat Vol.8 No.6
In this paper, a difference expansion based reversible data hiding approach which achieves the low distortion requirement under the same embedding capacity is proposed. An edge-oriented prediction method and a modified overflow/underflow prevention method are proposed to achieve the requirement. For each pixel, the prediction method uses edge information to get a better predicted value in an attempt to reduce the image distortion. Experimental results have demonstrated that the proposed reversible data hiding method yields lower distortion than several well-known expansion-based reversible data hiding methods.
Crack Detection for Metal Injection Molded Parts
( Hsing-meng Wang ),( Pei-hsuan Wu ),( Wen-tzong Lee ) 한국농업기계학회 2018 한국농업기계학회 학술발표논문집 Vol.23 No.1
In the research, image processing and machine learning techniques are employed on the surface defect detection of metal injection molded parts. There are two sections in this manuscript; one is image capturing system, and another one is the machine vision inspection system. For image capturing system, the ring light with diffuser is used, and it could project uniform light on the metal surface. CCD cameras are used to capture the images of metal injection molded parts. To obtain the best quality image, the inspection system uses Sobel operator searching for the focused position where the sharpness measure is maximized. For the machine vision inspection system, local feature information of the image is extracted by Histogram of oriented gradient, Gary level co-occurrence matrix and Local binary patterns. The selected features are imported into the support vector machines classification image to classify the crack defects.
A Cryptographic Key Assignment Scheme with Adaptable Time-token Constraint in a Hierarchy
Hsing-Chung Chen,Shiuh-Jeng Wang,Jyh-Horng Wen 보안공학연구지원센터 2008 International Journal of Multimedia and Ubiquitous Vol.3 No.4
A scheme, which uses flexible cryptographic key management upon adaptable time-token constraint for a user hierarchy access control (UHAC) scheme, is proposed in this paper. For adapting the changeability in a UHAC system, we propose a technique of assigning independent time-token which is distributed by a trusted agency server to reply an authorized user for once secure access request. The key feature of the technique is to adapt some secure parameters in distributed time-token for responding to each legal access request. Further, all class keys will be updated proactively by the concept of proactive key management, which makes the advantage that is proven and free from the scenario of the collusive attack example which proposed by Yi et al. in [18]. This cryptographic key assignment scheme based on the difficulty in solving a discrete logarithm, with adaptable time-token constraint, can achieve better security and more efficient management, than the conventional UHAC scheme. Besides, our scheme provides a flexible manner and dynamic key management to increase the availability of user access in UHAC structure.
Chin-Hsing Chang,Tzong-Shyan Lin,Wen-Ju Yang 한국원예학회 2012 Horticulture, Environment, and Biotechnology Vol.53 No.6
To improve mango anthracnose management in Taiwan, the critical timing when anthracnose invades mango panicles is a priority subject. A 3-years field study was conducted by inoculating panicles at different developmental stages with 105 conidia/mL suspensions. Invading panicles at the full blooming stage resulted in 67.2% of panicles without setting any fruit and 61.1% of the fruitlets dropped, highest latent infection rate in the unripe fruits, and highest infection rate and largest infected area in the ripe fruits during the postharvest stage. Based on the data provided, we concluded that full blooming stage was the critical stage for C. gloeosporioides control in mango production,and suggest that controlling the population of field pathogens before full blooming stage should be emphasized in routine practice.