chain code
Recently Published Documents


TOTAL DOCUMENTS

368
(FIVE YEARS 75)

H-INDEX

20
(FIVE YEARS 3)

2021 ◽  
Vol 9 (2) ◽  
pp. 249
Author(s):  
Agustinus Deddy Arief Wibowo ◽  
Rudi Heriansyah

This paper proposes a real-time vehicle surveillance system based on image processing approach tailored with short message service. A background subtraction, color balancing, chain code based shape detection, and blob filtering are used to detect suspicious moving human around the parked vehicle. Once detected, the developed system will generate a warning notification to the owner by sending a short message to his mobile phone. The current frame of video image will also be stored and be sent to the owner e-mail for further checking and investigation. Last stored image will be displayed in a centralized monitoring website, where the status of the vehicle also can be monitored at the same time. When necessary, the stored images can be used during investigation process to assist the authority to take further legal actions.


2021 ◽  
Vol 2074 (1) ◽  
pp. 012062
Author(s):  
Changyong Zhu ◽  
Xiaodong Zheng ◽  
Chao Zhou

Abstract Aiming at the problems of manual testing of industrial products, a measurement method of industrial products based on three-dimensional dynamic imaging technology is proposed. The products on the production line are dynamically photographed from different angles and within a certain period of time by using cameras. Then the obtained Image denoising processing and contour tracking based on chain code table and line segment table to obtain boundary information and regional information of each enclosed area of the image. Experimental tests show that the test accuracy of this method is 100%, which is suitable for real-time detection. Fully automated research on product testing provides the foundation.


2021 ◽  
Author(s):  
Yuting He ◽  
Shigang Wang ◽  
Xueshan Gao
Keyword(s):  

Energies ◽  
2021 ◽  
Vol 14 (21) ◽  
pp. 7039
Author(s):  
Igor Korobiichuk ◽  
Viktorij Mel’nick ◽  
Volodimir Karachun ◽  
Vladyslav Shybetskyi

This work analyzes the possibility of a provision of force-majeure mode of the combat vehicles with the aid of disk construction installed in the baffler, the base of the operation of which is the method of residual cyclical quadratic chain code of construction of the “windows” of the movable disk. To determine the optimal parameters of the moving disk of the rotor system, mathematical modeling was performed. The results of mathematical modeling were used to create a PC-based calculation program. The calculation was performed for the rotational frequency ω = 300 s−1 andfor harmonic numbers from 1 to 100. The waveforms used in simulation were as follows: quasi-trapezoidal and rectangular. It is established that at the number of “windows” m = 276 in the moving disk of the rotor system the radiation spectrum acquires a uniform distribution. The object of the research is the process of extreme burning of fuel material in the combat vehicles’ engines, ensuring, according to the technical possibilities of the engine, the implementation of the force-majeure mode of the combat vehicle in the whole. The quantitative and qualitative criteria of fullness of fuel material burning in the engine are chosen as the basis for the evaluation of the reaching of the force-majeure mode. The “flat noise” of the efflux is chosen as the basis of this evaluation. This method ensures the construction of the stochastic structure of “flat noise” in the engine efflux and, in that way, confirms the possibility of technical implementation of the force-majeure mode. The rotor system further ensures not only the force-majeure formation, but also reaches the minimum noise of the combat vehicle at the change of its dislocation. The research results can be further used to optimize the design of exhaust systems, which will reduce emissions.


2021 ◽  
Author(s):  
vinodhini mani ◽  
Prakash M

Abstract Cloud computing poses a challenge to the healthcare infrastructure, as it affects privacy, confidentiality, and security rules concerning large binary objects such as x-rays and CT scan reports. However, health records are stored and accessed using an encryption hash which is stored in the interplanetary file system (IPFS), called a peer-to-peer system. But the patient’s data is sold, share for research purposes by their healthcare providers without their knowledge as it affects their privacy and security. In the healthcare industry today, customers face the issue of health record that lacks interoperability, resulting in difficulty aggregating and examining patient data. The objective of this research is to develop cybersecurity measurement approaches that ensure patient information security by protecting against cyber threats using blockchain technology based on healthcare IT. Consequently, this paper proposes an innovative solution to the problem, namely Patient-centric healthcare data management (PCHDM). It was built using IPFS, a permissioned distributed ledger system that uses Hyperledger Fabric, which stores health records, but only with the permission of the owner. A unique cryptographic public key encryption algorithm is used to encrypt IPFS data to build an electronic health record blockchain system. Our platform offers two types of solutions: (i) a solution that utilizes a database of hyper ledger fabric, which is an on-chain database, (ii) off-chain solutions which encrypt data and store it securely off-chain using IPFS. A robust blockchain solution for PCHDM will be created by encrypting the data stored in IPFS using appropriate public key cryptographic algorithms. To determine which blocks should be incorporated into the blockchain, the Byzantine Fault Tolerance is applied in the health chain architectural model. This system hosts smart contracts and application logic as well as smart contracts known as "chain code" via container technology. As part of this research, health record hashes were stored on the blockchain and the actual health data was stored off-chain in IPFS, which is the decentralized cloud storage system that achieves scalability. Due to the encryption of healthcare records with a hash, this model proves that unauthorized access is impossible because the records are more scalable, interoperable, and reliable. Stakeholders are more confident in collaborating and sharing their medical records with this model.


2021 ◽  
Author(s):  
Erik Jhones F. do Nascimento ◽  
Tassiana M. Castro ◽  
Ana Carolina S. Abreu ◽  
Filipe A. Lira ◽  
Amauri H. Souza

Webology ◽  
2021 ◽  
Vol 18 (SI04) ◽  
pp. 01-15
Author(s):  
Srilakshmi Inuganti

In Character Recognition, the Feature extraction has encompassed a well-known role. Here, Feature Extraction centered on Chain code (CC) is implemented. CC encodes every stroke with a string of numbers, in which every number signifies a specific direction wherein the subsequent point on the stroke is present. CC centered feature safeguard information and permits reasonable data to decrease. Disparate CC can signify the same shape since the CC is reliant on starting point. So here, Starting Point and rotation invariant feature extraction technique using Normalized Differential Chain Code (NDCC) is proposed. A two-stage classifier is employed for classification. Here, the NDCC feature is utilized in the pre-classifier and pre-processed (x,y) coordinates are used in the post classifier. In both stages K-NN classifier is used. This feature is verified in HP-Lab data that is present in the UNIPEN format. Investigational outcomes proved that the proposed feature enhances recognition accuracy over the selected dataset.


Doklady BGUIR ◽  
2021 ◽  
Vol 19 (4) ◽  
pp. 21-27
Author(s):  
A. I. Mitsiukhin ◽  
I. I. Pikirenya

The paper considers a digital image processing method that provides efficient transmission, redistribution and storage of aerospace environmental monitoring videographic information. The requirement to increase the monitoring efficiency, if necessary, to carry out regular monitoring of changes in the image field of the observed object is especially relevant when describing spatially aligned sets of images obtained after multi-zone, multi-time and multi-polarization shooting. In many remote sensing applications, the processing efficiency reflects the degree of reduction in the volume of transmitted, described, analyzed and stored videographic information. The computational processing of digital images based on the coordinate survey scheme is presented. The method can be used to perform the procedure for decoding images in order to solve the problem of classifying objects of interest, analyzing images. Such characteristics of binary objects as a spatial boundary and a contour were used as deciphering signs. These features make it possible to describe the shape of an object, its geometric parameters and search for images with specific spatial structures. The processing method is realized by executing efficient algorithms for coding an image on a discrete grid by means of a chain code and spectral coding based on the fast discrete Hartley transform. The result of processing comes down to minimizing the number of such basic computational operations as multiplication, addition, transferring, as well as reducing the time and capacitive complexity of the program, and reducing the redundancy of the initial data. An example of an effective representation and description of a segmented image of an object is given. The proposed method makes it possible to expand the technical capabilities of more efficient transmission and processing of images for solving problems in the field of remote sensing.


2021 ◽  
Vol 12 (1) ◽  
pp. 71-79
Author(s):  
Dr. Anamika Ahirwar ◽  
◽  
Sweta Pandey

A block chain network is a technical infrastructure that provides ledger and smart contract (chain code) services to applications. Primarily, smart contracts are used to generate transactions which are subsequently distributed to every peer node in the network where they are immutably recorded on their copy of the ledger. The users of applications might be end users using client applications or block chain network administrators. First and foremost, block chain is a public electronic ledger built around a P2P system that can be openly shared among disparate users to create an unchangeable record of transactions, each time-stamped and linked to the previous one. Every time a set of transactions is added, that data becomes another block in the chain.


Sign in / Sign up

Export Citation Format

Share Document