Academic literature on the topic 'Chain code method'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Chain code method.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Chain code method"

1

Žalik, Borut, Domen Mongus, and Niko Lukač. "A universal chain code compression method." Journal of Visual Communication and Image Representation 29 (May 2015): 8–15. http://dx.doi.org/10.1016/j.jvcir.2015.01.013.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Grabowik, Cezary, Krzysztof Kalinowski, Iwona Paprocka, and Wojciech Kempa. "An Attempt to Application of Chain Codes for Design Similarity Evaluation." Advanced Materials Research 1036 (October 2014): 897–902. http://dx.doi.org/10.4028/www.scientific.net/amr.1036.897.

Full text
Abstract:
The need of integration of all engineering activities starting from a designing stage finishing on manufacturing implies the necessity of application of a new software solution. Among them CAPP systems seem to be the best and the most promising integration tool. There are the two basic methods of the computer aided process planning it is the variant and generative methods. These CAPP modelling methods are based on the different principles. The variant method is based, in general, on the ideas of the design similarity and group technology whilst the generative one mainly on the basis of utilization of the manufacturing knowledge store and the automatic process synthesis. It is a well-known fact that the variant process planning approach is based on the hypothesis that similar parts would have similar process plans. In a CAPP variant process planning system it is necessary to look for similarities between parts. Process plans formerly prepared and stored in the CAPP system manufacturing database are used for planning of new manufacturing processes for new parts similar to those recorded in system database. In the variant system working out of the classification schema and similarity measures is essential. In this paper an attempt to application of chain codes for a design similarity evaluation is presented. The proposed procedure is based on application of the chain codes for description of the parts selected longitudinal cross sections. The proposed chain code structure is created in similar way to this used for the Freeman code formation but unlike classic Freeman chain code the parts cross section is discretized in more than the 8 cardinal directions. The characteristic feature of the proposed profile coding method is the approach for the code starting point selection. In each case the part design chain code is created starting from the a priori selected upper left corner of a product. The idea of products similarity evaluation bases on the parts profile codes and application of the minimum edit distance definitions. In the paper the Levenshtein and Hamming distance for code chains similarity comparison are proposed At the current stage of research this method is used for similarity evaluation of rotational symmetric parts. The choice of the minimum edit distance measure in the proposed solution depends on product pins number.
APA, Harvard, Vancouver, ISO, and other styles
3

Mawaddah, Saniyatul, and Nanik Suciati. "Pengenalan Karakter Tulisan Tangan Menggunakan Ekstraksi Fitur Bentuk Berbasis Chain Code." Jurnal Teknologi Informasi dan Ilmu Komputer 7, no. 4 (2020): 683. http://dx.doi.org/10.25126/jtiik.2020742022.

Full text
Abstract:
<p class="Abstrak">Pengenalan karakter tulisan tangan pada citra merupakan suatu permasalahan yang sulit untuk dipecahkan, dikarenakan terdapat perbedaan gaya penulisan pada setiap orang. Tahapan proses dalam pengenalan tulisan tangan diantaranya adalah <em>preprocessing</em>, ekstraksi fitur, dan klasifikasi. <em>Preprocessing</em> dilakukan untuk merubah citra tulisan tangan menjadi citra biner yang hanya mempunyai ketebalan 1 pixel melalui proses binerisasi dan <em>thining</em>. Kemudian pada tahap ekstraksi fitur, dipilih fitur bentuk karena fitur bentuk memiliki peran yang lebih penting dibanding 2 fitur visual lainnya (warna dan tekstur) pada pengenalan karakter tulisan tangan. Metode ekstraksi fitur bentuk yang dipilih dalam penelitian ini adalah metode berbasis <em>chain code</em> karena metode tersebut sering digunakan dalam beberapa penelitian pengenalan tulisan tangan. Pada penelitian ini, dilakukan studi kinerja dari ekstraksi fitur berbasis <em>chain code</em> pada pengenalan karakter tulisan tangan untuk mengetahui metode terbaiknya. Tiga metode ekstraksi fitur berbasis <em>chain code</em> yang digunakan dalam penelitian ini adalah <em>freeman chain code</em>, <em>differential chain code</em> dan <em>vertex chain code</em>. Setiap citra karakter diekstrak menggunakan 3 metode tersebut dengan tiga cara yaitu ekstraksi secara global, lokal 3x3, 5x5, dan 7x7. Setelah esktraksi fitur, dilakukan proses klasifikasi menggunakan support vector machine (SVM). Hasil eksperimen menunjukkan akurasi terbaik adalah pada model citra 7x7 dengan nilai akurasi <em>freeman chain code</em> sebesar 99.75%, <em>differential chain code</em> sebesar 99.75%, dan <em>vertex chain code</em> sebesar 98.6%.</p><p class="Abstrak"><em><strong>Abstract</strong></em></p><p class="Abstract"><em>The recognition of handwriting characters images is a difficult problems to be solved, because everyone has a different writing style. The step of handwriting recognition process are preprocessing, feature extraction, and classification. Preprocessing is done to convert handwritten images into binary images that only have 1 pixel thickness by using binarization and thinning. Then, in the feature extraction we select shape feature because it is more important than two other visual features (color and texture) in handwriting character recognition. Shape feature extraction method chosen in this research is chain code method because this method is often used in several studies for handwriting recognition. In this study, a performance study of feature extraction based on chain codes was carried out on handwriting character recognition to know the best chain code method. The three shape feature extraction based on chain code used in this study are freeman, differential and vertex chain codes. Each character image is extracted using these 3 methods in three ways: extraction globally, local 3x3, 5x5, and 7x7. After the extraction feature, the classification process is carried out using the support vector machine (SVM). The experimental results show that the best accuracy is in the 7x7 image model with the value of freeman chain code accuracy of 99.75%, the differential chain code of 99.75%, and the vertex chain code of 98.6%.</em></p><p class="Abstrak"><em><strong><br /></strong></em></p>
APA, Harvard, Vancouver, ISO, and other styles
4

Zhang, Li Ying, and Xue Jun Zhang. "Measurement of Proppant Geometrical Characteristics Based on Chain Code." Applied Mechanics and Materials 239-240 (December 2012): 708–12. http://dx.doi.org/10.4028/www.scientific.net/amm.239-240.708.

Full text
Abstract:
In order to evaluate geometrical characteristics of proppant scientifically and accurately, both of the theoretical analysis and the experimental method were adopted. By binaryzation processing of the particles digital image, using chain code technology to realize regional boundary calibration to obtain vertex chain code and coordinates of boundary point, an algorithm has been inferred for particle size, sphericity and roundness, and problem-solving process for geometrical characteristics has been confirmed by experiments. The results indicate that measurement of geometrical characteristics, algorithm and analysis for the sizing and averaging have become rationale for the particle pattern recognition and analysis system. The conclusion breaks through traditional sieving methods in measuring and contrast plate method, laying foundation for the application of computer image analysis technology.
APA, Harvard, Vancouver, ISO, and other styles
5

Shin, Jae Kyun, and S. Krishnamurty. "On Identification and Canonical Numbering of Pin-Jointed Kinematic Chains." Journal of Mechanical Design 116, no. 1 (1994): 182–88. http://dx.doi.org/10.1115/1.2919344.

Full text
Abstract:
This paper deals with the development of a standard code for the unique representation of pin-jointed kinematic chains based on graph theory. Salient features of this method include the development of an efficient and robust algorithm for the identification of isomorphism in kinematic chains; the formulation of a unified procedure for the analysis of symmetry in kinematic chains; and the utilization of symmetry in the coding process resulting in the unique well-arranged numbering of the links. This method is not restricted to simple jointed kinematic chains only, and it can be applied to any kinematic chain which can be represented as simple graphs including open jointed and multiple jointed chains. In addition, the method is decodable as the original chain can be reconstructed unambiguously from the code values associated with the chains.
APA, Harvard, Vancouver, ISO, and other styles
6

Li, Jian, Shuai Guo, and Feng Ye. "Shape Recognition Based on Freeman Chain Code." Advanced Materials Research 317-319 (August 2011): 2490–96. http://dx.doi.org/10.4028/www.scientific.net/amr.317-319.2490.

Full text
Abstract:
In this paper, a shape recognition method based on Freeman chain code has been proposed. According to the detected corners, feature vector of a contour shape can be obtained. And the descriptor of each corner in the feature vector has three components, which are the normalized distance between the corner and the centroid of all the corners, the local main trend of both sides of the corners. By using the feature vector, the matching judgment has been given, and the results of the experiment are shown.
APA, Harvard, Vancouver, ISO, and other styles
7

Shin, Jae Kyun, and S. Krishnamurty. "Development of a Standard Code for Colored Graphs and Its Application to Kinematic Chains." Journal of Mechanical Design 116, no. 1 (1994): 189–96. http://dx.doi.org/10.1115/1.2919345.

Full text
Abstract:
The development of an efficient solution procedure for the detection of isomorphism and canonical numbering of vertices of colored graphs is introduced. This computer-based algorithm for colored graphs is formed by extending the standard code approach developed earlier for the canonical numbering of simple noncolored graphs, which fully utilizes the capabilities of symmetry analysis of such noncolored graphs. Its application to various kinematic chains and mechanisms is investigated with the aid of examples. The method never failed to produce unique codes, and is also found to be robust and efficient. Using this method, every kinematic chain and mechanism, as well as path generators and function generators, will have their own unique codes and a corresponding canonical numbering of their respective links. Thus, based on its efficiency and applicability, this method can be used as a universal standard code for identifying isomorphisms, as well as for enumerating nonisomorphic kinematic chains and mechanisms.
APA, Harvard, Vancouver, ISO, and other styles
8

Sun, Wei, Jianyi Kong, and Liangbo Sun. "A joint–joint matrix representation of planar kinematic chains with multiple joints and isomorphism identification." Advances in Mechanical Engineering 10, no. 6 (2018): 168781401877840. http://dx.doi.org/10.1177/1687814018778404.

Full text
Abstract:
The synthesis of the kinematic chain needs to obtain the information of the kinematic chain accurately and comprehensively. Isomorphism identification is an essential step in kinematic chain synthesis. In this article, a novel isomorphism determination method of planar kinematic chains with multiple joints based on joint–joint matrix description was proposed. First, a joint–joint matrix is presented to describe the kinematic chain, which can uniquely represent the kinematic chain structure. Then links and joints information were extracted from the matrix. And the link code and joint code were introduced to represent the link attributes and joint attributes, respectively. Furthermore, the standardization rules of joint–joint matrix are proposed. Isomorphism of kinematic chain is identified by comparing links, joints, and matrices. And the relationship between the links and the joints corresponding to the isomorphic kinematic chain is determined. Finally, the examples demonstrate that the method is novel and efficient.
APA, Harvard, Vancouver, ISO, and other styles
9

Sikdar, Ankita, Sreeparna Banerjee, Payal Roy, Somdeep Mukherjee, and Moumita Das. "Bengali Printed Character Recognition Using A Feature Based Chain Code Method." Advances in Image and Video Processing 2, no. 3 (2014): 1–9. http://dx.doi.org/10.14738/aivp.23.189.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Xie, Ying, P. K. Hopke, Gary Casuccio, and Brad Henderson. "Use of Chain Code Histogram Method to Quantify Airborne Particle Shapes." Aerosol Science and Technology 21, no. 3 (1994): 210–18. http://dx.doi.org/10.1080/02786829408959709.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Chain code method"

1

Ren, Manling. "Algorithms for off-line recognition of Chinese characters." Thesis, Nottingham Trent University, 1998. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.245175.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Magnussen, Matilda, and Therese Jakobsen. "Etiskt ansvarstagande : Med avstamp i de gap som kan uppstå mellan ett företags uppförandekod och en underleverantörs arbetssätt." Thesis, Linnéuniversitetet, Institutionen för ekonomistyrning och logistik (ELO), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-45134.

Full text
Abstract:
Kurs: Ämnesfördjupande arbete i logistik och ekonomistyrning, 2FE02E, 2FE20E Författare: Therese Jakobsen och Matilda Magnussen Handledare: Petra Andersson Titel: Etiskt ansvarstagande – Med avstamp i de gap som kan uppstå mellan ett företags uppförandekod och en underleverantörs arbetssätt Bakgrund: I dagens samhälle krävs det att företag tar ett större etiskt ansvar och verkar för en hållbar utveckling. Det ansvarsfulla företaget är ett uttryck för det företag som aktivt arbetar med Corporate Social Responsibility. Ett verktyg i arbetet med det är att utveckla en uppförandekod, även kallat Code of Conduct som dikterar riktlinjer och normer företagets verksamhet ska genomsyras av. I och med detta uppmärksammas oetiskt beteende i en större utsträckning och tydliggör vikten av att arbeta aktivt med CSR. Vilket leder fram till en problemdiskussion om hur ett företag kan ta ett etiskt ansvar med avstamp i de gap som kan uppstå mellan ett företags Code Of Conduct och en underleverantörs arbetssätt. Syfte: Syftet med denna uppsats är att redogöra för den process som startar då företag misstänker att det finns ett gap mellan deras CoC och underleverantörers arbetssätt. Detta för att redogöra hur processen hanteras vid upptäckt av oetiskt gap med avstamp i ett inköpande företags CoC och en underleverantörs arbetssätt och belysa hur processen kan förbättras. Metod: Denna uppsats är en kvalitativ studie och bygger på expertintervjuer samt ett typföretag. Två konsulter som kan tituleras experter inom ämnet hållbarhet har intervjuats och ett typföretag har studerats. Urvalet av respondenter och företag är gjord via ett bekvämlighetsurval. Studien har positivistiskt synsätt och utgår från en analytisk induktion som angreppsätt. Slutsats: Hur processen utformas då ett företag misstänker ett oetiskt beteende hos en underleverantör varierar från fall till fall och beror på varför företaget tar ett etiskt ansvar och hur det appliceras i praktiken. Det finns en tydlig koppling mellan ekonomin och hållbar utveckling där ekonomin har en förmåga att både främja och stjälpa den hållbara utvecklingen. I arbetet med Corporate Social Responsibility och stävan efter hållbar utveckling är det bäst att agera i förebyggande syfte, anfall är bästa försvar. Nyckelord: CSR, hållbar utveckling, etiskt ansvarstagande, Code of Conduct, värdekedja, leverantörsrevisioner, process och arbetsmetod.
APA, Harvard, Vancouver, ISO, and other styles
3

Kozlová, Alena. "Trojúhelníková schémata v neživotním pojištění." Master's thesis, Vysoká škola ekonomická v Praze, 2011. http://www.nusl.cz/ntk/nusl-124521.

Full text
Abstract:
The thesis is about the arrangement of the last known claim values into the run-off triangle. This diagram is used in non-life insurance, mainly in methods for calculating technical claims reserves. Individual methods will be described in detail and consecutively applied on real data. The real data are a set of data with long tail. We are differentiating between easier deterministic and stochastic methods, which are more demanding for calculation. The results will be compared by basic statistical parameter of the analyzed data and at the end the best method will be chosen for the data.
APA, Harvard, Vancouver, ISO, and other styles
4

Herms, Paolo. "Certification of a Tool Chain for Deductive Program Verification." Phd thesis, Université Paris Sud - Paris XI, 2013. http://tel.archives-ouvertes.fr/tel-00789543.

Full text
Abstract:
This thesis belongs to the domain of software verification. The goalof verifying software is to ensure that an implementation, a program,satisfies the requirements, the specification. This is especiallyimportant for critical computer programs, such as control systems forair planes, trains and power plants. Here a malfunctioning occurringduring operation would have catastrophic consequences. Software requirements can concern safety or functioning. Safetyrequirements, such as not accessing memory locations outside validbounds, are often implicit, in the sense that any implementation isexpected to be safe. On the other hand, functional requirementsspecify what the program is supposed to do. The specification of aprogram is often expressed informally by describing in English or someother natural language the mission of a part of the program code.Usually program verification is then done by manual code review,simulation and extensive testing. But this does not guarantee that allpossible execution cases are captured. Deductive program proving is a complete way to ensure soundness of theprogram. Here a program along with its specificationis a mathematical object and its desired properties are logicaltheorems to be formally proved. This way, if the underlying logicsystem is consistent, we can be absolutely sure that the provenproperty holds for the program in any case.Generation of verification conditions is a technique helpingthe programmer to prove the properties he wants about his programs.Here a VCG tool analyses a program and its formal specification andproduces a mathematical formula, whose validity implies the soundnessof the program with respect to its specification. This is particularlyinteresting when the generated formulas can be proved automatically byexternal SMT solvers.This approach is based on works of Hoare and Dijkstra and iswell-understood and shown correct in theory. Deductive verificationtools have nowadays reached a maturity allowing them to be used inindustrial context where a very high level of assurance isrequired. But implementations of this approach must deal with allkinds of language features and can therefore become quite complex andcontain errors -- in the worst case stating that a program correcteven if it is not. This raises the question of the level ofconfidence granted to these tools themselves. The aim of this thesis is to address this question. We develop, inthe Coq system, a certified verification-condition generator (VCG) forACSL-annotated C programs.Our first contribution is the formalisation of an executableVCG for the Whycert intermediate language,an imperative language with loops, exceptions and recursive functionsand its soundness proof with respect to the blocking big-step operational semantics of the language.A second contribution is the formalisation of the ACSL logicallanguage and the semantics of ACSL annotations of Compcert's Clight.From the compilation of ACSL annotated Clight programs to Whycertprograms and its semantics preservation proof combined with a Whycertaxiomatisation of the Compcert memory model results our maincontribution: an integrated certified tool chainfor verification of C~programs on top of Compcert. By combining oursoundness result with the soundness of the Compcert compiler we obtaina Coq theorem relating the validity of the generated proof obligationswith the safety of the compiled assembly code.
APA, Harvard, Vancouver, ISO, and other styles
5

Barnouski, Jebidiah Lee. "Using one-year claim development to chose a large claim reserving technique." Master's thesis, Instituto Superior de Economia e Gestão, 2016. http://hdl.handle.net/10400.5/11589.

Full text
Abstract:
Mestrado em Ciências Actuariais<br>Neste relatório será também explicado ao seu leitor o que é que está na base da separação dos sinistros graves dos restantes, bem como dos métodos frequentemente utilizados para o cálculo de reservas para sinistros com danos corporais. Será também exposto o processo de gestão de sinistros graves actualmente utilizado em Portugal e nas restantes sucursais da Liberty. Para chegar à conclusão de qual o melhor método a sugerir serão primeiramente completados os triângulos tanto de pagamentos ocorridos como de frequências esperadas. As reservas agregadas serão depois obtidas utilizando três métodos diferentes, Chain Ladder, Cape Cod e Benktander. Por forma a estimar o desvio padrão associado a cada método utilizado serão simulados diferentes cenários e calculada a diferença entre as reservas agregadas obtidas para 2014 e 2015 (exceptuando o período de 2015 correspondente ao qual em 2014 não foi possível recolher valores de reservas). A esta técnica é dado o nome de OCD, isto é, The One-Year Claim Development. De entre os três métodos utilizados será eleito aquele cuja medida de sensibilidade para um ano (média dos desvios padrão obtidos) for menor, e consequentemente considerar-se-á esse o melhor método para tratar sinistros graves em Portugal. Devo ainda referir que a leitura e compreensão deste relatório pressupõe o conhecimento prévio das bases da actividade seguradora no ramo automóvel, bem como do processo de cálculo de reservas matemáticas.<br>This report will arrive at a conclusion by explaining to the reader the basic reasoning behind splitting large claims as well as the most common methods for BI reserving. It is assumed that the reader has fundamental understanding of the insurance industry, motor insurance and BI, and the reserving process. It is necessary to explain the practices used by Portugal and other Liberty International countries to form an opinion of those practices by applying them to Portugal's claim information. Furthermore, the question of whether to split large claims or not will be thoroughly evaluated. Finally, there will be an aggregate suggestion as to the best splitting practice and reserving methodology specific for Liberty Seguros Portugal. To do this, several shocked scenarios will be simulated. Additional large claims will be introduced to the total incurred claims triangle and large claim count triangles. The one-year claim development (OCD) will then be compared using different reserving methodologies, the Chain Ladder Method, Cape Cod Method, and Benktander Method. The one-year claim development is measured by the change in the aggregate reserve ultimate between 2014 and 2015 (excluding the 2015 cohort for which no aggregate reserve ultimate was available in 2014). The standard deviation of each method's one-year uncertainty will be calculated by computing the OCD of each method under the three shocked scenarios. The technique that yields the lowest average of standard deviations, called the one-year sensitivity measure by the author, will be selected as the best approach for handling large claims.
APA, Harvard, Vancouver, ISO, and other styles
6

Sweetman, Michael J. "Addition of a chain-cell search method and a Van der Waals force model to a particle dynamics code." Thesis, 2003. http://library1.njit.edu/etd/fromwebvoyage.cfm?id=njit-etd2003-122.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Chain code method"

1

Markov chain Monte Carlo simulations and their statistical analysis: With web-based fortran code. World Scientific Publishing, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Markov chain Monte Carlo simulations and their statistical analysis: With web-based Fortran code. World Scientific, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Berg, Bernd A. Markov Chain Monte Carlo Simulations And Their Statistical Analysis: With Web-based Fortran Code. World Scientific Publishing Company, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Broughton, Jeffrey. Core Texts of the Sŏn Approach. Oxford University Press, 2020. http://dx.doi.org/10.1093/oso/9780197530542.001.0001.

Full text
Abstract:
The book is a study and partial translation of Core Texts of the Sŏn Approach (Sŏnmun ch’waryo), a Korean anthology of key texts foundational to Korean Sŏn (Chan/Zen) Buddhism. This anthology provides a convenient entrée to two fundamental themes of Korean Sŏn: Sŏn vis-à-vis the doctrinal teachings (in which Sŏn is shown to be superior); and the huatou (Korean hwadu) method of practice-work popularized by the Song dynasty Chan master Dahui Zonggao (1089–1163). This method consists of “lifting to awareness” or “keeping an eye on” the huatou or phrase, usually the word wu無‎/No (Korean mu). No mental operation whatsoever is to be performed upon the huatou. The practitioner simply lifts the huatou to awareness constantly, twenty-four hours a day. Core Texts of the Sŏn Approach, which was published in Korea during the first decade of the twentieth century, attempts to encapsulate the entire Korean Sŏn tradition in one convenient volume (and thus functions as a sort of vade mecum). It contains eight Chan texts by Chinese authors and seven Sŏn texts by Korean authors, showing the organic relationship between the parent Chinese Chan tradition and its heir Korean Sŏn. Due to the circumstances of modern East Asian history, Korean Sŏn is much less well-known in the West than Japanese Zen. This book will give readers access to a broad sweep of texts of the Korean branch of this school of East Asian Buddhism.
APA, Harvard, Vancouver, ISO, and other styles
5

Nowak, Dariusz, ed. Production–operation management. The chosen aspects. Wydawnictwo Uniwersytetu Ekonomicznego w Poznaniu, 2021. http://dx.doi.org/10.18559/978-83-8211-059-3.

Full text
Abstract:
The aim of the e-book is to present the theoretical, cognitive and practical aspects of the essence and complexity of operational management in a production company. The presented modern production methods together with the challenges and problems of contemporary enterprises should better help to understand the issues of sustainable development, with particular emphasis on waste. The book consists of six chapters devoted to relevant and topic issues relating to the core business of an industrial enterprise. Chapter 1 The nature of the industrial enterprise is an introduction to further considerations and deals with the essence of the basic aspects of the company. Both popular and less known definitions of an enterprise, its features, functions and principles of operation are presented. An important part of the chapter is the presentation and formulation of strategic, tactical and operational goals. Moreover, the division of enterprises is presented with the use of various criteria and the features of the industrial market, which make it distinct. Chapter 2 The operational management evolution and its role in the industrial enterprise discusses the evolution and concept of production and operational management. The management levels were also presented, indicating their most important functions. An integral part of the chapter is the essence of the production system, viewed through the prism of the five elements. Chapter 3 Functions and role in operations management presents the issues concerning the organization of production processes, production capacity and inventory management. This part also presents considerations on cooperation and collaboration between enterprises in the process of creating value. Chapter 4 Traditional methods used in operational activities focuses on methods such as benchmarking, outsourcing, core competences, JIT, MPR I and MRP II, as well as TQM and kaizen. Knowledge of these methods should contribute to understanding the activities of modern enterprises, the way of company functioning, the realization of production activities, as well as aspects related to building a competitive position. Chapter 5 Modern methods used in production-operations management discusses the less common and less frequently used production methods, based on a modern and innovative approach. In particular, it was focused on: Shop Floor Control and cooperative manufacturing, environment-conscious manufacturing (ECM) and life-cycle assessment ( LCA), waste management and recycling, Electronic Data Interchange (EDI), virtual enterprise, World Class Manufacturing (WCM), Quality Function Deployment (QFD) and House of Quality (HOQ), theory of constraints (TOC), Drum Buffer Rope (DBR), group technology (GT) and cellular manufacturing (CM), Demand Chain Management and competitive intelligence (CI). In the last section discusses: the role of sustainable statistical process control and Computer-Aided Process Planning in context formatting of information management. Chapter 6 Problems of sustainable development and challenges related to production and operations management describes the problem and challenges related to production and operations activities. In particular, attention was paid to the threats related to changes in global warming, the growing scale of waste, or the processes of globalization. It was pointed out that the emerging problem may be both a threat and a chance for the development of enterprises. An integral part of the chapter are also considerations on technical progress, innovation and the importance of human capital in operational activities.
APA, Harvard, Vancouver, ISO, and other styles
6

Jakab, András, and Dimitry Kochenov, eds. The Enforcement of EU Law and Values. Oxford University Press, 2017. http://dx.doi.org/10.1093/acprof:oso/9780198746560.001.0001.

Full text
Abstract:
It is clear that the current crisis of the EU is not confined to the Eurozone and the EMU, evidenced in its inability to ensure the compliance of Member States to follow the principles and values underlying the integration project in Europe (including the protection of democracy, the Rule of Law, and human rights). This defiance has affected the Union profoundly, and this book dissects the essence of this crisis, examining its history and offering coping methods for the years to come. Defiance is not a new concept and this volume explores the richness of EU-level and national-level examples of historical defiance—the French Empty Chair policy, the Luxembourg compromise, and the FPÖ crisis in Austria—and draws on the experience of the US legal system and that of the integration projects on other continents. Building on this legal-political context, the book focuses on the assessment of the adequacy of the enforcement mechanisms whilst learning from EU integration history. Structured in four parts, the volume studies theoretical issues on defiance in the context of multi-layered legal orders, EU mechanisms of acquis and values’ enforcement, comparative perspective on law-enforcement in multi-layered legal systems, and case-studies of defiance in the EU.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Chain code method"

1

Sánchez-Cruz, Hermilo. "A Proposal Method for Corner Detection with an Orthogonal Three-Direction Chain Code." In Advanced Concepts for Intelligent Vision Systems. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11864349_15.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Pham, Truong Hong Ngan, Teruhisa Hochin, and Hiroki Nomiya. "Evaluation of Similarity Measuring Method of Human Body Movement Based on 3D Chain Code." In Intelligent Information and Database Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-75420-8_44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jiang, Yueqiu, Ping Wang, Hongwei Gao, Lei Jin, and Xiaojing Liu. "Study on the Method for Removing Boundary Burr Based on Relevance of Chain Code." In Advanced Research on Electronic Commerce, Web Application, and Communication. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-20370-1_31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Feng, Juan, Shengwei Wang, Gang Liu, and Lihua Zeng. "A Separating Method of Adjacent Apples Based on Machine Vision and Chain Code Information." In Computer and Computing Technologies in Agriculture V. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-27281-3_32.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Verbeek, Freek, Joshua A. Bockenek, and Binoy Ravindran. "Highly Automated Formal Proofs over Memory Usage of Assembly Code." In Tools and Algorithms for the Construction and Analysis of Systems. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45237-7_6.

Full text
Abstract:
Abstract We present a methodology for generating a characterization of the memory used by an assembly program, as well as a formal proof that the assembly is bounded to the generated memory regions. A formal proof of memory usage is required for compositional reasoning over assembly programs. Moreover, it can be used to prove low-level security properties, such as integrity of the return address of a function. Our verification method is based on interactive theorem proving, but provides automation by generating pre- and postconditions, invariants, control-flow, and assumptions on memory layout. As a case study, three binaries of the Xen hypervisor are disassembled. These binaries are the result of a complex build-chain compiling production code, and contain various complex and nested loops, large and compound data structures, and functions with over 100 basic blocks. The methodology has been successfully applied to 251 functions, covering 12,252 assembly instructions.
APA, Harvard, Vancouver, ISO, and other styles
6

Yi, Hairong, Guiwen Luo, and Dongdai Lin. "Faster Scalar Multiplication on the x-Line: Three-Dimensional GLV Method with Three-Dimensional Differential Addition Chains." In Codes, Cryptology and Information Security. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16458-4_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

P, Sheela Rani, Sankara Revathi S, Dharshini J S, and Rekha M. "Identification of Product Originality Based on Supply Chain Management Using Block Chain." In Intelligent Systems and Computer Technology. IOS Press, 2020. http://dx.doi.org/10.3233/apc200141.

Full text
Abstract:
The Internet of Things (IOT) is integrated with supply chain management process to track the product. To track the product smart tags is used. The smart tags like QR code and NFC is used. But with the technology enhancement the block chain is introduced into the supply chain management process. The block chain is the great revolution that data in the centralized form is transformed in to a decentralized manner. The distributed Ledger Technology (DLT) is one of the method used in ethereum block chain. The main advantage of using DLT is, it offers decentralized, privacy-preserving and verifiable process in the smart tags. In existing system only single server was used to maintain all the process like supplier, manufacturer and distributor. In this application we are using different server which was more secure than existing system. The proposed solution in this paper is it checks the product evidence during the entire lifecycle of the product by using the smart contract. The data can be immutable by using smart contract with ethereum block chain. The duplication is manipulated by the block chainserver.
APA, Harvard, Vancouver, ISO, and other styles
8

Jain, Ratnesh Kumar, and Rahul Singhai. "Analysis of User's Browsing Behavior and Their Categorization Using Markov Chain Model." In Advances in Data Mining and Database Management. IGI Global, 2017. http://dx.doi.org/10.4018/978-1-5225-0613-3.ch002.

Full text
Abstract:
Web server log file contains information about every access to the web pages hosted on a server like when they were requested, the Internet Protocol (IP) address of the request, the error code, the number of bytes sent to the user, and the type of browser used. Web servers can also capture referrer logs, which show the page from which a visitor makes the next request. As the visit to web site is increasing exponentially the web logs are becoming huge data repository which can be mined to extract useful information for decision making. In this chapter, we proposed a Markov chain based method to categorize the users into faithful, Partially Impatient and Completely Impatient user. And further, their browsing behavior is analyzed. We also derived some theorems to study the browsing behavior of each user type and then some numerical illustrations are added to show how their behavior differs as per categorization. At the end we extended this work by approximating the theorems.
APA, Harvard, Vancouver, ISO, and other styles
9

"Design of Grounding System." In Advances in Computer and Electrical Engineering. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-3853-0.ch002.

Full text
Abstract:
This chapter contains the types of grounding systems, single ground rod, single strip end connected, single strip center connected, radial grounding, single radials, equipotential mesh electrodes, radial grounding, multiple radials, and grid electrodes grid with ground rods, ring electrode, and grounding chain. It contains also the method of calculating single grounding electrode system resistance, length/depth of the ground electrode, diameter of the ground electrode and number of ground electrodes to obtain the required grounding system resistance. The chapter contains the grounding nomograph, example worksheet using nomograph, design of multiple grounding electrode in straight line and ring systems, examples layout and graph, multiple grounding electrode system are presented. It contains also calculating methods of multiple grounding electrode system resistance of different configurations. Color code technique to calculate the design parameters of the grounding rods is also presented.
APA, Harvard, Vancouver, ISO, and other styles
10

Kuruvilla, Sarosh. "Introduction." In Private Regulation of Labor Standards in Global Supply Chains. Cornell University Press, 2021. http://dx.doi.org/10.7591/cornell/9781501754517.003.0001.

Full text
Abstract:
This introductory chapter provides a background of private regulation of labor standards in global supply chains. Over the past three decades, there has been a plethora of private, voluntary regulatory initiatives with regard to social (labor) and environmental issues. This proliferation has come about in part because of pressure from antiglobalizers calling for global governance, and consumer and activist movements calling for global corporations to be more socially and environmentally responsible. There are many different methods of private voluntary regulation for labor standards, but the most common is the private regulation model. It has three elements: setting of standards regarding labor practices in global supply chains through a corporate code of conduct generally based on the conventions of the International Labour Organization; “auditing” or “social auditing” that involves monitoring whether supplier factories comply with the code of conduct; and incentives for suppliers to improve compliance by linking future sourcing decisions to their compliance records (penalizing or dropping noncompliant suppliers and rewarding more compliant ones). The book looks at the current state and future trajectory of this form of private regulation.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Chain code method"

1

Lin, Ying, and Xinglin Fang. "A Stereo Matching Method Based on Chain Code Vector." In 2009 Second International Workshop on Computer Science and Engineering. IEEE, 2009. http://dx.doi.org/10.1109/wcse.2009.690.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Daeha Lee, Chunsu Park, Minsu Jang, and Jaehong Kim. "Human internal state recognition using modified chain-code method." In 2015 12th International Conference on Ubiquitous Robots and Ambient Intelligence (URAI). IEEE, 2015. http://dx.doi.org/10.1109/urai.2015.7358864.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Sikdar, Ankita. "A Feature Based Chain Code Method for Identifying Printed Bengali Characters." In International Conference of Advanced Computer Science & Information Technology. Academy & Industry Research Collaboration Center (AIRCC), 2012. http://dx.doi.org/10.5121/csit.2012.2310.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Qi Dong, Guangping Xu, Liu Jing, Yanbing Xue, and Hua Zhang. "A fuzzy identification method of contours based on chain-code features." In 2011 Third Chinese Conference on Intelligent Visual Surveillance. IEEE, 2011. http://dx.doi.org/10.1109/ivsurv.2011.6157018.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jung, Byung K., Sung Y. Shin, Seong H. Son, and Jeong K. Pack. "Shape based medical image retrieval method using irregularity chain code similarity." In the 2014 Conference. ACM Press, 2014. http://dx.doi.org/10.1145/2663761.2664203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Qian, You, Wang Xichang, Zhang Huaying, Sun Zhen, and Liu Jiang. "Recognition Method for Handwritten Digits Based on Improved Chain Code Histogram Feature." In 3rd International Conference on Multimedia Technology(ICMT-13). Atlantis Press, 2013. http://dx.doi.org/10.2991/icmt-13.2013.53.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Hastawan, Ahmad Fashiha, Indah Soesanti, and Noor Akhmad Setiawan. "Effective method for circle detection based on transformation of chain code direction." In PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON SYNCHROTRON RADIATION INSTRUMENTATION – SRI2015. Author(s), 2016. http://dx.doi.org/10.1063/1.4958499.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Niu, Qingxiao, Hua Zhang, Jing Liu, Qian Wang, Guangping Xu, and Yanbing Xue. "A shape contour description method based on chain code and Fast Fourier Transform." In 2011 Seventh International Conference on Natural Computation (ICNC). IEEE, 2011. http://dx.doi.org/10.1109/icnc.2011.6022333.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Jian, Ding She, and Lei Shi. "Research on Detailed Depletion Chain Solving Algorithm With the NUIT Code." In 2017 25th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2017. http://dx.doi.org/10.1115/icone25-66238.

Full text
Abstract:
Burnup calculation and nuclide inventory calculation may require solving detailed depletion chains with high computational accuracy and efficiency. NUIT (NUclide Inventory Tool) is a newly-developed nuclide inventory calculation code, which is capable of handling detailed depletion chains by implementing various advanced algorithms. Based on the NUIT code, this paper investigates the accuracy and efficiency of the Mini-Max Polynomial Approximation (MMPA) method, and compare it with the Chebyshev Rational Approximation Method (CRAM). It is concluded that both methods are numerically accurate and efficient for dealing with detailed depletion chains with extremely short half-lived nuclides.
APA, Harvard, Vancouver, ISO, and other styles
10

Liu, Chuan-He, and Ting-Li Yang. "The Compound Union Theory and Method of Type Synthesis of Geared Linkage Kinematic Chains." In ASME 2000 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2000. http://dx.doi.org/10.1115/detc2000/mech-14179.

Full text
Abstract:
Abstract The compound union theory and method of type synthesis of geared linkage kinematic chains is developed in this paper. The theory includes the new concepts, such as the basic geared kinematic chain, the compound union and the type code etc., the new constitution principle of geared linkage kinematic chains and four new theorems that are essential for type synthesis of geared linkage kinematic chains. One typical example and its results of the type synthesis are also given. It is proved that the compound union theory and method is systematic, strict, simple, practical and efficient.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Chain code method"

1

Jorgensen, Frieda, Andre Charlett, Craig Swift, Anais Painset, and Nicolae Corcionivoschi. A survey of the levels of Campylobacter spp. contamination and prevalence of selected antimicrobial resistance determinants in fresh whole UK-produced chilled chickens at retail sale (non-major retailers). Food Standards Agency, 2021. http://dx.doi.org/10.46756/sci.fsa.xls618.

Full text
Abstract:
Campylobacter spp. are the most common bacterial cause of foodborne illness in the UK, with chicken considered to be the most important vehicle for this organism. The UK Food Standards Agency (FSA) agreed with industry to reduce Campylobacter spp. contamination in raw chicken and issued a target to reduce the prevalence of the most contaminated chickens (those with more than 1000 cfu per g chicken neck skin) to below 10 % at the end of the slaughter process, initially by 2016. To help monitor progress, a series of UK-wide surveys were undertaken to determine the levels of Campylobacter spp. on whole UK-produced, fresh chicken at retail sale in the UK. The data obtained for the first four years was reported in FSA projects FS241044 (2014/15) and FS102121 (2015 to 2018). The FSA has indicated that the retail proxy target for the percentage of highly contaminated raw whole retail chickens should be less than 7% and while continued monitoring has demonstrated a sustained decline for chickens from major retailer stores, chicken on sale in other stores have yet to meet this target. This report presents results from testing chickens from non-major retailer stores (only) in a fifth survey year from 2018 to 2019. In line with previous practise, samples were collected from stores distributed throughout the UK (in proportion to the population size of each country). Testing was performed by two laboratories - a Public Health England (PHE) laboratory or the Agri-Food &amp; Biosciences Institute (AFBI), Belfast. Enumeration of Campylobacter spp. was performed using the ISO 10272-2 standard enumeration method applied with a detection limit of 10 colony forming units (cfu) per gram (g) of neck skin. Antimicrobial resistance (AMR) to selected antimicrobials in accordance with those advised in the EU harmonised monitoring protocol was predicted from genome sequence data in Campylobacter jejuni and Campylobacter coli isolates The percentage (10.8%) of fresh, whole chicken at retail sale in stores of smaller chains (for example, Iceland, McColl’s, Budgens, Nisa, Costcutter, One Stop), independents and butchers (collectively referred to as non-major retailer stores in this report) in the UK that are highly contaminated (at more than 1000 cfu per g) with Campylobacter spp. has decreased since the previous survey year but is still higher than that found in samples from major retailers. 8 whole fresh raw chickens from non-major retailer stores were collected from August 2018 to July 2019 (n = 1009). Campylobacter spp. were detected in 55.8% of the chicken skin samples obtained from non-major retailer shops, and 10.8% of the samples had counts above 1000 cfu per g chicken skin. Comparison among production plant approval codes showed significant differences of the percentages of chicken samples with more than 1000 cfu per g, ranging from 0% to 28.1%. The percentage of samples with more than 1000 cfu of Campylobacter spp. per g was significantly higher in the period May, June and July than in the period November to April. The percentage of highly contaminated samples was significantly higher for samples taken from larger compared to smaller chickens. There was no statistical difference in the percentage of highly contaminated samples between those obtained from chicken reared with access to range (for example, free-range and organic birds) and those reared under standard regime (for example, no access to range) but the small sample size for organic and to a lesser extent free-range chickens, may have limited the ability to detect important differences should they exist. Campylobacter species was determined for isolates from 93.4% of the positive samples. C. jejuni was isolated from the majority (72.6%) of samples while C. coli was identified in 22.1% of samples. A combination of both species was found in 5.3% of samples. C. coli was more frequently isolated from samples obtained from chicken reared with access to range in comparison to those reared as standard birds. C. jejuni was less prevalent during the summer months of June, July and August compared to the remaining months of the year. Resistance to ciprofloxacin (fluoroquinolone), erythromycin (macrolide), tetracycline, (tetracyclines), gentamicin and streptomycin (aminoglycosides) was predicted from WGS data by the detection of known antimicrobial resistance determinants. Resistance to ciprofloxacin was detected in 185 (51.7%) isolates of C. jejuni and 49 (42.1%) isolates of C. coli; while 220 (61.1%) isolates of C. jejuni and 73 (62.9%) isolates of C. coli isolates were resistant to tetracycline. Three C. coli (2.6%) but none of the C. jejuni isolates harboured 23S mutations predicting reduced susceptibility to erythromycin. Multidrug resistance (MDR), defined as harbouring genetic determinants for resistance to at least three unrelated antimicrobial classes, was found in 10 (8.6%) C. coli isolates but not in any C. jejuni isolates. Co-resistance to ciprofloxacin and erythromycin was predicted in 1.7% of C. coli isolates. 9 Overall, the percentages of isolates with genetic AMR determinants found in this study were similar to those reported in the previous survey year (August 2016 to July 2017) where testing was based on phenotypic break-point testing. Multi-drug resistance was similar to that found in the previous survey years. It is recommended that trends in AMR in Campylobacter spp. isolates from retail chickens continue to be monitored to realise any increasing resistance of concern, particulary to erythromycin (macrolide). Considering that the percentage of fresh, whole chicken from non-major retailer stores in the UK that are highly contaminated (at more than 1000 cfu per g) with Campylobacter spp. continues to be above that in samples from major retailers more action including consideration of interventions such as improved biosecurity and slaughterhouse measures is needed to achieve better control of Campylobacter spp. for this section of the industry. The FSA has indicated that the retail proxy target for the percentage of highly contaminated retail chickens should be less than 7% and while continued monitoring has demonstrated a sustained decline for chickens from major retailer stores, chicken on sale in other stores have yet to meet this target.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!