Computer vision and image processing techniques have been extensively used in various fields and a wide range of applications, as well as recently in surface treatment to determine the quality of metal processing. Accordingly, digital image evaluation and processing are carried out to perform image segmentation, identification, and classification to ensure the quality of metal surfaces. In this work, a novel method is developed to effectively determine the quality of metal surface processing using computer vision techniques in real time, according to the average size of irregularities and caverns of captured metal surface images. The presented literature review focuses on classifying images into treated and untreated areas. The high computation burden to process a given image frame makes it unsuitable for real-time system applications. In addition, the considered current methods do not provide a quantitative assessment of the properties of the treated surfaces. The markup, processed, and untreated surfaces are explored based on the entropy criterion of information showing the randomness disorder of an already treated surface. However, the absence of an explicit indication of the magnitude of the irregularities carries a dependence on the lighting conditions, not allowing to explicitly specify such characteristics in the system. Moreover, due to the requirement of the mandatory use of specific area data, regarding the size of the cavities, the work is challenging in evaluating the average frequency of these cavities. Therefore, an algorithm is developed for finding the period of determining the quality of metal surface treatment, taking into account the porous matrix, and the complexities of calculating the surface tensor. Experimentally, the results of this work make it possible to effectively evaluate the quality of the treated surface, according to the criterion of the size of the resulting irregularities, with a frame processing time of 20 ms, closely meeting the real-time requirements.
The study of statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection of information, which by recording information about the user ID, session ID, sending time, message length and its serial number, as well as using a new session key for encryption , allows to ensure the confidentiality and integrity of data in information and communication systems management processes. The object of research is the process of ensuring the confidentiality of data in information and communication systems management systems based on cloud technologies. The subject is the study of statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection in information and communication systems. The purpose of this work is to study the statistical stability and speed characteristics of the proposed hashing function of the advanced module of cryptographic protection in information and communication systems for process control based on cloud technologies. To use this module effectively, it is important to choose crypto-resistant encryption and hashing methods, as well as secret key synchronization. Cryptoalgorithms resistant to linear, differential, algebraic, quantum and other known types of cryptanalysis can be used as encryption and hashing functions. An experimental study was conducted, which confirmed the crypto-resistance of the advanced algorithm to linear and differential cryptanalysis and determined that the speed of cryptographic data processing by the advanced method using the developed encryption function is 1.98 times higher than analogues, and the key generation speed 1.17 times compared to the generators used in particular in the selected prototype.
За аналізом якості обслуговування абонентів у реалізованих проектах мереж 5G в світі встановлено, що заявлені вимоги до мереж п’ятого покоління не досягаються в жодній із реалізованих мереж, а фактична якість обслуговування абонентів перебуває на не досить високому рівні, що свідчить про низьку ефективність наявних методів керування мережами стільникового оператора та розподіленої обробки даних у них. Тому було розроблено метод оптимізації розміщення масштабованих послуг на розподілених обчислювальних ресурсах мережі стільникового оператора. Також було проведено імітаційне моделювання для оцінювання ефективності розробленого у роботі методу, результати якого підтвердили його ефективність.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.