A code-based approach for labeling in complex irregular regions

被引:0
|
作者
Li, Zhi-long [1 ]
Cao, Jun-jie [1 ]
Liu, Xiu-ping [1 ]
Su, Zhi-xun [1 ]
机构
[1] Dalian Univ Technol, Sch Math Sci, Dalian 116024, Peoples R China
来源
基金
中国国家自然科学基金;
关键词
Labeling; Freeman codes; Region filling; Optimal direction; Shipbuilding; NESTING PROBLEMS; PLACEMENT; ALGORITHMS; SEARCH; PARTS;
D O I
10.1631/jzus.A0920214
中图分类号
T [工业技术];
学科分类号
08 ;
摘要
Labeling information in a complex irregular region is a useful procedure occurring frequently in sheet metal and the furniture industry which will be beneficial in parts management. A fast code-based labeler (FCBL) is proposed to accomplish this objective in this paper. The region is first discretized, and then encoded by the Freeman encoding technique for providing the 2D regional information by 1D codes with redundancies omitted. We enhance the encoding scheme to make it more suitable for our complex problem. Based on the codes, searching algorithms are designed and can be extended with customized constraints. In addition, by introducing a smart optimal direction estimation, the labeling speed and accuracy of FCBL are significantly improved. Experiments with a large range of real data gained from industrial factories demonstrate the stability and millisecond-level speed of FCBL. The proposed method has been integrated into a shipbuilding CAD system, and plays a very important role in ship parts labeling process.
引用
收藏
页码:1450 / 1460
页数:11
相关论文
共 50 条
  • [31] Basic Semiosis as Code-Based Control
    Artmann, Stefan
    BIOSEMIOTICS, 2009, 2 (01) : 31 - 38
  • [32] NIST PQC: Code-based CryptoSystems*
    Kuznetsov A.A.
    Gorbenko Yu.I.
    Prokopovych-Tkachenko D.I.
    Lutsenko M.S.
    Pastukhov M.V.
    Telecommunications and Radio Engineering (English translation of Elektrosvyaz and Radiotekhnika), 2019, 78 (05): : 429 - 441
  • [33] Redundant code-based masking revisited
    Costes N.
    Stam M.
    IACR Transactions on Cryptographic Hardware and Embedded Systems, 2020, 2021 (01): : 426 - 450
  • [34] Basic Semiosis as Code-Based Control
    Stefan Artmann
    Biosemiotics, 2009, 2 : 31 - 38
  • [35] JECB: a Join-Extension, Code-Based Approach to OLTP Data Partitioning
    Tran, Khai Q.
    Naughton, Jeffrey F.
    Sundarmurthy, Bruhathi
    Tsirogiannis, Dimitris
    SIGMOD'14: PROCEEDINGS OF THE 2014 ACM SIGMOD INTERNATIONAL CONFERENCE ON MANAGEMENT OF DATA, 2014, : 39 - 50
  • [36] A Code-Based Analytical Approach for Using Separate Device Coprocessors in Computing Systems
    Hampel, Volker
    Goronzy, Grigori
    Maehle, Erik
    ARCHITECTURE OF COMPUTING SYSTEMS - ARCS 2011, 2011, 6566 : 1 - 12
  • [37] Correction: Design displacement for lifelines at fault crossings: the code-based approach for Europe
    Vasileios E. Melissianos
    Dimitrios Vamvatsikos
    Laurentiu Danciu
    Roberto Basili
    Bulletin of Earthquake Engineering, 2024, 22 : 2721 - 2721
  • [38] A Code-Based Approach to Unauthorized Access Under the Computer Fraud and Abuse Act
    Bellia, Patricia L.
    GEORGE WASHINGTON LAW REVIEW, 2016, 84 (06) : 1442 - 1476
  • [39] Probabilistic root finding in code-based cryptography
    Marchiori, Dunia
    Custodio, Ricardo
    Panario, Daniel
    Moura, Lucia
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) : 71 - 85
  • [40] Design criteria of a new code-based KEM
    Vysotskaya, Victoria
    Chizhov, Ivan
    JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2024, 20 (03): : 497 - 511