Abstract:
Ein Zielobjekt kann durch Abschätzen einer Verteilung einer Mehrzahl von Ausrichtungen einer Umrandung eines Zielobjekts und Erkennen des Zielobjekts auf der Grundlage der Verteilung erkannt werden.
Abstract:
Es besteht ein Wunsch nach einem genauen Erlernen eines Erkennungsmodells (130). Es wird ein durch einen Computer implementiertes Verfahren bereitgestellt, das umfasst: Erfassen eines Eingangsbildes; Erfassen eines kommentierten Bildes, das einen Bereich von Interesse im Eingangsbild kennzeichnet; Eingeben des Eingangsbildes in ein Erkennungsmodell (130), das ein Ausgangsbild erzeugt, das einen Zielbereich aus dem Eingangsbild zeigt; Berechnen eines Fehlers zwischen dem Ausgangsbild und dem kommentierten Bild unter Verwenden einer Verlustfunktion, die einen Fehler innerhalb des Bereichs von Interesse stärker gewichtet als einen Fehler außerhalb des Bereichs von Interesse; und Aktualisieren des Erkennungsmodells derart, dass der Fehler verringert wird.
Abstract:
Computerimplementiertes Verfahren für das Entwerfen einer Quelle und einer Maske für die Lithographie, das aufweist:einen Schritt (S1) des Auswählens eines Satzes von Strukturen (10);einen Schritt (S2) des Durchführens einer Quellen-Masken-Optimierung (SMO), die den Satz von Strukturen (10) verwendet, unter einer Beschränkungsregel der optischen Lagekorrektur (OPC), die für ein selektives Beschränken eines Verschiebens (40) einer Kantenposition eines Polygons (20) verwendet wird, wenn die OPC auf den Satz von Strukturen (10) angewendet wird; undeinen Schritt (S4) des Festlegens eines Layouts der Maske für die Lithographie mittels Anwendens (S3) der OPC auf sämtliche Strukturen (10), welche die Maske für die Lithographie bilden, wobei die durch die SMO optimierte Quelle verwendet wird.
Abstract:
Ein Klassifizieren neuronaler Netze kann ausgeführt werden durch Eingeben eines Trainingsdatensatzes in jedes aus einer Mehrzahl von ersten neuronalen Netzen, wobei der Trainingsdatensatz eine Mehrzahl von Proben enthält, Erhalten einer Mehrzahl von Sätzen von Ausgabewerten aus der Mehrzahl von ersten neuronalen Netzen, wobei jeder Satz von Ausgabewerten eine Mehrzahl von Ausgabewerten enthält, die einer aus der Mehrzahl von Proben entsprechen, wobei jeder Ausgabewert in Reaktion auf das Eingeben von einer der Proben des Trainingsdatensatzes von einem entsprechenden ersten neuronalen Netz ausgegeben wird, Eingeben der Mehrzahl von Sätzen von Ausgabewerten in ein zweites neuronales Netz und Trainieren des zweiten neuronalen Netzes, so dass es in Reaktion auf das Eingeben eines entsprechenden Satzes von Ausgabewerten ein erwartetes Ergebnis ausgibt, das jeder Probe entspricht.
Abstract:
PROBLEM TO BE SOLVED: To properly manage the content of information registered in a user community. SOLUTION: To provide a system for managing a user community provided on an information processing system for allowing the other users refer to information provided by a user. This system is provided with a storage part for storing an audit policy for specifying the content of information for permitting registration in the user community in association with each of a plurality of user communities; a detection part for detecting the user community of a provision destination according to the provision of information by the user; and a registration control part for preventing the information from being registered in the user community under such conditions that the information provided by the user is against the audit policy corresponding to the detected user community. COPYRIGHT: (C)2007,JPO&INPIT
Abstract:
PURPOSE: To provide a stable speech synthesis processing with the reduced tremble of pitch in a speech synthesizer system utilizing a pitch synchronized waveform superposition method. CONSTITUTION: A glottis closing point is made to be the reference point of superposition (pitch mark). Since the glottis closing point is stably and accurately extracted by using a dynamic wavelet transformation, a speech with few trembling and few gurgling is synthesized by its stability. By setting the reference point of superposition on another position from the reference point of waveform cutout, the softer cutout of a wave form is enabled. Extraction of the glottis closing point is performed by searching the local peak of dynamic wavelet transformation, however, preferably the threshold for searching the local peak of dynamic wavelet transformation is adaptively controlled every time when dynamic wavelet transformation is obtained.
Abstract:
PROBLEM TO BE SOLVED: To provide a mask design method, a program thereof, and a mask design system.SOLUTION: The mask design system according to the present invention includes: an optimization unit 120 having a global mask optimization section 122 and a global light source optimization section 123; and an optical domain simultaneous optimization unit (FDJO) 124. The optimization unit 120 performs a non-linear optimization for an optical domain representation of a mask pattern under a constraint condition that a value of a negative deviation of the object domain representation at a prescribed evaluation point of a restored object domain representation is smaller than a value of a predetermined negative threshold of the evaluation point.
Abstract:
PROBLEM TO BE SOLVED: To transfer authority of encryption communication without increasing leakage risk of an encryption key. SOLUTION: A system with a first communication apparatus and a management apparatus which makes encryption communications perform between the first communication apparatus and an external second communication apparatus, is offered. The management apparatus is provided with: a key memory unit which memorizes a first encryption key which is shared with the second communication apparatus; a key creation unit which performs operation which gives the first encryption key which is read out from the key memory unit to one direction function with a key, and creates the operation result as the second encryption key; and a key output unit which outputs the second encryption key and the key of the one direction function to the first communication apparatus. The first communication apparatus is provided with a key creation control unit which transmits the key of the one direction function received from the management apparatus to the second communication apparatus, makes the second communication apparatus perform operation to give the memorized first encryption key to the one direction function with the key, and creates the second encryption key; and an encryption communication unit which performs encryption communications with the second communication apparatus using the second encryption key received from the management apparatus. COPYRIGHT: (C)2008,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To provide a method for computing manufacturability of a lithographic mask to be used for manufacturing a semiconductor device. SOLUTION: Target edge pairs are selected from the mask layout data of a lithographic mask for computinging a manufacturing penalty as an index indicating the difficulty of manufacturing in making a lithographic mask. The mask layout data includes polygons, and each polygon has a large number of edges. Each target edge pair is defined by two edges of edges of one or more of the polygons. The manufacturability of the lithographic mask, including the manufacturing penalty in making the lithographic mask, is determined. Determining the manufacturing penalty is based on the target edge pairs selected. Determining the manufacturability of the lithographic mask uses continuous differentiability of the maufacturability defined on a continuous scale. The manufacturability of the lithographic mask is output. The manufacturability of the lithographic mask is dependent on the manufacturing penalty in making the lithographic mask. COPYRIGHT: (C)2010,JPO&INPIT
Abstract:
PROBLEM TO BE SOLVED: To extract invisible information even when visible information is overlapped with the invisible information. SOLUTION: The present invention provides a method for extracting the invisible information from an object with the visible information overlapped with at least a part of the invisible information formed by stealth ink and the method includes steps: for irradiating the object with light which makes the stealth ink emit light: for receiving reflected light from the object; for extracting image information from the received reflected light; for dividing the image information into a plurality of pieces of color channel information; for calculating a correlation function among the pieces of color channel information about the respective pixel values constituting the image information about at least two pieces of color channel information selected from the pieces of color channel information; for reducing and interpolating visible information components about one of the selected color channel information using the correlation function and for extracting the invisible information from one piece of interpolated color channel information. COPYRIGHT: (C)2007,JPO&INPIT