• Title/Summary/Keyword: 알고리즘 통제

Search Result 192, Processing Time 0.019 seconds

A Study on UAV Flight Control System HILS Test Environment (무인항공기 비행제어 HILS 시험환경 연구)

  • Byun, Jinku;Hur, Gi-Bong;Lee, KwangHyun;Suk, Jinyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.4
    • /
    • pp.316-323
    • /
    • 2016
  • A UAV(Unmanned Aerial Vehicle) flies along pre-programed navigation points(in-flight, take-off, or landing) automatically without pilot input. Even though UAVs fly differently from general piloted aircraft as the pilot controls the aircraft from a ground station through means of a data-link system. Occasionally, the data-link connection can be lost for any number of reasons, in which case, the FLCC(Flight control Computer) must automatically switch to autopilot to continue flying. Hence, the FLCC is a flight-critical component that must be throughly tested and validated. This paper discusses the development of a HILS(Hardware in the Loop Simulation) test environment designed to simulate real flight conditions to verify the FLCC satisfies flying quality requirements and maintains robustness despite any potential malfunctions or emergency situations.

Flight trajectory generation through post-processing of launch vehicle tracking data (발사체 추적자료 후처리를 통한 비행궤적 생성)

  • Yun, Sek-Young;Lyou, Joon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.6
    • /
    • pp.53-61
    • /
    • 2014
  • For monitoring the flight trajectory and the status of a launch vehicle, the mission control system in NARO space center process data acquired from the ground tracking system, which consists of two tracking radars, four telemetry stations, and one electro-optical tracking system. Each tracking unit exhibits its own tracking error mainly due to multi-path, clutter and radio refraction, and by utilizing only one among transmitted informations, it is not possible to determine the actual vehicle trajectory. This paper presents a way of generating flight trajectory via post-processing the data received from the ground tracking system. The post-processing algorithm is divided into two parts: compensation for atmosphere radio refraction and multi-sensor fusion, for which a decentralized Kalman filter was adopted and implemented based on constant acceleration model. Applications of the present scheme to real data resulted in the flight trajectory where the tracking errors were minimized than done by any one sensor.

Study on the Camera Image Frame's Comparison for Authenticating Smart Phone Users (스마트폰 사용자 인증을 위한 카메라 영상 프레임 비교에 관한 연구)

  • Jang, Eun-Gyeom;Nam, Seok-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.155-164
    • /
    • 2011
  • APP based on the smart phone is being utilized to various scopes such as medical services in hospitals, financing services at banks and credit card companies, and ubiquitous technologies in companies and homes etc. In this service environment, exposures of smart phones cause loss of assets including leaks of official/private information by outsiders. Though secret keys, pattern recognition technologies, and single image authentication techniques are being applied as protective methods, but they have problems in that accesses are possible by utilizing static key values or images like pictures. Therefore, this study proposes a face authentication technology for protecting smart phones from these dangerous factors and problems. The proposed technology authenticates users by extracting key frames of user's facial images by real time, and also controls accesses to the smart phone. Authentication information is composed of multiple key frames, and the user' access is controlled by distinction algorism of similarity utilizing DC values of image's pixel and luminance.

The Extraction of Fingerprint Corepoint And Region Separation using Labeling for Gate Security (출입 보안을 위한 레이블링을 이용한 영역 분리 및 지문 중심점 추출)

  • Lee, Keon-Ik;Jeon, Young-Cheol;Kim, Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.243-251
    • /
    • 2008
  • This study is to suggest the extraction algorithms of fingerprint corepoint and region separation using the labeling for gate security in order that it might be applied to the fingerprint recognition effectively. The gate security technology is entrance control, attendance management, computer security, electronic commerce authentication, information protection and so on. This study is to extract the directional image by dividing the original image in $128{\times}128$ size into the size of $4{\times}4$ pixel. This study is to separate the region of directional smoothing image extracted by each directional by using the labeling, and extract the block that appeared more than three sorts of change in different directions to the corepoint. This researcher is to increase the recognition rate and matching rate by extracting the corepoint through the separation of region by direction using the maximum direction and labeling, not search the zone of feasibility of corepoint or candidate region of corepoint used in the existing method. According to the result of experimenting with 300 fingerprints, the poincare index method is 94.05%, the proposed method is 97.11%.

  • PDF

A Study of Extraction of Variables Affecting the Adolescents' Computer Use Type with Decision Tree (의사결정트리 기반의 분석을 통한 청소년의 컴퓨터 사용 유형별 관련 변수 추출)

  • Lee, Hye-Joo;Jung, Eui-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.9-18
    • /
    • 2012
  • This study investigated the extraction algorithm fitting for variables of adolescents' computer use type with the sample from KYPS data (3409 in the second grade of the junior high school; 1704 boys and 1705 girls). The results of the decision tree model revealed that : (1) Gender, computer use time, misdeed friends, parent supervision, other agreement of misdeed, parent study expectation, self-control, teacher attachment, and sibling relation were significant for entertainment type. (2) Gender, cyberclub, computer use time, self-belief, online misdeed were significant for relation type. (3) Study enthusiasm, personal study time, optimistic disposition, study and spare time, cyberclub, self-belief, and other people criticism were significant for information type. These results suggest that adolescents' diverse conditions should be considered for using computer more efficiently.

  • PDF

The Effect of CPS Programming Model on promoting Elementary school students' divergent thinking (초등학생의 확산적 사고 촉진을 위한 CPS 프로그래밍 수업의 효과 분석)

  • Jeon, Seong-Kyun;Lee, Young-Jun
    • The Journal of Korean Association of Computer Education
    • /
    • v.15 no.2
    • /
    • pp.1-8
    • /
    • 2012
  • General form of the programing education is finding and realizing algorithm to solve problems faster and more efficiently. In other words, it is based on convergent thinking. However, the programming education must have different characteristics to education targets. For elementary school students, it is needed to provide various experience-centered investigation environments. They should learn how to find the most efficient problem solving method by themselves. This study had adopted divergent thinking strategy where divergent thinking and convergent thinking can be repeated at the same time to suit a programming education with great importance of convergent thinking to elementary school leaners, and analyzed its effects. This study was applied to 5th graders, and 12 times of experimental measure classes were conducted by dividing them into the control group that conducted general programming class and the experimental group that conducted a programming class including divergent thinking of CPS model. As a result, CPS model had significant effect on the subordinate elements of creative problem solving skills, self-assurance, independence, and divergent thinking.

  • PDF

Action Realization of Modular Robot Using Memory and Playback of Motion (동작기억 및 재생 기능을 이용한 모듈라 로봇의 다양한 동작 구현)

  • Ahn, Ki-Sam;Kim, Ji-Hwan;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • In recent years, robots have been actively used for children's creativity learning and play, but most robots have a stereotyped form and have a high dependency on the program, making it difficult to learn creativity and play. In order to compensate for these drawbacks, We have created a robot that can easily and reliably combine each other. The robot can memorize the desired operation and execute the memorized operation by using one button. Also, in case multiple modules are combined, pressing the button once on any module makes it possible to easily adjust the operation of all the combined modules. In order to verify the actual operation, two, three, and five modules are combined to demonstrate the usefulness of the proposed structure and algorithm by implementing a gobbling motion and a walking robot. It is required to study intelligent modular robots that can control over the Internet by supplementing the wireless connection method.

An Efficient Method of IR-based Automated Keyword Tagging (정보검색 기법을 이용한 효율적인 자동 키워드 태깅)

  • Kim, Jinsuk;Choe, Ho-Seop;You, Beom-Jong
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.24-27
    • /
    • 2008
  • As shown in Wikipedia, tagging or cross-linking through major key-words improves the readability of documents. Recently, the Semantic Web rises the importance of social tagging as a key feature of the Web 2.0 and Tag Cloud has emerged as its crucial phenotype. In this paper we provides an efficient method of automated keyword tagging based on controlled term collection, where the computational complexity of O(mN) - if pattern matching algorithm is used - can be reduced to O(mlogN) - if Information Retrieval is adopted - while m is the length of target document and N is the total number of candidate terms to be tagged. The result shows that IR-based tagging speeds up 5.6 times compared with fast pattern matching algorithm.

  • PDF

Analysis of Global Precipitation CMORPH (광역적 강우자료 CMORPH 분석)

  • Kim, Joo-Hun;Kim, Kyeong-Tak
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2012.05a
    • /
    • pp.887-887
    • /
    • 2012
  • 기후변화에 의한 강우패턴의 변화는 강우량 및 강우강도의 증가로 대표되며 국립기상연구소 (2011)에 의하면 현재와 같은 탄소배출이 줄어들지 않는다면 2050년 우리나라의 강수량은 16% 증가하고 일 강수량 80mm 이상의 호우발생일수가 60%이상 증가될 것으로 전망하고 있다. 이와 같이 기후변화로 인해 발생빈도가 증가추세인 집중호우는 산사태와 같은 2차 피해를 유발하고 있으며 강우의 예측 및 실시간 모니터링은 재해 예방 및 수자원관리, 국가 방재역량 강화를 위해 연구되어야 할 분야이다. 이에 본 연구에서는 광역적 강우자료로서 미국 NOAA의 기후예측센터에 의해 제공되는 글로벌 강우량 CMORPH와 지상 강우자료와의 비교 분석을 통해 CMORPH 자료의 수자원 분야 이용 가능성을 분석하는 것을 목적으로 한다. CMORPH는 고급의 시공간적 해상도를 가지며, 단기간의 기후 예측센터 모핑(morphing) 방법에 의한 "CMORPH"라 불리우는 강우평가 알고리즘과 새로운 위성 기반 기술을 이용하여 개발되었다. CMORPH 기술에 의해 생산된 글로벌 강우 추정은 저궤도 위성 수동 마이크로파(passive microwaves, PMW) 관측으로부터 유도되고, 그 형태는 전적으로 정지궤도 위성(geostationary satellite) 적외선(IR) 데이터로부터 얻어진 공간적 전파 정보 (모션 벡터)를 통해 전송된다. 이 기술은 PMW 데이터로부터 유도된 비교적 고품질의 추정 강우를 전파하기 위하여 30분 간격의 정지궤도 위성 IR 이미지로부터 파생된 모션 벡터를 이용하며, 때때로 레이더보다 더 나은 성능을 보이기도 하고(Apip 등 2010), CMORPH의 지역적 제공범위는 $60^{\circ}N-60^{\circ}S$이고 2002년 12월부터 제공하고 있다. 본 연구에서는 CMORPH 자료 중 2002년 12월부터 제공하는 3시간 누가강우 자료를 수집하였고, 자료의 정확도 분석은 갑천유역을 대상으로 하였다. 3시간 누가 강우량을 1일 누가 강우량으로 변환한 후 금강홍수통제소의 갑천 유역 강우관측소 5곳의 강우자료를 티센 평균에 의한 유역 평균강우자료와 비교하였다. 2009년 1년간의 지상관측자료와 CMORPH자료를 비교한 결과 가 0.34 정도로 분석되었으나 추가 연구를 통해 마이크로 웨이브 강우자료 및 3시간 강우자료, 그리고 30분 강우자료의 분석을 통해 다양한 형태의 강우자료 확보뿐만 아니라 광역적인 강우특성 분석도 가능하여 연구 결과의 동아시아지역 등으로 확대 적용할 수 있을 것으로 기대한다.

  • PDF

A Study on Dynamic Signal Metering Operation Method for Roundabouts Using VISSIM (VISSIM을 활용한 회전교차로의 동적 신호미터링 운영방안 연구)

  • Lee, Sol;Ahn, Woo-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.15 no.2
    • /
    • pp.74-84
    • /
    • 2016
  • After installing roundabouts, changes of travel behaviour in the vicinity of roundabouts can cause increasing traffic volumes and unbalanced flow conditions. In that cases, the efficiency of roundabouts as a whole intersections can drop due to the insufficient gap between vehicles in the circulating lanes. The purpose of this study is developing a dynamic signal metering operation method for roundabouts in which a real time Signal Metering operation algorithm is suggested and its performance is tested by using VISSIM COM Interface(Visual Basic Application). The results of the real time Signal Metering operation show that there is a substantial delay improvements when two adjoined approaches are combined together and the flows of metering approach are less than controlling approach. Especially, the total entering flow is around 1,600 vehicle/h gives the delay reduction per vehicle of 70.9~102.2(73.8~77.8%) seconds for four-lane-approach with one-lane roundabouts.