• Title/Summary/Keyword: 오작동

Search Result 299, Processing Time 0.025 seconds

Fabrication of smart alarm service system using a tiny flame detection sensor based on a Raspberry Pi (라즈베리파이 기반 미소 불꽃 감지를 이용한 스마트 경보 서비스 시스템 구현)

  • Lee, Young-Min;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.9
    • /
    • pp.953-958
    • /
    • 2015
  • Raspberry Pi is a credit card-sized computer with support for a large number of input and output peripherals. This makes it the perfect platform for interaction with many different devices and for usage in a wide range of applications. When combined with Wi-Fi, it can communicate remotely, therefore increasing its suitability for the construction of wireless sensor nodes. In addition, data processing and decision-making can be based on artificial intelligence, what is performed in developed testbed on the example of monitoring and determining the confidence of fire. In this paper, we demonstrated the usage of Raspberry Pi as a sensor web node for fire-safety monitoring in a building. When the UV-flame sensors detect a flame as thin as that of a candle, the Raspberry Pi sends a push-message to notify the assigned smartphone of the on-site situation through the GCM server. A mobile app was developed to provide a real-time video streaming service in order to determine a false alarm. If an emergency occurs, one can immediately call for help.

Development of a Decompiler for Verification and Analysis of an Intermediate Code in ANSI C Compiler (ANSI C 컴파일러에서 중간코드의 검증과 분석을 위한 역컴파일러의 개발)

  • Kim, Young-Keun;Kwon, Hyeok-Ku;Lee, Yang-Sun
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.3
    • /
    • pp.411-419
    • /
    • 2007
  • Mounted on mobile device, set-top box, or digital TV, EVM is a virtual machine solution that can download and execute dynamic application programs. And the SIL(Standard Intermediate Language) is intermediate language of the EVM, which has a set of opcodes for object-oriented language and a sequential language. Since the C compiler used on each platform depends on the hardware, it converts C program to objective code, and then executes. To solve this problem, our research team developed ANSI C compiler and the EVM. Our ANSI C compiler outputs the SIL code based on stack machine. This paper presents the SIL-to-C decompiler in which converts the SIL code to three address code. Thus, the decompiler allows us to verify SIL code created by ANSI C compiler, and analyze a program from C language source level.

  • PDF

A Proposal of Eye-Voice Method based on the Comparative Analysis of Malfunctions on Pointer Click in Gaze Interface for the Upper Limb Disabled (상지장애인을 위한 시선 인터페이스에서 포인터 실행 방법의 오작동 비교 분석을 통한 Eye-Voice 방식의 제안)

  • Park, Joo Hyun;Park, Mi Hyun;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.4
    • /
    • pp.566-573
    • /
    • 2020
  • Computers are the most common tool when using the Internet and utilizing a mouse to select and execute objects. Eye tracking technology is welcomed as an alternative technology to help control computers for users who cannot use their hands due to their disabilities. However, the pointer execution method of the existing eye tracking technique causes many malfunctions. Therefore, in this paper, we developed a gaze tracking interface that combines voice commands to solve the malfunction problem when the upper limb disabled uses the existing gaze tracking technology to execute computer menus and objects. Usability verification was conducted through comparative experiments regarding the improvements of the malfunction. The upper limb disabled who are hand-impaired use eye tracking technology to move the pointer and utilize the voice commands, such as, "okay" while browsing the computer screen for instant clicks. As a result of the comparative experiments on the reduction of the malfunction of pointer execution with the existing gaze interfaces, we verified that our system, Eye-Voice, reduced the malfunction rate of pointer execution and is effective for the upper limb disabled to use.

Current Status and Prospect of Aircraft Ice Protection Systems (항공기 결빙 보호장치의 기술 현황 및 전망)

  • Lee, Jae-Won;Cho, Min-Young;Kim, Yong-Hwan;Yee, Kwanjung;Myong, Rho-Shin
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.48 no.11
    • /
    • pp.911-925
    • /
    • 2020
  • Aircraft ice protection systems are applied to the window shield, engine inlet, and wings to protect the aircraft from ice that may form on the surfaces of aircraft and sensors during operation. Icing on the aircraft can cause serious accidents by degrading the flight stability of the aircraft and by malfunctions in sensors such as the air data probe. Various types of ice protection systems have been developed for aircraft in the past. The electro-thermal type ice protection system contributes greatly to improving energy efficiency in a relatively simple structure, and has established itself as one of most popular ice protection systems for modern aircraft. In this review, two representative ice protection systems-hot-air and electro-thermal types-were intensively analyzed, and the prospect of ice protection systems was discussed based on the current status and application cases.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

Implementation of Active RFID System Using Prediction Packet Algorithm for Ultra Low Power Wireless Communication (초저전력 무선통신을 위한 패킷 예측 알고리즘을 이용한 능동형 RFID 시스템 구현)

  • Lee, Kyung-Hoon;Lee, Bae-Ho;Kim, Young-Min
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.8A
    • /
    • pp.661-668
    • /
    • 2012
  • In this paper, we introduce the low power wireless communication method and propose new protocol and algorithm for wireless communication which can be applied Active RFID system. Transceiver module is composed of MCU, RF transceiver and chip antenna. and it used the lithium coin battery for power supply. The experimental result is confirmed minimum power consumption which show average $10{\mu}A$(packet transmit) and $30{\mu}A$(packet receive) per second. It can be used ultra low power wireless communication. this result is possible for using the algorithm which predict the arrival time of packet. and it indicates that are possible to prevent malfunction and enhance responsiveness.

A STUDY ON THE PRESSURE BEHAVIOR INSIDE PROPELLANT LINE OF SATELLITE (인공위성 연료배관의 유압특성 연구)

  • Choi, Jin-Chul;Kim, Jeong-Soo
    • Journal of Astronomy and Space Sciences
    • /
    • v.19 no.3
    • /
    • pp.207-214
    • /
    • 2002
  • One of the way to derive design parameters of the fuel feeding system in satellite propulsion system is to analyze unsteady flow of liquid propellant (hydrazine). During steady thruster firing the flow rate is constant: if a thruster valve is abruptly shut down among a set of thrusters, pressure spikes much higher than the initial tank pressure occur. This renders the fuel flow unsteady, and the fluid pressure and flow rate to oscillate. If the pressure spikes are high enough, there are possibilities that propellant explosively decomposes, thruster valves we damaged, and adiabatic detonation of the hydrazine propellant is potentially incurred. Reflected shockwaves could also affect the calibration and operation of the pressure transducers. These necessitate the analysis of unsteady flow in the propulsion system design, and pressure behavior inside the propellant line obtained through some governing parameter variation is presented in this work.

Development of Nondestructive System for Detecting the Cracks in KTX Brake Disk Using Rayleigh Wave (Rayleigh Wave를 이용한 KTX 제동 디스크의 균열 검측 시스템 개발)

  • Kim, Min Soo;Yeom, Yun Taek;Park, Jin-Hyun;Song, Sung Jing;Kim, Hak Joon;Kwon, Sung Duck;Lee, Ho Yong
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.37 no.1
    • /
    • pp.29-36
    • /
    • 2017
  • Recently, KTX (Korean Train Express) train stoppage accidents were mainly caused by malfunctioning equipment, aging and cracking of railway vehicles, crack breakages of brake disks, and breakages of brake disks. Breakage of brake disk can cause large-scale casualties such as high-speed collision and concern about derailment by hitting lower axle and wheel. Therefore, in this study, a brake disk with solid and ventilation type, which is the brake disk of a KTX train was modeled, and a dynamometer system was constructed to operate the disk. A Rayleigh wave was used to inspect the surface of the brake disk. An ultrasonic inspection module was developed for the brake disk by using a local immersion method due to the difficulty involved in ultrasonic inspection using an existing immersion method. In addition, the surface defects of the brake disk were evaluated using a dynamometer mock-up system and an ultrasonic inspection module of the brake disk.

Power Generation and Control System Using Differential Pressure of District Heating Pipeline in a Substation (지역난방 사용자기계실 내 열수송관 차압을 이용한 발전 및 제어 기술)

  • Kim, Kyung Min;Park, Sung Yong;Oh, Mun Sei
    • Journal of Energy Engineering
    • /
    • v.26 no.3
    • /
    • pp.90-96
    • /
    • 2017
  • When the hot water is supplied through the district heating (DH) pipeline, a pressure differential control valve (PDCV) protects the DH user equipment from the high pressure DH water and helps to supply DH water to long distance. It also controls the temperature and adjust the pressure in the main district heating pipeline. However, cavitation occurs in PDCV due to the use of high pressure DH water. It causes frequent failures and many problems. It also causes energy loss and complaints to both operators and users. In order to solve these problems, we will introduce the energy saving technology to replace the primary side PDCV with hydraulic turbine, convert the differential pressure into electricity, and utilize electricity as the power of the secondary side pump.

Improving Data Availability by Data Partitioning and Partial Overlapping on Multiple Cloud Storages (다수 클라우드 스토리지로의 데이터 분할 및 부분 중복을 통한 데이터 가용성 향상)

  • Park, Jun-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12B
    • /
    • pp.1498-1508
    • /
    • 2011
  • A cloud service customer has no other way but to wait for his lost data to be recovered by the cloud service provider when the data was lost or not accessible for a while due to the provider's system failure, cracking attempt, malfunction, or outage. We consider a solution to address this problem that can be implemented in the cloud client's domain, rather than in the cloud service provider's domain. We propose a high level architecture and scheme for successfully retrieving data units even when several cloud storages are not accessible at the same time. The scheme is based on a clever way of partitioning and partial overlapping of data for being stored on multiple cloud storages. In addition to providing a high level of data availability, the scheme makes it possible to re-encrypt data units with new keys in a user transparent way, and can produce the complete log of every user's data units accessed, for assessing data disclosure, if needed.