• Title/Summary/Keyword: 자동차 시스템

Search Result 3,561, Processing Time 0.029 seconds

Assignment Scheme for Entering Middle School Using GIS (GIS 정보를 이용한 중학교 무시험 배정업무 기법)

  • Kim, Seung-Mok;Kim, Seung-Hoon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.71-78
    • /
    • 2010
  • Teachers have to measure the distance from their students' houses to neighboring schools manually by using ruler or driving cars every year. Not only it makes an significant overhead, but it also makes a problem of reliability of measured distance. The problem of fairness exists as well if measured distance is incorrect erroneously or deliberately. In this paper, we propose a scheme for constructing GIS and use its data for assigning students for entering middle schools without tests. We analyze the manually measured first and second nearest schools by using GIS data and confirm the measured distances have considerable errors. We also assign students based on the first and the second nearest school by using GIS. As a result, the distance to the assigned school reduced significantly and the fairness increases as well.

Automatic Test case Generation Mechanism from the Decision Table of Requirement Specification Techniques based on Metamodel (메타모델 기반 요구사항 명세 기법인 의사 결정표를 통한 자동 테스트 케이스 생성 메커니즘)

  • Hyun Seung Son
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.2
    • /
    • pp.228-234
    • /
    • 2023
  • As the increasing demand for high-quality software, there is huge requiring for quality certification of international standards, industrial functional safety (IEC 61508), automotive (ISO 26262), embedded software guidelines for weapon systems, etc., in the industry. Software companies are very difficult to systematically acquire the quality certification in terms of cost and manpower of Startup, venture small-sized companies. For their companies one test case automatic generation is considered as a core technique to evaluate or improve software quality. This paper proposes a test case automatic generation method based on the design decision table for system and software design verification. We apply the proposed method with OMG's standard techniques of metamodel and model transformation for automatically generating test cases. To do this, we design the metamodels of design decision table (Model) and test case document (Text) and define model transformation to automatically generate test cases, which will expect to easily work MC/DC coverage.

The Application of Fiber-Reinforced Composites to Electromagnetic Wave Shielding Enclosures (섬유강화 복합재료의 전자파 차폐 기구물에 대한 적용에 관한 연구)

  • Park Ki-Yeon;Lee Sang-Eui;Lee Won-Jun;Kim Chun-Gon;Han Jae-Hung
    • Composites Research
    • /
    • v.19 no.3
    • /
    • pp.1-6
    • /
    • 2006
  • As the structures of the high performance electronic equipments and devices recently become more complex, the electromagnetic interference (EMI) and compatibility (EMC) have been very essential for commercial and military purposes. Thus, sensitive electrical devices and densely packed systems need to be protected from electromagnetic wave. In this research, glass fabric/epoxy composites containing conductive multi-walled carbon nanotube (MWNT) and carbon fiber/epoxy composites as electrical shielding materials were fabricated and electrical properties of the composites were measured. The concerning frequency band is from 300 MHz to 1 GHz. The performances of composite shielding enclosures were predicted using electromagnetic wave 3-D simulation tool, CST Microwave Studio. The shielding enclosure made of carbon fiber/epoxy composites were fabricated and the shielding effectiveness (SE) was measured in the anechoic chamber.

Game Theoretical Analysis of Economic Gab-Jil (경제적 갑질에 대한 게임이론적 분석)

  • Yang, Chae-Yeol
    • Korean small business review
    • /
    • v.41 no.3
    • /
    • pp.95-106
    • /
    • 2019
  • The Economic Gab-Jil, where the stronger are forcing the weaker to sacrifice, is not only a serious social problem, but also it exhausts the vitality of the national economy. Especially, the issue of 'cost reduction (CR) of delivery price' in automobile industry, and the issue of 'tolls' and 'retaliating' in the franchise business are becoming more controversial. This paper suggests some measures to rectify the problems by an analysis using a game-theoretic model. One of the ways to change the 'bad equilibrium', where economic Gab-Jil is prevalent, to the 'good equiblium' is to strengthen the bargaining power of the weak by legal and institutional measures. It is also a more market-friendly system that is self-enforcing, where the regulation is automatically enforced by the incentives of the participants, without relying solely on the enforcement power of regulatory or supervisory bodies

Interaction Design of Take-Over Request for Semi-Autonomous Driving Vehicle : Comparative Experiment between HDD and HUD (반자율주행 차량의 제어권 전환 요청(TOR) 인터랙션 디자인 연구 : HDD와 HUD 비교 실험을 중심으로)

  • Kim, Taek-Soo;Choi, Song-A;Choi, Junho
    • Design Convergence Study
    • /
    • v.17 no.4
    • /
    • pp.17-29
    • /
    • 2018
  • In the semi-autonomous vehicle, before reaching a fully autonomous driving stage, it is imperative for the system to issue a take-over request(TOR) that asks a driver to operate manually in a specific situation. The purpose of this study is to compare whether head-up display(HUD) is a better human-vehicle interaction than head-down display(HUD) in the event of TOR. Upon recognition of TOR in the experiment with a driving simulator, participants were prompted to switch over to manual driving after performing a secondart task, that is, playing a game, while in auto-driving mode. The results show that HUD is superior to HDD in 'ease of use' and 'satisfaction' although there is no significant difference in reaction time and subjective workload. Therefore, designing secondary tasks through HUD during autonomous driving situation improves the user experience of the TOR function. The implication of this study lies in the establishing an empirical case for setting up UX design guidelines for autonomous driving context.

Advances in Power Semiconductor Devices for Automotive Power Inverters: SiC and GaN (전기자동차 파워 인버터용 전력반도체 소자의 발전: SiC 및 GaN)

  • Dongjin Kim;Junghwan Bang;Min-Su Kim
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.30 no.2
    • /
    • pp.43-51
    • /
    • 2023
  • In this paper, we introduce the development trends of power devices which is the key component for power conversion system in electric vehicles, and discuss the characteristics of the next-generation wide-bandgap (WBG) power devices. We provide an overview of the characteristics of the present mainstream Si insulated gate bipolar transistor (IGBT) devices and technology roadmap of Si IGBT by different manufacturers. Next, recent progress and advantages of SiC metal-oxide-semiconductor field-effect transistor (MOSFET) which are the most important unipolar devices, is described compared with conventional Si IGBT. Furthermore, due to the limitations of the current GaN power device technology, the issues encountered in applying the power conversion module for electric vehicles were described.

A Study on the Trigger Technology for Vehicle Occupant Detection (차량 탑승 인원 감지를 위한 트리거 기술에 관한 연구)

  • Lee, Dongjin;Lee, Jiwon;Jang, Jongwook;Jang, Sungjin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.120-122
    • /
    • 2021
  • Currently, as demand for cars at home and abroad increases, the number of vehicles is decreasing and the number of vehicles is increasing. This is the main cause of the traffic jam. To solve this problem, it operates a high-ocompancy vehicle (HOV) lane, a multi-passenger vehicle, but many people ignore the conditions of use and use it illegally. Since the police visually judge and crack down on such illegal activities, the accuracy of the crackdown is low and inefficient. In this paper, we propose a system design that enables more efficient detection using imaging techniques using computer vision to solve such problems. By improving the existing vehicle detection method that was studied, the trigger was set in the image so that the detection object can be selected and the image analysis can be conducted intensively on the target. Using the YOLO model, a deep learning object recognition model, we propose a method to utilize the shift amount of the center point rather than judging by the bounding box in the image to obtain real-time object detection and accurate signals.

  • PDF

A Study on the Direction of the Introduction of Korean Autonomous Co-operation Driving Vehicle (한국형 자율협력주행차량의 도입 방향성에 관한 연구)

  • Lee, Seung-Pil;Kim, Hwan-Seong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2020.11a
    • /
    • pp.161-162
    • /
    • 2020
  • Major advanced ports around the world are preparing for environmental regulations such as increased efficiency of ports and low emission of pollutants in ports by utilizing fourth industrial technologies and ICT technologies such as AI, big data, self-driving cars and connected cars. It is also investing in developing fully unmanned terminals to solve the problem of workforce reduction caused by avoidance of 3D industries. However, the introduction of advanced technology is being delayed in domestic ports, which has led to a drop in port efficiency. In addition, port safety accidents have also occurred frequently, seriously affecting port marketing. Thus, the characteristics and types of each container terminal in Korea were analyzed and the factors for introducing autonomous cooperative driving were classified into five section factors and 15 division factors. Hierarchically classified factors will be surveyed on workers working in shipping lines, port construction, container terminals and related ministries.

  • PDF

A Sentiment Analysis of Customer Reviews on the Connected Car using Text Mining: Focusing on the Comparison of UX Factors between Domestic-Overseas Brands (텍스트 마이닝을 활용한 커넥티드 카 고객 리뷰의 감성 분석: 국내-해외 브랜드간 UX 요인 비교를 중심으로)

  • Youjung Shin;Junho Choi;Sung Woo Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.517-528
    • /
    • 2023
  • The purpose of this study is to analyze and compare UX factors of connectivity systems of domestic and overseas car brands. Using a text mining analysis, UX factors of domestic and overseas brands were compared through positive-negative sentiment index. After collecting 120,000 reviews on Hyundai Motor Group (Hyundai, Kia, Genesis) and 190,000 on Tesla, BMW, and Mercedes, pre-processing was performed. Keywords were classified into 11 UX factors in 3 dimensions of the system connection, information, and service. For domestic brands, sentiment index for 'safety' was the highest. For overseas brands, 'entertainment' was the most positive UX factor.

Cyber Attack Detection Using Message Authentication for Controller Area Networks (차량 내부 네트워크에서 메세지 인증을 이용한 사이버 공격 탐지)

  • Lee, Suyun;Park, Seo-Hee;Song, Ho-Jin;Beak, Youngmi
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.107-109
    • /
    • 2022
  • This paper proposes a new security system to detect cyber-attacks based on message authentication in a in-vehicle network. In the in-vehicle network, when a sending node transmits messages in a broadcast manner, it only uses a message identifier, rather than a node's identifier. It leads to a problem not identifying the source. In the proposed system, the sending node generates a message authentication code (MAC) using a cryptographic hash function to the control data and transmits it with the control data. When generating the MAC for each message, a multidimensional chaotic map is applied to increase the randomness of the result. The receiving node compares its MAC generated from the control data in the received message with the MAC of the received message to detect whether the message transmitted from the sending node is forged or not. We evaluate the performance of the proposed system by using CANoe and CAPL (Communication Access Programming Language). Our system shows a 100% of detection rate against cyber-attacks injected.

  • PDF