• Title/Summary/Keyword: Alarm setting

Search Result 28, Processing Time 0.03 seconds

Development of the Emergency Generator Equipments Diagnosis System (비상용 발전설비 진단시스템 개발)

  • Lee, Sang-Cheol;Na, Chae-Dong;Lee, Seong-Beom;Yoo, Jae-Moon;Choi, Sik
    • Proceedings of the KIEE Conference
    • /
    • 1999.07f
    • /
    • pp.2590-2593
    • /
    • 1999
  • This paper describes the development of Emergency Generator Equipments Diagnosis System for monitoring generator equipments and battery system. This system is capable of measuring on up to 20 separate sites of generator, engine and periphral equipment's. Battery system also capable of measure the setting time, float and discharge voltage of up to 240 cells in a single installation, and has the memory capacity to store battery's alarm data information on up to 200 separate sites. This system are easy to maintain and attain cost effectively, so that prepared for meeting the customer's service needs immediately. The system is additionally programmed with a each model, that will enable to accurately determine the generator equipments and remain battery capacity in a system following a short discharge test. It is also equipped with remote interrogation and control facilities.

  • PDF

Fabrication of Battery Checking & Monitoring System (밧데리 진단 및 감시장치 제작)

  • Lee, Sang-Cheol;Na, Chae-Dong;Yoo, Jae-Moon;Choi, Sik
    • Proceedings of the KIEE Conference
    • /
    • 1998.07f
    • /
    • pp.2156-2159
    • /
    • 1998
  • This paper describes a Battery Checking & Monitoring System for monitoring battery cell and power system in Uninterruptible Power Supplies(UPS). The system is capable of measuring, in a matter of setting time, float and discharge voltage of up to 240 cells in a single installation, and has the memory capacity to store battery's alarm data information on up to 200 separate sites. This system are easy to maintain and attain cost effectively, so that prepared for meeting the customer's service needs immediately. The system is additionally programmed with a each model, that will enable to accurately determine the remain battery capacity in a UPS system following a short discharge test. It is also equipped with remote interrogation and control facilities.

  • PDF

Light Propagation in Multimode GRIN(graded-index) Fibers with Intrusion Sensing Capability (침입 감지기능을 가진 다중모드 GRIN(graded-index) 광섬유 내에서의 광파의 전파)

  • Sohn, Young-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.11 no.5
    • /
    • pp.273-278
    • /
    • 2002
  • An intrusion-sensitive capability of multimode graded-index (GRIN) optical fibers under bending has been investigated. In this system, the data light is transmitted in the fundamental mode while alarm monitor light is launched in a high-order mode at the same time. An attempted intrusion to drain data by bending the fiber results in greater attenuation of a monitor signal in higher order modes, thereby setting off an alarm at the receiver. Light propagation in a multimode graded-index fiber is also analyzed theoretically when the fundamental mode is selectively excited and the fiber is bent around a constant radius mandrel. The bending generates coupling between the various modes of the fiber. Power transitions of the fundamental mode by changing the bending radius were also analyzed numerically using program simulation. It is shown that Asawa-Taylor model[4] is valid up to 1cm of the radius of curvature of the fiber bend.

Performance Analysis of Initial Cell Search in WCDMA System over Rayleigh Fading Channels (레일리 페이딩 채널에서 W-CDMA 시스템의 초기 셀 탐색 성능 해석)

  • Song, Moon-Kyou
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.4
    • /
    • pp.1-10
    • /
    • 2001
  • The 3-step cell search has been considered for fast acquisition of the scrambling code unique to a cell in the W -CDMA system. In this paper, the performance of the cell search scheme is analyzed in Rayleigh fading channels. And the system parameters for cell search scheme and the design parameters for the receivers are examined. The probabilities of detection, miss and false alarm for each step are derived in closed forms based on the statistics of CDMA noncoherent demodulator output. Through the analysis, the effect of threshold setting and post detection integration for each step is investigated, and the optimal values of the power allocation for the synchronization channels are also considered. The number of post-detection integrations for each step is a design parameter for the receiver, and the optimum values may depend on not only the power allocation for each channel related to the cell search, but the false alarm penalty time. It is shown that optimal values could be determined through the analysis. Also, the cumulative probability distribution of the average cell search time is obtained.

  • PDF

A Selection of Threshold for the Generalized Hough Transform: A Probabilistic Approach (일반화된 허프변환의 임계값 선택을 위한 확률적 접근방식)

  • Chang, Ji Y.
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.1
    • /
    • pp.161-171
    • /
    • 2014
  • When the Hough transform is applied to identify an instance of a given model, the output is typically a histogram of votes cast by a set of image features into a parameter space. The next step is to threshold the histogram of counts to hypothesize a given match. The question is "What is a reasonable choice of the threshold?" In a standard implementation of the Hough transform, the threshold is selected heuristically, e.g., some fraction of the highest cell count. Setting the threshold too low can give rise to a false alarm of a given shape(Type I error). On the other hand, setting the threshold too high can result in mis-detection of a given shape(Type II error). In this paper, we derive two conditional probability functions of cell counts in the accumulator array of the generalized Hough transform(GHough), that can be used to select a scientific threshold at the peak detection stage of the Ghough.

Performance Evaluation of Motorcycle's Anti-theft Device using NFC Authentication and Solenoid Valve (NFC 보안인증과 솔레노이드 밸브를 이용한 이륜차 이동제한장치 성능평가)

  • Moon, Boram;Jin, Taeseok
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.82-86
    • /
    • 2016
  • This paper proposes a method for the immobilization of motorbike brakes in conjunction with near-field communication (NFC) technology in order to meet the increasing demand for security and convenience of motorbike drivers. We thought about the concept of wireless key, NFC security devices and automatic solenoid valve for setting the lock and unlock module. This paper propose the design and development of an innovative anti-theft alarm system for motorcycles using NFC smart devices based on RFID system, the basis of IoT and AES(advanced encryption standard) encryption Algorithm. The design concept is based on NFC communication strategy between the vehicle and owner. To do this concept, we designed motorcycle smart key system with general-purpose NFC system and the automatic solenoid valve for setting the lock and unlock module. First, we designed control unit and NFC card reader for motorcycle smart key system. Then we propose an AES encryption algorithm and prove that the motorcycle key system is controllable by showing the result of implementing and testing, after installing.

Robust Spectrum Sensing for Blind Multiband Detection in Cognitive Radio Systems: A Gerschgorin Likelihood Approach

  • Qing, Haobo;Liu, Yuanan;Xie, Gang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.5
    • /
    • pp.1131-1145
    • /
    • 2013
  • Energy detection is a widely used method for spectrum sensing in cognitive radios due to its simplicity and accuracy. However, it is severely affected by the noise uncertainty. To solve this problem, a blind multiband spectrum sensing scheme which is robust to noise uncertainty is proposed in this paper. The proposed scheme performs spectrum sensing over the total frequency channels simultaneously rather than a single channel each time. To improve the detection performance, the proposal jointly utilizes the likelihood function combined with Gerschgorin radii of unitary transformed covariance matrix. Unlike the conventional sensing methods, our scheme does not need any prior knowledge of noise power or PU signals, and thus is suitable for blind spectrum sensing. In addition, no subjective decision threshold setting is required in our scheme, making it robust to noise uncertainty. Finally, numerical results based on the probability of detection and false alarm versus SNR or the number of samples are presented to validate the performance of the proposed scheme.

Location Tracking based on MS-Based/Assisted Location Trigger Model with Context-Awareness

  • Park, Sung-Suk;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.63-69
    • /
    • 2016
  • In this paper, we proposed the location tracking system based on MS-Based/Assisted(Mobile Station-Based and Assisted) location trigger service model with context-awareness for the intelligent location tracking of moving objects. It provides the proper resulting value that matches the context of users through the analysis about the situation of the user, physical environment, computing resource and the existing information on user input. In order to provide real-time data, we proposed the location tracking system which realizes the intelligent information such as the expecting arrival time and passing the specific area of the moving object by adopting the location trigger. So, it derives to minimize the costs of communication for the mobile object tracking applications. The proposed location tracking system based on context-awareness can be used for realtime monitoring, intelligent alarm/action, setting up of the optimized moving path, dynamic adjustment of strategies and policies. So it has the advantage to develop the application system which is aimed at optimization of the object tracking and movement.

Wind loads and wind-resistant behaviour of large cylindrical tanks in square-arrangement group. Part 1: Wind tunnel test

  • Liu, Qing;Zhao, Yang;Cai, Shuqi;Dong, Shilin
    • Wind and Structures
    • /
    • v.31 no.6
    • /
    • pp.483-493
    • /
    • 2020
  • Large cylindrical floating-roof tanks, constructed as oil containers, are usually distributed regularly in open area and easily exposed to severe wind loads. However, wind pressures around these grouped squat tanks appear to have not been clearly given in design codes or thoroughly studied in existing researches. This paper conducts a detailed investigation on wind loads on the external wall of a four-tank group in square arrangement. To achieve that, wind tunnel tests are carried out on both empty and full tank groups, considering various wind angles and spacing. Results show that 3 regions in elevation can be identified on the tank shell according to the circumferential wind pressure distribution. The upper 2 regions cover a relatively small portion of the shell where excessive negative pressures are spotted, setting an alarm to the design of the top angle and stiffening rings. By comparing results on grouped tanks to those on an isolated tank, grouping effects concerning wind angle, tank position in group and spacing are discussed. Deviations on pressure distributions that will compromise structural safety are outlined, including the increase of negative pressures, the shift of maximum pressure locations as well as the change of positive pressure range. And, several potentially unfavourable wind pressure distributions are selected for further analyses.

Design and Implementation of Static Program Analyzer Finding All Buffer Overrun Errors in C Programs (C 프로그램의 버퍼 오버런(buffer overrun) 오류를 찾아 주는 정적 분석기의 설계와 구현)

  • Yi Kwang-Keun;Kim Jae-Whang;Jung Yung-Bum
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.5
    • /
    • pp.508-524
    • /
    • 2006
  • We present our experience of combining, in a realistic setting, a static analyzer with a statistical analysis. This combination is in order to reduce the inevitable false alarms from a domain-unaware static analyzer. Our analyzer named Airac(Array Index Range Analyzer for C) collects all the true buffer-overrun points in ANSI C programs. The soundness is maintained, and the analysis' cost-accuracy improvement is achieved by techniques that static analysis community has long accumulated. For still inevitable false alarms (e.g. Airac raised 970 buffer-overrun alarms in commercial C programs of 5.3 million lines and 737 among the 970 alarms were false), which are always apt for particular C programs, we use a statistical post analysis. The statistical analysis, given the analysis results (alarms), sifts out probable false alarms and prioritizes true alarms. It estimates the probability of each alarm being true. The probabilities are used in two ways: 1) only the alarms that have true-alarm probabilities higher than a threshold are reported to the user; 2) the alarms are sorted by the probability before reporting, so that the user can check highly probable errors first. In our experiments with Linux kernel sources, if we set the risk of missing true error is about 3 times greater than false alarming, 74.83% of false alarms could be filtered; only 15.17% of false alarms were mixed up until the user observes 50% of the true alarms.