• Title/Summary/Keyword: Algorithm Design

Search Result 10,350, Processing Time 0.046 seconds

Research and development on image luminance meter of road tunnel internal and external (도로터널 내/외부의 영상휘도 측정기 연구개발)

  • Jang, Soon-Chul;Park, Sung-Lim;Ko, Seok-Yong;Lee, Mi-Ae
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2015
  • This paper introduces the development of imaging luminance meter which measures the luminances of external/internal road tunnel. The developed imaging luminance meter complies with both L20 method and Veiling luminance method of the international standards, CIE88. In this paper the L20 method is mainly presented because most of tunnels currently adapt L20 method. The developed system has an embedded computer to operate at stand-alone. The system has a ethernet port, a heater, a fan, a defroster, a wiper and sun shielder. Compensation algorithm is applied for correcting non-linear responses to the luminance and integration time. The accuracy of measurement is less than 1% when it calibrated at the public certification institute. The developed system was also tested at the real field, road tunnel. The test results were very similar with the reference luminance meter and showed that the developed system operates well at the real field. Partial sensor saturations were happened to show the less luminance, because there were the high reflecting objects in the real field. Further study should be followed for high luminance measurement.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Smart Synthetic Path Search System for Prevention of Hazardous Chemical Accidents and Analysis of Reaction Risk (반응 위험성분석 및 사고방지를 위한 스마트 합성경로 탐색시스템)

  • Jeong, Joonsoo;Kim, Chang Won;Kwak, Dongho;Shin, Dongil
    • Korean Chemical Engineering Research
    • /
    • v.57 no.6
    • /
    • pp.781-789
    • /
    • 2019
  • There are frequent accidents by chemicals during laboratory experiments and pilot plant and reactor operations. It is necessary to find and comprehend relevant information to prevent accidents before starting synthesis experiments. In the process design stage, reaction information is also necessary to prevent runaway reactions. Although there are various sources available for synthesis information, including the Internet, it takes long time to search and is difficult to choose the right path because the substances used in each synthesis method are different. In order to solve these problems, we propose an intelligent synthetic path search system to help researchers shorten the search time for synthetic paths and identify hazardous intermediates that may exist on paths. The system proposed in this study automatically updates the database by collecting information existing on the Internet through Web scraping and crawling using Selenium, a Python package. Based on the depth-first search, the path search performs searches based on the target substance, distinguishes hazardous chemical grades and yields, etc., and suggests all synthetic paths within a defined limit of path steps. For the benefit of each research institution, researchers can register their private data and expand the database according to the format type. The system is being released as open source for free use. The system is expected to find a safer way and help prevent accidents by supporting researchers referring to the suggested paths.

Design of detection method for smoking based on Deep Neural Network (딥뉴럴네트워크 기반의 흡연 탐지기법 설계)

  • Lee, Sanghyun;Yoon, Hyunsoo;Kwon, Hyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.191-200
    • /
    • 2021
  • Artificial intelligence technology is developing in an environment where a lot of data is produced due to the development of computing technology, a cloud environment that can store data, and the spread of personal mobile phones. Among these artificial intelligence technologies, the deep neural network provides excellent performance in image recognition and image classification. There have been many studies on image detection for forest fires and fire prevention using such a deep neural network, but studies on detection of cigarette smoking were insufficient. Meanwhile, military units are establishing surveillance systems for various facilities through CCTV, and it is necessary to detect smoking near ammunition stores or non-smoking areas to prevent fires and explosions. In this paper, by reflecting experimentally optimized numerical values such as activation function and learning rate, we did the detection of smoking pictures and non-smoking pictures in two cases. As experimental data, data was constructed by crawling using pictures of smoking and non-smoking published on the Internet, and a machine learning library was used. As a result of the experiment, when the learning rate is 0.004 and the optimization algorithm Adam is used, it can be seen that the accuracy of 93% and F1-score of 94% are obtained.

A Study on the Improvement of Injection Molding Process Using CAE and Decision-tree (CAE와 Decision-tree를 이용한 사출성형 공정개선에 관한 연구)

  • Hwang, Soonhwan;Han, Seong-Ryeol;Lee, Hoojin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.580-586
    • /
    • 2021
  • The CAT methodology is a numerical analysis technique using CAE. Recently, a methodology of applying artificial intelligence techniques to a simulation has been studied. A previous study compared the deformation results according to the injection molding process using a machine learning technique. Although MLP has excellent prediction performance, it lacks an explanation of the decision process and is like a black box. In this study, data was generated using Autodesk Moldflow 2018, an injection molding analysis software. Several Machine Learning Algorithms models were developed using RapidMiner version 9.5, a machine learning platform software, and the root mean square error was compared. The decision-tree showed better prediction performance than other machine learning techniques with the RMSE values. The classification criterion can be increased according to the Maximal Depth that determines the size of the Decision-tree, but the complexity also increases. The simulation showed that by selecting an intermediate value that satisfies the constraint based on the changed position, there was 7.7% improvement compared to the previous simulation.

Design of Immersive Walking Interaction Using Deep Learning for Virtual Reality Experience Environment of Visually Impaired People (시각 장애인 가상현실 체험 환경을 위한 딥러닝을 활용한 몰입형 보행 상호작용 설계)

  • Oh, Jiseok;Bong, Changyun;Kim, Jinmo
    • Journal of the Korea Computer Graphics Society
    • /
    • v.25 no.3
    • /
    • pp.11-20
    • /
    • 2019
  • In this study, a novel virtual reality (VR) experience environment is proposed for enabling walking adaptation of visually impaired people. The core of proposed VR environment is based on immersive walking interactions and deep learning based braille blocks recognition. To provide a realistic walking experience from the perspective of visually impaired people, a tracker-based walking process is designed for determining the walking state by detecting marching in place, and a controller-based VR white cane is developed that serves as the walking assistance tool for visually impaired people. Additionally, a learning model is developed for conducting comprehensive decision-making by recognizing and responding to braille blocks situated on roads that are followed during the course of directions provided by the VR white cane. Based on the same, a VR application comprising an outdoor urban environment is designed for analyzing the VR walking environment experience. An experimental survey and performance analysis were also conducted for the participants. Obtained results corroborate that the proposed VR walking environment provides a presence of high-level walking experience from the perspective of visually impaired people. Furthermore, the results verify that the proposed learning algorithm and process can recognize braille blocks situated on sidewalks and roadways with high accuracy.

A Study on Stealth Design for Exterior Equipment Arrangement Considering the Multi-Bounce Effect (다중반사를 고려한 함정의 외부 탑재 장비 최적배치 연구)

  • Hwang, Joon-Tae;Hong, Suk-Yoon;Kwon, Hyun-Wung;Kim, Jong-Chul;Song, Jee-Hun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.23 no.7
    • /
    • pp.918-925
    • /
    • 2017
  • Multiple reflections on exterior equipment with complex shape on naval ships cause unexpectedly high Radar Cross Section (RCS) distributions, and the directions of reradiated electromagnetic waves are hard to predict. Therefore, the optimum arrangement of exterior equipments should be considered according to the Radar Absorbing Structure (RAS) method. In this paper, the optimum arrangement for exterior equipments was determined to reduce multiple reflections and RCS even with complex shapes. The sequential descending arrangement method was used to establish an optimum arrangement algorithm. An LCS-2 type model was selected for optimum exterior equipment arrangements. In order to reduce computational cost, RCS distributions and multiple reflection path analysis of exterior equipments was carried out to select exterior equipments for optimum arrangement, and an optimum arrangement was determined to find positions with minimum RCS values. Also, the RCS reduction effect was analyzed using detectable radar range.

Design of Two Layer Depth-encoding Detector Module with SiPM for PET (SiPM을 사용한 두 층의 반응 깊이를 측정하는 양전자방출단층촬영기기의 검출기 모듈 설계)

  • Lee, Seung-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.3
    • /
    • pp.319-324
    • /
    • 2019
  • A depth-encoding detector module with silicon photomultipliers(SiPMs) using two layers of scintillation crystal array was designed, and the position measurement capability was verified using DETECT2000. The depth of interaction of the crystal pixels with the gamma rays was tracked through the image acquired with the combination of surface treatment of the crystal pixels and reflectors. The bottom layer was treated as a reflector except for the optically coupled surfaces, and the crystals of top layer were optically coupled each other except for the outer surfaces so that the light sharing was made easier than the bottom layer. Flood images were obtained through the combination of specular reflectors and random reflectors, grounded and polished surfaces of crystal pixels, and the positions at which layer images were generated were measured and analyzed. The images were reconstructed using the Anger algorithm, whose the SiPM signals were reduced as the 16-channels to 4-channels. In the combination of the grounded surface and all reflectors, the depth positions were discriminated into two layers, whereas it was impossible to separate the two layers in the all polished surface combinations. Therefore, using the combination of grounded surface crystal pixels and reflectors could improve the spatial resolution at the outside of the field of view by measuring the depth position in preclinical positron emission tomography.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Apriori Based Big Data Processing System for Improve Sensor Data Throughput in IoT Environments (IoT 환경에서 센서 데이터 처리율 향상을 위한 Apriori 기반 빅데이터 처리 시스템)

  • Song, Jin Su;Kim, Soo Jin;Shin, Young Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.277-284
    • /
    • 2021
  • Recently, the smart home environment is expected to be a platform that collects, integrates, and utilizes various data through convergence with wireless information and communication technology. In fact, the number of smart devices with various sensors is increasing inside smart homes. The amount of data that needs to be processed by the increased number of smart devices is also increasing, and big data processing systems are actively being introduced to handle it effectively. However, traditional big data processing systems have all requests directed to cluster drivers before they are allocated to distributed nodes, leading to reduced cluster-wide performance sharing as cluster drivers managing segmentation tasks become bottlenecks. In particular, there is a greater delay rate on smart home devices that constantly request small data processing. Thus, in this paper, we design a Apriori-based big data system for effective data processing in smart home environments where frequent requests occur at the same time. According to the performance evaluation results of the proposed system, the data processing time was reduced by up to 38.6% from at least 19.2% compared to the existing system. The reason for this result is related to the type of data being measured. Because the amount of data collected in a smart home environment is large, the use of cache servers plays a major role in data processing, and association analysis with Apriori algorithms stores highly relevant sensor data in the cache.