• Title/Summary/Keyword: Automated software

Search Result 525, Processing Time 0.021 seconds

Development of Lane Change System considering Acceleration for Collision Avoidance (충돌회피를 위한 가속도를 고려한 차선 변경 시스템 개발)

  • Kang, Hyunkoo;Lee, Donghwi;Huh, Kunsoo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.21 no.2
    • /
    • pp.81-86
    • /
    • 2013
  • This paper presents the lane change system for collision avoidance. The proposed algorithm for the collision avoidance consists of path generation and path following. Using a calculated TTC (Time to Collision), partial braking is operated and collision avoidance path is generated considering relative distance, velocity and acceleration. Based on the collision avoidance path, desired yaw angle and yaw rate are calculated for the automated path following. The lateral controller is designed by a Lyapunov function approach using 3 D.O.F vehicle model and vehicle parameters. The required steering angle is determined from wheel velocity, longitudinal and lateral velocity in order to follow the desired yaw angle and yaw rate. This system is developed MATLAB/Simulink and its performance is evaluated using the commercial software CarSim.

Robust Design for Multiple Quality Attributes in Injection Molded Parts by the TOPSIS and Complex Method (TOPSIS와 콤플렉스법에 의한 사출성형품의 다속성 강건설계)

  • Park, Jong-Cheon;Kim, Gi-Beom;Kim, Gyeong-Mo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.18 no.12
    • /
    • pp.116-123
    • /
    • 2001
  • An automated injection molding design methodology has been developed to optimize multiple quality attributes, which are usually in conflict with each other, in injection molded parts. For the optimization, commercial CAE simulation tools and optimization techniques are integrated into the methodology. To decal with the multiple objective problem the relative closeness computed in TOPSIS(Technique for Order Preference by Similarity to Ideal Solution) is used as a performance measurement index for optimization multiple part defects. To attain robustness against process variation, Taguchi's quadratic loss function is introduced in the TOPSIS. Also, the modified complex method is used as an optimization tool to optimize objective function. The verification of the developed design methodology was carried out on simulation software with an actual model. Applied to production this methodology will be useful to companies in reducing their product development time and enhancing their product quality.

  • PDF

A study for object analysis based on context awareness scenario (상황인식 시나리오 기반 객체분석에 대한 연구)

  • Song, Jiyoung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.5
    • /
    • pp.3153-3158
    • /
    • 2014
  • Children in schoolzone accidents occur frequently in order to actively respond to the situation on the module for automated recognition research. By the vehicle penetration such like schoolzone, child object recognition, and GPS coordination information, the monitoring scenario can be constructed, and if an event occurs corresponding to strategic scenario so that suitable reaction can be provided to increase safety level to the schoolzone. In this paper, a GPS sensor and the image sensor and the monitoring server on the network based on the integration of context-aware methods have been studied. The image sensor section and the GPS section through analysis of the situation analysis and recognition of the object based on the scenario can actively cope with the situation according to the methods proposed.

Exploring Image Processing and Image Restoration Techniques

  • Omarov, Batyrkhan Sultanovich;Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.3
    • /
    • pp.172-179
    • /
    • 2015
  • Because of the development of computers and high-technology applications, all devices that we use have become more intelligent. In recent years, security and surveillance systems have become more complicated as well. Before new technologies included video surveillance systems, security cameras were used only for recording events as they occurred, and a human had to analyze the recorded data. Nowadays, computers are used for video analytics, and video surveillance systems have become more autonomous and automated. The types of security cameras have also changed, and the market offers different kinds of cameras with integrated software. Even though there is a variety of hardware, their capabilities leave a lot to be desired. Therefore, this drawback is trying to compensate by dint of computer program solutions. Image processing is a very important part of video surveillance and security systems. Capturing an image exactly as it appears in the real world is difficult if not impossible. There is always noise to deal with. This is caused by the graininess of the emulsion, low resolution of the camera sensors, motion blur caused by movements and drag, focus problems, depth-of-field issues, or the imperfect nature of the camera lens. This paper reviews image processing, pattern recognition, and image digitization techniques, which will be useful in security services, to analyze bio-images, for image restoration, and for object classification.

Design and Implementation of GIS Based Automatic Terrain Analysis System for Field Operation

  • Kim, Kyoung-Ok;Yang, Young-Kyu;Lee, Jong-Hoon;Choi, Kyoung-Ho;Jung, In-Sook;Kim, Tae-Kyun
    • Korean Journal of Remote Sensing
    • /
    • v.10 no.2
    • /
    • pp.121-132
    • /
    • 1994
  • A GIS based tactical terrain analysis system named ATTAS(Army Tactical Terrain Analysis Software) has been designed and implemented to support the field commanders for enhancing the capabiliy of their unit and efficiency of weapon system. This system is designed to provide computer graphics environment in which the analyst can interactively operate the entire analyzing process such as selecting the area of interest, performing analysis functions, simulating required battlefield operation and display the results. This system can be divided into three major sections; the terrain analysis modules, utilites, and graphic editor. The terrain analysis module inclused surface analysis, line of sight analysis, enemy disposition, 3D display, radar coverage, logistic route analysis, shortest path analysis, atmospheric phenomena prediction, automated IPB (Inteligence preparation of Battlefield), and other applied analysis. A combination of 2D and 3D computer graphics techniques using the X-window system with OSF/Motif in UNIX workstation was adopted as the user interface. The integration technique of remotely sensed images and GIS data such as precision registration, overlay, and on-line editing was developed and implemented. An efficient image and GIS data management technique was also developed and implemented using Oracle Database Management System.

Automated CFD analysis for multiple directions of wind flow over terrain

  • Morvan, Herve P.;Stangroom, Paul;Wright, Nigel G.
    • Wind and Structures
    • /
    • v.10 no.2
    • /
    • pp.99-119
    • /
    • 2007
  • Estimations of wind flow over terrain are often needed for applications such as pollutant dispersion, transport safety or wind farm location. Whilst field studies offer very detailed information regarding the wind potential over a small region, the cost of instrumenting a natural fetch alone is prohibitive. Wind tunnels offer one alternative although wind tunnel simulations can suffer from scale effects and high costs as well. Computational Fluid Dynamics (CFD) offers a second alternative which is increasingly seen as a viable one by wind engineers. There are two issues associated with CFD however, that of accuracy of the predictions and set-up and simulation times. This paper aims to address the two issues by demonstrating, by way of an investigation of wind potential for the Askervein Hill, that a good level of accuracy can be obtained with CFD (10% for the speed up ratio) and that it is possible to automate the simulations in order to compute a full wind rose efficiently. The paper shows how a combination of script and session files can be written to drive and automate CFD simulations based on commercial software. It proposes a general methodology for the automation of CFD applied to the computation of wind flow over a region of interest.

Map Error Measuring Mechanism Design and Algorithm Robust to Lidar Sparsity (라이다 점군 밀도에 강인한 맵 오차 측정 기구 설계 및 알고리즘)

  • Jung, Sangwoo;Jung, Minwoo;Kim, Ayoung
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.3
    • /
    • pp.189-198
    • /
    • 2021
  • In this paper, we introduce the software/hardware system that can reliably calculate the distance from sensor to the model regardless of point cloud density. As the 3d point cloud map is widely adopted for SLAM and computer vision, the accuracy of point cloud map is of great importance. However, the 3D point cloud map obtained from Lidar may reveal different point cloud density depending on the choice of sensor, measurement distance and the object shape. Currently, when measuring map accuracy, high reflective bands are used to generate specific points in point cloud map where distances are measured manually. This manual process is time and labor consuming being highly affected by Lidar sparsity level. To overcome these problems, this paper presents a hardware design that leverage high intensity point from three planar surface. Furthermore, by calculating distance from sensor to the device, we verified that the automated method is much faster than the manual procedure and robust to sparsity by testing with RGB-D camera and Lidar. As will be shown, the system performance is not limited to indoor environment by progressing the experiment using Lidar sensor at outdoor environment.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

Optimization Process of Type 4 Composite Pressure Vessels Using Genetic and Simulated Annealing Algorithm (유전 알고리즘 및 담금질 기법을 활용한 Type 4 복합재료 압력용기 최적화 프로세스)

  • SONG, GWINAM;KIM, HANSANG
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.32 no.4
    • /
    • pp.212-218
    • /
    • 2021
  • In this study, we conducted a design optimization of the Type 4 composite pressure vessels to enhance the pressure-resistant performance of the vessels while keeping the thickness of the composite layer. The design variables for the optimization were the stacking angles of the helical layers of the vessels to improve the performance. Since the carbon fibers are expensive material, it is desirable to reduce the use of the carbon fibers by applying an optimal design of the composite pressure vessel. The structural analysis and optimization process for the design of Type 4 composite pressure vessels were carried out using a commercial finite element analysis software, Abaqus and a plug-in for automated simulation, Isight, respectively. The optimization results confirmed the performance and safety of the optimized Type 4 composite pressure vessels was enhanced by 12.84% compared to the initial design.