• 제목/요약/키워드: Automated software

검색결과 525건 처리시간 0.023초

충돌회피를 위한 가속도를 고려한 차선 변경 시스템 개발 (Development of Lane Change System considering Acceleration for Collision Avoidance)

  • 강현구;이동휘;허건수
    • 한국자동차공학회논문집
    • /
    • 제21권2호
    • /
    • pp.81-86
    • /
    • 2013
  • This paper presents the lane change system for collision avoidance. The proposed algorithm for the collision avoidance consists of path generation and path following. Using a calculated TTC (Time to Collision), partial braking is operated and collision avoidance path is generated considering relative distance, velocity and acceleration. Based on the collision avoidance path, desired yaw angle and yaw rate are calculated for the automated path following. The lateral controller is designed by a Lyapunov function approach using 3 D.O.F vehicle model and vehicle parameters. The required steering angle is determined from wheel velocity, longitudinal and lateral velocity in order to follow the desired yaw angle and yaw rate. This system is developed MATLAB/Simulink and its performance is evaluated using the commercial software CarSim.

TOPSIS와 콤플렉스법에 의한 사출성형품의 다속성 강건설계 (Robust Design for Multiple Quality Attributes in Injection Molded Parts by the TOPSIS and Complex Method)

  • 박종천;김기범;김경모
    • 한국정밀공학회지
    • /
    • 제18권12호
    • /
    • pp.116-123
    • /
    • 2001
  • An automated injection molding design methodology has been developed to optimize multiple quality attributes, which are usually in conflict with each other, in injection molded parts. For the optimization, commercial CAE simulation tools and optimization techniques are integrated into the methodology. To decal with the multiple objective problem the relative closeness computed in TOPSIS(Technique for Order Preference by Similarity to Ideal Solution) is used as a performance measurement index for optimization multiple part defects. To attain robustness against process variation, Taguchi's quadratic loss function is introduced in the TOPSIS. Also, the modified complex method is used as an optimization tool to optimize objective function. The verification of the developed design methodology was carried out on simulation software with an actual model. Applied to production this methodology will be useful to companies in reducing their product development time and enhancing their product quality.

  • PDF

상황인식 시나리오 기반 객체분석에 대한 연구 (A study for object analysis based on context awareness scenario)

  • 송지영
    • 한국산학기술학회논문지
    • /
    • 제15권5호
    • /
    • pp.3153-3158
    • /
    • 2014
  • 스쿨존에서 빈번하게 발생하는 어린이 안전사고에 능동적으로 대처하기 위해서는 상황 인식에 대한 자동화된 모듈에 대한 연구가 필요하다. 스쿨존과 같은 지역에서 차량의 진입, 어린이의 객체 인식, 그리고 GPS 좌표 정보를 기반으로 감시 시나리오를 구축하여, 전략화된 시나리오에 맞는 상황이 발생되었다고 판단되면 스쿨존 안전도를 높이기 위해 이에 대한 조치를 취하게 된다. 본 논문에서는 GPS 센서와 영상센서 그리고 네트워크에 연결된 모니터링 서버와의 통합을 기반으로 상황인식 방안을 연구하였다. 영상센서 부문과 GPS분석부문을 통해 상황인식을 객체분석을 수행하고 시나리오에 기반한 상황에 따라 능동적으로 대처할 수 있는 방안을 제안한다.

Exploring Image Processing and Image Restoration Techniques

  • Omarov, Batyrkhan Sultanovich;Altayeva, Aigerim Bakatkaliyevna;Cho, Young Im
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제15권3호
    • /
    • pp.172-179
    • /
    • 2015
  • Because of the development of computers and high-technology applications, all devices that we use have become more intelligent. In recent years, security and surveillance systems have become more complicated as well. Before new technologies included video surveillance systems, security cameras were used only for recording events as they occurred, and a human had to analyze the recorded data. Nowadays, computers are used for video analytics, and video surveillance systems have become more autonomous and automated. The types of security cameras have also changed, and the market offers different kinds of cameras with integrated software. Even though there is a variety of hardware, their capabilities leave a lot to be desired. Therefore, this drawback is trying to compensate by dint of computer program solutions. Image processing is a very important part of video surveillance and security systems. Capturing an image exactly as it appears in the real world is difficult if not impossible. There is always noise to deal with. This is caused by the graininess of the emulsion, low resolution of the camera sensors, motion blur caused by movements and drag, focus problems, depth-of-field issues, or the imperfect nature of the camera lens. This paper reviews image processing, pattern recognition, and image digitization techniques, which will be useful in security services, to analyze bio-images, for image restoration, and for object classification.

Design and Implementation of GIS Based Automatic Terrain Analysis System for Field Operation

  • Kim, Kyoung-Ok;Yang, Young-Kyu;Lee, Jong-Hoon;Choi, Kyoung-Ho;Jung, In-Sook;Kim, Tae-Kyun
    • 대한원격탐사학회지
    • /
    • 제10권2호
    • /
    • pp.121-132
    • /
    • 1994
  • A GIS based tactical terrain analysis system named ATTAS(Army Tactical Terrain Analysis Software) has been designed and implemented to support the field commanders for enhancing the capabiliy of their unit and efficiency of weapon system. This system is designed to provide computer graphics environment in which the analyst can interactively operate the entire analyzing process such as selecting the area of interest, performing analysis functions, simulating required battlefield operation and display the results. This system can be divided into three major sections; the terrain analysis modules, utilites, and graphic editor. The terrain analysis module inclused surface analysis, line of sight analysis, enemy disposition, 3D display, radar coverage, logistic route analysis, shortest path analysis, atmospheric phenomena prediction, automated IPB (Inteligence preparation of Battlefield), and other applied analysis. A combination of 2D and 3D computer graphics techniques using the X-window system with OSF/Motif in UNIX workstation was adopted as the user interface. The integration technique of remotely sensed images and GIS data such as precision registration, overlay, and on-line editing was developed and implemented. An efficient image and GIS data management technique was also developed and implemented using Oracle Database Management System.

Automated CFD analysis for multiple directions of wind flow over terrain

  • Morvan, Herve P.;Stangroom, Paul;Wright, Nigel G.
    • Wind and Structures
    • /
    • 제10권2호
    • /
    • pp.99-119
    • /
    • 2007
  • Estimations of wind flow over terrain are often needed for applications such as pollutant dispersion, transport safety or wind farm location. Whilst field studies offer very detailed information regarding the wind potential over a small region, the cost of instrumenting a natural fetch alone is prohibitive. Wind tunnels offer one alternative although wind tunnel simulations can suffer from scale effects and high costs as well. Computational Fluid Dynamics (CFD) offers a second alternative which is increasingly seen as a viable one by wind engineers. There are two issues associated with CFD however, that of accuracy of the predictions and set-up and simulation times. This paper aims to address the two issues by demonstrating, by way of an investigation of wind potential for the Askervein Hill, that a good level of accuracy can be obtained with CFD (10% for the speed up ratio) and that it is possible to automate the simulations in order to compute a full wind rose efficiently. The paper shows how a combination of script and session files can be written to drive and automate CFD simulations based on commercial software. It proposes a general methodology for the automation of CFD applied to the computation of wind flow over a region of interest.

라이다 점군 밀도에 강인한 맵 오차 측정 기구 설계 및 알고리즘 (Map Error Measuring Mechanism Design and Algorithm Robust to Lidar Sparsity)

  • 정상우;정민우;김아영
    • 로봇학회논문지
    • /
    • 제16권3호
    • /
    • pp.189-198
    • /
    • 2021
  • In this paper, we introduce the software/hardware system that can reliably calculate the distance from sensor to the model regardless of point cloud density. As the 3d point cloud map is widely adopted for SLAM and computer vision, the accuracy of point cloud map is of great importance. However, the 3D point cloud map obtained from Lidar may reveal different point cloud density depending on the choice of sensor, measurement distance and the object shape. Currently, when measuring map accuracy, high reflective bands are used to generate specific points in point cloud map where distances are measured manually. This manual process is time and labor consuming being highly affected by Lidar sparsity level. To overcome these problems, this paper presents a hardware design that leverage high intensity point from three planar surface. Furthermore, by calculating distance from sensor to the device, we verified that the automated method is much faster than the manual procedure and robust to sparsity by testing with RGB-D camera and Lidar. As will be shown, the system performance is not limited to indoor environment by progressing the experiment using Lidar sensor at outdoor environment.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

An Improved Lightweight Two-Factor Authentication and Key Agreement Protocol with Dynamic Identity Based on Elliptic Curve Cryptography

  • Qiu, Shuming;Xu, Guosheng;Ahmad, Haseeb;Xu, Guoai;Qiu, Xinping;Xu, Hong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.978-1002
    • /
    • 2019
  • With the rapid development of the Internet of Things, the problem of privacy protection has been paid great attention. Recently, Nikooghadam et al. pointed out that Kumari et al.'s protocol can neither resist off-line guessing attack nor preserve user anonymity. Moreover, the authors also proposed an authentication supportive session initial protocol, claiming to resist various vulnerability attacks. Unfortunately, this paper proves that the authentication protocols of Kumari et al. and Nikooghadam et al. have neither the ability to preserve perfect forward secrecy nor the ability to resist key-compromise impersonation attack. In order to remedy such flaws in their protocols, we design a lightweight authentication protocol using elliptic curve cryptography. By way of informal security analysis, it is shown that the proposed protocol can both resist a variety of attacks and provide more security. Afterward, it is also proved that the protocol is resistant against active and passive attacks under Dolev-Yao model by means of Burrows-Abadi-Needham logic (BAN-Logic), and fulfills mutual authentication using Automated Validation of Internet Security Protocols and Applications (AVISPA) software. Subsequently, we compare the protocol with the related scheme in terms of computational complexity and security. The comparative analytics witness that the proposed protocol is more suitable for practical application scenarios.

유전 알고리즘 및 담금질 기법을 활용한 Type 4 복합재료 압력용기 최적화 프로세스 (Optimization Process of Type 4 Composite Pressure Vessels Using Genetic and Simulated Annealing Algorithm)

  • 송귀남;김한상
    • 한국수소및신에너지학회논문집
    • /
    • 제32권4호
    • /
    • pp.212-218
    • /
    • 2021
  • In this study, we conducted a design optimization of the Type 4 composite pressure vessels to enhance the pressure-resistant performance of the vessels while keeping the thickness of the composite layer. The design variables for the optimization were the stacking angles of the helical layers of the vessels to improve the performance. Since the carbon fibers are expensive material, it is desirable to reduce the use of the carbon fibers by applying an optimal design of the composite pressure vessel. The structural analysis and optimization process for the design of Type 4 composite pressure vessels were carried out using a commercial finite element analysis software, Abaqus and a plug-in for automated simulation, Isight, respectively. The optimization results confirmed the performance and safety of the optimized Type 4 composite pressure vessels was enhanced by 12.84% compared to the initial design.