• Title/Summary/Keyword: Back Analysis Algorithm

Search Result 338, Processing Time 0.027 seconds

A Study on fault Detection of Off-design Performance for Smart UAV Propulsion System (스마트 무인기용 가스터빈 엔진의 탈설계 영역 구성품 손상 진단에 관한 연구)

  • Kong, Chang-Duk;Kho, Seong-Hee;Ki, Ja-Young;Lee, Chang-Ho
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.11 no.3
    • /
    • pp.29-34
    • /
    • 2007
  • In this study a model-based diagnostic method using the Neural Network was proposed for PW206C turbo shaft engine and performance model was developed by SIMULINK. Fault and test database to build the NN was obtained at various off-design operating range such as flight altitude, flight Mach number and gas generator rotational speed variation. According to the fault detection analysis results, it was confirmed that the proposed fault detection method could find well the fault of compressor, compressor turbine and power turbine at on-design point as well as off-design point conditions.

Experimentation on The Recognition of Arithmetic Expressions (수식 표현의 인식에 관한 연구)

  • Lee, Young Kyo;Kim, Young Po
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.29-35
    • /
    • 2014
  • The formula contains up between the text and the structural information, as well as their mathematical symbols. Research on-line or off-line recognition formula is underway actively used in various fields, and various forms of the equation are implemented recognition system. Although many documents are included in the various formulas, it is not easy to enter a formula into the computer. Recognition of the expression is divided into two processes of symbol recognition and structural analysis. After analyzing the location information of each character is specified to recognize the effective area after each symbol, and to the structure analysis based on the proximity between the characters is recognized as an independent single formula. Furthermore, analyzing the relationship between the front and back each time a combination of the position relationship between each symbol, and then to add the symbol which was able to easily update the structure of the entire formula. In this paper, by using a scanner to scan the book formula was used to interpret the meaning of the recognized symbol has a relative size and location information of the expression symbol. An algorithm to remove the formulas for calculation of the number of formula is present at the same time is proposed. Using the proposed algorithms to scan the books in the formula in order to evaluate the performance verification as 100% separation and showed the recognition rate equation.

Prediction of Settlement of SCP Composite Ground using Genetic Algorithm (유전자 알고리즘 기법에 근거한 SCP 복합지반의 침하 예측)

  • 박현일;김윤태;이형주
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.16 no.2
    • /
    • pp.64-74
    • /
    • 2004
  • In order to accelerate the rate of consolidation settlement, to reduce settlement, and to increase bearing capacity for soft ground under quay wall, sand compaction pile method (SCP) has widely been applied. Improved ground is composite ground which is consisted of the sand pile-surrounding clayey soil. As caisson and upper structures are installed on SCP composite ground, the settlement is compositively occurred by elastic compression of sand compaction piles and also consolidation of the surrounding clay ground. In this study, the combined settlement model is proposed to predict the settlement of SCP composite ground in basis of elastic theory for sand compaction pile and consolidation theory for marine soft clay. Optimization technique was performed based on back-analysis so that real coded genetic algorithm was applied to estimate the parameters of the proposed settlement model. Case analysis was carried out for a domestic SCP composite ground to examine the applicability of the proposed prediction technique.

Efficiency Optimization Control of SynRM with FNPI Controller (FNPI 제어기예 의한 SynRM의 효율 최적화 제어)

  • Kang, Sung-Jun;Ko, Jae-Sub;Choi, Jung-Sik;Jang, Mi-Geum;Back, Jung-Woo;Chung, Dong-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2009.04b
    • /
    • pp.29-31
    • /
    • 2009
  • Optimal efficiency control of synchronous reluctance motor(SynRM) is very important in the sense of energy saving and conservation of natural environment because the efficiency of the SynRM is generally lower than that of other types of AC motors. This paper is proposed an efficiency optimization control for the SynRM which minimizes the copper and iron losses. The design of the speed controller based on fuzzy-neural networks (FN)-PI controller that is implemented using fuzzy control and neural networks. There exists a variety of combinations of d and q-axis current which provide a specific motor torque. The objective of the efficiency optimization control is to seek a combination of d and q-axis current components, which provides minimum losses at a certain operating point in steady state. It is shown that the current components which directly govern the torque production have been very well regulated by the efficiency optimization control scheme. The proposed algorithm allows the electromagnetic losses In variable speed and torque drives to be reduced while keeping good torque control dynamics. The control performance of the proposed controller is evaluated by analysis for various operating conditions. Analysis results are presented to show the validity of the proposed algorithm.

  • PDF

Real Time Face Detection in Video Using Progressive Thresholding (순차 임계 설정법을 이용한 비디오에서의 실시간 얼굴검출)

  • Ye Soo-Young;Lee Seon-Bong;Kum Dae-Hyun;Kim Hyo-Sung;Nam Ki-Gon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.7 no.3
    • /
    • pp.95-101
    • /
    • 2006
  • A face detection plays an important role in face recognition, video surveillance, and human computer interaction. In this paper, we propose a progressive threshold method to detect human faces in real time. The consecutive face images are acquired from camera and transformed into YCbCr color space images. The skin color of the input images are separated using a skin color filter in the YCbCr color space and some candidated face areas are decided by connected component analysis. The intensity equalization is performed to avoid the effect of many circumstances and an arbitrary threshold value is applied to get binary images. The eye area can be detected because the area is clearly distinguished from others in the binary image progressive threshold method searches for an optimal eye area by progressively increasing threshold from low values. After progressive thresholding, the eye area is normalized and verified by back propagation algorithm to finalize the face detection.

  • PDF

An Analysis for Process Parameters in the Automatic $CO_2$ Welding Using the Taguchi Method (다구찌 방법을 이용한 $CO_2$ 자동용접의 공정변수 분석)

  • 김인주;박창언;김일수;성백섭;손준식;유관종;김학형
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2004.10a
    • /
    • pp.596-599
    • /
    • 2004
  • The robotic $CO_2$ welding is a manufacturing process to produce high quality joints for metal and it could provide a capability of full automation to enhance productivity. Despite the widespread use in the various manufacturing industries, the full automation of the robotic $CO_2$ welding has not yet been achieved partly because the mathematical model for the process parameters of a given welding task is not fully understood and quantified. Several mathematical models to control welding quality, productivity, microstructure and weld properties in arc welding processes have been studied. However, it is not an easy task to apply them to the various practical situations because the relationship between the process parameters and the bead geometry is non-linear and also they are usually dependent on the specific experimental results. Practically, it is difficult, but important to know how to establish a mathematical model that can predict the result of the actual welding process and how to select the optimum welding condition under a certain constraint. In this research, an attempt has been made to develop an intelligent algorithm to predict the weld geometry (top-bead width, top-bead height, back-bead width and back-bead height) as a function of key process parameters in the robotic $CO_2$welding. To achieve this above objective, Taguchi method was employed using five different process parameters (tip gap, gas flow rate, welding speed, arc current, welding voltage) as a guide for optimization of process parameters.

  • PDF

M&S Software Design of Multiple Radio Positioning Integration System (다중 전파측위 융복합 시스템의 M&S 소프트웨어 설계)

  • Koo, Moonsuk;Kim, YoungJoon;Choi, Kwang-Ho;So, Hyoungmin;Oh, Sang Heon;Kim, Seong-Cheol;Lee, Hyung-Keun;Hwang, Dong-Hwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.602-611
    • /
    • 2015
  • Even though GNSS provides highly accurate navigation information all over the world, it is vulnerable to jamming in the electronic warfare due to its weak signal power. The United States and Korea have plans to use terrestrial navigation systems as back-up systems during outage of GNSS. In order to develop back-up systems of GNSS, an M&S software platform is necessary for performance evaluation of various vehicle trajectories and integrated navigation systems. In this paper a design method of an M&S software is proposed for evaluation of multiple radio positioning integration systems. The proposed M&S software consists of a navigation environment generation part, a navigation algorithm part, a GUI part and a coverage analysis part. Effectiveness of the proposed design method is shown by implementing an M&S software for the GPS, DME and eLoran navigation systems.

A New Arithmetic Unit Over GF(2$^{m}$ ) for Low-Area Elliptic Curve Cryptographic Processor (저 면적 타원곡선 암호프로세서를 위한 GF(2$^{m}$ )상의 새로운 산술 연산기)

  • 김창훈;권순학;홍춘표
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7A
    • /
    • pp.547-556
    • /
    • 2003
  • This paper proposes a novel arithmetic unit over GF(2$^{m}$ ) for low-area elliptic curve cryptographic processor. The proposed arithmetic unit, which is linear feed back shift register (LFSR) architecture, is designed by using hardware sharing between the binary GCD algorithm and the most significant bit (MSB)-first multiplication scheme, and it can perform both division and multiplication in GF(2$^{m}$ ). In other word, the proposed architecture produce division results at a rate of one per 2m-1 clock cycles in division mode and multiplication results at a rate of one per m clock cycles in multiplication mode. Analysis shows that the computational delay time of the proposed architecture, for division, is less than previously proposed dividers with reduced transistor counts. In addition, since the proposed arithmetic unit does not restrict the choice of irreducible polynomials and has regularity and modularity, it provides a high flexibility and scalability with respect to the field size m. Therefore, the proposed novel architecture can be used for both division and multiplication circuit of elliptic curve cryptographic processor. Specially, it is well suited to low-area applications such as smart cards and hand held devices.

Security Enhancing of Authentication Protocol for Hash Based RFID Tag (해쉬 기반 RFID 태그를 위한 인증 프로토콜의 보안성 향상)

  • Jeon, Jin-Oh;Kang, Min-Sup
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.23-32
    • /
    • 2010
  • In this paper, we first propose the security enhancing of authentication protocol for Hash based RFID tag, and then a digital Codec for RFID tag is designed based on the proposed authentication protocol. The protocol is based on a three-way challenge response authentication protocol between the tags and a back-end server. In order to realize a secure cryptographic authentication mechanism, we modify three types of the protocol packets which defined in the ISO/IEC 18000-3 standard. Thus active attacks such as the Man-in-the-middle and Replay attacks can be easily protected. In order to verify effectiveness of the proposed protocol, a digital Codec for RFID tag is designed using Verilog HDL, and also synthesized using Synopsys Design Compiler with Hynix $0.25\;{\mu}m$ standard-cell library. Through security analysis and comparison result, we will show that the proposed scheme has better performance in user data confidentiality, tag anonymity, Man-in-the-middle attack prevention, replay attack, forgery resistance and location tracking.

A Study on Reliability Analysis and Development of Fault Tolerant Digital Governor (내고장성 디지털 조속기의 신뢰도 평가 및 개발에 관한 연구)

  • 신명철;전일영;안병원;이성근;김윤식;진강규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.11a
    • /
    • pp.467-474
    • /
    • 1999
  • In this paper, Fault tolerant digital governor, using duplex I/O module and triplex CPU module and also 2 out of 3 voting algorithm and adding self diagnostic ability, is designed to realize ceaseless controlling and to improve the reliability of control system. The processor module of the system(SIDG-3000) is developed based on MC68EC040 32 Bit of Motorola, which guaranteed high quality of the module ,and SRAM for data also SRAM for command are separated. The process module also includes inter process communication function and power back up function (SRAM for back-up). System reliability is estimated by using the model of Markov process. The reliability of triplex system in mission time can be improved about 1.8 times in reliability 86%. 2.8 times in 95 %, 6 times in 99 % compared with a single control system. Designed digital governor system is applied after modelling of the steam turbine generator system of Buk-Cheju Thermal Power Plant. Simulation is carried out to prove the effectiveness of the designed digital governor system

  • PDF