• Title/Summary/Keyword: CAN 통신

Search Result 20,553, Processing Time 0.052 seconds

Development of a warning algorithm and monitoring system for preventing condensation in utility tunnels (공동구 내 결로 예방을 위한 경고 알고리즘 및 모니터링 시스템 개발)

  • Sang-Il Choi;Jung-Hun Kim;Suk-Min Kong;Yoseph Byun;Seong-Won Lee
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.5
    • /
    • pp.551-561
    • /
    • 2024
  • Underground utility tunnels are spaces densely packed with various infrastructure facilities, such as power, telecommunications, and water supply and drainage systems, making internal environment management crucial. An investigation into accident cases and on-site demands in these tunnels revealed that while fires and floods are the most common types of incidents, the demand for real-time condensation prevention and response is frequent according to on-site managers. Condensation occurs due to the difference in humidity and temperature between the inside and outside of the tunnel. Frequent or prolonged condensation can lead to metal pipe corrosion, electrical failures, and reduced equipment lifespan. Therefore, this study developed a control algorithm and monitoring system to prevent condensation in underground utility tunnels. The proposed control algorithm estimates the likelihood of condensation in real-time based on the measured temperature and humidity and suggests appropriate responses for each stage to the managers. Finally, a practical condensation prevention monitoring system was built based on the developed algorithm, verifying the feasibility and applicability of this technology in the field.

Study on Battery Power based IoT Device Lightweight Authentication Protocol (베터리 전력 환경 IoT 디바이스 경량 인증 프로토콜 연구)

  • Sung-Hwa Han
    • Convergence Security Journal
    • /
    • v.24 no.3
    • /
    • pp.165-171
    • /
    • 2024
  • Due to the IT convergence trend, many industrial domains are developing their own IoT services. With batteries and lightweight devices, IoT could expand into various fields including smart farms, smart environments, and smart energy. Many battery-powered IoT devices are passive in enforcing security techniques to maintain service time. This is because security technologies such as cryptographic operations consume a lot of power, so applying them reduces service maintenance time. This vulnerable IoT device security environment is not stable. In order to provide safe IoT services, security techniques considering battery power consumption are required. In this study, we propose an IoT device authentication technology that minimizes power consumption. The proposed technology is a device authentication function based on the Diffie-Hell man algorithm, and has the advantage that malicious attackers cannot masquerade the device even if salt is leaked during the transmission section. The battery power consumption of the authentication technology proposed in this study and the ID/PW-based authentication technology was compared. As a result, it was confirmed that the authentication technique proposed in this study consumes relatively little power. If the authentication technique proposed in this study is applied to IoT devices, it is expected that a safer IoT security environment can be secured.

Construction of Event Networks from Large News Data Using Text Mining Techniques (텍스트 마이닝 기법을 적용한 뉴스 데이터에서의 사건 네트워크 구축)

  • Lee, Minchul;Kim, Hea-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.183-203
    • /
    • 2018
  • News articles are the most suitable medium for examining the events occurring at home and abroad. Especially, as the development of information and communication technology has brought various kinds of online news media, the news about the events occurring in society has increased greatly. So automatically summarizing key events from massive amounts of news data will help users to look at many of the events at a glance. In addition, if we build and provide an event network based on the relevance of events, it will be able to greatly help the reader in understanding the current events. In this study, we propose a method for extracting event networks from large news text data. To this end, we first collected Korean political and social articles from March 2016 to March 2017, and integrated the synonyms by leaving only meaningful words through preprocessing using NPMI and Word2Vec. Latent Dirichlet allocation (LDA) topic modeling was used to calculate the subject distribution by date and to find the peak of the subject distribution and to detect the event. A total of 32 topics were extracted from the topic modeling, and the point of occurrence of the event was deduced by looking at the point at which each subject distribution surged. As a result, a total of 85 events were detected, but the final 16 events were filtered and presented using the Gaussian smoothing technique. We also calculated the relevance score between events detected to construct the event network. Using the cosine coefficient between the co-occurred events, we calculated the relevance between the events and connected the events to construct the event network. Finally, we set up the event network by setting each event to each vertex and the relevance score between events to the vertices connecting the vertices. The event network constructed in our methods helped us to sort out major events in the political and social fields in Korea that occurred in the last one year in chronological order and at the same time identify which events are related to certain events. Our approach differs from existing event detection methods in that LDA topic modeling makes it possible to easily analyze large amounts of data and to identify the relevance of events that were difficult to detect in existing event detection. We applied various text mining techniques and Word2vec technique in the text preprocessing to improve the accuracy of the extraction of proper nouns and synthetic nouns, which have been difficult in analyzing existing Korean texts, can be found. In this study, the detection and network configuration techniques of the event have the following advantages in practical application. First, LDA topic modeling, which is unsupervised learning, can easily analyze subject and topic words and distribution from huge amount of data. Also, by using the date information of the collected news articles, it is possible to express the distribution by topic in a time series. Second, we can find out the connection of events in the form of present and summarized form by calculating relevance score and constructing event network by using simultaneous occurrence of topics that are difficult to grasp in existing event detection. It can be seen from the fact that the inter-event relevance-based event network proposed in this study was actually constructed in order of occurrence time. It is also possible to identify what happened as a starting point for a series of events through the event network. The limitation of this study is that the characteristics of LDA topic modeling have different results according to the initial parameters and the number of subjects, and the subject and event name of the analysis result should be given by the subjective judgment of the researcher. Also, since each topic is assumed to be exclusive and independent, it does not take into account the relevance between themes. Subsequent studies need to calculate the relevance between events that are not covered in this study or those that belong to the same subject.

A Case Study of Environmental Design from a Viewpoint of Hybrid and Features of User Experience (하이브리드와 이용자체험 특성으로 본 환경설계의 사례연구)

  • Jang, Il-Young;Kim, Jin-Seon
    • Archives of design research
    • /
    • v.19 no.1 s.63
    • /
    • pp.201-214
    • /
    • 2006
  • Modern society is an age of vagueness and confusion. In addition, vagueness, complexity and variety are seen throughout art including modern philosophy, literature, and environmental design. A phenomenon like this shows that modern society has integrated different components as an organic relationship frequently crossing the boundary of fields. This feature can be regarded as hybrid related with accepting contradictory components and binding them into one under relationship between part and whole. As new design concept, presented are attitude to accept the two instead of attitude to select one of the alternatives, abundance instead of dearness, and ambiguity instead of simplicity. This principle has a crucial influence on creative design providing opposing contradiction and several alternative plans as non-deterministic form not completed one and, above all, useful information in mutual dependence and mutual relationship. When it comes to hybrid, therefore, a strategy is needed to consider layer of several fields getting out of standardizing space into a single space. As an event of this situation and concept, space experience means behaving freely based on experience of users' body. It can be known that this experience brings about users' more dynamic experience in comparison with the experience of seeing environmental design from a viewpoint of visual ism on the existing simplicity. Such a practical experience is subjective, synesthetic, and non-observational one. Therefore, hybrid has brought active users to the stage, which is distinguished from synesthesia felt through body's experience, not through observational attitude and visual space which achieve former balance and harmony with non-determination. That's because hybrid creatures are turning to a product resulted from creative imagination instead of from reappearance which makes text visualized. Such experience performed by user's active participation collapses the boundary between special elite-centered art and daily life and it is the present progressive form showing creation process of future events and new esthetic experience.

  • PDF

Analysis of Anxiety EGG per Driving Speed on Different Design Speed Road (상이한 설계속도 도로에서의 주행속도별 불안뇌파 분석)

  • Lim, Joon Beom;Lee, Soo Beom;Joo, Sung Kab;Shin, Joon Soo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.5
    • /
    • pp.2049-2056
    • /
    • 2013
  • With the advance in information communication, the information age has come, and desire of human being in increasing. In this circumstance, the necessity for design for building of superhighways is arising to improve the mobility in the field of transportation, too. This study was conducted to analyze if driver can drive at a design speed on a superhighway with a design speed exceeding 120km/h. For this study, it was experimented if the running speed that makes a driver feel anxious, increased, when road alignment and standard improved, due to the differences of design speed. For the experiment, 30 subjects were asked to attach brain wave analyzers to bodies. Then, this study compared powers of ${\beta}$ waves generated, when they felt anxious, driving on the roads with different design speeds, and driving virtually through a simulator. Here, Kangbyeonbukro (90km/h), Jayuro(100km/h), Joongang Expressway(110km/h), and Seohaean Expressway(120km/h) were selected as experimental sections. While drivers drove on the Kangbyeonbukro and Jayuro at a speed of 80km/h - 130km/h, on the Joongang Expressway at a speed of 100km/h - 150km/h, and Seohaean Expressway at a speed of 110km/h - 180km/h, powers of anxiety EEGs(electroencephalogram) were compared, and during the simulation driving at the same speed of 110km/h - 180km/h, powers of anxiety EEGs were compared and analyzed. Moreover, the speed when anxiety EEGs increased, was statistically verified through paired t-test. As the result, the speed when anxiety EEGs increased during the simulation driving was nearly 30km/h higher than when they increased during the actual driving on the expressways, and anxiety EEGs increased at the same speed, when subjects drove on the roads with a design speed of 90km/h and 100km/h. It means that there were small differences in road alignment and standard. However, the running speed to make drivers feel anxious was increased at both roads with a design speed of 110km/h and 120km/h. It implies that drivers can drive at a higher speed, as road alignment and standard improve.

The Effect of Penalizing Wrong Answers Upon the Omission Response in the Computerized Modified Multiple-choice Testing (컴퓨터화 변형 선다형 시험 방식에서 감점제가 시험 점수와 반응 포기에 미치는 영향)

  • Song, Min Hae;Park, Jooyong
    • Korean Journal of Cognitive Science
    • /
    • v.28 no.4
    • /
    • pp.315-328
    • /
    • 2017
  • Even though assessment using information and communication technology will most likely lead the future of educational assessment, there is little domestic research on this topic. Computerized assessment will not only cut costs but also measure students' performance in ways not possible before. In this context, this study introduces a tool which can overcome the problems of multiple choice tests, which are most widely used type of assessment in current Korean educational setting. Multiple-choice tests, in which options are presented with the questions, are efficient in that grading can be automated; however, they allow for students who don't know the answer, to find the correct answer from the options. Park(2005) has developed a modified multiple-choice testing system (CMMT) using the interactivity of computers, that presents questions first, and options later for a short time when the student requests for them. The present study was conducted to find out if penalizing wrong answers could lower the possibility of students choosing an answer among the options when they don't know the correct answer. 116 students were tested with the directions that they will be penalized for wrong answers, but not for no response. There were 4 experimental conditions: 2 conditions of high or low percentage of penalizing, each in traditional multiple-choice or CMMT format. The results were analyzed using a two-way ANOVA for the number of no response, the test score and self-report score. Analysis showed that the number of no response was significantly higher for the CMMT format and that test scores were significantly lower when the penalizing percentage was high. The possibility of applying CMMT format tests while penalizing wrong answers in actual testing settings was addressed. In addition, the need for further research in the cognitive sciences to develop computerized assessment tools, was discussed.

An efficient interconnection network topology in dual-link CC-NUMA systems (이중 연결 구조 CC-NUMA 시스템의 효율적인 상호 연결망 구성 기법)

  • Suh, Hyo-Joong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.1
    • /
    • pp.49-56
    • /
    • 2004
  • The performance of the multiprocessor systems is limited by the several factors. The system performance is affected by the processor speed, memory delay, and interconnection network bandwidth/latency. By the evolution of semiconductor technology, off the shelf microprocessor speed breaks beyond GHz, and the processors can be scalable up to multiprocessor system by connecting through the interconnection networks. In this situation, the system performances are bound by the latencies and the bandwidth of the interconnection networks. SCI, Myrinet, and Gigabit Ethernet are widely adopted as a high-speed interconnection network links for the high performance cluster systems. Performance improvement of the interconnection network can be achieved by the bandwidth extension and the latency minimization. Speed up of the operation clock speed is a simple way to accomplish the bandwidth and latency betterment, while its physical distance makes the difficulties to attain the high frequency clock. Hence the system performance and scalability suffered from the interconnection network limitation. Duplicating the link of the interconnection network is one of the solutions to resolve the bottleneck of the scalable systems. Dual-ring SCI link structure is an example of the interconnection network improvement. In this paper, I propose a network topology and a transaction path algorism, which optimize the latency and the efficiency under the duplicated links. By the simulation results, the proposed structure shows 1.05 to 1.11 times better latency, and exhibits 1.42 to 2.1 times faster execution compared to the dual ring systems.

Developmental Plan of Man-Overboard Alert Devices of Small Fishing Vessels: A Study (소형어선의 선외추락 경보장치 개발 방안 연구)

  • Kim, Jae-Won;Kim, Byung-Ok;Lim, Jung-Gyun;Lee, Ju-Han;Yim, Jea-Hong;Park, Dong-Kook
    • Journal of Navigation and Port Research
    • /
    • v.42 no.4
    • /
    • pp.245-252
    • /
    • 2018
  • A method of transmitting an alert signal in case of man-overboard (MOB) systems in a small fishing vessel navigating within coastal area is being operated as VHF-DSC equipment via a distress alert button and V-P ass Equipment via alert button or beacon separation. However, a small fishing vessel with a couple of crews on board is an inappropriate way to alert a man-overboard condition. However, internationally, MOB equipment using VHF-DSC, AIS, and Bluetooth technologies is used to transmit alert signals directly to the mother ship and other radio stations. In order to analyze the performance and technology of the MOB equipment operating in foreign countries, it was confirmed that the alarm signal can be received within a maximum of one nautical mile when the MOB device is on the water surface. An MOB device that meets domestic conditions needs to send an alarm signal to a station within the VHF communication range. However, in order to reduce the false alert signal, it is most appropriate to operate the VHF-DSC radio equipment installed on the ship remotely. Analysis of various technologies connecting the MOB and the VHF-DSC revealed that the Bluetooth system has advantages such as device miniaturization. When an emergency signal is transmitted from the MOB device, it can be received by a dedicated receiver and recognized through an external input terminal of the VHF-DSC equipment generating its own alarm. If the emergency situation cannot be processed at the mother ship, a distress alert is sent to all radio stations via VHF-DSC for response under emergencies faced by small fishing vessels.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

A Study on the Effective Controlling System of Radio-activity Ventilation (RI사용 의료기관의 효율적인 배기관리 방안)

  • Lee, Kyung-Jae;Lee, Jin-Hyung;Kim, Kyung-Hoon;Kwack, Dong-Woo;Jo, Hyun-Duck;Ko, Kil-Man;Park, Young-Jae;Lee, In-Won
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.12 no.1
    • /
    • pp.91-98
    • /
    • 2008
  • Purpose: Radio-isotopes (RI) use has been steadily developing due to industrial and technical development in the modern medical society. Particularly, popularization of domestic cyclotrons dramatically enable hospitals to produce and use diagnostic radio-isotopes. Generally, only specific facilities such as hospitals, research institutes, nuclear power plants and universities can use radio-isotopes, they are also responsible for ventilation system. The strength of radioactivity in the air is strongly regulated and controlled by korea atomic energy law in Korea Institue of Nuclear Safety (KINS), so that air radioactivity exposure can lead to environmental pollution surrounding places. In this study, we'd like to find out the investigation and the present condition of the controlled ventilation system in domestic hospitals by an emission standard from KINS, and try to reach an agreement about how to use the ventilation system. Result: Definition of filters, features and structures of pre-filters, hepa-filters, charcol filters, filter exchange procedures and precautions are explained. RI deflation concentration and filter exchange cycle have been presented as a standard prescribed in the rules of KINS. The Radiation Control Management System (RCMS) introduced by Seoul National University Bundang Hospital linking to digital pressure gauge with computer controller in another medical facilities were described in details. Conclusions: The system of medical facilities using RI has been remarkably developing in 21 century. Especially, radiation safety control system has also been grown rapidly into the subdivision, specialization, advanced technology along with international technical improvement. However, As far as current RI ventilation system is concerned, it has nothing better than doing in the past. Preferentially, to reinforce this, more sophisticated system with strict periodic filter exchange and exhaust air control guidance should be introduced by applying brilliant domestic information technology for RCMS and digital gauge method. From personal point of view as a radiation safety manager, I have provide with present problems and improvements. Futhermore, more improved guidance should be conducted.

  • PDF