• Title/Summary/Keyword: CAN Network Control

Search Result 4,040, Processing Time 0.035 seconds

A Design on Face Recognition System Based on pRBFNNs by Obtaining Real Time Image (실시간 이미지 획득을 통한 pRBFNNs 기반 얼굴인식 시스템 설계)

  • Oh, Sung-Kwun;Seok, Jin-Wook;Kim, Ki-Sang;Kim, Hyun-Ki
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.12
    • /
    • pp.1150-1158
    • /
    • 2010
  • In this study, the Polynomial-based Radial Basis Function Neural Networks is proposed as one of the recognition part of overall face recognition system that consists of two parts such as the preprocessing part and recognition part. The design methodology and procedure of the proposed pRBFNNs are presented to obtain the solution to high-dimensional pattern recognition problem. First, in preprocessing part, we use a CCD camera to obtain a picture frame in real-time. By using histogram equalization method, we can partially enhance the distorted image influenced by natural as well as artificial illumination. We use an AdaBoost algorithm proposed by Viola and Jones, which is exploited for the detection of facial image area between face and non-facial image area. As the feature extraction algorithm, PCA method is used. In this study, the PCA method, which is a feature extraction algorithm, is used to carry out the dimension reduction of facial image area formed by high-dimensional information. Secondly, we use pRBFNNs to identify the ID by recognizing unique pattern of each person. The proposed pRBFNNs architecture consists of three functional modules such as the condition part, the conclusion part, and the inference part as fuzzy rules formed in 'If-then' format. In the condition part of fuzzy rules, input space is partitioned with Fuzzy C-Means clustering. In the conclusion part of rules, the connection weight of pRBFNNs is represented as three kinds of polynomials such as constant, linear, and quadratic. Coefficients of connection weight identified with back-propagation using gradient descent method. The output of pRBFNNs model is obtained by fuzzy inference method in the inference part of fuzzy rules. The essential design parameters (including learning rate, momentum coefficient and fuzzification coefficient) of the networks are optimized by means of the Particle Swarm Optimization. The proposed pRBFNNs are applied to real-time face recognition system and then demonstrated from the viewpoint of output performance and recognition rate.

Development of Automatic Sorting System for Black Plastics Using Laser Induced Breakdown Spectroscopy (LIBS) (LIBS를 이용한 흑색 플라스틱의 자동선별 시스템 개발)

  • Park, Eun Kyu;Jung, Bam Bit;Choi, Woo Zin;Oh, Sung Kwun
    • Resources Recycling
    • /
    • v.26 no.6
    • /
    • pp.73-83
    • /
    • 2017
  • Used small household appliances have a wide variety of product types and component materials, and contain high percentage of black plastics. However, they are not being recycled efficiently as conventional sensors such as near-infrared ray (NIR), etc. are not able to detect black plastic by types. In the present study, an automatic sorting system was developed based on laser-induced breakdown spectroscopy (LIBS) to promote the recycling of waste plastics. The system we developed mainly consists of sample feeder, automatic position recognition system, LIBS device, separator and control unit. By applying laser pulse on the target sample, characteristic spectral data can be obtained and analyzed by using CCD detectors. The obtained data was then treated by using a classifier, which was developed based on artificial intelligent algorithm. The separation tests on waste plastics also were carried out by using a lab-scale automatic sorting system and the test results will be discussed. The classification rate of the radial basis neural network (RBFNNs) classifier developed in this study was about > 97%. The recognition rate of the black plastic by types with the automatic sorting system was more than 94.0% and the sorting efficiency was more than 80.0%. Automatic sorting system based on LIBS technology is in its infant stage and it has a high potential for utilization in and outside Korea due to its excellent economic efficiency.

Shape Optimization of Three-Way Reversing Valve for Cavitation Reduction (3 방향 절환밸브의 공동현상 저감을 위한 형상최적화)

  • Lee, Myeong Gon;Lim, Cha Suk;Han, Seung Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.11
    • /
    • pp.1123-1129
    • /
    • 2015
  • A pair of two-way valves typically is used in automotive washing machines, where the water flow direction is frequently reversed and highly pressurized clean water is sprayed to remove the oil and dirt remaining on machined engine and transmission blocks. Although this valve system has been widely used because of its competitive price, its application is sometimes restricted by surging effects, such as pressure ripples occurring in rapid changes in water flow caused by inaccurate valve control. As an alternative, one three-way reversing valve can replace the valve system because it provides rapid and accurate changes to the water flow direction without any precise control device. However, a cavitation effect occurs because of the complicated bottom plug shape of the valve. In this study, the cavitation index and percent of cavitation (POC) were introduced to numerically evaluate fluid flows via computational fluid dynamics (CFD) analysis. To reduce the cavitation effect generated by the bottom plug, the optimal shape design was carried out through a parametric study, in which a simple computer-aided engineering (CAE) model was applied to avoid time-consuming CFD analysis and difficulties in achieving convergence. The optimal shape design process using full factorial design of experiments (DOEs) and an artificial neural network meta-model yielded the optimal waist and tail length of the bottom plug with a POC value of less than 30%, which meets the requirement of no cavitation occurrence. The optimal waist length, tail length and POC value were found to 6.42 mm, 6.96 mm and 27%, respectively.

USN's Efforts to Rebuild its Combat Power in an Era of Great Power Competition (강대국 간의 경쟁시대와 미 해군의 증강 노력)

  • Jung, Ho-Sub
    • Strategy21
    • /
    • s.44
    • /
    • pp.5-27
    • /
    • 2018
  • The purpose of this paper is to look at USN's efforts to rebuild its combat power in the face of a reemergence of great powers competition, and to propose some recommendations for the ROKN. In addition to the plan to augment its fleet towards a 355-ships capacity, the USN is pursuing to improve exponentially combat lethality(quality) of its existing fleet by means of innovative science and technology. In other words, the USN is putting its utmost efforts to improve readiness of current forces, to modernize maintenance facilities such as naval shipyards, and simultaneously to invest in innovative weapons system R&D for the future. After all, the USN seems to pursue innovations in advanced military Science & Technology as the best way to ensure continued supremacy in the coming strategic competition between great powers. However, it is to be seen whether the USN can smoothly continue these efforts to rebuild combat strength vis-a-vis its new competition peers, namely China and Russian navy, due to the stringent fiscal constraints, originating, among others, from the 2011 Budget Control Act effective yet. Then, it seems to be China's unilateral and assertive behaviors to expand its maritime jurisdiction in the South China Sea that drives the USN's rebuild-up efforts of the future. Now, some changes began to be perceived in the basic framework of the hitherto regional maritime security, in the name of declining sea control of the USN as well as withering maritime order based on international law and norms. However, the ROK-US alliance system is the most excellent security mechanism upon which the ROK, as a trading power, depends for its survival and prosperity. In addition, as denuclearization of North Korea seems to take significant time and efforts to accomplish in the years to come, nuclear umbrella and extended deterrence by the US is still noting but indispensible for the security of the ROK. In this connection, the naval cooperation between ROKN and USN should be seen and strengthened as the most important deterrents to North Korean nuclear and missile threats, as well as to potential maritime provocation by neighboring countries. Based on these observations, this paper argues that the ROK Navy should try to expand its own deterrent capability by pursuing selective technological innovation in order to prevent this country's destiny from being dictated by other powers. In doing so, however, it may be too risky for the ROK to pursue the emerging, disruptive innovative technologies such as rail gun, hypersonic weapon... etc., due to enormous budget, time, and very thin chance of success. This paper recommends, therefore, to carefully select and extensively invest on the most cost-effective technological innovations, suitable in the operational environments of the ROK. In particular, this paper stresses the following six areas as most potential naval innovations for the ROK Navy: long range precision strike; air and missile defense at sea; ASW with various unmanned maritime system (UMS) such as USV, UUV based on advanced hydraulic acoustic sensor (Sonar) technology; network; digitalization for the use of AI and big data; and nuclear-powered attack submarines as a strategic deterrent.

A Method for Reducing Path Recovery Overhead of Clustering-based, Cognitive Radio Ad Hoc Routing Protocol (클러스터링 기반 인지 무선 애드혹 라우팅 프로토콜의 경로 복구 오버헤드 감소 기법)

  • Jang, Jin-kyung;Lim, Ji-hun;Kim, Do-Hyung;Ko, Young-Bae;Kim, Joung-Sik;Seo, Myung-hwan
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.280-288
    • /
    • 2019
  • In the CR-enabled MANET, routing paths can be easily destroyed due to node mobility and channel unavailability (due to the emergence of the PU of a channel), resulting in significant overhead to maintain/recover the routing path. In this paper, network caching is actively used for route maintenance, taking into account the properties of the CR. In the proposed scheme, even if a node detects that a path becomes unavailable, it does not generate control messages to establish an alternative path. Instead, the node stores the packets in its local cache and 1) waits for a certain amount of time for the PU to disappear; 2) waits for a little longer while overhearing messages from other flow; 3) after that, the node applies local route recovery process or delay tolerant forwarding strategy. According to the simulation study using the OPNET simulator, it is shown that the proposed scheme successfully reduces the amount of control messages for path recovery and the service latency for the time-sensitive traffic by 13.8% and 45.4%, respectively, compared to the existing scheme. Nevertheless, the delivery ratio of the time-insensitive traffic is improved 14.5% in the proposed scheme.

Design of a Greenhouse Monitoring System using Arduino and Wireless Communication (아두이노와 무선통신을 이용한 온실 환경 계측 시스템 설계)

  • Sung, Bo Hyun;Cho, Young-Yeol
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.452-459
    • /
    • 2022
  • One of the important factors among the smart farm factors is environmental measurement. This study tried to design an environmental measurement monitoring system through Bluetooth wireless communication with LoRa using the open source programs Arduino, App Inventor, and Node Red. This system consists of Arduino, LoRa shield, temperature and humidity sensor (SHT10), and carbon dioxide sensor (K30). The environmental measurement system is configured as a system that allows the sensor to collect environmental data and transmit it to the user through wireless communication to conveniently monitor the farm environment. As libraries used in the Arduino program, LoRa.h, Sensirion.h, LiquidCrystal_I2C.h and K30_I2C.h were used. When receiving environmental data from the sensor at regular intervals, coding using average value was used for data stabilization. An Android-based app was developed using Node Red and App Inventor program as the user interface. It can be seen that the environmental data for the sensor is well collected with the screen output to the serial screen of Arduino, the screen of the smartphone, and the user interface of Node Red. Through these open source-based platforms and programs will be applied to various agricultural applications.

A Study on Analysis of Research Trends and Intellectual Structure in the Overseas Cataloging Research (해외 목록학 연구동향 및 지적구조 분석)

  • Ji Won Lee;Sung Sook Lee
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.367-387
    • /
    • 2024
  • This study aims to identify the recent trends and intellectual structure of international research in the field of catalog, which is undergoing a major change due to the enactment of new standards and rules and the anticipated future. For this purpose, we collected 680 articles published in the 14 years since 2010 and analyzed 1,942 author keywords extracted from them after preprocessing. The main findings of the analysis are as follows First, overseas cataloging research has seen notable growth since 2017. Second, the most frequent research topics were: cataloging, metadata, RDA, university libraries, authority control, linked data, FRBR, catalog, LCSH, libraries, andonline cataloging. Third, the research themes were divided into two clusters, one related to the traditional aspects of library cataloging and the other related to the more recently discussed topics of authority control, cooperative cataloging, RDA, and linked data, which were further subdivided into 14 subclusters. Fourth, we looked at the growth index and standard performance index of the 14 keyword clusters and found that all but one cluster showed growth in terms of discipline growth. This study is significant in that it can be used as a basis for predicting the future development of inventories for Korean academia and the field and for related education.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

Analysis and Design of Profiling Adaptor for XML based Energy Storage System (XML 기반의 에너지 저장용 프로파일 어댑터 분석 및 설계)

  • Woo, Yongje;Park, Jaehong;Kang, Mingoo;Kwon, Kiwon
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.29-38
    • /
    • 2015
  • The Energy Storage System stores electricity for later use. This system can store electricity from legacy electric power systems or renewable energy systems into a battery device when demand is low. When there is high electricity demand, it uses the electricity previously stored and enables efficient energy usage and stable operation of the electric power system. It increases the energy usage efficiency, stabilizes the power supply system, and increases the utilization of renewable energy. The recent increase in the global interest for efficient energy consumption has increased the need for an energy storage system that can satisfy both the consumers' demand for stable power supply and the suppliers' demand for power demand normalization. In general, an energy storage system consists of a Power Conditioning System, a Battery Management System, a battery cell and peripheral devices. The specifications of the subsystems that form the energy storage system are manufacturer dependent. Since the core component interfaces are not standardized, there are difficulties in forming and operating the energy storage system. In this paper, the design of the profile structure for energy storage system and realization of private profiling system for energy storage system is presented. The profiling system accommodates diverse component settings that are manufacturer dependent and information needed for effective operation. The settings and operation information of various PCSs, BMSs, battery cells, and other peripheral device are analyzed to define profile specification and structure. A profile adapter software that can be applied to energy storage system is designed and implemented. The profiles for energy storage system generated by the profile authoring tool consist of a settings profile and operation profile. Setting profile consists of configuration information for energy device what composes energy saving system. To be more specific, setting profile has three parts of category as information for electric control module, sub system, and interface for communication between electric devices. Operation profile includes information in relation to the method in which controls Energy Storage system. The profiles are based on standard XML specification to accommodate future extensions. The profile system has been verified by applying it to an energy storage system and testing charge and discharge operations.

A Mobility Supporting MAC Protocol to Improve Handover Performance in IEEE 802.16j Multi-hop Relay Networks (IEEE 802.16j 멀티 홉 릴레이 네트워크에서의 핸드오버 성능 향상을 위한 이동성 지원 MAC 프로토콜)

  • Yang, Hyeon-Chae;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.437-452
    • /
    • 2008
  • IEEE 802.16j MR networks introduce RSs (Relay Stations) within the IEEE 802.16 system in order to enhance the data throughput and extend the coverage. However, the current standardization defines that the BS (Base Station) controls MS's (Mobile Station's) handover, not only it induces the large signaling overhead but also handover latency could increase. In this paper, we propose a handover protocol in the MR networks where the high capability RSs that can process the MS's control functions are deployed. First, we classify the handover scenarios for the MR networks with the high capability RSs. Then, we define the MAC handover procedure, corresponding MAC management messages and the transmission routes for the proposed messages so that an 802.16e MS can perform seamless handover without noticing it is attached to an MR network. The simulation results show that the proposed handover protocol not only reduces the MAC management message overhead transferred through the wireless links compared to IEEE 802.16j/D1, which is the current standard for MR networks, but also performs the rapider and more secure MS handover than IEEE 802.16e and IEEE 802.16j/D1.