• Title/Summary/Keyword: CAN Network Control

Search Result 4,033, Processing Time 0.038 seconds

Analysis of Impact of Hydrologic Data on Neuro-Fuzzy Technique Result (수문자료가 Neuro-Fuzzy 기법 결과에 미치는 영향 분석)

  • Ji, Jungwon;Choi, Changwon;Yi, Jaeeung
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1413-1424
    • /
    • 2013
  • Recently, the frequency of severe storms increases in Korea. Severe storms occurring in a short time cause huge losses of both life and property. A considerable research has been performed for the flood control system development based on an accurate stream discharge prediction. A physical model is mainly used for flood forecasting and warning. Physical rainfall-runoff models used for the conventional flood forecasting process require extensive information and data, and include uncertainties which can possibly accumulate errors during modelling processes. ANFIS, a data driven model combining neural network and fuzzy technique, can decrease the amount of physical data required for the construction of a conventional physical models and easily construct and evaluate a flood forecasting model by utilizing only rainfall and water level data. A data driven model, however, has a disadvantage that it does not provide the mathematical and physical correlations between input and output data of the model. The characteristics of a data driven model according to functional options and input data such as the change of clustering radius and training data length used in the ANFIS model were analyzed in this study. In addition, the applicability of ANFIS was evaluated through comparison with the results of HEC-HMS which is widely used for rainfall-runoff model in Korea. The neuro-fuzzy technique was applied to a Cheongmicheon Basin in the South Han River using the observed precipitation and stream level data from 2007 to 2011.

A Study on Improvement of Parking Guidance System to Low-Power Operation for Green Building

  • Lee, Jeong-Jun;Oh, Young-Tae;Lee, Choul-Ki;Yun, Il-Soo;Chung, Sang-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.3
    • /
    • pp.1-8
    • /
    • 2011
  • The parking guidance system can increase driver's convenience with detailed parking information service, but it continuously consumes electrical energy with large amount of sensors, displays and control modules. With the increase of the demand for green and sustainable building design, it becomes a meaningful issue for parking guidance system to reduce operating power. This paper presents the preliminary design and estimated results of a parking guidance system which is optimized to reduce the power consumption mainly on detectors and displays. The system design is based on commercial wireless parking detectors, wireless-loop-detector and earth-magnetic-detector. We have performed system architecture design, communication network design, parking information service scenario planning, battery life regulation and at last operating power estimation. With the 7 years of battery replace cycle, the estimated result for power consumption of designed system was 0.33W/slot, which is 13% of the traditional system's estimation result. The estimated annual maintain cost was similar to the traditional ultrasonic sensor based system's. The low power operable designed system can be expected to reduce CO2 emission.

The Social Implication of New Media Art in Forming a Community (공동체 형성에 있어서 뉴미디어아트의 사회적 역할에 대한 고찰)

  • Kim, Hee-Young
    • The Journal of Art Theory & Practice
    • /
    • no.14
    • /
    • pp.87-124
    • /
    • 2012
  • This paper focuses on the social implication of new media art, which has evolved with the advance of technology. To understand the notion of human-computer interactivity in media art, it examines the meaning of "cybernetics" theory invented by Norbert Wiener just after WWII, who provided "control and communication" as central components of his theory of messages. It goes on to investigate the application of cybernetics theory onto art since the 1960s, to which Roy Ascott made a significant contribution by developing telematic art, utilizing the network of telecommunication. This paper underlines the significance of the relationship between human and machine, art and technology in transforming the work of art as a site of communication and experience. The interactivity in new media art transforms the viewer into the user of the work, who is now provided free will to make decisions on his or her action with the work. The artist is no longer a godlike figure who determines the meaning of the work, yet becomes another user of his or her own work, with which to interact. This paper believes that the interaction between man and machine, art and technology can lead to various ways of interaction between humans, thereby restoring a sense of community while liberating humans from conventional limitations on their creativity. This paper considers the development of new media art more than a mere invention of new aesthetic styles employing advanced technology. Rather, new media art provides a critical shift in subverting the modernist autonomy that advocates the medium specificity. New media art envisions a new art, which would embrace impurity into art, allowing the coexistence of autonomy and heteronomy, embracing a technological other, thereby expanding human relations. By enabling the birth of the user in experiencing the work, interactive new media art produces an open arena, in which the user can create the work while communicating with the work and other users. The user now has freedom to visit the work, to take a journey on his or her own, and to make decisions on what to choose and what to do with the work. This paper contends that there is a significant parallel between new media artists' interest in creating new experiences of the art and Jacques Ranci$\grave{e}$re's concept of the aesthetic regime of art. In his argument for eliminating hierarchy in art and for embracing impurity, Ranci$\grave{e}$re provides a vision for art, which is related to life and ultimately reshapes life. Ranci$\grave{e}$re's critique of both formalist modernism and Jean-Francois Lyotard's postmodern view underlines the social implication of new media art practices, which seek to form "the common of a community."

  • PDF

Face Detection in Color Images Based on Skin Region Segmentation and Neural Network (피부 영역 분할과 신경 회로망에 기반한 칼라 영상에서 얼굴 검출)

  • Lee, Young-Sook;Kim, Young-Bong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.12
    • /
    • pp.1-11
    • /
    • 2006
  • Many research demonstrations and commercial applications have been tried to develop face detection and recognition systems. Human face detection plays an important role in applications such as access control and video surveillance, human computer interface, identity authentication, etc. There are some special problems such as a face connected with background, faces connected via the skin color, and a face divided into several small parts after skin region segmentation in generally. It can be allowed many face detection techniques to solve the first and second problems. However, it is not easy to detect a face divided into several parts of regions for reason of different illumination conditions in the third problem. Therefore, we propose an efficient modified skin segmentation algorithm to solve this problem because the typical region segmentation algorithm can not be used to. Our algorithm detects skin regions over the entire image, and then generates face candidate regions using our skin segmentation algorithm For each face candidate, we implement the procedure of region merging for divided regions in order to make a region using adjacency between homogeneous regions. We utilize various different searching window sizes to detect different size faces and a face detection classifier based on a back-propagation algorithm in order to verify whether the searching window contains a face or not.

  • PDF

Gaze Detection by Computing Facial and Eye Movement (얼굴 및 눈동자 움직임에 의한 시선 위치 추적)

  • 박강령
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.79-88
    • /
    • 2004
  • Gaze detection is to locate the position on a monitor screen where a user is looking by computer vision. Gaze detection systems have numerous fields of application. They are applicable to the man-machine interface for helping the handicapped to use computers and the view control in three dimensional simulation programs. In our work, we implement it with a computer vision system setting a IR-LED based single camera. To detect the gaze position, we locate facial features, which is effectively performed with IR-LED based camera and SVM(Support Vector Machine). When a user gazes at a position of monitor, we can compute the 3D positions of those features based on 3D rotation and translation estimation and affine transform. Finally, the gaze position by the facial movements is computed from the normal vector of the plane determined by those computed 3D positions of features. In addition, we use a trained neural network to detect the gaze position by eye's movement. As experimental results, we can obtain the facial and eye gaze position on a monitor and the gaze position accuracy between the computed positions and the real ones is about 4.8 cm of RMS error.

A Study to Improve the Spatial Data Design of Korean Reach File to Support TMDL Works (TMDL 업무 지원을 위한 Korean Reach File 공간자료 설계 개선 연구)

  • Lee, Chol Young;Kim, Kye Hyun;Park, Yong Gil;Lee, Hyuk
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.4
    • /
    • pp.345-359
    • /
    • 2013
  • In order to manage water quality efficiently and systematically through TMDL (Total Maximum Daily Load), the demand for the construction of spatial data for stream networks has increased for use with GIS-based water quality modeling, data management and spatial analysis. The objective of this study was to present an improved KRF (Korean Reach File) design as framework data for domestic stream networks to be used for various purposes in relation to the TMDL. In order to achieve this goal, the US EPA's RF (River Reach File) was initially reviewed. The improved design of the graphic and attribute data for the KRF based on the design of the EPA's RF was presented. To verify the results, the KRF was created for the Han River Basin. In total, 2,047 stream reaches were divided and the relevant nodes were generated at 2,048 points in the study area. The unique identifiers for each spatial object were input into the KRF without redundancy. This approach can serve as a means of linking the KRF with related database. Also, the enhanced topological information was included as attributes of the KRF. Therefore, the KRF can be used in conjunction with various types of network analysis. The utilization of KRF for water quality modeling, data management and spatial analysis as they pertain to the applicability of the TMDL should be conducted.

The LVC Linkage for the Interoperability of the Battle Lab (Battle Lab에서의 상호운용성을 위한 LVC 연동방안)

  • Yun, Keun-Ho;Shim, Shin-Woo;Lee, Dong-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.21 no.1
    • /
    • pp.81-88
    • /
    • 2012
  • In the M&S filed, The Battle Lab is available for acquisition, design, development tool, validation test, and training in the weapon system of development process. Recently, the Battle Lab in the military of Korea is still in an early stage, in spite of importance of battle lab construction. In the environment of network centric warfare, a practical use of the M&S which is connecting live, virtual and constructive model can be applied to all field of System Engineering process. It is necessary thar the Battle Lab is not restricted by time and space, and is possible for the technical implementation. In this paper, to guarantee the interoperability of live and virtual simulation, virtual simulators connect live simulators by using the tactical data link. To guarantee the interoperability of virtual and constructive simulation, both virtual simulators and constructive simulators use the RTI which is the standard tool of M&S. We propose the System that constructed the Air Defence Battle Lab. In case of the approach of target tracks, The Air Defence Battle Lab is the system for the engagement based on a command of an upper system in the engagement weapon system. Constructive simulators which are target track, missile, radar, and launcher simulator connect virtual simulators which are MCRC, battalion, and fire control center simulators using the RPR-FOM 1.0 that is a kind of RTI FOM. The interoperability of virtual simulators and live simulators can be guaranteed by the connection of the tactical data links which are Link-11B and ATDL-1.

Fast Handover Mechanism for Multi-Interface MIPv6 Environments and Performance Evaluation (다중 인터페이스 MIPv6 환경에서의 Fast Handover 방안 및 성능 분석)

  • Park, Man-Kyu;Hwang, An-Kyu;Lee, Jae-Yong;Kim, Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.12
    • /
    • pp.34-43
    • /
    • 2007
  • Recently, in addition to the sharp increase of mobile nodes, various kinds of wireless technologies are available for mobile nodes. If IPv6 technology is applied to the network, multi-homing terminals which have several public IP addresses on one interface will be common. Accordingly, there are many research activities on mobility management for multi-interface, multi-homming nodes. In this paper we propose an extended fast handover mechanism for multi-interface MIPv6 environments that uses multi-interface FBU (MFBU) message instead of the existing FBU message. The MFBU message has the "tunnel destination" mobility option that points a specific tunnel destination other than NAR, and "T" flag that indicates the existence of tunnel destination option. The proposed mechanism can improve the TCP performance by mitigating packet reordering during FMIPv6 handover that can cause unnecessary congestion control due to 3 duplicate ACKs. In this paper, we implemented a multi-Interface MIPv6 simulator by extending a single-interface MIPv6 simulator in NS-2, and showed that the performance of TCP traffic is improved by using the proposed multi-interface fast MIPv6.

Reactive Power Variation Method for Anti-islanding Using Digital Phase-Locked-Loop (DPLL을 이용한 능동적 단독운전방지를 위한 무효전력변동법)

  • Lee, Ki-Ok;Yu, Byung-Gu;Yu, Gwon-Jong;Choi, Ju-Yeop;Choy, Ick
    • Journal of the Korean Solar Energy Society
    • /
    • v.28 no.2
    • /
    • pp.64-69
    • /
    • 2008
  • As the grid-connected photovoltaic power conditioning systems (PVPCS) are installed in many residential areas, these have raised potential problems of network protection on electrical power system. One of the numerous problems is an Islanding phenomenon. There has been an argument that it may be a non-issue in practice because the probability of islanding is extremely low. However, there are three counter-arguments: First, the low probability of islanding is based on the assumption of 100% power matching between the PVPCS and the islanded local loads. In fact, an islanding can be easily formed even without 100% power matching (the power mismatch could be up to 30% if only traditional protections are used, e.g. under/over voltage/frequency). The 30% power-mismatch condition will drastically increase the islanding probability. Second, even with a larger power mismatch, the time for voltage or frequency to deviate sufficiently to cause a trip, plus the time required to execute a trip (particularly if conventional switchgear is required to operate), can easily be greater than the typical re-close time on the distribution circuit. Third, the low-probability argument is based on the study of PVPCS. Especially, if the output power of PVPCS equals to power consumption of local loads, it is very difficult for the PVPCS to sustain the voltage and frequency in an islanding. Unintentional islanding of PVPCS may result in power-quality issues, interference to grid-protection devices, equipment damage, and even personnel safety hazards. Therefore the verification of anti-islanding performance is strongly needed. In this paper, improved RPV method is proposed through considering power quality and anti-islanding capacity of grid-connected single-phase PVPCS in IEEE Std 1547 ("Standard for Interconnecting Distributed Resources to Electric Power Systems"). And the simulation results are verified.

Performance of an Authentication Proxy for Port Based Security Systems (포트레벨 보안을 위한 인증 프록시 시스템의 성능분석)

  • 이동현;이현우;정해원;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.8B
    • /
    • pp.730-737
    • /
    • 2003
  • In this paper, we present an efficient authentication proxy for IEEE 802.1x systems based on the port-based access control mechanism. An IEEE 802.1x system consists of PC supplicants, a bridge with authentication client functions, and an authentication server. For the network security and user authentication purposes, a supplicant who wants to access Internet should be authorized to access the bridge port using the Extended Authentication Protocol (EAP) over LAN. The frame of EAP over LAN is then relayed to the authentication server by the bridge. After several transactions between the supplicant and the server via the bridge, the supplicant may be either authorized or not. Noting that the transactions between the relaying bridge and the server will be increased as the number of supplicants grows in public networks, we propose a scheme for reducing the transactions by employing an authentication proxy function at the bridge. The proxy is allowed to cache the supplicant's user ID and password during his first transaction with the server. For the next authentication procedure of the same supplicant, the proxy function of the bridge handles the authentication transactions using its cache on behalf of the authentication server. Since the main authentication server handles only the first authentication transaction of each supplicant, the processing load of the server can be reduced. Also, the authentication transaction delay experienced by a supplicant can be decreased compared with the conventional 802.1x system.