• Title/Summary/Keyword: Control Area Network

Search Result 955, Processing Time 0.035 seconds

Analysis of Engine Load Factor for a 78 kW Class Agricultural Tractor According to Agricultural Operations (농작업에 따른 78 kW급 농업용 트랙터 엔진 부하율 분석)

  • Baek, Seung Min;Kim, Wan Soo;Baek, Seung Yun;Jeon, Hyeon Ho;Lee, Dae Hyun;Kim, Hyung Kweon;Kim, Yong Joo
    • Journal of Drive and Control
    • /
    • v.19 no.1
    • /
    • pp.16-25
    • /
    • 2022
  • The purpose of this study was to calculate and analyze the engine load factor of major agricultural operations using a 78 kW class agricultural tractor for estimating the emission of air pollutants and greenhouse. Engine load data were collected using controller area network (CAN) communication. Main agricultural operations were selected as plow tillage (PT), rotary tillage (RT), baler operation (BO), loader operation (LO), driving on soil (DS), and driving on concrete (DC). The engine power was calculated using the measured engine load data. A weight factor was applied to load factor for considering usage ratio according to agricultural operations. Weight factors for different agricultural operations were calculated to be 27.4%, 32.9%, 17.5%, 7.7%, 4.5%, and 10.0% for PT, RT, BO, LO, DS, and DC, respectively. As a result of the field test, load factors were 0.74, 0.93, 0.41, 0.23, 0.27, and 0.21 for PT, RT, BO, LO, DS, and DC, respectively. The engine load factor was the highest for RT. Finally, as a result of applying the weight factor for usage ratio of agricultural operations, the integrated engine load factor was estimated to be 0.63, which was about 1.31 times higher than the conventional applied load factor of 0.48. In future studies, we plan to analyze the engine load factor by considering various horsepower and working conditions of the tractor.

A Study on Multiplexer Assignment Problem for Efficient Dronebot Network (효율적인 드론봇 네트워크 구성을 위한 Multiplexer 할당모형에 관한 연구)

  • Seungwon Baik
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.2
    • /
    • pp.17-22
    • /
    • 2023
  • In the midst of the development of science and technology based on the 4th industrial revolution, the ROK Army is moving forward with the ARMY TIGER 4.0 system, a ground combat system that combines future advanced science and technology. The system is developing around an AI-based hyper-connected ground combat system, and has mobility, intelligence, and networking as core concepts. Especially, the dronebot combat system is used as a compound word that refers to unmanned combat systems including drones and ground unmanned systems. In future battlefields, it is expected that the use of unmanned and artificial intelligence-based weapon systems will increase. During the transition to a complete unmanned system, it is a very important issue to ensure connectivity individual unmanned systems themselves or between manned and unmanned systems on the battlefield. This paper introduces the Multiplexer Allocation Problem (MAP) for effective command control and communication of UAV/UGV, and proposes a heuristic algorithm. In addition, the performance of the proposed algorithm is analyzed by comparing the solutions and computing time. Also, we discuss future research area for the MAP.

  • PDF

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

Analysis of Georeferencing Accuracy in 3D Building Modeling Using CAD Plans (CAD 도면을 활용한 3차원 건축물 모델링의 Georeferencing 정확도 분석)

  • Kim, Ji-Seon;Yom, Jae-Hong;Lee, Dong-Cheon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.2
    • /
    • pp.117-131
    • /
    • 2007
  • Representation of building internal space is an active research area as the need for more geometrically accurate and visually realistic increases. 3 dimensional representation is common ground of research for disciplines such as computer graphics, architectural design and engineering and Geographic Information System (GIS). In many cases CAD plans are the starting point of reconstruction of 3D building models. The main objectives of building reconstruction in GIS applications are visualization and spatial analysis. Hence, CAD plans need to be preprocessed and edited to adapt to the data models of GIS SW and then georeferenced to enable spatial analysis. This study automated the preprocessing of CAD data using AutoCAD VBA (Visual Basic Application), and the processed data was topologically restructured for further analysis in GIS environment. Accuracy of georeferencing CAD data was also examined by comparing the results of coordinate transformation by using digital maps and GPS measurements as the sources of ground control points. The reconstructed buildings were then applied to visualization and network modeling.

An Efficient Core-Based Multicast Tree using Weighted Clustering in Ad-hoc Networks (애드혹 네트워크에서 가중치 클러스터링을 이용한 효율적인 코어-기반 멀티캐스트 트리)

  • Park, Yang-Jae;Han, Seung-Jin;Lee, Jung-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.377-386
    • /
    • 2003
  • This study suggested a technique to maintain an efficient core-based multicast tree using weighted clustering factors in mobile Ad-hoc networks. The biggest problem with the core-based multicast tree routing is to decide the position of core node. The distance of data transmission varies depending on the position of core node. The overhead's effect on the entire network is great according to the recomposition of the multicast tree due to the movement of core node, clustering is used. A core node from cluster head nodes on the multicast tree within core area whose weighted factor is the least is chosen as the head core node. Way that compose multicast tree by weighted clustering factors thus and propose keeping could know that transmission distance and control overhead according to position andmobility of core node improve than existent multicast way, and when select core node, mobility is less, and is near in center of network multicast tree could verification by simulation stabilizing that transmission distance is short.

Roles of Cancer Registries in Enhancing Oncology Drug Access in the Asia-Pacific Region

  • Soon, Swee-Sung;Lim, Hwee-Yong;Lopes, Gilberto;Ahn, Jeonghoon;Hu, Min;Ibrahim, Hishamshah Mohd;Jha, Anand;Ko, Bor-Sheng;Lee, Pak Wai;MacDonell, Diana;Sirachainan, Ekaphop;Wee, Hwee-Lin
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.4
    • /
    • pp.2159-2165
    • /
    • 2013
  • Cancer registries help to establish and maintain cancer incidence reporting system, serve as a resource for investigation of cancer and its causes, and provide information for planning and evaluation of preventive and control programs. However, their wider role in directly enhancing oncology drug access has not been fully explored. We examined the value of cancer registries in oncology drug access in the Asia-Pacific region on three levels: (1) specific registry variable types; (2) macroscopic strategies on the national level; and (3) a regional cancer registry network. Using literature search and proceedings from an expert forum, this paper covers recent cancer registry developments in eight economies in the Asia-Pacific region - Australia, China, Hong Kong, Malaysia, Singapore, South Korea, Taiwan, and Thailand - and the ways they can contribute to oncology drug access. Specific registry variables relating to demographics, tumor characteristics, initial treatment plans, prognostic markers, risk factors, and mortality help to anticipate drug needs, identify high-priority research area and design access programs. On a national level, linking registry data with clinical, drug safety, financial, or drug utilization databases allows analyses of associations between utilization and outcomes. Concurrent efforts should also be channeled into developing and implementing data integrity and stewardship policies, and providing clear avenues to make data available. Less mature registry systems can employ modeling techniques and ad-hoc surveys while increasing coverage. Beyond local settings, a cancer registry network for the Asia-Pacific region would offer cross-learning and research opportunities that can exert leverage through the experiences and capabilities of a highly diverse region.

Road Networks and Crime Occurrence Multi-Agent Simulation for Smart Safe City (스마트 안전도시 조성을 위한 도로망 특성과 범죄발생 멀티에이전트(Multi-Agent) 시뮬레이션)

  • MOON, Tae-Heon;CHO, Jung-Hun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.120-134
    • /
    • 2015
  • Under the hypothesis that the form of road network could affect crime occurrence, this study demonstrates to prove them using Space Syntax with real crime data. We calculated integration, control, connection index by means of Space Syntax and analyzed the relationship between the three indexes and the number of crime occurrence on the each road. Next, in order to generalize the analysis results we adopted Multi-Agent Model and simulated several scenarios on the computer virtual space. The results revealed that integration index has the strongest relationship with crime occurrence both in the case of real study area and virtual space simulations. Though this study has several limitations on the extent of virtual space and realistic computer programming of agents' behavior, the results are meaningful to verify the relationship between the form of read network and crime occurrence. Moreover the simulation platform that this study developed has promising possibilities to find realistic solutions on the effective police deployment or facility layout to improve smart safe city development.

Port's Successful Global Supply Chain Strategies - Focusing on the case of Dubai port - (항만의 성공적인 글로벌 공급사슬 전략 - 두바이항의 사례를 중심으로 -)

  • Han, Chul-Hwan
    • Journal of Korea Port Economic Association
    • /
    • v.24 no.2
    • /
    • pp.175-192
    • /
    • 2008
  • Today's individual firms no longer compete as solely autonomous entities, but rather as supply chain. As such the competitive position of a port is not only determined by its internal strengths but also it is also affected by its links in a global supply chin. In other words, port competitiveness is becoming increasingly dependent on external coordination and control of the whole supply chain. The main purpose of this paper is to examine how a port embeds itself into supply chain in order to strengthen its competitive position by focusing on Dubai port case. This paper found that Dubai port used three phases-insertion, integration and dominance-as a strategies for how it can embedded into global supply chain successfully. Dubai's global supply chain strategies give some implications for the further development of the Port of Gwangyang. First, the Port of Gwangyang should fully utilize symbiotic relationship with Gwangyang free Economic Zone. Second, the integration between Korea Container Terminal Authority and GYFEZ can be recommended for fast decision-making and providing a one-stop-service. Finally, Gwangyang should pursue an aggressive supply chain strategy, aims at dominance in the regional port network through port alliance with small and medium ports in neighboring area.

  • PDF

UE Measurement Based Compressed Mode in WCDMA (WCDMA 시스템에서 단말 측정에 의한 압축 모드 방법)

  • 김선명;장원학;조영종;임재성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7A
    • /
    • pp.814-827
    • /
    • 2004
  • The compressed mode is used to perform inter-frequency and inter-system handover in WCDMA. The instantaneous transmit power is increased in the compressed frame in order to keep the QoS(Quality of Service) unaffected by the reduced processing gain. Furthermore, since the inner loop power control is not active during the transmission gap and the effect of interleaving is decreased, a higher Eb/No target is required, which directly affects the system performance. Due to the impact on performance, the compressed mode should be activated by the RNC(Radio Network Controller) only when there is real need to execute an inter-frequency or inter-system handover. However, 3GPP does not define the method that decides the compressed mode activation. In order to reduce performance degradation, there is need the decision method. In this paper, we consider a combined cell structure in which some neighbor cells have a frequency the same as serving cell and the others have a different frequency or system. Under consideration, we analyze the effect of the compressed mode on the WCDMA forward link performance. In order to avoid performance degradation, we propose an UE(User Equipment) measurement method that can restrict the activation area of the compressed mode of UE that does not need it and evaluate its performance by simulations. Analytical results show that the use of the compressed mode affects the performance degradation. And simulation results show that proposed method leads to better performance.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.