• 제목/요약/키워드: Detecting Effectiveness

검색결과 335건 처리시간 0.033초

이산 사건/이산 시간 혼합형 시뮬레이션 모델 구조를 사용한 유도 어뢰의 탐지 효과도 분석 (Analysis of Detecting Effectiveness of a Homing Torpedo using Combined Discrete Event & Discrete Time Simulation Model Architecture)

  • 하솔;차주환;이규열
    • 한국시뮬레이션학회논문지
    • /
    • 제19권2호
    • /
    • pp.17-28
    • /
    • 2010
  • 음향 탐지나 항적 탐지 등을 이용하여 표적을 추적하는 유도 어뢰는 개념 설계 단계에서부터 군 요구를 분석하고 군요구에 따른 어뢰의 개략 설계 사양 도출을 필요로 한다. 이를 위해 이산 사건/이산 시간 혼합형 시뮬레이션 모델 구조를 적용하여 어뢰가 목적하고 있는 탐지 임무의 정량적인 달성 정도를 나타내는 탐지 효과도를 분석하였다. 어뢰의 탐지효과도 분석을 위해 초기 개념 설계 단계에서 주어지는 어뢰의 개략적인 설계 변수를 바탕으로 어뢰와 표적의 수학 모델을 설정하였으며, 이와 함께 이산 사건/이산 시간 혼합형 시뮬레이션 모델 구조를 적용하여 아 잠수함 모델, 어뢰 모델, 표적 모델을 구성하였다. 특히 어뢰 모델에는 유도 어뢰의 특성을 고려하여 탐색 운동 방법, 음향 탐지 방법 등을 적용하였으며. 각 모델을 구성하는 설계 변수에는 오차 모형을 반영하였다. 이를 바탕으로 어뢰가 표적을 탐지하는 과정에 대해 반복 시뮬레이션을 수행하여 설계 변수 변화에 따른 어뢰의 탐지 효과도를 분석하였다.

건축공간 환경관리 지원을 위한 AI·IoT 기반 이상패턴 검출에 관한 연구 (A Study on Detection of Abnormal Patterns Based on AI·IoT to Support Environmental Management of Architectural Spaces)

  • 강태욱
    • 한국BIM학회 논문집
    • /
    • 제13권3호
    • /
    • pp.12-20
    • /
    • 2023
  • Deep learning-based anomaly detection technology is used in various fields such as computer vision, speech recognition, and natural language processing. In particular, this technology is applied in various fields such as monitoring manufacturing equipment abnormalities, detecting financial fraud, detecting network hacking, and detecting anomalies in medical images. However, in the field of construction and architecture, research on deep learning-based data anomaly detection technology is difficult due to the lack of digitization of domain knowledge due to late digital conversion, lack of learning data, and difficulties in collecting and processing field data in real time. This study acquires necessary data through IoT (Internet of Things) from the viewpoint of monitoring for environmental management of architectural spaces, converts them into a database, learns deep learning, and then supports anomaly patterns using AI (Artificial Infelligence) deep learning-based anomaly detection. We propose an implementation process. The results of this study suggest an effective environmental anomaly pattern detection solution architecture for environmental management of architectural spaces, proving its feasibility. The proposed method enables quick response through real-time data processing and analysis collected from IoT. In order to confirm the effectiveness of the proposed method, performance analysis is performed through prototype implementation to derive the results.

Detecting user status from smartphone sensor data

  • Nguyen, Thu-Trang;Nguyen, Thi-Hau;Nguyen, Ha-Nam;Nguyen, Duc-Nhan;Choi, GyooSeok
    • International Journal of Advanced Culture Technology
    • /
    • 제4권1호
    • /
    • pp.28-30
    • /
    • 2016
  • Due to the high increment in usage and built-in advanced technology of smartphones, human activity recognition relying on smartphone sensor data has become a focused research area. In order to reduce noise of collected data, most of previous studies assume that smartphones are fixed at certain positions. This strategy is impractical for real life applications. To overcome this issue, we here investigate a framework that allows detecting the status of a traveller as idle or moving regardless the position and the direction of smartphones. The application of our work is to estimate the total energy consumption of a traveller during a trip. A number of experiments have been carried out to show the effectiveness of our framework when travellers are not only walking but also using primitive vehicles like motorbikes.

Real Time Multiple Vehicle Detection Using Neural Network with Local Orientation Coding and PCA

  • Kang, Jeong-Gwan;Oh, Se-Young
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 2003년도 ISIS 2003
    • /
    • pp.636-639
    • /
    • 2003
  • In this paper, we present a robust method for detecting other vehicles from n forward-looking CCD camera in a moving vehicle. This system uses edge and shape information to detect other vehicles. The algorithm consists of three steps: lane detection, ehicle candidate generation, and vehicle verification. First after detecting a lane from the template matching method, we divide the road into three parts: left lane, front lane, and right lane. Second, we set the region of interest (ROI) using the lane position information and extract a vehicle candidate from the ROI. Third, we use local orientation coding (LOC) edge image of the vehicle candidate as input to a pretrained neural network for vehicle recognition. Experimental results from highway scenes show the robustness and effectiveness of this method.

  • PDF

드론 열화상활용 저수지 제체 누수탐사 (Drone Infrared Thermography Method for Leakage Inspection of Reservoir Embankment)

  • 이준구;유영철;김영화;최원;김한중
    • 한국농공학회논문집
    • /
    • 제60권6호
    • /
    • pp.21-31
    • /
    • 2018
  • The result of examination of diagnostic method, which is composed of a combination of a thermal camera and a drone that visually shows the temperature of the object by detecting the infrared rays, for detecting the leakage of earth dam was driven in this research. The drone infrared thermography method was suggested to precise safety diagnosis through direct comparing the two method results of electrical resistivity survey and thermal image survey. The important advantage of the thermal leakage detection method was the simplicity of the application, the quickness of the results, and the effectiveness of the work in combination with the existing diagnosis method.

반도체 제조공정에서의 이상수율 검출 방법론 (A New Abnormal Yields Detection Methodology in the Semiconductor Manufacturing Process)

  • 이장희
    • Journal of Information Technology Applications and Management
    • /
    • 제15권1호
    • /
    • pp.243-260
    • /
    • 2008
  • To prevent low yields in the semiconductor industry is crucial to the success of that industry. However, to prevent low yields is difficult because of too many factors to affect yield variation and their complex relation in the semiconductor manufacturing process. This study presents a new efficient detection methodology for detecting abnormal yields including high and low yields, which can forecast the yield level of a production unit (namely a lot) based on yield-related feature variables' behaviors. In the methodology, we use C5.0 to identify the yield-related feature variables that are the combination of correlated process variables associated with yield, use SOM (Self-Organizing Map) neural networks to extract and classify significant patterns of past abnormal yield lots and finally use C5.0 to generate classification rules for detecting abnormal yield lot. We illustrate the effectiveness of our methodology using a semiconductor manufacturing company's field data.

  • PDF

Detection and Location of Partial Discharge in Oil Filled Transformer

  • Lee, Seung-Whan;Oh, Hak-Joon;Chung, Chan-Soo;Yun, Man-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.98.3-98
    • /
    • 2001
  • The research for detecting of insulating deterioration in transformer has been studied from long ago. Analysis method of combustible gas, which is included in insulating oil, has been widely used in detection of transformer pre-fault detection due to the effectiveness of its method. Recently the fault effect of the large transformer is very critical in a power system, therefore the on-line monitoring and diagnostic system is needed. In addition, the more accurate method of detecting a Partial Discharge (PD) location should be developed. For preventive maintenance against discharge failures, it is important not only to detect the discharges, but also to accurately estimate their positions. However ...

  • PDF

유비쿼터스환경에서의 DDoS의 공격과 탐지, 방어시스템에 관한 연구 (A study on DDoS Attack, Detecting and Defence in ubiquitous system)

  • 정창덕;차주원;황선일
    • 한국IT서비스학회:학술대회논문집
    • /
    • 한국IT서비스학회 2009년도 추계학술대회
    • /
    • pp.544-548
    • /
    • 2009
  • The underlying success of logistics depends on the flow of data and information for effective management. Over the last 30 years, we have seen the power of microprocessors double about every 18months. This continuing trend means that computers will become considerably smaller, cheaper, and more abundant; indeed, they are becoming ubiquitous and are even finding their way into everyday objects, resulting in the creation of smart things. In the long term, ubiquitous technologies will take on great economic significance. Industrial products will become smart because of their integrated information processing capacity, or take on an electronic identity that can be queried remotely, or be equipped with sensors for detecting their environment, enabling the development of innovative products and totally new services. The global marketplace runs on logistics, security, speed, agility and flexibility..In this paper we report that pairing these traditional logistics functions with RFID technology can be a huge value-driver for companies. This winning combination yields increased logistics management effectiveness and more efficient visibility into the supply chain management.

  • PDF

자가인지 저작근 이완 장치의 센서 및 제어 시스템 개발 (Develoment of Sensor and Control Systems for Self Detecting Masticatory Muscle Relaxation Appliances)

  • 남현도;안동준;한경호;김기석
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1998년도 하계학술대회 논문집 G
    • /
    • pp.2439-2441
    • /
    • 1998
  • In this research, the sensor and control system for self detecting masticatory muscle relaxation appliances. A strain gauge is used to measure a strength of tooth clenching force. A bridge circuit and voltage amplifier is designed to amplify measured signals and RF transmitter and receiver is also designed to communicate inner and outer mouth device. The experiments are performed to show the effectiveness of designed system.

  • PDF

주성분 분석을 이용한 상수도 관망의 누수감지 (Leak Detection in a Water Pipe Network Using the Principal Component Analysis)

  • 박수완;하재홍;김기민
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2018년도 학술발표회
    • /
    • pp.276-276
    • /
    • 2018
  • In this paper the potential of the Principle Component Analysis(PCA) technique that can be used to detect leaks in water pipe network blocks was evaluated. For this purpose the PCA was conducted to evaluate the relevance of the calculated outliers of a PCA model utilizing the recorded pipe flows and the recorded pipe leak incidents of a case study water distribution system. The PCA technique was enhanced by applying the computational algorithms developed in this study. The algorithms were designed to extract a partial set of flow data from the original 24 hour flow data so that the variability of the flows in the determined partial data set are minimal. The relevance of the calculated outliers of a PCA model and the recorded pipe leak incidents was analyzed. The results showed that the effectiveness of detecting leaks may improve by applying the developed algorithm. However, the analysis suggested that further development on the algorithm is needed to enhance the applicability of the PCA in detecting leaks in real-world water pipe networks.

  • PDF