• Title/Summary/Keyword: Detecting Programming

Search Result 51, Processing Time 0.028 seconds

Development of the Leakage Current Detection Module for a Concent (콘센트용 누전감지 모듈 개발)

  • Han, Young-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.447-452
    • /
    • 2013
  • In this paper, the leakage current detection and auto shut-off module for a concent has been developed. Existing leakage current detection modules are detecting resistive leakage current, using a resistive leakage current detection chip but the proposed leakage current detection module separates and detects resistive leakage current in the synthesis leakage current by only programming in a power processor MCU(MSP430). The module implemented by proposed method has early detection and auto shut-off feature at more than resistive leakage current 5mA, and has the advantage of easily adjusting resistive leakage current less or more than 5mA, because of resistive leakage current detection function being implemented by a program in MCU.

Study on the Optimal Deployment of the Passive Radar System for Detecting Small Unmanned Aerial Vehicles (소형 무인기 탐지를 위한 패시브 레이더망 최적 배치 연구)

  • Baek, Inseon;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.4
    • /
    • pp.443-452
    • /
    • 2016
  • Current low-altitude radar system often fails to detect small unmanned aerial vehicles (UAV) because of their small radar cross section (RCS) compared with larger targets. As a potential alternative, a passive bistatic radar system has been considered. We study an optimal deployment problem for the passive bistatic radar system. We model this problem as a covering problem, and develop an integer programming model. The objective of the model is to maximize coverage of a passive bistatic radar system. Our model takes into account factors specific to a bistatic radar system, including bistatic RCS and transmitter-receiver pair coverage. Considering bistatic RCS instead of constant RCS is important because the slight difference of RCS value for small UAVs could significantly influence the detection probability. The paired radar coverage is defined by using the concept of gradual coverage and cooperative coverage to represent a realistic environment.

A Decomposition Algorithm for a Local Access Telecommunication Network Design Problem

  • Cho, Geon
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.23 no.2
    • /
    • pp.29-46
    • /
    • 1998
  • In this paper, we develop detailed algorithms for implementing the so-called Limited Column Generation procedure for Local Access Telecommunication Network(LATN) design problem. We formulate the problem into a tree-partitioning problem with an exponential number of variables. Its linear programming relaxation has all integral vertices, and can be solved by the Limited Column Generation procedure in just n pivots, where n is the number of nodes in the network. Prior to each pivot. an entering variable is selected by detecting the Locally Most Violated(LMV) reduced cost, which can be obtained by solving a subproblem in pseudo-polynomial time. A critical step in the Limited Column Generation is to find all the LMV reduced costs. As dual variables are updated at each pivot, the reduced costs have to be computed in an on-line fashion. An efficient implementation is developed to execute such a task so that the LATN design problem can be solved in O(n$^2$H), where H is the maximum concentrator capacity. Our computational experiments indicate that our algorithm delivers an outstanding performance. For instance, the LATN design problem with n=150 and H=1000 can be solved in approximately 67 seconds on a SUN SPARC 1000 workstation.

  • PDF

A decomposition algorithm for local access telecommunication network design problem

  • Cho, Geon
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.54-68
    • /
    • 1995
  • In this paper, we develop detailed algorithms for implementing the so-called Limited Column Generation procedure for Local Access Telecommunication Network (LATN) Design problem. We formulate the problem into a tree-partitioning problem with an exponential number of variables. Its linear programming relaxation has all integral vertices, and can be solved by the Limited Column. Generation procedure in just n pivots, where n is the number of nodes in the network. Prior to each pivot, an entering variable is selected by detecting the Locally Most Violated (LMV) reduced cost, which can be obtained by solving a subproblem in pseudo-polynomial time. A critical step in the Limited Column Generation is to find all the LMV reduced costs. As dual variables are updated at each pivot, the reduced costs have to be computed in an on-line fashion. An efficient implementation is developed to execute such a task so that the LATN Design problem can be solved in O(n$^{2}$H), where H is the maximum concentrator capacity. Our computational experiments indicate that our algorithm delivers an outstanding performance. For instance, the LATN Design problem with n = 150 and H = 1000 can be solved in approximately 67 seconds on a SUN SPARC 1000 workstation.

  • PDF

Construction of The Mac Wave Detection System using Strain Gage (스트레인 게이지를 이용한 맥파 검출 시스템의 구성)

  • Yi, Chong-Ho
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.88-93
    • /
    • 1999
  • In this paper, a new Mac-wave detection system by strain gage is constructed for study on a Mac-wave which is major factor of diagnosis in oriental medicine. Inherent resistance of a strain gage is linearly changed with strain of the sensor, thus the Mac-wave of wrist can be detected by using of the strain gage. A precision bridge circuit and high sensitive amplifier is designed for detecting the change of resistance of the strain gage in this experiments. A very small change of Mac-wave is acquired in the circuit. And the digital signal of the detected Mac-wave are acquired on a PC by multichannel A/D converter and displayed graphically by programming. The characteristics of the Mac-wave of sampled 6 persons in the time and the frequency domain are analysed, therefore the usefulness of the system constructed in this experiments are proved.

  • PDF

Determining the Time of Least Water Use for the Major Water Usage Types in District Metered Areas (상수관망 블록의 대표적인 용수사용 유형에 대한 최소 용수사용 시간의 결정)

  • Park, Suwan;Jung, So-Yeon;Sahleh, Vahideh
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.29 no.3
    • /
    • pp.415-425
    • /
    • 2015
  • Aging water pipe networks hinder efficient management of important water service indices such as revenue water and leakage ratio due to pipe breakage and malfunctioning of pipe appurtenance. In order to control leakage in water pipe networks, various methods such as the minimum night flow analysis and sound waves method have been used. However, the accuracy and efficiency of detecting water leak by these methods need to be improved due to the increase of water consumption at night. In this study the Principal Component Analysis (PCA) technique was applied to the night water flow data of 426 days collected from a water distribution system in the interval of one hour. Based on the PCA technique, computational algorithms were developed to narrow the time windows for efficient execution of leak detection job. The algorithms were programmed on computer using the MATLAB. The presented techniques are expected to contribute to the efficient management of water pipe networks by providing more effective time windows for the detection of the anomaly of pipe network such as leak or abnormal demand.

Optimization of Triple Response Systems by Using the Dual Response Approach and the Hooke-Jeeves Search Method

  • Fan, Shu-Kai S.;Huang, Chia-Fen;Chang, Ko-Wei;Chuang, Yu-Chiang
    • Industrial Engineering and Management Systems
    • /
    • v.9 no.1
    • /
    • pp.10-19
    • /
    • 2010
  • This paper presents an extended computing procedure for the global optimization of the triple response system (TRS) where the response functions are nonconvex (nonconcave) quadratics and the input factors satisfy a radial region of interest. The TRS arising from response surface modeling can be approximated using a nonlinear mathematical program involving one primary (objective) function and two secondary (constraints) functions. An optimization algorithm named triple response surface algorithm (TRSALG) is proposed to determine the global optimum for the nondegenerate TRS. In TRSALG, the Lagrange multipliers of target (secondary) functions are computed by using the Hooke-Jeeves search method, and the Lagrange multiplier of the radial constraint is located by using the trust region (TR) method at the same time. To ensure global optimality that can be attained by TRSALG, included is the means for detecting the degenerate case. In the field of numerical optimization, as the family of TR approach always exhibits excellent mathematical properties during optimization steps, thus the proposed algorithm can guarantee the global optimal solution where the optimality conditions are satisfied for the nondegenerate TRS. The computing procedure is illustrated in terms of examples found in the quality literature where the comparison results with a gradient-based method are used to calibrate TRSALG.

The Vision-based Autonomous Guided Vehicle Using a Virtual Photo-Sensor Array (VPSA) for a Port Automation (가상 포토센서 배열을 탑재한 항만 자동화 자을 주행 차량)

  • Kim, Soo-Yong;Park, Young-Su;Kim, Sang-Woo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.2
    • /
    • pp.164-171
    • /
    • 2010
  • We have studied the port-automation system which is requested by the steep increment of cost and complexity for processing the freight. This paper will introduce a new algorithm for navigating and controlling the autonomous Guided Vehicle (AGV). The camera has the optical distortion in nature and is sensitive to the external ray, the weather, and the shadow, but it is very cheap and flexible to make and construct the automation system for the port. So we tried to apply to the AGV for detecting and tracking the lane using the CCD camera. In order to make the error stable and exact, this paper proposes new concept and algorithm for obtaining the error is generated by the Virtual Photo-Sensor Array (VPSA). VPSAs are implemented by programming and very easy to use for the various autonomous systems. Because the load of the computation is light, the AGV utilizes the maximal performance of the CCD camera and enables the CPU to take multi-tasks. We experimented on the proposed algorithm using the mobile robot and confirmed the stable and exact performance for tracking the lane.

A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments

  • Qianfeng Lin;Jooyoung Son
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.644-662
    • /
    • 2023
  • There are still outbreaks of COVID-19 across the world. Ships increase the risk of worldwide transmission of the virus. Close contact tracing remains as an effective method of reducing the risk of virus transmission. Therefore, close contact tracing in ship environments becomes a research topic. Exposure Notifications API (Application Programming Interface) can be used to determine the encountered location points of close contacts on ships. Location points of close contact are estimated by the encountered location points. Risky areas in ships can be calculated based on the encountered location points. The tracking of close contacts is possible with Bluetooth technology without the Internet. The Bluetooth signal can be used to judge the proximity among detecting devices by using the feature that Bluetooth has a strong signal at close range. This Bluetooth feature makes it possible to trace close contacts in ship environments. In this paper, we propose a method for close contact tracing and showing the risky area in a ship environment by combining beacon and Exposure Notification API using Bluetooth technology. This method does not require an Internet connection for tracing close contacts and can protect the personal information of close contacts.

Stackelberg Game between Multi-Leader and Multi-Follower for Detecting Black Hole and Warm Hole Attacks In WSN

  • S.Suganthi;D.Usha
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.159-167
    • /
    • 2023
  • Objective: • To detect black hole and warm hole attacks in wireless sensor networks. • To give a solution for energy depletion and security breach in wireless sensor networks. • To address the security problem using strategic decision support system. Methods: The proposed stackelberg game is used to make the spirited relations between multi leaders and multi followers. In this game, all cluster heads are acts as leaders, whereas agent nodes are acts as followers. The game is initially modeled as Quadratic Programming and also use backtracking search optimization algorithm for getting threshold value to determine the optimal strategies of both defender and attacker. Findings: To find optimal payoffs of multi leaders and multi followers are based on their utility functions. The attacks are easily detected based on some defined rules and optimum results of the game. Finally, the simulations are executed in matlab and the impacts of detection of black hole and warm hole attacks are also presented in this paper. Novelty: The novelty of this study is to considering the stackelberg game with backtracking search optimization algorithm (BSOA). BSOA is based on iterative process which tries to minimize the objective function. Thus we obtain the better optimization results than the earlier approaches.