• Title/Summary/Keyword: Device Identification Algorithm

Search Result 59, Processing Time 0.028 seconds

Development of Unique Naming Algorithm for 3D Straight Bridge Model Using Object Identification (3차원 직선교 모델 객체의 인식을 통한 고유 명칭부여 알고리즘 개발)

  • Park, Junwon;Park, Sang Il;Kim, Bong-Geun;Yoon, Young-Cheol;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.557-564
    • /
    • 2014
  • In this study, we present an algorithm that conducts an unique naming process for the bridge object through the solid object identification focused on 3D straight bridge model. For the recognition of 3D objects, the numerical algorithm utilizes centroid point, and solid object on the local coordination system. It classifies the object feature set by classifying the objects and members based on the bridge direction. By doing so, unique names, which contain the information about span, members and order of the object, were determined and the suitability of this naming algorithm was examined through a truss bridge model and a bridge model with different coordinate systems. Also, the naming process based on the object feature set was carried out for the real 3D bridge model and then was applied to the module on local server and mobile device for real bridge inspection work. From the comparison of the developed naming algorithm based on object identification and the conventional one based on field inspection, it was shown that the conventional field inspection work can be effectively improved.

GA-based parameter identification of DC motors (DC 모터의 GA 기반 파라미터 추정)

  • Lee, Yun-Hyung;So, Myung-Ok
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.6
    • /
    • pp.716-722
    • /
    • 2014
  • In order to design the speed controller of the DC motor system, firstly, parameters estimation of the system must be preceded. In this paper, we proposed the application of genetic algorithm(GA) optimization in estimating the parameters of DC motor. Estimated models are considered both first and second order models, and each estimated model is optimized by minimizing three different types of the evaluation function of GA. Also, GA is imported in comparison with estimation result of numerical analysis method because of its power in searching entire solution space with more probability of finding the global optimum. Data for parameter estimation is acquired from input and output signals of the actual experiment device and the butterworth filter also designs for removing noise in the signals. Finally comparison between real data of the actual device and estimated models is presented to indicate effectiveness and resolution of proposed identification method.

Development of Odorant Sensor System using Six Channel Lipid-Coated SAW Resonator Devices imitating the Olfactory Mechanizm (후각 메카니즘을 모방한 냄새 센서의 개발 연구)

  • Chang, Sang-Mok;Isao, Karube
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1991 no.05
    • /
    • pp.98-100
    • /
    • 1991
  • A sensitive surface acoustic wave (SAW) sensor for the detection of odorants has been constructed by depositing different phospholipids and fatty acids on the surface of the SAW device wi th the Langmuir-Blodgett technique. The characteristics of SAW device operating at 310 MHz deposited with phosphatidylcholine were analyzed. Amyl acetate, acetoin, menthone and other organic gases showed different affinities. The identification of odorants depending on the species of lipid used for coating is discussed in terms of the similarity of the normalized resonant frequency shift pattern. Using a number of different lipid-coated SAW devices, odorants could be identified by a neural-network pattern recognition with back-propagation algorithm.

  • PDF

Development of Age Classification Deep Learning Algorithm Using Korean Speech (한국어 음성을 이용한 연령 분류 딥러닝 알고리즘 기술 개발)

  • So, Soonwon;You, Sung Min;Kim, Joo Young;An, Hyun Jun;Cho, Baek Hwan;Yook, Sunhyun;Kim, In Young
    • Journal of Biomedical Engineering Research
    • /
    • v.39 no.2
    • /
    • pp.63-68
    • /
    • 2018
  • In modern society, speech recognition technology is emerging as an important technology for identification in electronic commerce, forensics, law enforcement, and other systems. In this study, we aim to develop an age classification algorithm for extracting only MFCC(Mel Frequency Cepstral Coefficient) expressing the characteristics of speech in Korean and applying it to deep learning technology. The algorithm for extracting the 13th order MFCC from Korean data and constructing a data set, and using the artificial intelligence algorithm, deep artificial neural network, to classify males in their 20s, 30s, and 50s, and females in their 20s, 40s, and 50s. finally, our model confirmed the classification accuracy of 78.6% and 71.9% for males and females, respectively.

Design of Efficient Hacking Prevention Systems Using a Smart Card (스마트카드 기반의 효율적인 해킹 방지 시스템 설계)

  • 황선태;박종선
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.179-190
    • /
    • 2004
  • This paper describes the design of hacking prevention systems using a smart card. It consists of two parts, i.e., PC authentication and Keyboard-buffer hacking prevention. PC authentication function is a procedure to handle the access control to the target PC. The card's serial number is used for PIN(Personal Identification Number) and is converted into hash-code by SHA-1 hash-function to verify the valid users. The Keyboard-buffer hacking prevention function converts the scan codes into the encoded forms using RSA algorithm on the Java Card, and puts them into the keyboard-buffer to protect from illegal hacking. The encoded information in the buffer is again decoded by the RSA algorithm and displayed on the screen. in this paper, we use RSA_PKCS#1 algorithm for encoding and decoding. The reason using RSA technique instead of DES or Triple-DES is for the expansion to multi-functions in the future on PKI. Moreover, in the ubiquitous computing environment, this smart card security system can be used to protect the private information from the illegal attack in any computing device anywhere. Therefore, our security system can protect PC user's information more efficiently and guarantee a legal PC access authority against any illegal attack in a very convenient way.

  • PDF

Development of Home Electrical Power Monitoring System and Device Identification Algorithm (가정용 전력 모니터링 시스템 및 장치식별 알고리즘 개발)

  • Park, Sung-Wook;Seo, Jin-Soo;Wang, Bo-Hyeun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.4
    • /
    • pp.407-413
    • /
    • 2011
  • This paper presents an electrical power monitoring system for home energy management and an automatic appliance-identification algorithm based on the electricity-usage patterns collected during the monitoring tests. This paper also discusses the results of the field tests of which the proposed system was voluntarily deployed at 13 homes. The proposed monitoring system periodically measures the amount of power consumption of each appliance with a pre-specified time interval and effectively displays the essential information provided by the monitored data which is required users to know in order to save power consumption. Regarding the field tests of the monitoring system, the households responded that the system was useful in saving electricity and especially the electricity-usage patterns per appliances. They also considered that the predicted amount of the monthly power consumption was effective. The proposed appliance-identification algorithm uses 4 patterns: Zero-Crossing Rate(ZC), Variation of On State(VO), Slope of On State(SO) and Duty Cycle(DC), which are applied over the 2 hour interval with 25% of it on state, and it yielded 82.1% of success rate in identifying 5 kinds of appliances: refrigerator, TV, electric rice-cooker, kimchi-refrigerator and washing machine.

Improved Hot data verification considering the continuity and frequency of data update requests (데이터 갱신요청의 연속성과 빈도를 고려한 개선된 핫 데이터 검증기법)

  • Lee, Seungwoo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.33-39
    • /
    • 2022
  • A storage device used in the mobile computing field should have low power, light weight, durability, etc., and should be able to effectively store and manage large-capacity data generated by users. NAND flash memory is mainly used as a storage device in the field of mobile computing. Due to the structural characteristics of NAND flash memory, it is impossible to overwrite in place when a data update request is made, so it can be solved by accurately separating requests that frequently request data update and requests that do not, and storing and managing them in each block. The classification method for such a data update request is called a hot data identification method, and various studies have been conducted at present. This paper continuously records the occurrence of data update requests using a counting filter for more accurate hot data validation, and also verifies hot data by considering how often the requested update requests occur during a specific time.

Deep Learning-Based Algorithm for the Detection and Characterization of MRI Safety of Cardiac Implantable Electronic Devices on Chest Radiographs

  • Ue-Hwan Kim;Moon Young Kim;Eun-Ah Park;Whal Lee;Woo-Hyun Lim;Hack-Lyoung Kim;Sohee Oh;Kwang Nam Jin
    • Korean Journal of Radiology
    • /
    • v.22 no.11
    • /
    • pp.1918-1928
    • /
    • 2021
  • Objective: With the recent development of various MRI-conditional cardiac implantable electronic devices (CIEDs), the accurate identification and characterization of CIEDs have become critical when performing MRI in patients with CIEDs. We aimed to develop and evaluate a deep learning-based algorithm (DLA) that performs the detection and characterization of parameters, including MRI safety, of CIEDs on chest radiograph (CR) in a single step and compare its performance with other related algorithms that were recently developed. Materials and Methods: We developed a DLA (X-ray CIED identification [XCID]) using 9912 CRs of 958 patients with 968 CIEDs comprising 26 model groups from 4 manufacturers obtained between 2014 and 2019 from one hospital. The performance of XCID was tested with an external dataset consisting of 2122 CRs obtained from a different hospital and compared with the performance of two other related algorithms recently reported, including PacemakerID (PID) and Pacemaker identification with neural networks (PPMnn). Results: The overall accuracies of XCID for the manufacturer classification, model group identification, and MRI safety characterization using the internal test dataset were 99.7% (992/995), 97.2% (967/995), and 98.9% (984/995), respectively. These were 95.8% (2033/2122), 85.4% (1813/2122), and 92.2% (1956/2122), respectively, with the external test dataset. In the comparative study, the accuracy for the manufacturer classification was 95.0% (152/160) for XCID and 91.3% for PPMnn (146/160), which was significantly higher than that for PID (80.0%,128/160; p < 0.001 for both). XCID demonstrated a higher accuracy (88.1%; 141/160) than PPMnn (80.0%; 128/160) in identifying model groups (p < 0.001). Conclusion: The remarkable and consistent performance of XCID suggests its applicability for detection, manufacturer and model identification, as well as MRI safety characterization of CIED on CRs. Further studies are warranted to guarantee the safe use of XCID in clinical practice.

A real-time sorting algorithm for in-beam PET of heavy-ion cancer therapy device

  • Ke, Lingyun;Yan, Junwei;Chen, Jinda;Wang, Changxin;Zhang, Xiuling;Du, Chengming;Hu, Minchi;Yang, Zuoqiao;Xu, Jiapeng;Qian, Yi;She, Qianshun;Yang, Haibo;Zhao, Hongyun;Pu, Tianlei;Pei, Changxu;Su, Hong;Kong, Jie
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3406-3412
    • /
    • 2021
  • A real-time digital time-stamp sorting algorithm used in the In-Beam positron emission tomography (In-Beam PET) is presented. The algorithm is operated in the field programmable gate array (FPGA) and a small amount of registers, MUX and memory cells are used. It is developed for sorting the data of annihilation event from front-end circuits, so as to identify the coincidence events efficiently in a large amount of data. In the In-Beam PET, each annihilation event is detected by the detector array and digitized by the analog to digital converter (ADC) in Data Acquisition Unit (DAQU), with a resolution of 14 bits and sampling rate of 50 MS/s. Test and preliminary operation have been implemented, it can perform a sorting operation under the event count rate up to 1 MHz per channel, and support four channels in total, count rate up to 4 MHz. The performance of this algorithm has been verified by pulse generator and 22Na radiation source, which can sort the events with chaotic order into chronological order completely. The application of this algorithm provides not only an efficient solution for selection of coincidence events, but also a design of electronic circuit with a small-scale structure.

Development of wearable device with smart key function and convergence of personal bio-certification and technology using ECG signal (심전도 신호를 이용한 개인 바이오인증 기술 융합과 smart key 기능이 탑재된 wearable device 개발)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.637-642
    • /
    • 2022
  • Self-authentication technology using electrocardiogram (ECG) signals is drawing attention as a self-authentication technology that can replace existing bio-authentication. A device that recognizes a digital electronic key can be mounted on a vehicle to wirelessly exchange data with a car, and a function that can lock or unlock a car door or start a car by using a smartphone can be controlled through a smartphone. However, smart keys are vulnerable to security, so smart keys applied with bio-authentication technology were studied to solve this problem and provide driver convenience. A personal authentication algorithm using electrocardiogram was mounted on a watch-type wearable device to authenticate bio, and when personal authentication was completed, it could function as a smart key of a car. The certification rate was 95 per cent achieved. Drivers do not need to have a smart key, and they propose a smart key as an alternative that can safely protect it from loss and hacking. Smart keys using personal authentication technology using electrocardiogram can be applied to various fields through personal authentication and will study methods that can be applied to identification devices using electrocardiogram in the future.