• Title/Summary/Keyword: Error embedded method

Search Result 171, Processing Time 0.023 seconds

Smart Cargo Monitoring System Based on Decision Support System for Liquid Carrier Tanker

  • Kim, Youn-Tae;Baek, Gyeong-Dong;Jeon, Tae-Ryong;Kim, Sung-Shin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.8 no.2
    • /
    • pp.140-145
    • /
    • 2008
  • In this paper, we constructed the advanced cargo monitoring system for liquid cargo tankers which embedded the Decision Support System (DSS) based on the International Ship Management Code (ISM Code). To make this system, we first organized a base of expert's knowledge concerning liquid tanker operations that largely affect ocean accidents. We can find out the knowledge via inference method which simply imitates the fuzzy inference method. Based on this expert's knowledge, we constructed the DSS that provides a code of conduct for operating cargo tanks safely. The proposed monitoring system could eliminate human error when confronting dangerous situations, so the system will help sailors to operate cargo tanks safely.

Burn-back Analysis for Propellant Grains with Embedded Metal Wires (금속선이 삽입된 추진제 그레인의 Burn-back 해석)

  • Lee, Hyunseob;Oh, Jongyun;Yang, Heesung;Lee, Sunyoung;Khil, Taeock
    • Journal of the Korean Society of Propulsion Engineers
    • /
    • v.26 no.2
    • /
    • pp.12-19
    • /
    • 2022
  • Propellant grains with embedded metal wires have been used for enhancement of burning rate while maintaining high loading density. For the performance design of a solid rocket motor using propellant grain with embedded metal wires, burn-back analysis is required according to number, location, arrangement angle of metal wires, and augmentation ratio of the propellant burning rate near a wire region. In this study, a numerical method to quickly calculate a burning surface area was developed in response to the design change of the propellant grain with embedded metal wires. The burning surface area derived from the developed method was compared with the results of a CAD program. Error rate decreased as the radial size of the grid decreased. Analysis for characteristics of burning surface area was performed according to the number and location of metal wires, the initial and final phases were shortened and the steady-state phase was increased when the number of metal wires increased. When arranging the metal wires at different radii, the burning surface area rapidly increased in the initial phase and sharply decreased in the final phase compared to the case where the metal wires were disposed in the same radius.

An Audio Watermarking Method Using the Attribute of the Tonal Masker (토널 마스커 특성을 이용한 오디오 워터마킹)

  • 이희숙;이우선
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.5
    • /
    • pp.367-374
    • /
    • 2003
  • In this paper, we propose an audio watermarking method using the attribute of tonal masker. First, the attribute of tonal masker as an audio watermarking attribute is analyzed. According to existing researches, it is possible to be imperceptible modulation for the energies of the frequencies that compose a tonal masker. And when the relation between the tone energy and the left or right frequency energy after various signal processing is compared with the one before the processing, very few changes are showed. We propose an audio watermarking method using these attributes of tonal masker. A watermark bit is embedded by the modulation of the difference between the two neighboring frequency energies of a tone. In the detection, the modulated the tonal masker is searched using the key wed in the embedding without original audio and the embedded watermark bit is detected. After each attack of noise insertion, band-pass filtering, re-sampling, compression, echo transform and equalization, the detection error ratios of the proposed method were average 0.11%, 1.26% for Classics and Pops. And the SDG(Subjective Diff-Grades) scale evaluation of the sound quality of the watermarked audio result in the average SDG -0.31.

Autonomous Stationkeeping System for Geostationary Satellite (정지위성 자동위치유지 시스템에 관한 연구)

  • Park, Bong-Kyu;Tahk, Min-Jea;Bang, Hyo-Choong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.32 no.10
    • /
    • pp.67-76
    • /
    • 2004
  • This paper improves existing 'fly-the-wire' based autonomous station-keeping system, suitable for geostationary satellite and introduces results of computer simulations conducted to verify the algorithm. The on-board stationkeeping system receives pseudo-range signals from two ground equipments located with long baseline, determines the orbit error in realtime and generates orbit control commands. To reduce fuel consumption, this paper proposes an on-board orbit control logic using modified fly-the-wire method. The modified fly-the-wire method de-couples error components into two dynamic modes, harmonic and linear motion. The harmonic error components are removed by applying output commands produced by feedback controller, and the linear motions are controlled by the correction ${\Delta}V\;s$ added to reference maneuvers. The reference maneuvers are generated through the ground based computer simulation and embedded or uploaded into the on-board computer with time tags. Finally, the performance of the proposed algorithm is verified through a series of computer simulations.

Vector Map Data Watermarking Method using Binary Notation

  • Kim, Jung-Yeop;Park, Soo-Hong
    • Spatial Information Research
    • /
    • v.15 no.4
    • /
    • pp.385-395
    • /
    • 2007
  • As the growth of performance of the computer and the development of the Internet are exponential, sharing and using the information illegally have also increased to the same proportion. In this paper, we proposed a novel method on the vector map data among digital contents. Vector map data are used for GIS, navigation and web-based services etc. We embedded watermark into the coordinate of the vector map data using bit operation and extracted the watermark. This method helps to protect the copyright of the vector map data. This watermarking method is a spatial domain method and it embeds the watermark within an allowable error. Our experiment shows that the watermark produced by this method is resistant to simplification and translation.

  • PDF

Implementation and application of remote control system using LACC(Local Area Control Center) (LACC를 이용한 원격제어 시스템 구현 및 적용)

  • Park Tae-Jin;Jang Myung-Kee;Chung Seung-Ryul
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.15-22
    • /
    • 2006
  • Nowadays, there is called energy saving, that it is accomplished with a lot study and application development as according to demand of all around world. It is using to network device of wire or wireless such as internet, lan, plc, and zigbee and that we should be accomplished to study about method that spending a little cost to fatal error in control system that be expected of frequent occurrence on network, and that have method to do construction a little bit tried out. Also, in that such a embedded system with network function case, there is important thing that it is remote management to network node and control methods to trust because firmware upgrade have the advantage of more than the other device. In this paper, we have verified through a result of experiment for efficient remote management and control method as previously stated in this paper, that it is area of the PLC for sensor node and doing management to relay, and implementation of the LACC which is core part of the ESS, and in order to get a result to trust from doing analysis of capacity and test.

Performance Improvement of the SVM by Improving Accuracy of Estimating Vanishing Points (소실점 추정 정확도 개선을 통한 SVM 성능 향상)

  • Ahn, Sang-Geun;Seo, Tae-Kyu;Jeon, Gwang-Gil;Cho, Joong-Hwee
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.6
    • /
    • pp.361-367
    • /
    • 2016
  • In this paper, we propose an improved single view metrology (SVM) algorithm to accurately measure the height of objects. In order to accurately measure the size of objects, vanishing points have to be correctly estimated. There are two methods to estimate vanishing points. First, the user has to choose some horizontal and vertical lines in real world. Then, the user finds the cross points of the lines. Second, the user can obtain the vanishing points by using software algorithm such as [6-9]. In the former method, the user has to choose the lines manually to obtain accurate vanishing points. On the other hand, the latter method uses software algorithm to automatically obtain vanishing points. In this paper, we apply image resizing and edge sharpening as a pre-processing to the algorithm in order to improve performance. The estimated vanishing points algorithm create four vanishing point candidates: two points are horizontal candidates and the other two points are vertical candidates. However, a common image has two horizontal vanishing points and one vertical vanishing point. Thus, we eliminate a vertical vanishing point candidate by analyzing the histogram of angle distribution of vanishing point candidates. Experimental results show that the proposed algorithm outperforms conventional methods, [6] and [7]. In addition, the algorithm obtains similar performance with manual method with less than 5% of the measurement error.

Comparison procedure in evaluation analysis of source code comparison on Embedded system (정보기기 소스코드 유사성 분석에서 목적물 검증)

  • Nam, SangYep;Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.31-38
    • /
    • 2021
  • In order to analyze the similarity of the source code object material, the source code on both sides must be able to be compiled and executed. In particular, in the case of hardware-integrated software, it is necessary to check whether the hardware interface matches. However, currently, the source code is provided in an incomplete state which is not original of source code used in developing steps. The complainant confirms that the executing characteristics are similar to their own in the expression and function of the output, and request an evaluation. When a source code compilation error occurs during the evaluation process, the experts draw a flowchart of the source code and applies the method of tracing the code flow for each function as indirect method. However, this method is indirect and the subjective judgment is applied, so there is concern about the contention of objectivity in the similarity evaluation result. In this paper, the problems of unverified source code similarity analysis and improvement directions are dealt with, through the analysis cases of source code disputes applied to embedded systems.

A Basic Study on Vehicle Load Analyzing System for Embedded Road (임베디드 도로를 위한 차량하중 분석시스템 기초연구)

  • Jo, Byung-Wan;Yoon, Kwang-Won;Park, Jung-Hoon;Kim, Heoun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.1D
    • /
    • pp.127-132
    • /
    • 2011
  • Load managing method on road became necessary since overloaded vehicles occur damage on road facilities and existing systems for preventing this damage still show many problems. Accordingly, efficient managing system for preventing overloaded vehicles could be organized by using the road itself as a scale by applying genetic algorithm to analyze the load and the drive information of vehicles. First of all, accurate analysis of load using the behavior of road itself is needed for solving illegal axle manipulation problems of overloaded vehicles and for installing intelligent embedded load analyzing system. Accordingly in this study, to use the behavior of road, the transformation was measured by installing underground box type indoor model and indoor experiment was held using genetic algorithm and 10% error were checked.

Efficient Use of Unused Spare Columns for Reducing Memory Miscorrections

  • Jung, Ji-Hun;Ishaq, Umair;Song, Jae-Hoon;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.331-340
    • /
    • 2012
  • In the deep sub-micron ICs, growing amounts of on-die memory and scaling effects make embedded memories increasingly vulnerable to reliability and yield problems. Spare columns are often included in memories to repair defective cells or bit lines during production test. In many cases, the repair process will not use all spare columns. Schemes have been proposed to exploit these unused spare columns to store additional check bits which can be used to reduce the miscorrection probability for triple errors in single error correction-double error detection (SEC-DED). These additional check bits increase the dimensions of the parity check matrix (H-matrix) requiring extra area overhead. A method is proposed in this paper to efficiently fill the extra rows of the H-matrix on the basis of similarity of logic between the other rows. Optimization of the whole H-matrix is accomplished through logic sharing within a feasible operating time resulting in reduced area overhead. A detailed implementation using fuse technology is also proposed in this paper.