• Title/Summary/Keyword: Experimental verification

Search Result 1,663, Processing Time 0.025 seconds

Detection of a Light Region Based on Intensity and Saturation and Traffic Light Discrimination by Model Verification (명도와 채도 기반의 점등영역 검출 및 모델 검증에 의한 교통신호등 판별)

  • Kim, Min-Ki
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1729-1740
    • /
    • 2017
  • This paper describes a vision-based method that effectively recognize a traffic light. The method consists of two steps of traffic light detection and discrimination. Many related studies have used color information to detect traffic light, but color information is not robust to the varying illumination environment. This paper proposes a new method of traffic light detection based on intensity and saturation. When a traffic light is turned on, the light region usually shows values with high saturation and high intensity. However, when the light region is oversaturated, the region shows values of low saturation and high intensity. So this study proposes a method to be able to detect a traffic light under these conditions. After detecting a traffic light, it estimates the size of the body region including the traffic light and extracts the body region. The body region is compared with five models which represent specific traffic signals, then the region is discriminated as one of the five models or rejected as none of them. Experimental results show the performance of traffic light detection reporting the precision of 97.2%, the recall of 95.8%, and correct recognition rate of 94.3%. These results shows that the proposed method is effective.

Bounded Model Checking BIR Model (BIR 모델의 바운디드 모델 검증)

  • Cho, Min-Taek;Lee, Tae-Hoon;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.743-751
    • /
    • 2007
  • Model checking has been successfully applied to hardware verification. Software is more subtle than hardware with respect to formal verification due to its infinite state space. Although there are many research activities in this area, bounded model checking is regarded as a promising technique. Bounded model checking uses an upper bound to unroll its model, which is the main advantage of bounded model checking compared to other model checking techniques. In this paper, we applied bounded model checking to verify BIR which is the input model for the model checking tool BOGOR. Some BIR examples are verified with our technique. Experimental results show that bounded model checking is better than explicit model checking provided by BOGOR. This paper presents the formalization of BIR and the encoding algorithm of BIR into CNF.

Design and Experimental Verification of Two Dimensional Asymmetric Supersonic Nozzle (이차원 비대칭형 초음속 노즐 설계와 실험적 검증)

  • Kim, Chae-Hyoung;Sung, Kun-Min;Jeung, In-Seuck;Choi, Byoung-Il;Kouchi, Toshinori;Masuya, Goro
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.9
    • /
    • pp.899-905
    • /
    • 2009
  • Most supersonic-flow test facility has axisymmetric nozzles or two-dimensional symmetric nozzles. Compared to these nozzles, a two-dimensional asymmetric nozzle has advantages of reducing low cost for various Mach number testing and undesirable flow structure such as shock wave reflection because the nozzle part can be directly connected to the test section part in this type of nozzle. The two-dimensional asymmetric nozzle, which was Mach number 2, was designed for supersonic combustion experiment. And it was verified with the numerical analysis and visualization of Mach wave. This study suggested the practical method for design and verification of supersonic two dimensional asymmetric nozzles.

A Study on Noise Control and Verification of High Pressure Steam System Using Experimental Method (실험적 방법을 이용한 고압증기 시스템의 방음설계 및 검증에 관한 연구)

  • Seok, H.I.;Lee, D.K.;Jeong, T.S.;Heo, J.H.
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2011.09a
    • /
    • pp.112-116
    • /
    • 2011
  • The noise analysis is usually carried out in the early structure design stage for the main areas in a vessel such as an accommodation, an engine room, HVAC System and etc. If the analysis results are higher than the noise limits based on guideline, appropriate countermeasures are established to reduce noise levels and applied to the vessel. But excessive noise induced the main or auxiliary equipment and high pressure steam system is very difficult to check in the initial design stage, and local noise problems frequently appear in actual vessels. This paper deals with excessive noise of the engine control room on LNG carrier. It includes the cause analysis of excessive noise, the countermeasure, and verification. Also, it proves suitability of the countermeasure through the on-board test.

  • PDF

Blast Analysis of Concrete Structure using Arbitrary Lagrangian-Eulerian Technique (Arbitrary Lagrangian-Eulerian기법을 적용한 콘크리트 구조물의 폭발해석)

  • Yi, Na-Hyun;Kim, Sung-Bae;Nam, Jin-Won;Lee, Sung-Tae;Kim, Jang-Ho
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2008.04a
    • /
    • pp.269-272
    • /
    • 2008
  • Blast load, an impulsive load with extremely short time duration with very high pressure, is effected by ground and air condition, weight of charge, shape and location of structure. In this study, a blast dynamic analysis for the air-structural integrated model considering dynamic properties of materials and simulation of complex blast wave propagation by Arbitrary Lagrangian- Eulerian technique is suggested to perform an accurate blast analysis of concrete structures. For the verification of the proposed blast analysis method, which is the air-structure integrated model using ALE technique, the comparison of analysis and experimental results is performed. The verification confirms that the simulation of realistic behavior of RC wall structures is possible using ALE method. Also, the example cases which have been analyzed using this method show that the estimation to the structural failure criterion for blast load failure can be represented by energy absorbtion procedure.

  • PDF

Background segmentation of fingerprint image using RLC (RLC를 이용한 지문영상의 배경 분리)

  • 박정호;송종관;윤병우
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.866-872
    • /
    • 2004
  • In fingerprint verification and identification, fingerprint and background region should be segmented. For this purpose, most systems obtain variance of brightness of X and Y direction using Sobel mask. To decide given local region is background or not, the variance is compared with a certain threshold. Although this method is simple, most fingerprint image does not separated with two region of fingerprint and background region. In this paper, we presented a new segmentation algorithm based on run-length connectivity analysis. For a given binary image after thresholding, suggested algorithm calculates RL of X and Y direction. Until the given image is segmented to two regions, small run region is successively inverted. Experimental result show that this algorithm effectively separates fingerprint region and background region.

Structural Analysis and Integrity Verification of Main Wing of HALE UAV (성층권 장기체공 무인기 주익 구조 해석 및 건전성 평가)

  • Park, Sang Wook;Kim, Sung Joon;Shin, Jeong Woo;Lee, Seunggyu;Kim, Tae-Uk
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.27 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • Recently, development of long endurance electric powered airplane has been conducted worldwidely. Light structural weight of a main wing with sufficient structural integrity is essential for long endurance flight. Since a main wing with a slender spar can occur catastrophic fracture under the flight, it is important to establish a design and verification method for both the weight reduction and structural integrity. In this paper, structural design and analysis of the main wing of HALE UAV with tubular spar reinforced with a bulkhead were introduced. The static strength test of the main wing was performed to verify structural integrity under the static load. Then, the experimental result was compared with an analytical result from a finite element analysis. It was concluded that the developed light weight main wing would have sufficient structural integrity under the flight operation.

LTS Semantics Model of Event-B Synchronization Control Flow Design Patterns

  • Peng, Han;Du, Chenglie;Rao, Lei;Liu, Zhouzhou
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.570-592
    • /
    • 2019
  • The Event-B design pattern is an excellent way to quickly develop a formal model of the system. Researchers have proposed a number of Event-B design patterns, but they all lack formal behavior semantics. This makes the analysis, verification, and simulation of the behavior of the Event-B model very difficult, especially for the control-intensive systems. In this paper, we propose a novel method to transform the Event-B synchronous control flow design pattern into the labeled transition system (LTS) behavior model. Then we map the design pattern instantiation process of Event-B to the instantiation process of LTS model and get the LTS behavior semantic model of Event-B model of a multi-level complex control system. Finally, we verify the linear temporal logic behavior properties of the LTS model. The experimental results show that the analysis and simulation of system behavior become easier and the verification of the behavior properties of the system become convenient after the Event-B model is converted to the LTS model.

Automatic Malware Detection Rule Generation and Verification System (악성코드 침입탐지시스템 탐지규칙 자동생성 및 검증시스템)

  • Kim, Sungho;Lee, Suchul
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.9-19
    • /
    • 2019
  • Service and users over the Internet are increasing rapidly. Cyber attacks are also increasing. As a result, information leakage and financial damage are occurring. Government, public agencies, and companies are using security systems that use signature-based detection rules to respond to known malicious codes. However, it takes a long time to generate and validate signature-based detection rules. In this paper, we propose and develop signature based detection rule generation and verification systems using the signature extraction scheme developed based on the LDA(latent Dirichlet allocation) algorithm and the traffic analysis technique. Experimental results show that detection rules are generated and verified much more quickly than before.

Deep Face Verification Based Convolutional Neural Network

  • Fredj, Hana Ben;Bouguezzi, Safa;Souani, Chokri
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.256-266
    • /
    • 2021
  • The Convolutional Neural Network (CNN) has recently made potential improvements in face verification applications. In fact, different models based on the CNN have attained commendable progress in the classification rate using a massive amount of data in an uncontrolled environment. However, the enormous computation costs and the considerable use of storage causes a noticeable problem during training. To address these challenges, we focus on relevant data trained within the CNN model by integrating a lifting method for a better tradeoff between the data size and the computational efficiency. Our approach is characterized by the advantage that it does not need any additional space to store the features. Indeed, it makes the model much faster during the training and classification steps. The experimental results on Labeled Faces in the Wild and YouTube Faces datasets confirm that the proposed CNN framework improves performance in terms of precision. Obviously, our model deliberately designs to achieve significant speedup and reduce computational complexity in deep CNNs without any accuracy loss. Compared to the existing architectures, the proposed model achieves competitive results in face recognition tasks