• Title/Summary/Keyword: Information Processing Technology

Search Result 7,830, Processing Time 0.046 seconds

Characteristics Evaluation of Lathe Scrap for Manufacturing Fiber Reinforced Cementitious Composites (섬유보강 시멘트 복합체 제조를 위한 선반 스크랩의 특성 평가)

  • Bae, Suho;Jeon, Juntai;Kwon, Soonoh;Lee, Hyunjin;Kim, Sungwook
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.3
    • /
    • pp.432-441
    • /
    • 2014
  • The purpose of this research is to investigate characteristics of lathe scrap for manufacturing fiber reinforced cementitious composites(FRCCs) to use lathe scrap as a alternative materials of steel fiber. It should be noted that the use of the lathe scrap for making FRCCs raised friendly environmental effect as well as economy because the lathe scrap was a by-product of steel manufactures. For this purpose, various steel scraps were collected from processing plants of metal and then their physical properties were evaluated. Also, steel scraps were classified and analyzed according to the KS D 2101 and then of these scraps, lathe scrap as a alternative materials of steel fiber was suggested. In addition, FRCCs containing lathe scraps were made according to their total volume fractions of 0.0, 0.5, 1.0, 1.5, and 2.0% for water-binder ratios of 30%, 40%, respectively, and then characteristics, such as the workability, compressive strength, and flexural strength of those were evaluated. It was observed from the test result that the compressive strengths at 7 and 28 days of FRCCs containing lathe scrap were slightly small but the flexural strengths at 28 days of those increased by 10% compared with plain concrete.

Study on the Autonomous Vehicle Feature for the Elderly Driver (Focusing on Interaction Design) (고령운전자를 위한 자율주행차량 기능 연구 (인터랙션 디자인을 중심으로))

  • Choi, Kyu-Han
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.11
    • /
    • pp.474-481
    • /
    • 2019
  • Korea entered the aged society in 2018 with the elderly population accounting for 14.4% of the total population, and it is expected to enter the super-aged society in 2026. In particular, it is predicted that by 2050, the elderly population will be 38% of the total population, making it one of the countries with the highest number of elderly people in the world. The increase in the elderly population is naturally leading to an increase in the number of traffic accidents among elderly drivers, in 2017, there were 26,713 elderly driver accidents over 65 years of age, with 848 people dying and 38,627 injured. Compared with 2011, the number of accidents and injuries has doubled and the number of deaths has increased 1.4 times. This study determined that the main factors of the increase in traffic accidents were the characteristics of elderly drivers, such as a decrease in visual/hearing ability, cognitive and information processing ability, and muscle strength. Therefore, it raised the necessity of autonomous vehicle(level 2) for elderly driver who can minimize the burden of driving and aimed to study the function of autonomous vehicle for elderly driver who is not familiar with new technology. Based on this, four functions of autonomous vehicles for elderly drivers were derived, such as providing clear information according to the road environment, considering physical characteristics of drivers, simplifying interface, and reinforcing in-vehicle safety devices.

An Overview of Operations and Applications of HF Ocean Radar Networks in the Korean Coast (한국연안 고주파 해양레이더망 운영과 활용 개관)

  • Kim, Ho-Kyun;Kim, Jung-Hoon;Son, Young-Tae;Lee, Sang-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.34 no.2_2
    • /
    • pp.351-375
    • /
    • 2018
  • This paper aims to i) introduce the characteristics of HF ocean radar and the major results and information produced by the radar networks in the Korean coasts to the readers, ii) make an up-to-date inventory of the existing radar systems, and iii) share the information related to the radar operating skill and the ocean current data application. The number of ocean radars has been showing a significant growth over the past 20 years, currently deploying more than 44 radars in the Korean coasts. Most of radars are in operation at the present time for the purposes related to the marine safety, tidal current forecast and understanding of ocean current dynamics, mainly depending on the mission of each organization operating radar network. We hope this overview paper may help expand the applicability of the ocean radar to fisheries, leisure activity on the sea, ocean resource management, oil spill response, coastal environment restoration, search and rescue, and vessel detection etc., beyond the level of understanding of tidal and ocean current dynamics. Additionally we hope this paper contributes further to the surveillance activity on our ocean territory by founding a national ocean radar network frame and to the domestic development of ocean radar system including signal processing technology.

Segmentation of Seabed Points from Airborne Bathymetric LiDAR Point Clouds Using Cloth Simulation Filtering Algorithm (항공수심라이다 데이터 해저면 포인트 클라우드 분리를 위한 CSF 알고리즘 적용에 관한 연구)

  • Lee, Jae Bin;Jung, Jae Hoon;Kim, Hye Jin
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.1
    • /
    • pp.1-9
    • /
    • 2020
  • ABL (Airborne Bathymetric LiDAR) is an advanced survey technology that uses green lasers to simultaneously measure the water depths and oceanic topography in coastal and river areas. Seabed point cloud extraction is an essential prerequisite to further utilizing the ABL data for various geographic data processing and applications. Conventional seabed detection approaches often use return waveforms. However, their limited accessibility often limits the broad use of the bathymetric LiDAR (Light Detection And Ranging) data. Further, it is often questioned if the waveform-based seabed extraction is reliable enough to extract seabed. Therefore, there is a high demand to extract seabed from the point cloud using other sources of information, such as geometric information. This study aimed to assess the feasibility of a ground filtering method to seabed extraction from geo-referenced point cloud data by using CSF (Cloth Simulation Filtering) method. We conducted a preliminary experiment with the RIGEL VQ 880 bathymetric data, and the results show that the CSF algorithm can be effectively applied to the seabed point segmentation.

Performance Evaluation of Scheduling Algorithm for VoIP under Data Traffic in LTE Networks (데이터 트래픽 중심의 LTE망에서 VoIP를 위한 스케줄링 알고리즘 성능 분석)

  • Kim, Sung-Ju;Lee, Jae Yong;Kim, Byung Chul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.12
    • /
    • pp.20-29
    • /
    • 2014
  • Recently, LTE is preparing to make a new leap forward LTE-A all over the world. As LTE privides high speed service, the role of mobile phones seems to change from voice to data service. According to Cisco, global mobile data traffic will increase nearly 11-fold between 2013 and 2018. Mobile video traffic will reach 75% by 2018 from 66% in 2013 in Korea. However, voice service is still the most important role of mobile phones. Thus, controllability of throughput and low BLER is indispensable for high-quality VoIP service among various type of traffic. Although the maximum AMR-WB, 23.85 Kbps is sufficient to a VoIP call, it is difficult for the LTE which can provide tens to hundreds of MB/s may not keep the certain level VoIP QoS especially in the cell-edge area. This paper proposes a new scheduling algorithm in order to improve VoIP performance after analyzing various scheduling algorithms. The proposal is the technology which applies more priority processing for VoIP than other applications in cell-edge area based on two-tier scheduling algorithm. The simulation result shows the improvement of VoIP performance in the view point of throughput and BLER.

Hardware Design of SURF-based Feature extraction and description for Object Tracking (객체 추적을 위한 SURF 기반 특이점 추출 및 서술자 생성의 하드웨어 설계)

  • Do, Yong-Sig;Jeong, Yong-Jin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.83-93
    • /
    • 2013
  • Recently, the SURF algorithm, which is conjugated for object tracking system as part of many computer vision applications, is a well-known scale- and rotation-invariant feature detection algorithm. The SURF, due to its high computational complexity, there is essential to develop a hardware accelerator in order to be used on an IP in embedded environment. However, the SURF requires a huge local memory, causing many problems that increase the chip size and decrease the value of IP in ASIC and SoC system design. In this paper, we proposed a way to design a SURF algorithm in hardware with greatly reduced local memory by partitioning the algorithms into several Sub-IPs using external memory and a DMA. To justify validity of the proposed method, we developed an example of simplified object tracking algorithm. The execution speed of the hardware IP was about 31 frame/sec, the logic size was about 74Kgate in the 30nm technology with 81Kbytes local memory in the embedded system platform consisting of ARM Cortex-M0 processor, AMBA bus(AHB-lite and APB), DMA and a SDRAM controller. Hence, it can be used to the hardware IP of SoC Chip. If the image processing algorithm akin to SURF is applied to the method proposed in this paper, it is expected that it can implement an efficient hardware design for target application.

Quantitatively Managed Leveling for Capability Maturity Model Integration Implementation (정량적 소프트웨어 능력성숙도모델 도입전략 및 사례)

  • Kim, Hanyoung;Lee, Wookey;Lee, James J.H.;Lee, Rich C.K.
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.3
    • /
    • pp.335-346
    • /
    • 2013
  • With the overwhelming development of information technologies, the need for software development that can deal with diversified and complex business processes has increased dramatically. As a result, companies prefer softwares that can handle far more complex processing ability and also it should be stable as well as easier to maintain. These ambivalent requirements keep the software development organizations from assessing the quantitative abilities, so that under the support of the U.S. Department of Defense the Capability Maturity Model (CMM) and Capability Maturity Model Integration (CMMI) have been developed. The CMMI upper levels for the software development companies will be evaluated to be excellent and authenticated, which drives the companies to get and maintain high levels of maturity. In this paper, a case study for a domestic software company has been exploited how to achieve CMMI level 4 and what kind of factors have been played an effective role. These issues at the domestic and international software and maintenance program, can influence the trustworthiness and marketing effects for the global market. In this paper, the company's actual case study will give clues to find out the important factors for the development and maintenance of software companies maturity levels.

Design of Required Interface for Components in EJB Environment (EJB 환경에서 컴포넌트의 Required 인터페이스 설계 기법)

  • Yoon, Hee-Yoon;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.11D no.3
    • /
    • pp.671-682
    • /
    • 2004
  • As new and diverse information technologies are being introduced and software complexity is increased, software development cost and efforts are also sharply increased. Component-Based Development (CBD) technology is appealing as a new way to reduce the cost and effort by increasing reusability and maintainability. Component in CBD has variability infernally which enables customization of the component within the specific domain. A component user can easily set up internally variability parts though Required interface which is provided by the component. Enterprise JavaBeans (EJB) is utilized as a commercial standard to implement Java-based components. However, EJB constructs are limited in directly implementing Required interfaces of coarse-grained components[8]. In this paper, we define Required interface and propose interface-storage technique, class-storage technique, interface-generation technique, and Plug -in technique for implementing required interface of component. Interface-storage technique stores variable value in Required interface and class-storage technique take the Bean containg variability as Required interface without modification of component model. Interface-generation technique generates new Bean which takes the role of Required interface for component variability and Plug-in technique sets up component variability that component user plugged-in variable part externally The proposed four techniques conform to the semantics of CBD component interface and enable the implementation of high quality components.

Detection Model of Malicious Nodes of Tactical Network for Korean-NCW Environment (한국형 NCW를 위한 전술네트워크에서의 악의적인 노드 검출 모델)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Ryou, Hwang-Bin;Jo, Yong-Gun
    • Convergence Security Journal
    • /
    • v.11 no.1
    • /
    • pp.71-77
    • /
    • 2011
  • NCW(Network Centric- Warfare) encompasses the concept to use computer data processing and network linkage communications techniques, share information and furthermore, enhance the effectiveness of computer-operating systems. As IT(Information & Technology) have become developed in the recent years, the existing warfare system-centered conventional protocol is not use any longer. Instead, network-based NCW is being widely-available, today. Under this changing computer environment, it becomes important to establish algorithm and build the stable communication systems. Tools to identify malign node factors through Wireless Ad-hoc network cause a tremendous error to analyze and use paths of even benign node factors misreported to prove false without testing or indentifying such factors to an adequate level. These things can become an obstacle in the process of creating the optimum network distribution environment. In this regard, this thesis is designed to test and identify paths of benign node factors and then, present techniques to transmit data through the most significant open short path, with the tool of MP-SAR Protocol, security path search provider, in Ad-hoc NCW environment. Such techniques functions to identify and test unnecessary paths of node factors, and thus, such technique users can give an easy access to benign paths of node factors.

A Study on the Design of EA Performance Evaluation Model and the Application Case (EA성과평가 모델의 설계 및 적용사례에 관한 연구)

  • Lee, Seok-Kyun;Lee, Young-Min;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.395-406
    • /
    • 2009
  • Korean government has operated EA by the act on efficient introduction of information system and operation, etc. But the evaluation system for EA and the criteria don't prepare well. Particularly, There is no model for EA performance measurement and the way is insufficient. In this study, we derived 8 areas and 17 criteria for the performance evaluation based on the Performance Reference Model of U.S FEA and Korea. And we also derived 8 areas and 10 criteria for it based on the OMB EA Assessment Framework and the EA maturity model in Korea. We propose the performance evaluation model of the five areas that consists of the business performance, customer performance, process, human resource and the technology for EA performance evaluation. To verify the model, we applied the model to three organizations and evaluated EA performance. In addition, we compared the performance result with the performance evaluation area of EA maturity model of Korea to verify the result. We also analyzed the criteria of the proposed performance evaluation model with the current EA maturity model and Performance Reference Model of Korea. As a result of the evaluation, we verified of the proposed performance evaluation model, too.