• Title/Summary/Keyword: LOG operator

Search Result 53, Processing Time 0.022 seconds

A Basic Study of Water Basin Experiment for Underwater Robot with Improving usability (사용자 운용 편의성을 위한 수중로봇 MR-1의 수조실험에 관한 연구)

  • Nam, Keonseok;Ryu, Jedoo;Ha, Kyoungnam
    • The Journal of Korea Robotics Society
    • /
    • v.15 no.1
    • /
    • pp.32-38
    • /
    • 2020
  • This paper describes a method for tracking attitude and position of underwater robots. Underwater work with underwater robots is subject to differences in work efficiency depending on the skill of the operator and the utilization of additional sensors. Therefore, this study developed an underwater robot that can operate autonomously and maintain a certain attitude when working underwater to reduce difference of work efficiency. The developed underwater robot uses 8 thrusters to control 6 degrees of freedom motion, IMU (Inertial Measurement Unit), DVL (Doppler Velocity Log) and PS (Pressure Sensor) to measure attitude and position. In addition, the thruster allocation algorithm was designed to follow the control desired value using 8 thrusters, and the motion control experiments were performed in the engineering water basin using the thruster allocation method.

A study on automatic testing of powder metallurgy process using the visual inspection system (시각감시장치를 이용한 분말야금 공정의 검사자동화 기술개발에 관한 연구)

  • Kwon, Ki-Ryong;Choi, Jae-Youn;Choi, Sung-Lark
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.1
    • /
    • pp.89-93
    • /
    • 1997
  • This paper describes the automatic testing system developed for powder metallurgy process using the visual inspection, and its some internal algorithms. The system consists of one unit from each of the five types of units; feeding, slot, vision inspection, volumn counter, and inferior good extractor units. Some applications of the system to powder metallurgy process has shown the possibility of reducing the rework and increasing the efficiency of operation.

  • PDF

Multiresolution Edge Detection Technique (다해상도 에지 검출 기법)

  • 박덕준;박래홍
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.28B no.12
    • /
    • pp.51-58
    • /
    • 1991
  • In this paper, we propose a multiresolution edge detection method which selects the edge detection window size and scale automatically by using the local variance information as an edgeness measure of a region. The mode of the local variance distribution which is calculated over the (2p + 1) x (2p + 1) windows is used to determine the resolution of the given pixel and the edge operator with different scale can be applied to the pixel depending on its resolution. The combination of the resolution determination scheme with the conventional Canny and LOG edge detectors gives the proposed multiresolution edge detection schemes. The effectness of the proposed schemes is shown via computer simulation.

  • PDF

Analysis of Purchase Process Using Process Mining (프로세스 마이닝을 이용한 구매 프로세스 분석)

  • Kim, Seul-Gi;Jung, Jae-Yoon
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.47-54
    • /
    • 2018
  • Previous studies of business process analysis have analyzed various factors such as task, customer service, operator convenience, and execution time prediction. To accurately analyze these factors, it is effective to utilize actual historical data recorded in information systems. Process mining is a technique for analyzing various elements of a business process from event log data. In this case study, process mining was applied to the transaction data of a purchase agency to analyze the business process of their procurement process, the execution time, and the operators.

Improvement of Efficient Tone-Mapping Curve using Adaptive Depth Range Coefficient (적응적 깊이 영역 변수를 활용한 효율적인 톤 매핑 커브 개선)

  • Lee, Yong-Hwan;Kim, Youngseop;Ahn, Byoung-Man
    • Journal of the Semiconductor & Display Technology
    • /
    • v.14 no.4
    • /
    • pp.92-97
    • /
    • 2015
  • The purpose of this work is to support a solution of optimizing TMO (tone mapping operator). JPEG XT Profile A and C utilize Erik Reinhard TMO that works well in most cases, however, detailed information of a scene is lost in some cases. Reinhard TMO only calculates its coefficient to have tone-mapping curve from log-average luminance, and this lead to lose details of bright and dark area of scenes in turn. Thus, this paper proposes an enhancement of the default TMO for JPEG XT Profile C to optimize tone-mapping curve. Main idea is that we divide tone mapping curve into several ranges, and set reasonable parameters for each range. By the experimental results, the proposed scheme shows and obtains better performance within a dark scene, compared to the default Reinhard TMO.

Event Logging Method for Control Rod Control System (원자로 제어봉구동장치 제어시스템용 이벤트 기록 방법)

  • Cheon, Jong-Min;Kim, Choon-Kyung;Jo, Chang-Hui;Jeong, Soon-Hyun;Nam, Jeong-Han
    • Proceedings of the KIEE Conference
    • /
    • 2003.11c
    • /
    • pp.552-554
    • /
    • 2003
  • This paper is about the method by which Power Control Unit(PCU) of Control Rod Control System(CRCS) logs events in the system and the real-time monitoring display. This method enables the functions like the event logging of Control Rod Drive Mechanism(CRDM)/power Cabinet, the off-line show of the event data logged and the on-line show by communication between the PCU and the monitoring display. Operators in a nuclear power plant must be able to grasp any possible abnormal states correctly. Because our newly designed system has a good ability to log and display the kinds, tine, and the prior and posterior states of urgent or non-urgent events, the operators can judge, maintain and repair the abnormal event more easily.

  • PDF

Penalized variable selection for accelerated failure time models

  • Park, Eunyoung;Ha, Il Do
    • Communications for Statistical Applications and Methods
    • /
    • v.25 no.6
    • /
    • pp.591-604
    • /
    • 2018
  • The accelerated failure time (AFT) model is a linear model under the log-transformation of survival time that has been introduced as a useful alternative to the proportional hazards (PH) model. In this paper we propose variable-selection procedures of fixed effects in a parametric AFT model using penalized likelihood approaches. We use three popular penalty functions, least absolute shrinkage and selection operator (LASSO), adaptive LASSO and smoothly clipped absolute deviation (SCAD). With these procedures we can select important variables and estimate the fixed effects at the same time. The performance of the proposed method is evaluated using simulation studies, including the investigation of impact of misspecifying the assumed distribution. The proposed method is illustrated with a primary biliary cirrhosis (PBC) data set.

ROUGH MAXIMAL SINGULAR INTEGRAL AND MAXIMAL OPERATORS SUPPORTED BY SUBVARIETIES

  • Zhang, Daiqing
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.2
    • /
    • pp.277-303
    • /
    • 2021
  • Under the rough kernels Ω belonging to the block spaces B0,qr (Sn-1) or the radial Grafakos-Stefanov kernels W����(Sn-1) for some r, �� > 1 and q ≤ 0, the boundedness and continuity were proved for two classes of rough maximal singular integrals and maximal operators associated to polynomial mappings on the Triebel-Lizorkin spaces and Besov spaces, complementing some recent boundedness and continuity results in [27, 28], in which the authors established the corresponding results under the conditions that the rough kernels belong to the function class L(log L)α(Sn-1) or the Grafakos-Stefanov class ����(Sn-1) for some α ∈ [0, 1] and �� ∈ (2, ∞).

A Study on the Hardware Architecture of Trinomial $GF(2^m)$ Multiplier (Trinomial $GF(2^m)$ 승산기의 하드웨어 구성에 관한 연구)

  • 변기영;윤광섭
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.41 no.5
    • /
    • pp.29-36
    • /
    • 2004
  • This study focuses on the arithmetical methodology and hardware implementation of low-system-complexity multiplier over GF(2$^{m}$ ) using the trinomial of degree a The proposed parallel-in parallel-out operator is composed of MR, PP, and MS modules, each can be established using the regular array structure of AND and XOR gates. The proposed multiplier is composed of $m^2$ 2-input AND gates and $m^2$-1 2-input XOR gates, and the propagation delay is $T_{A}$+(1+[lo $g_2$$^{m}$ ]) $T_{x}$ . Comparison result of the related multipliers of GF(2$^{m}$ ) are shown by table, it reveals that our operator involve more regular and generalized then the others, and therefore well-suited for VLSI implementation. Moreover, our multiplier is more suitable for any other GF(2$^{m}$ ) operational applications.s.

The Development of Blood Bank Management Program (혈액 은행 전산 처리 프로그램의 개발)

  • Kim, Jong-Won;Lee, Seung-Kuk;Han, Kyou-Sup;Kim, Jin-Q;Cho, Han-Ik;Kim, Sang-In
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1989 no.05
    • /
    • pp.75-76
    • /
    • 1989
  • The blood bank is a field of clinical pathology which requires the most accuratemaintenanceofrecording. Because the mistake in it is directly related to a patient's life. So, the computerization of the blood bank is urgent to maintain a log blook arid to compare the patient's current data with past result. We developed the blood bank management program using 32 bit minicomputer. This is composed of 4 parts; a management of routine test result, special test result, the blood issue and statistics. The management of routine test result handles the patient's information and blood typing and compares above results with the past one of same patient. The management of special test result are for special immunohematologic tests like an irregular antibody, Coombs' test, and etc. Blood issue part records the type of the blood bag, component, and the name of issuer. Statistic part are made to get statistics of each day and each month by the blood type, and the type the blood component. The program is secured by the maintenance of operator's operation history and thu provision of the security code to each operator, without which no one can enter the system and after the content. So the stability and reliability of the data is obtained. This program will be upgraded for bar-code using system in the near future.

  • PDF