• Title/Summary/Keyword: Movement Detection

Search Result 604, Processing Time 0.025 seconds

In Situ Sensing of Copper-plating Thickness Using OPD-regulated Optical Fourier-domain Reflectometry

  • Nayoung, Kim;Do Won, Kim;Nam Su, Park;Gyeong Hun, Kim;Yang Do, Kim;Chang-Seok, Kim
    • Current Optics and Photonics
    • /
    • v.7 no.1
    • /
    • pp.38-46
    • /
    • 2023
  • Optical Fourier-domain reflectometry (OFDR) sensors have been widely used to measure distances with high resolution and speed in a noncontact state. In the electroplating process of a printed circuit board, it is critically important to monitor the copper-plating thickness, as small deviations can lead to defects, such as an open or short circuit. In this paper we employ a phase-based OFDR sensor for in situ relative distance sensing of a sample with nanometer-scale resolution, during electroplating. We also develop an optical-path difference (OPD)-regulated sensing probe that can maintain a preset distance from the sample. This function can markedly facilitate practical measurements in two aspects: Optimal distance setting for high signal-to-noise ratio OFDR sensing, and protection of a fragile probe tip via vertical evasion movement. In a sample with a centimeter-scale structure, a conventional OFDR sensor will probably either bump into the sample or practically out of the detection range of the sensing probe. To address this limitation, a novel OPD-regulated OFDR system is designed by combining the OFDR sensing probe and linear piezo motors with feedback-loop control. By using multiple OFDR sensors, it is possible to effectively monitor copper-plating thickness in situ and uniformize it at various positions.

Properties of Cement Matrix using Carbon Black (카본블랙을 혼입한 시멘트 경화체의 특성)

  • Lee, Jeon-Ho;Lee, Chang-Woo;Lee, Sang-Soo
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2021.05a
    • /
    • pp.217-218
    • /
    • 2021
  • With the prolonged Covid-19 epidemic, movement restrictions such as social distancing are prolonged, and as people stay indoors for a longer time, interest in indoor air pollution is increasing. Indoor air quality is not easily purified unlike outdoors. Among indoor building materials, paints and flooring contain formaldehyde that causes sick house syndrome and VOCs that contain carcinogenicity and harmfulness. For modern people who spend a lot of time living indoors for more than an hour, the occurrence of these harmful substances can be said to be fatal. In response to these risks, in July 2019, the government reinforced the standards for indoor air quality to protect the public's health by raising the detection standards for fine dust, ultrafine dust, and formaldehyde in indoor multi-use facilities. People use machines such as air purifiers to improve indoor air quality, or make efforts such as periodic ventilation. In order to reduce or support these other ancillary efforts more effectively, to reduce the generation of pollutants in the building itself, or to adsorb or purify pollutants in the air, use carbon black as an admixture to make a cement hardened body, and to grasp basic physical properties and adsorption capacity. And the result is as follows. As a result of the experiment to determine the appropriate amount of carbon black, it was confirmed that the more the amount of carbon black was added, the better it was in the formaldehyde emission test, but the tendency was not clear when measuring the flexural strength, so a further experiment to improve this is needed.

  • PDF

Vest-type System on Machine Learning-based Algorithm to Detect and Predict Falls

  • Ho-Chul Kim;Ho-Seong Hwang;Kwon-Hee Lee;Min-Hee Kim
    • PNF and Movement
    • /
    • v.22 no.1
    • /
    • pp.43-54
    • /
    • 2024
  • Purpose: Falls among persons older than 65 years are a significant concern due to their frequency and severity. This study aimed to develop a vest-type embedded artificial intelligence (AI) system capable of detecting and predicting falls in various scenarios. Methods: In this study, we established and developed a vest-type embedded AI system to judge and predict falls in various directions and situations. To train the AI, we collected data using acceleration and gyroscope values from a six-axis sensor attached to the seventh cervical and the second sacral vertebrae of the user, considering accurate motion analysis of the human body. The model was constructed using a neural network-based AI prediction algorithm to anticipate the direction of falls using the collected pedestrian data. Results: We focused on developing a lightweight and efficient fall prediction model for integration into an embedded AI algorithm system, ensuring real-time network optimization. Our results showed that the accuracy of fall occurrence and direction prediction using the trained fall prediction model was 89.0% and 78.8%, respectively. Furthermore, the fall occurrence and direction prediction accuracy of the model quantized for embedded porting was 87.0 % and 75.5 %, respectively. Conclusion: The developed fall detection and prediction system, designed as a vest-type with an embedded AI algorithm, offers the potential to provide real-time feedback to pedestrians in clinical settings and proactively prepare for accidents.

An Efficient Routing Scheme Based on Node Density for Underwater Acoustic Sensors Networks

  • Rooh Ullah;Beenish Ayesha Akram;Amna Zafar;Atif Saeed;Sultan H. Almotiri;Mohammed A. Al Ghamdi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.5
    • /
    • pp.1390-1411
    • /
    • 2024
  • Underwater Wireless Sensors Networks (UWSNs) are deployed in remotely monitored environment such as water level monitoring, ocean current identification, oil detection, habitat monitoring and numerous military applications. Providing scalable and efficient routing is very challenging in UWSNs due to the harsh underwater environment. The biggest difficulties are the nodes inherent movement due to water current, long delay in data transmission, low bandwidth of the acoustic signal, high error rate and energy scarcity in battery powered nodes. Many routing protocols have been proposed to solve the aforementioned problems. There are three broad categories of routing protocols namely depth based, energy based and vector-based routing. Vector Based Forwarding protocols perform routing through virtual pipeline by defining their radius which give proper direction to packets communication. We proposed a routing protocol termed as Path-Oriented Energy Scaled Expanded Vector Based Forwarding (PESEVBF). PESEVBF takes into account all parameters; holding time, the source nodes packets routing path and void holes creation on the second hop; PESEVBF not only considers the packet upward advancement but also focus on density of the forwarded nodes in terms of number of potential forwarding and suppressed nodes for path selection. Node selection in resultant holding time is based on minimum Path Factor (PF) value. Moreover, the suppressed node will be selected for packet forwarding to avoid the void holes occurrences on the second hop. Performance of PESEVBF is compared with other routing protocols using matrices such as energy consumption, packet delivery ratio, packets dropping ratio and duplicate packets creation indicating considerable performance improvement.

Automatic Detection of Stage 1 Sleep (자동 분석을 이용한 1단계 수면탐지)

  • 신홍범;한종희;정도언;박광석
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.11-19
    • /
    • 2004
  • Stage 1 sleep provides important information regarding interpretation of nocturnal polysomnography, particularly sleep onset. It is a short transition period from wakeful consciousness to sleep. Lack of prominent sleep events characterizing stage 1 sleep is a major obstacle in automatic sleep stage scoring. In this study, we attempted to utilize simultaneous EEC and EOG processing and analyses to detect stage 1 sleep automatically. Relative powers of the alpha waves and the theta waves were calculated from spectral estimation. Either the relative power of alpha waves less than 50% or the relative power of theta waves more than 23% was regarded as stage 1 sleep. SEM (slow eye movement) was defined as the duration of both eye movement ranging from 1.5 to 4 seconds and regarded also as stage 1 sleep. If one of these three criteria was met, the epoch was regarded as stage 1 sleep. Results f ere compared to the manual rating results done by two polysomnography experts. Total of 169 epochs was analyzed. Agreement rate for stage 1 sleep between automatic detection and manual scoring was 79.3% and Cohen's Kappa was 0.586 (p<0.01). A significant portion (32%) of automatically detected stage 1 sleep included SEM. Generally, digitally-scored sleep s1aging shows the accuracy up to 70%. Considering potential difficulties in stage 1 sleep scoring, the accuracy of 79.3% in this study seems to be robust enough. Simultaneous analysis of EOG provides differential value to the present study from previous oneswhich mainly depended on EEG analysis. The issue of close relationship between SEM and stage 1 sleep raised by Kinnariet at. remains to be a valid one in this study.

A Study on Termite Monitoring Method Using Magnetic Sensors and IoT(Internet of Things) (자력센서와 IoT(사물인터넷)를 활용한 흰개미 모니터링 방법 연구)

  • Go, Hyeongsun;Choe, Byunghak
    • Korean Journal of Heritage: History & Science
    • /
    • v.54 no.1
    • /
    • pp.206-219
    • /
    • 2021
  • The warming of the climate is increasing the damage caused by termites to wooden buildings, cultural properties and houses. A group removal system can be installed around the building to detect and remove termite damage; however, if the site is not visited regularly, every one to two months, you cannot observe whether termites have spread within, and it is difficult to take prompt effective action. In addition, since the system is installed and operated in an exposed state for a long period of time, it may be ineffective or damaged, resulting in a loss of function. Furthermore if the system is installed near a cultural site, it may affect the aesthetic environment of the site. In this study, we created a detection system that uses wood, cellulose, magnets, and magnetic sensors to determine whether termites have entered the area. The data was then transferred to a low power LoRa Network which displayed the results without the necessity of visiting the site. The wood was made in the shape of a pile, and holes were made from the top to the bottom to make it easier for termites to enter and produce a cellulose sample. The cellulose sample was made in a cylindrical shape with a magnet wrapped in cellulose and inserted into the top of a hole in the wood. Then, the upper part of the wood pile was covered with a stopper to prevent foreign matter from entering. It also served to block external factors such as light and rainfall, and to create an environment where termites could add cellulose samples. When the cellulose was added by the termites, a space was created around the magnet, causing the magnet to either fall or tilt. The magnetic sensor inside the stopper was fixed on the top of the cellulose sample and measured the change in the distance between the magnet and the sensor according to the movement of the magnet. In outdoor experiments, 11 cellulose samples were inserted into the wood detection system and the termite inflow was confirmed through the movement of the magnet without visiting the site within 5 to 17 days. When making further improvements to the function and operation of the system it in the future, it is possible to confirm that termites have invaded without visiting the site. Then it is also possible to reduce damage and fruiting due to product exposure, and which would improve the condition and appearance of cultural properties.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

Development of Sentiment Analysis Model for the hot topic detection of online stock forums (온라인 주식 포럼의 핫토픽 탐지를 위한 감성분석 모형의 개발)

  • Hong, Taeho;Lee, Taewon;Li, Jingjing
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.1
    • /
    • pp.187-204
    • /
    • 2016
  • Document classification based on emotional polarity has become a welcomed emerging task owing to the great explosion of data on the Web. In the big data age, there are too many information sources to refer to when making decisions. For example, when considering travel to a city, a person may search reviews from a search engine such as Google or social networking services (SNSs) such as blogs, Twitter, and Facebook. The emotional polarity of positive and negative reviews helps a user decide on whether or not to make a trip. Sentiment analysis of customer reviews has become an important research topic as datamining technology is widely accepted for text mining of the Web. Sentiment analysis has been used to classify documents through machine learning techniques, such as the decision tree, neural networks, and support vector machines (SVMs). is used to determine the attitude, position, and sensibility of people who write articles about various topics that are published on the Web. Regardless of the polarity of customer reviews, emotional reviews are very helpful materials for analyzing the opinions of customers through their reviews. Sentiment analysis helps with understanding what customers really want instantly through the help of automated text mining techniques. Sensitivity analysis utilizes text mining techniques on text on the Web to extract subjective information in the text for text analysis. Sensitivity analysis is utilized to determine the attitudes or positions of the person who wrote the article and presented their opinion about a particular topic. In this study, we developed a model that selects a hot topic from user posts at China's online stock forum by using the k-means algorithm and self-organizing map (SOM). In addition, we developed a detecting model to predict a hot topic by using machine learning techniques such as logit, the decision tree, and SVM. We employed sensitivity analysis to develop our model for the selection and detection of hot topics from China's online stock forum. The sensitivity analysis calculates a sentimental value from a document based on contrast and classification according to the polarity sentimental dictionary (positive or negative). The online stock forum was an attractive site because of its information about stock investment. Users post numerous texts about stock movement by analyzing the market according to government policy announcements, market reports, reports from research institutes on the economy, and even rumors. We divided the online forum's topics into 21 categories to utilize sentiment analysis. One hundred forty-four topics were selected among 21 categories at online forums about stock. The posts were crawled to build a positive and negative text database. We ultimately obtained 21,141 posts on 88 topics by preprocessing the text from March 2013 to February 2015. The interest index was defined to select the hot topics, and the k-means algorithm and SOM presented equivalent results with this data. We developed a decision tree model to detect hot topics with three algorithms: CHAID, CART, and C4.5. The results of CHAID were subpar compared to the others. We also employed SVM to detect the hot topics from negative data. The SVM models were trained with the radial basis function (RBF) kernel function by a grid search to detect the hot topics. The detection of hot topics by using sentiment analysis provides the latest trends and hot topics in the stock forum for investors so that they no longer need to search the vast amounts of information on the Web. Our proposed model is also helpful to rapidly determine customers' signals or attitudes towards government policy and firms' products and services.

A study on Convergence Weapon Systems of Self propelled Mobile Mines and Supercavitating Rocket Torpedoes (자항 기뢰와 초공동 어뢰의 융복합 무기체계 연구)

  • Lee, Eunsu;Shin, Jin
    • Maritime Security
    • /
    • v.7 no.1
    • /
    • pp.31-60
    • /
    • 2023
  • This study proposes a new convergence weapon system that combines the covert placement and detection abilities of a self-propelled mobile mine with the rapid tracking and attack abilities of supercavitating rocket torpedoes. This innovative system has been designed to counter North Korea's new underwater weapon, 'Haeil'. The concept behind this convergence weapon system is to maximize the strengths and minimize the weaknesses of each weapon type. Self-propelled mobile mines, typically placed discreetly on the seabed or in the water, are designed to explode when a vessel or submarine passes near them. They are generally used to defend or control specific areas, like traditional sea mines, and can effectively limit enemy movement and guide them in a desired direction. The advantage that self-propelled mines have over traditional sea mines is their ability to move independently, ensuring the survivability of the platform responsible for placing the sea mines. This allows the mines to be discreetly placed even deeper into enemy lines, significantly reducing the time and cost of mine placement while ensuring the safety of the deployed platforms. However, to cause substantial damage to a target, the mine needs to detonate when the target is very close - typically within a few yards. This makes the timing of the explosion crucial. On the other hand, supercavitating rocket torpedoes are capable of traveling at groundbreaking speeds, many times faster than conventional torpedoes. This rapid movement leaves little room for the target to evade, a significant advantage. However, this comes with notable drawbacks - short range, high noise levels, and guidance issues. The high noise levels and short range is a serious disadvantage that can expose the platform that launched the torpedo. This research proposes the use of a convergence weapon system that leverages the strengths of both weapons while compensating for their weaknesses. This strategy can overcome the limitations of traditional underwater kill-chains, offering swift and precise responses. By adapting the weapon acquisition criteria from the Defense force development Service Order, the effectiveness of the proposed system was independently analyzed and proven in terms of underwater defense sustainability, survivability, and cost-efficiency. Furthermore, the utility of this system was demonstrated through simulated scenarios, revealing its potential to play a critical role in future underwater kill-chain scenarios. However, realizing this system presents significant technical challenges and requires further research.

  • PDF

Illumination Environment Adaptive Real-time Video Surveillance System for Security of Important Area (중요지역 보안을 위한 조명환경 적응형 실시간 영상 감시 시스템)

  • An, Sung-Jin;Lee, Kwan-Hee;Kwon, Goo-Rak;Kim, Nam-Hyung;Ko, Sung-Jea
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.2 s.314
    • /
    • pp.116-125
    • /
    • 2007
  • In this paper, we propose a illumination environment adaptive real-time surveillance system for security of important area such as military bases, prisons, and strategic infra structures. The proposed system recognizes movement of objects on the bright environments as well as in dark illumination. The procedure of proposed system may be summarized as follows. First, the system discriminates between bright and dark with input image distribution. Then, if the input image is dark, the system has a pre-processing. The Multi-scale Retinex Color Restoration(MSRCR) is processed to enhance the contrast of image captured in dark environments. Secondly, the enhanced input image is subtracted with the revised background image. And then, we take a morphology image processing to obtain objects correctly. Finally, each bounding box enclosing each objects are tracked. The center point of each bounding box obtained by the proposed algorithm provides more accurate tracking information. Experimental results show that the proposed system provides good performance even though an object moves very fast and the background is quite dark.