• Title/Summary/Keyword: Multi-Rate

Search Result 3,845, Processing Time 0.035 seconds

Development of Sludge Concentration Estimation Method using Neuro-Fuzzy Algorithm (뉴로-퍼지 알고리즘을 이용한 슬러지 농도 추정 기법 개발)

  • Jang, Sang-Bok;Lee, Ho-Hyun;Lee, Dae-Jong;Kweon, Jin-Hee;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.2
    • /
    • pp.119-125
    • /
    • 2015
  • A concentration meter is widely used at purification plants, sewage treatment plants and waste water treatment plants to sort and transfer high concentration sludge and to control the amount of chemical dosage. When the strange substance is contained in the sludge, however, the attenuation of ultrasonic wave could be increased or not be transmitted to the receiver. At that case, the value of concentration meter is higher than the actual density value or vibrated up and down. It has also been difficult to automate the residuals treatment process according to the problems as sludge attachment or damage of a sensor. Multi-beam ultrasonic concentration meter has been developed to solve these problems, but the failure of the ultrasonic beam of a specific concentration measurement value degrade the performance of the entire system. This paper proposes the method to improve the accuracy of sludge concentration rate by choosing reliable sensor values and learning them by proposed algorithm. The prediction algorithm is chosen as neuro-fuzzy model, which is tested by the various experiments.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

Analysis on Pool Temperature Variation along Pool Water Management System Operation in Research Reactor (연구용원자로에서 수조수관리계통 운전에 따른 수조수 온도 해석)

  • Choi, Jungwoon;Lee, Sunil;Park, Ki-Jung;Seo, KyoungWoo
    • Transactions of the KSME C: Technology and Education
    • /
    • v.5 no.2
    • /
    • pp.135-143
    • /
    • 2017
  • The domestic unique research reactor, HANARO (Hi-flux Advanced Neutron Application ReactOr), has been constructed with the open-pool, the core is submerged in, for the multi-purpose neutron application. The reactor has a primary cooling system to remove the fission heat from the core and its connected fluidic systems. Since the works are required at the reactor pool top as a characteristic of the research reactor, the radiation shall be minimized with the operation of the hot water layer system to avoid unnecessary radiation exposure on the workers during work at the pool top. Moreover, the pool water management system is connected to the reactor pool to maintain the pool temperature below $50^{\circ}C$ to minimize the uprising radioactive gas or impurity from the colder pool bottom. For the efficient flow rate of the PWMS, the thermal capacity of heat exchanger is selected with 260 kW in the normal operation condition. In this paper, the modeling is formulated to figure out whether or not each pool temperature maintains below the temperature limit and the calculation results show that the designed PWMS heat exchanger has enough capacity with the design margin regardless of the reactor operation mode.

Thermal Insulation Effect of Inflatable Life Vest on the Drowned Individual estimated by Numerical Analysis (익수자 체온 저하에 미치는 팽창식 구명동의의 단열효과 수치 분석)

  • Kim, Sung Chan;Lee, Kyung Hoon;Hwang, Se Yun;Lee, Jin Sung;Lee, Jang Hyun
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.285-291
    • /
    • 2015
  • Exposure to cold sea water can be life-threatening to the drowned individual. Although appropriate life jacket can be usually be provided for the buoyance at the drowning accident, heat loss can make the drowned individual experience the hypothermia. Inflatable life jackets filled with inflatable air pocket can increase the thermal protection as well as the buoyancy force. Because it is important to know how the human body behaves unde the different life jacket, present study compares the thermal insulation capacity of solid type life jacket with that of inflatable life jacket. In order to represent the insulation capacity of life jacket, thermal resistance is estimated based on the assumption of steady-state. Also, a transient three-dimensional thermal distribution of the thigh is analyzed by using finite element method implementing the Pennes bioheat equation. The finite element model is a segmental, multi-layered representation of the body section which considers the heat conduction within tissue, bone, fat and local blood flow rate.

REAL-TIME MEASUREMENT OF DENTINAL TUBULAR FLUID FLOW DURING AND AFTER AMALGAM AND COMPOSITE RESTORATIONS (아말감과 복합레진의 수복 과정과 수복 후 발생하는 상아세관액 흐름의 실시간 측정)

  • Kim, Sun-Young;Cho, Byeong-Hoon;Baek, Seung-Ho;Lim, Bum-Sun;Lee, In-Bog
    • Restorative Dentistry and Endodontics
    • /
    • v.34 no.6
    • /
    • pp.467-476
    • /
    • 2009
  • The aim of this study was to measure the dentinal tubular fluid flow (DFF) during and after amalgam and composite restorations. A newly designed fluid flow measurement instrument was made. A third molar cut at 3 mm apical from the CEJ was connected to the flow measuring device under a hydrostatic pressure of 15 $cmH_2O$. Class I cavity was prepared and restored with either amalgam (Copalite varnish and Bestaloy) or composite (Z-250 with ScotchBond MultiPurpose: MP, Single Bond 2: SB, Clearfil SE Bond: CE and Easy Bond: EB as bonding systems). The DFF was measured from the intact tooth state through restoration procedures to 30 minutes after restoration, and re-measured at 3 and 7days after restoration. Inward fluid flow (IF) during cavity preparation was followed by outward flow (OF) after preparation, In amalgam restoration, the OF changed to IF during amalgam filling and slight OF followed after finishing. In composite restoration, application CE and EB showed a continuous OF and air-dry increased rapidly the OF until light-curing, whereas in MP and SB, rinse and dry caused IF and OF, respectively. Application of hydrophobic bonding resin in MP and CE caused a decrease in flow rate or even slight IF. Light-curing of adhesive and composite showed an abrupt IF. There was no statistically significant difference in the reduction of DFF among the materials at 30 min. 3 and 7 days after restoration (p > 0.05).

An Efficient Coding Technique of Holographic Video Signal using 3D Segment Scanning (분할영역의 3차원 스캐닝을 이용한 홀로그래픽 비디오 신호의 효율적인 부호화 기술)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.132-140
    • /
    • 2007
  • In this paper, we proposed a new technique to encode and decode the digital hologram. Since the digital hologram (or fringe pattern) is generated by interference of light, it has much different property from natural 2D (2 dimensional) images. First, we acquisite optical-sensed or computer-generated hologram by digital type, and then extract a chrominance component. The extracted digital hologram for coding is separated into segments to use multi-view properties. The segmented hologram shows the similar characteristics with picturing an object with 2D cameras in various point of view. Since fringe pattern is visually observed like as noise, we expect that the fringe pattern has poor coding efficiency. To obtain high efficiency, the segment is transformed with DCT (Discrete Cosine Transform) which resembles hologram generation process with high performance. Each transformed segment passes the 3D scanning process according to time and spatial correlation, and is organized into a video stream. Since the segment which correspond to frame of a video stream consists of the transformed coefficients with wide range of value, it is classified and re-normalized. Finally it is compressed with coding tools. The proposed algorithm illustrated that it has better properties for reconstruction of 16 times higher compression rate than the previous researches.

QoS Routing Protocol using multi path in Unidirectional Mobile Ad Hoc Networks (단방향 이동 Ad Hoc 망에서의 다중경로를 이용한 QoS 라우팅 프로토콜)

  • Kang, Kyeong-In;Park, Kyong-Bae;Yoo, Choong-Yul;Jung, Chan-Hyeok;Lee, Kwang-Bae;Kim, Hyun-Ug
    • The KIPS Transactions:PartC
    • /
    • v.9C no.6
    • /
    • pp.935-944
    • /
    • 2002
  • It is the Mobile Ad Hoc Networks that constituted with serveral mobile node that can communicate with other mobile nodes. Until now, there were no routing protocols considering such as Multimediadata, VOD (Video On Demand), which is required of lots of bandwidth in Mobile Ad Hoc Network, io we are in the need of QoS (Quality of Service)routing protocol to transmit the data packets faster and more accurate. Also, there are an unidirectional links due to asymmetric property of mobile terminals or current wireless environments on practical mobile ad hoc networks. However, at present, the existing mobile ad hoc routing protocols are implemented to support only bidirectional links. In this paper, we propose the Advanced Routing routing protocol in order to implement a new routing protocol, which is fit to mobile ad hoc networks containing unidirectional links and to support QoS service. For the performance evaluation, we use NS-2 simulator of U.C. Berkeley. We could get not only increased received data rate and decreased average route discovery time, but also network load decreases with compared Best effort service.

Precise Orbit Determination of LEO Satellite Using Dual-Frequency GPS Data (이중 주파수 GPS 데이터를 이용한 저궤도 위성의 정밀궤도결정)

  • Hwang, Yoo-La;Lee, Byoung-Sun;Kim, Jae-Hoon;Yoon, Jae-Cheol
    • Journal of Astronomy and Space Sciences
    • /
    • v.26 no.2
    • /
    • pp.229-236
    • /
    • 2009
  • KOorea Multi-purpose SATellite(KOMPSAT)-5 will be launched at 550km altitude in 2010. Accurate satellite position(20 cm) and velocity(0.03 cm/s) are required to treat highly precise Synthetic Aperture Radar(SAR) image processing. Ionosphere delay was eliminated using dual frequency GPS data and double differenced GPS measurement removed common clock errors of both GPS satellites and receiver. SAC-C carrier phase data with 0.1 Hz sampling rate was used to achieve precise orbit determination(POD) with ETRI GNSS Precise Orbit Determination(EGPOD) software, which was developed by ETRI. Dynamic model approach was used and satellite's position, velocity, and the coefficients of solar radiation pressure and drag were adjusted once per arc using Batch Least Square Estimator(BLSE) filter. Empirical accelerations for sinusoidal radial, along-track, and cross track terms were also estimated once per revolution for unmodeled dynamics. Additionally piece-wise constant acceleration for cross-track direction was estimated once per arc. The performance of POD was validated by comparing with JPL's Precise Orbit Ephemeris(POE).

Offline Friend Recommendation using Mobile Context and Online Friend Network Information based on Tensor Factorization (모바일 상황정보와 온라인 친구네트워크정보 기반 텐서 분해를 통한 오프라인 친구 추천 기법)

  • Kim, Kyungmin;Kim, Taehun;Hyun, Soon. J
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.8
    • /
    • pp.375-380
    • /
    • 2016
  • The proliferation of online social networking services (OSNSs) and smartphones has enabled people to easily make friends with a large number of users in the online communities, and interact with each other. This leads to an increase in the usage rate of OSNSs. However, individuals who have immersed into their digital lives, prioritizing the virtual world against the real one, become more and more isolated in the physical world. Thus, their socialization processes that are undertaken only through lots of face-to-face interactions and trial-and-errors are apt to be neglected via 'Add Friend' kind of functions in OSNSs. In this paper, we present a friend recommendation system based on the on/off-line contextual information for the OSNS users to have more serendipitous offline interactions. In order to accomplish this, we modeled both offline information (i.e., place visit history) collected from a user's smartphone on a 3D tensor, and online social data (i.e., friend relationships) from Facebook on a matrix. We then recommended like-minded people and encouraged their offline interactions. We evaluated the users' satisfaction based on a real-world dataset collected from 43 users (12 on-campus users and 31 users randomly selected from Facebook friends of on-campus users).

A Robust Hand Recognition Method to Variations in Lighting (조명 변화에 안정적인 손 형태 인지 기술)

  • Choi, Yoo-Joo;Lee, Je-Sung;You, Hyo-Sun;Lee, Jung-Won;Cho, We-Duke
    • The KIPS Transactions:PartB
    • /
    • v.15B no.1
    • /
    • pp.25-36
    • /
    • 2008
  • In this paper, we present a robust hand recognition approach to sudden illumination changes. The proposed approach constructs a background model with respect to hue and hue gradient in HSI color space and extracts a foreground hand region from an input image using the background subtraction method. Eighteen features are defined for a hand pose and multi-class SVM(Support Vector Machine) approach is applied to learn and classify hand poses based on eighteen features. The proposed approach robustly extracts the contour of a hand with variations in illumination by applying the hue gradient into the background subtraction. A hand pose is defined by two Eigen values which are normalized by the size of OBB(Object-Oriented Bounding Box), and sixteen feature values which represent the number of hand contour points included in each subrange of OBB. We compared the RGB-based background subtraction, hue-based background subtraction and the proposed approach with sudden illumination changes and proved the robustness of the proposed approach. In the experiment, we built a hand pose training model from 2,700 sample hand images of six subjects which represent nine numerical numbers from one to nine. Our implementation result shows 92.6% of successful recognition rate for 1,620 hand images with various lighting condition using the training model.