• Title/Summary/Keyword: Restrictive

Search Result 530, Processing Time 0.028 seconds

A study of radio communication based train control system (무선을 이용한 지상과 차상간 통신방식에 관한 연구)

  • 조봉관;류상환;백종현;조보형
    • Proceedings of the KSR Conference
    • /
    • 2002.10a
    • /
    • pp.478-483
    • /
    • 2002
  • Presently metro in our county has higher rate of passengers as a public transportation of urban area than other transportations. And road is under very restrictive condition to be expanded in many aspects because the streets are completely choked. Therefore increase of capacity in metro and reduction of headway has been seriously required and utmost efforts has been taken by related fields to meet the requirements. The concept of CBTC system came out from this background. CBTC system can be implemented to detect the train location without using the track circuits. It has many advantages in aspects of signalling equipments build-up and maintenance. This study investigated examples of radio communication system and applicable standard norms in other countries. And it also reviewed the suggestion for the establishment of radio frequency and radio network to be considered for application train control system by radio under Korean metro environment.

  • PDF

A development of remote experiment on web (웹을 이용한 원격제어 시스템 개발)

  • Jo, Su-Ho;Hwang, Hui-Dong;Sim, Jae-Hak;Ko, Kwang-Cheol;Kang, Hyung-Bu
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2696-2698
    • /
    • 2001
  • The appearance and popularization of Internet changes the existing restrictive management system into the new management system on Web. In this paper, We developed real-time management System controlling all sorts of informations from remote experiment system. Informations from Web client is stored for DB and Wherever User can use Internet, User can get this informations. We also developed Editor modifying Client Display.

  • PDF

A Study on Behavioral Model and Spatial Configuration Analysis model in the Architectural Space (건축공간의 행동모델과 공간구조 분석모델에 관한 연구)

  • Lee, Jong-Ruyl
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.12 no.2
    • /
    • pp.61-66
    • /
    • 2012
  • In space syntax, the mathmatical process to get a integration could be restrictive in understanding spatial configuration since it is based on only one behavior model. In this study, As another approach to spatial configuration analysis based on behavioral model, there is the simulation tracking analysis model that simulates the movements of human in the space and analyze them. In this study, the relationship between integration and behavioral model will be defined and the similarities and the differences between space syntax and the simulation tracking analysis model will be demonstrated. Furthermore, these two analysis models will be understood as a variety of tools that can analyze an object in multiple viewpoints.

Face Detection Algorithm for Automatic Teller Machine(ATM) (현금 인출기 적용을 위한 얼굴인식 알고리즘)

  • 이혁범;유지상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6B
    • /
    • pp.1041-1049
    • /
    • 2000
  • A face recognition algorithm for the user identification procedure of automatic teller machine(ATM), as an application of the still image processing techniques is proposed in this paper. In the proposed algorithm, face recognition techniques, especially, face region detection, eye and mouth detection schemes, which can distinguish abnormal faces from normal faces, are proposed. We define normal face, which is acceptable, as a face without sunglasses or a mask, and abnormal face, which is non-acceptable, as that wearing both, or either one of them. The proposed face recognition algorithm is composed of three stages: the face region detection stage, the preprocessing stage for facial feature detection and the eye and mouth detection stage. Experimental results show that the proposed algorithm can distinguish abnormal faces from normal faces accurately from restrictive sample images.

  • PDF

Efficient monitoring method using FFT-IFFT Signal reconstruction (FFT-IFFT 신호 복원을 이용한 효율적인 모니터링 기법)

  • Lee, Sang-Hyeok;Kang, Feel-Soon
    • Proceedings of the KIPE Conference
    • /
    • 2007.07a
    • /
    • pp.476-478
    • /
    • 2007
  • This paper presents an efficient data acquisition scheme to obtain a minimum CPU memory, optimized communication speed, and simplified program source code in a monitoring system. It is different in the number of utilized data from the conventional method which acquires every raw data. The proposed method uses only restrictive data required to reconstruct the original signal. The basic principle is to apply the FFT-IFFT method in data transferring process. To verify the high-performance of the proposed scheme, computer-aided simulation and experiments using a PV power monitoring system are carried out. It also presents the analyzed results the relationship between FFT's order and Gibb's Phenomenon.

  • PDF

The Mechanism of Spatial Data Processing for Restrictive Resource-Adaptive Form in Shared-nothing Spatial Database Cluster (비공유 공간 데이터베이스 클러스터에서 한정된 자원에 적합한 형태로의 공간데이터 처리 기법)

  • 유병섭;장용일;이충호;배해영
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.142-144
    • /
    • 2003
  • 최근 모바일 장치의 발전과 보급으로 차량 네비게이션 시스템(naigation system)과 같이 모바일 장치를 이용한 지도정보 서비스가 발전하였다. 모바일 장치는 자원이 한정되어 있고. 네트워크의 대역폭이 적기 때문에 크기가 크고 복잡한 벡터 데이터를 효율적으로 전송할 수 있는 방법이 매우 중요하다. 본 논문에서는 비공유 데이터베이스 클러스터에서 한정된 자원에 적합한 형태로 공간데이터를 처리하는 기법을 제안한다. 이는 스케일과 사용자의 요청에 따라 보여질 필요가 없는 피쳐들을 제거하고 스케일에 따라 보여지는 형태가 바뀌는 피쳐들에 대해 공간타입을 바꾸는 필터링을 통해 최적화된 지도 정보로 구성한다. 이렇게 구성된 정보는 불필요한 정보가 감소되어 데이터의 크기가 작아지는 장점을 갖는다. 또한 구성된 정보는 주요 부분부터 단계적으로 클라이언트에 보냄으로써 클라이언트에 대한 응답시간이 빠르게 되며, 사용자의 요구에 적합한 형태의 공간 정보를 우선순위가 높은 데이터부터 단계적으로 클라이언트에서 보여짐으로써 사용자에게 필요한 공간정보를 보다 빠르게 얻을 수 있다.

  • PDF

A study on the bridge safety management model using Ubiquitous technology (유비쿼터스 기술을 이용한 교량 안전관리 방안 연구)

  • Jo, Byung-Wan;Kim, Do-Keun;No, Seung-Hyun;Kim, Heoun
    • 한국방재학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.489-492
    • /
    • 2008
  • Nowadays in order to estimate safety diagnosis of bridge, a lot of data like static and dynamic displacement, accelerometer, wind velocity and so on are demanded. When it comes to measure these data, cabled sensor is essential equipment. But cabled sensors have also inefficient factors. From this point of view, considering practical aspects of using these expensive equipments which have been used to examine safety diagnosis, measuring by cabled sensors is restrictive in some respect. Recently to improve theses problems, Wireless sensor system was introduced. But this system can't perform intelligent reaction because database of this system is just based on internet. In this paper, the intelligent bridge safety management model which can be installed easily, measured at all times and dealing intelligently with various situations is developed to improve these problems.

  • PDF

Development of Registration Method of Panel and Mask for FTM Tube (FTM 튜브의 판넬과 마스크의 일치방법 개발)

  • Yun, Jong-Soon;Jung, Jong-Yun
    • IE interfaces
    • /
    • v.11 no.2
    • /
    • pp.107-117
    • /
    • 1998
  • This paper presents a useful method of registration in manufacturing of shadow color mask for cathode ray tubes of the FTM (Flat Tension Mask) type, wherein the shadow mask and front panel are interchangeable when mask-panels are assembled, which is called ICM system. Theoretical analysis and alignment process are presented. The pattern of mask aperture is registered with a screen pattern of corresponding geometry of the panel in flat tension mask tube. Registration accuracy of panel and mask affects the purity of color cathode ray tube concerned with mislanding. It tries to minimize the misregistration caused by variances, which are mechanical error, mask stretching position error, restrictive number of fiducial point, etc.

  • PDF

A Study on Restrictive Authentication of .KR Domain Name Usinsg DNSSEC (DNSSEC을 이용한 .KR 도메인네임의 제한적 인증에 관한 연구)

  • Lim, Joon-Hyung;Jang, Hyun-Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04b
    • /
    • pp.959-962
    • /
    • 2002
  • DNSSEC은 IETF에서 논의중인 DNS 보안 표준으로서, DNS에 있어 가장 큰 잠재적 위협인 '도메인 네임에 대응되는 IP주소의 위변조 위협에 대응하기 위해 논의되고 있는 표준이다. 최근 네트워크 환경에서의 최상의 암호화 기법으로 자리잡은 공개키 암호화 기법을 이용하여, 도메인 Zone에 서명을 하여, 이러한 Zone 메시지를 받아보았을 때, 서명을 검증함으로서, DNS메시지가 중간에 위 변조없이 적정한 소스로부터 왔다는 것을 확인하는 것이다. 본 논문에서는 DNSSEC에서 가능한, 계층적 인증방식을 .KR 하위 도메인네임에서 활용할 수 있는 방안으로서, secure resolver를 이용한 도메인네임의 인증을 제시하였다.

  • PDF

VARIATION OF PARAMETERS METHOD FOR SOLVING SIXTH-ORDER BOUNDARY VALUE PROBLEMS

  • Mohyud-Din, Syed Tauseef;Noor, Muhammad Aslam;Waheed, Asif
    • Communications of the Korean Mathematical Society
    • /
    • v.24 no.4
    • /
    • pp.605-615
    • /
    • 2009
  • In this paper, we develop a reliable algorithm which is called the variation of parameters method for solving sixth-order boundary value problems. The proposed technique is quite efficient and is practically well suited for use in these problems. The suggested iterative scheme finds the solution without any perturbation, discritization, linearization or restrictive assumptions. Moreover, the method is free from the identification of Lagrange multipliers. The fact that the proposed technique solves nonlinear problems without using the Adomian's polynomials can be considered as a clear advantage of this technique over the decomposition method. Several examples are given to verify the reliability and efficiency of the proposed method. Comparisons are made to reconfirm the efficiency and accuracy of the suggested technique.