• Title/Summary/Keyword: Vehicle Communication

Search Result 1,850, Processing Time 0.023 seconds

A Study on Effects of Performance Stage through Direction - With a focus on stage musicals performed in Korea - (연출을 통해 나타나는 공연무대의 효과에 관한 연구 - 국내 공연된 뮤지컬 무대 중심으로 -)

  • Han, A-Rim;Hong, Il-Tae
    • Korean Institute of Interior Design Journal
    • /
    • v.21 no.5
    • /
    • pp.328-335
    • /
    • 2012
  • Due to development of digital technology, a concept of stage design management is being changed. In addition, stage management technique is changing a viewpoint of the audience watching a stage through the convergence of analogue and digital technology. Three-dimensional media such as LED and hologram and works combining with previous stage performances are rising, and the audience's requirements about spectacles on the stage are increasingly higher. Interaction between a stage, audiences and actors is a communication tool by a work story and its direction. In other words, stage design should newly focus on not only concluded work story but also comprehensive delivery of direction and the expression and extreme delivery. Therefore, this study aims to examine how to combine analogue and digital direction elements in the stage design. To this end, this study looks into everything the audience feels through performances and analogue and digital elements directed for performances and then analyzes and arranges them to present a possibility of various types of work performances. Stage structure, set, and lighting that are analogue direction elements are the basis of stage performance. Analogue direction elements mean a media vehicle that can differentiate except for basic direction of each work. This study aims to analyze new performance culture when analog and digital direction elements are combined through stage performance and a possibility of new stage performance. In addition, through this it desired to seek for a development possibility of Korean leisure culture and art culture. As the work cases, this study shows 10 works through actual stage performances held in Korea and introduces elements directed in those works.

  • PDF

A Study on Active Suspension Robust Control with Sensor and Actuator Location (센서위치를 고려한 능동 서스펜션 강인제어에 관한 연구)

  • Park Jung-Hyen;Jang Seung-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.6
    • /
    • pp.1147-1152
    • /
    • 2006
  • This paper proposed modelling and design method in suspension system design to analyze sky hook damper system by adopting active robust control theory. Recent in the field of suspension system design it is general to adopt active control scheme for stiffness and damping, and connection with other vehicle stability control equipment is also intricate, it is required for control system scheme to design more robust, higher response and precision control equipment. It is known that sky hook suspension system is better than passive spring-damper system in designing suspension equipment. We analyze location of sensor and actuator in sky hook system and its motion equation, then design robust control system. Numerical example is shown for validity of robust control system design in active sky hook suspension system.

A Development of 3D Penetration Analysis Program for Survivability Analysis of Combat System : Focused on Tank Model (전투 시스템 생존성 분석을 위한 3차원 관통 해석 프로그램 개발 : 전차 모델을 대상으로)

  • Hwang, Hun-Gyu;Lee, Jae-Woong;Lee, Jang-Se;Park, Jong-Sou
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.244-250
    • /
    • 2015
  • Survivability is avoidance and tolerance ability of combat systems for accomplishing mission in battle field. Therefore, the combat system has to protect or minimize any damage from threats. For this reason, many modeling and simulation based studies which analyze vulnerability of the combat system by threats, are in progress to improve survivability of the combat system. In this paper, we developed a 3D penetration analysis program for survivability analysis of combat system. To do this, we applied the penetration analysis equation to threat and protection performance of tank. Also we implemented simple tank models based on 3D CAD, and tested the developed program using the implemented tank models. As a result, we verified the developed program that is possible to analyze penetration by threat and protection performance of tank and to visualize its result, based on scenarios.

SLAM based on feature map for Autonomous vehicle (자율주행 장치를 위한 특징 맵 기반 SLAM)

  • Kim, Jung-Min;Jung, Sung-Young;Jeon, Tae-Ryong;Kim, Sung-Shin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1437-1443
    • /
    • 2009
  • This paper is presented an simultaneous localization and mapping (SLAM) algorithm using ultrasonic for robot and electric compass, encoder, and gyro. Generally, localization based upon electric compass, encoder, and gyro can be measured just local position in workspace. However, actual robot must need an information of the absolute position in workspace to perform its mission, Absolute position in workspace could be calculated using SLAM algorithm. To implement SLAM in this paper, a map is built using ultrasonic sensor and hierarchical map building method. And then, we the map will be transformed into a feature map. The absolute position could be calculated using the feature map and map mapping method. As a test bed, we designed and construct an autonomous robot and showed the experimental performance of the proposed SLAM algorithm based on feature map. Experimental result, we verified that robot can found all absolute position on experiments using proposed SLAM algorithm.

The Efficient AES-CCM Architecture for a hardware library in the WAVE (WAVE 하드웨어 암호 라이브러리에 적합한 효율적인 AES-CCM 구조 설계)

  • Lee, Yeon-Cheol;Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2899-2905
    • /
    • 2013
  • According to developing wireless communications in vehicle, various security threat in the WAVE(Wireless access in vehicular environments) is increased. To protect this, IEEE 1609.2 specify services as for prevent message from attacks such as spoofing, eavesdropping and replay. It is possible to implement a hardware library for defending these attacks. In this paper, we proposed a efficient AES-CCM architecture for the hardware library in the WAVE. We compare our architecture to the previous one in the same FPGA. And our design uses less slices than 27 % of it and less slices than 45 % of it if we share registers that were used by other modules in the library. We also achieves a throughput of 1355 Gbits/s in xc5vlx110t-2ff1136.

Effects of Testosterone on Adipose Tissue Metabolism (지방조직대사에 대한 testosterone의 영향)

  • Jeong, Sunhyo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2995-3000
    • /
    • 2013
  • We investigated the effects of testosterone on the improvement of white adipose tissue explant and its molecular mechanism in adipose tissue of high fat diet-fed male castrated (CAST) mice. The CAST mice treated with testosterone had lower adipose tissue weights, the average size of adipocytes and mRNA levels of $C/EBP{\alpha}$ as well as adipocyte marker genes than the vehicle-treated CAST mice. These results suggest that testosterone prevent the expression of $C/EBP{\alpha}$ and $C/EBP{\alpha}$-mediated adipocyte marker genes, resulting in decreased adipose tissue mass and adipocyte metabolism in male CAST mice. Moreover, this study give a valuable molecular and biological knowledge on testosterone therapy in obese hypogonadal men.

A Design of ITMS(Intelligent Transport Monitoring System) for Optimization of Freight Transport (화물 수송의 최적화를 위한 ITMS(Intelligent Transport Monitoring System) 설계)

  • Jeong, EunHee;Lee, ByungKwan;Jung, INa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2853-2858
    • /
    • 2013
  • This paper proposes the ITMS(Intelligent Transport Monitoring System) which manages the route and state of freight by using the Meteorological Office, the Transportation Management Center, GPS and Sensors, etc. The ITMS consists of the CIMS(Container Inner Monitoring System) transmitting the inner temperature and humidity of a container, the TMM(Transport Management Module) computing an estimated time of arrival with Freight Vehicle location information and transmits the result to the CIMS, the FMM(Freight Management Module) checking and managing the freight freshness by using the temperature and humidity of the collected containers, and the SMM(Stevedoring Management Module) selecting the container loading and unloading places with the information transmitted from the CIMS, the TMM, and the FMM and attaching the freight formation to containers using an RFID label. The ITMS not only checks the freight condition at intervals but also acquires and manages the freight information with RFID labels rapidly and accurately.

A Study on Median Filter using Directional Mask in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 방향성 마스크를 이용한 메디안 필터에 관한 연구)

  • Hong, Sang-Woo;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.1
    • /
    • pp.230-236
    • /
    • 2015
  • In these digital times, the image signal processing is being used in various areas like vehicle recognition, security, and robotics. Generally, the image deterioration occurs by salt & pepper noise in the procedures of image transmission, storage, and processing. Methods to remove this noise are SMF, CWMF, and SWMF and these methods have few unsatisfactory noise reduction characteristics in salt & pepper noise environment. Therefore, in order to mitigate salt & pepper noise which is added in the image, this study suggested an algorithm which subdivides the masks in the image into four areas and processes using non-noise pixel numbers in each area. Additionally, in order to prove the excellence of the proposed algorithm, relevant performances were compared with existing methods using PSNR.

Development of CAN network intrusion detection algorithm to prevent external hacking (외부 해킹 방지를 위한 CAN 네트워크 침입 검출 알고리즘 개발)

  • Kim, Hyun-Hee;Shin, Eun Hye;Lee, Kyung-Chang;Hwang, Yeong-Yeun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.20 no.2
    • /
    • pp.177-186
    • /
    • 2017
  • With the latest developments in ICT(Information Communication Technology) technology, research on Intelligent Car, Connected Car that support autonomous driving or services is actively underway. It is true that the number of inputs linked to external connections is likely to be exposed to a malicious intrusion. I studied possible security issues that may occur within the Connected Car. A variety of security issues may arise in the use of CAN, the most typical internal network of vehicles. The data can be encrypted by encrypting the entire data within the CAN network system to resolve the security issues, but can be time-consuming and time-consuming, and can cause the authentication process to be carried out in the event of a certification procedure. To resolve this problem, CAN network system can be used to authenticate nodes in the network to perform a unique authentication of nodes using nodes in the network to authenticate nodes in the nodes and By encoding the ID, identifying the identity of the data, changing the identity of the ID and decryption algorithm, and identifying the cipher and certification techniques of the external invader, the encryption and authentication techniques could be detected by detecting and verifying the external intruder. Add a monitoring node to the CAN network to resolve this. Share a unique ID that can be authenticated using the server that performs the initial certification of nodes within the network and encrypt IDs to secure data. By detecting external invaders, designing encryption and authentication techniques was designed to detect external intrusion and certification techniques, enabling them to detect external intrusions.

Design of Dual-Polarized and Multi-Band Multi-Layer Patch Antenna (다층구조의 이중편파 다중대역 패치 안테나 설계)

  • Choi, Jong-Ho;Jeong, Bong-Sik
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.16 no.4
    • /
    • pp.156-161
    • /
    • 2015
  • In this paper, a dual-polarized multi-band multi-layer antenna for a vehicle, which operates in the GPS, bluetooth, and DSRC bands, was implemented. The antenna was designed as a multi-layer structure, and a FR4-epoxy substrate with =4.4 and =1.6mm was used. GPS and DSRC antennas have circular polarized characteristics, and a single probe feeding method was applied. Simulated results by Ansys HFSS v11 was compared with the measured ones. The size of the optimally designed antenna is $67mm{\times}67mm{\times}4.8mm$, -10dB bandwidth of the anatenna was measured to be 820MHz, 127MHz, and 862MHz in each band, and 3dB AR bandwidth of the antenna was simulated to be 19MHz and 110MHz in GPS and DSRC bands. The results confirmed that suggested system satisfies the system requirements.