• Title/Summary/Keyword: Vehicle Network

Search Result 1,538, Processing Time 0.027 seconds

A New Route Guidance Method Considering Pedestrian Level of Service using Multi-Criteria Decision Making Technique

  • Joo, Yong-Jin;Kim, Soo-Ho
    • Spatial Information Research
    • /
    • v.19 no.1
    • /
    • pp.83-91
    • /
    • 2011
  • The route finding analysis is an essential geo-related decision support tool in a LBS(Location based Services) and previous researches related to route guidance have been mainly focused on route guidances for vehicles. However, due to the recent spread of personal computing devices such as PDA, PMP and smart phone, route guidance for pedestrians have been increasingly in demand. The pedestrian route guidance is different from vehicle route guidance because pedestrians are affected more surrounding environment than vehicles. Therefore, pedestrian path finding needs considerations of factors affecting walking. This paper aimed to extract factors affecting walking and charting the factors for application factors affecting walking to pedestrian path finding. In this paper, we found various factors about environment of road for pedestrian and extract the factors affecting walking. Factors affecting walking consist of 4 categories traffic, sidewalk, network, safety facility. We calculated weights about each factor using analytic hierarchy process (AHP). Based on weights we calculated scores about each factor's attribute. The weight is maximum score of factor. These scores of factor are used to optimal pedestrian path finding as path finding cost with distance, accessibility.

Functional Characteristics of C-terminal Lysine to Cysteine Mutant Form of CTLA-4Ig

  • Kim, Bongi;Shin, Jun-Seop;Park, Chung-Gyu
    • IMMUNE NETWORK
    • /
    • v.13 no.1
    • /
    • pp.16-24
    • /
    • 2013
  • CTLA-4Ig is regarded as an inhibitory agent of the T cell proliferation via blocking the costimulatory signal which is essential for full T cell activation. To improve applicability, we developed the CTLA-4Ig-CTKC in which the c-terminal lysine had been replaced by cysteine through single amino acid change. The single amino acid mutation of c-terminus of CTLA-4Ig was performed by PCR and was checked by in vitro transcription and translation. DNA construct of mutant form was transfected to Chinese hamster ovary (CHO) cells by electroporation. The purified proteins were confirmed by Western blot and B7-1 binding assay for their binding ability. The suppressive capacity of CTLA-4Ig-CTKC was evaluated by the mixed lymphocyte reaction (MLR) and in the allogeneic pancreatic islet transplantation model. CTLA-4Ig-CTKC maintained binding ability to B7-1 molecule and effectively inhibits T cell proliferation in MLR. In the murine allogeneic pancreatic islet transplantation, short-term treatment of CTLA-4Ig-CTKC prolonged the graft survival over 100 days. CTLA-4Ig-CTKC effectively inhibits immune response both in MLR and in allogeneic islet transplantation model, indicating that single amino acid mutation does not affect the inhibitory function of CTLA-4Ig. CTLA-4Ig-CTKC can be used in vehicle-mediated drug delivery system such as liposome conjugation.

Implementation of Expert System Simulation based on 2th Security of Network (네트워크 2중 보안을 위한 전문가시스템 시뮬레이션의 구현)

  • Lee Chang-Jo
    • Management & Information Systems Review
    • /
    • v.4
    • /
    • pp.309-325
    • /
    • 2000
  • Organizations rely on Secure ID resources today to handle vast amounts of information. Because the data can vary widely in type and in degree of sensitivity, employees need to be able to exercise flexibility in handling and protecting it. It would not be practical or cost-effective to require that all data be handled in the same manner or be subject to the same protection requirements. Without some degree of standardization, however inconsistencies can develop at introduce risks. Policy formulation is an important step toward standardization of security activities for ID resources. ID security policy is generally formulated from the input of many members of an organization, including security officials, line managers, and ID resource specialists. However, policy is ultimately approved and issued by the organization's senior management. In environments where employees feel inundated with policies, directives, guidelines and procedures, an ID security policy should be introduced in a manner that ensures that management's unqualified support is clear. The organization's policy is management's vehicle for emphasizing the commitment to ID security and making clear the expectations for employee involvement and accountability. This paper will discuss ID security Policy in terms of the different types (program-level and issue-specific), components, and Implementation of Expert System Simulation based on 4GL, PowerBuilder.

  • PDF

Antitumor Activity of the Novel Human Cytokine AIMP1 in an in vivo Tumor Model

  • Lee, Yeon-Sook;Han, Jung Min;Kang, Taehee;Park, Young In;Kim, Hwan Mook;Kim, Sunghoon
    • Molecules and Cells
    • /
    • v.21 no.2
    • /
    • pp.213-217
    • /
    • 2006
  • Although AIMP1 (previously known as p43) is one of three auxiliary proteins bound to a macromolecular aminoacyl tRNA complex, it is also secreted as a cytokine controlling both angiogenesis and immune responses. Here we show that systemically administered purified recombinant human AIMP1 had anti-tumor activity in mouse xenograft models. In Meth A-bearing Balb/c mice, tumor volume increased about 28 fold in the vehicle treatment group, while an increase of about 16.7 fold was observed in the AIMP1-treated group. We also evaluated the anti-tumor activity of AIMP1 in combination with a sub-clinical dose of the cytotoxic anti-tumor drug, paclitaxel. The growth of NUGC-3 human stomach cancer cells was suppressed by 84% and 94% by the combinations of 5 mg/kg paclitaxel + 25 mg/kg AIMP1 (p = 0.03), and 5 mg/kg paclitaxel + 50 mg/kg AIMP1 (p = 0.02), respectively, while 5 mg/kg paclitaxel alone suppressed growth by only 54% (p = 0.02). A similar cooperative effect of AIMP1 and paclitaxel was observed in a lung cancer xenograft model. These results suggest that AIMP1 may be useful as a novel anti-tumor agent.

Performance Evaluation of Regenerative Braking System Based on a HESS in Extended Range BEV

  • Kiddee, Kunagone;Khan-Ngern, Werachet
    • Journal of Electrical Engineering and Technology
    • /
    • v.13 no.5
    • /
    • pp.1965-1977
    • /
    • 2018
  • This paper proposed a regenerative braking system (RBS) strategy for battery electric vehicles (BEVs) with a hybrid energy storage system (HESS) driven by a brushless DC (BLDC) motor. In the regenerative braking mode of BEV, the BLDC motor works as a generator. Consequently, the DC-link voltage is boosted and regenerative braking energy is transferred to a battery and/or ultracapacitor (UC) using a suitable switching pattern of the three-phase inverter. The energy stored in the HESS through reverse current flow can be exploited to improve acceleration and maintain the batteries from frequent deep discharging during high power mode. In addition, the artificial neural network (ANN)-based RBS control mechanism was utilized to optimize the switching scheme of the vehicular breaking force distribution. Furthermore, constant torque braking can be regulated using a PI controller. Different simulation and experiments were implemented and carried out to verify the performance of the proposed RBS strategy. The UC/battery RBS also contributed to improved vehicle acceleration and extended range BEVs.

GPS Jamming Resilient Location-based Routing for Unmanned Ground Vehicle Networks (무인 지상 차량 네트워크에서 GPS 재밍에 강인한 위치기반 라우팅)

  • Lee, Jinwoo;Jung, Woo-Sung;Kim, Yong-joo;Ko, Young-Bae;Ham, Jae-Hyun;Choi, Jeung-Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.432-440
    • /
    • 2015
  • UGVs(Unmanned Ground Vehicles) are robots that can substitute humans in reconnaissance operations of potentially dangerous and contaminated sites. Currently, there have been active research on utilizing UGVs in military environments. Much resrach has been focused on exploiting the weakness of topology-based routing and instead utilize location-based routing for the networking of UGVs. It is generally assumed that location-based routing methods can fully utilize the location information gained from GPS. However, this may not be possible in tactical environments due to enemy GPS jamming and LOS(Line of Sight) limitations. To solve this problem, we propose a location-based routing scheme utilizing low control message that can calibrate the location information using GPS information as well as location of neighboring UGV, movement direct and speed information. Also utilizing topology-based routing scheme to solve incorrect location information in GPS jamming region.

Neural Net Application Test for the Damage Detection of a Scaled-down Steel Truss Bridge (축소모형 강트러스 교량의 손상검출을 위한 신경회로망의 적용성 검토)

  • Kim, Chi-Yeop;Kwon, Il-Bum;Choi, Man-Yong
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.2 no.4
    • /
    • pp.137-147
    • /
    • 1998
  • The neural net application was tried to develop the technique for monitoring the health status of a steel truss bridge which was scaled down to 1/15 of the real bridge for the laboratory experiments. The damage scenarios were chosen as 7 cases. The dynamic behavior, which was changed due to the breakage of the members, of the bridge was investigated by finite element analysis. The bridge consists of single spam, and eight (8) main structural subsystems. The loading vehicle, which weighs as 100 kgf, was operated by the servo-motor controller. The accelerometers were bonded on the surface of 7 cross-beams to measure the dynamic behavior induced by the abnormal structural condition. Artificial neural network technique was used to determine the severity of the damage. At first, the neural net was learnt by the results of finite element analysis, and also, the maximum detection error was 3.65 percents. Another neural net was also learnt, and verified by the experimental results, and in this case, the maximum detection error was 1.05 percents. In future study, neural net is necessary to be learnt and verified by various data from the real bridge.

  • PDF

A Method of System Effectiveness Analysis for Remote-Operated Unmanned Ground Vehicles Using OneSAF (OneSAF를 이용한 원격조종 지상무인차량 체계효과분석 방법)

  • Han, Sang Woo;Pyun, Jai Jeong;Cho, Hyunsik
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.40 no.4
    • /
    • pp.388-395
    • /
    • 2014
  • Nowadays unmanned ground systems are used in supporting of surveillance and explosive ordnance disposal. Also, we expect that will be used to remarkably enhance combat capability through network-based cooperative operations with other combat systems. In order to effectively develop those unmanned systems, we needs a systematic method to analyze combat effectiveness and validate required operation capabilities. In this paper, we propose a practical approach to simulate remote-operated unmanned ground systems by using OneSAF, an US-Army simulation framework. First of all, we design a simulation model of unmanned system by integrating with core components for wireless communications and remote control of mobility and fire. Next, we extend OneSAF functionality to create communication links that connects a remote controller with an unmanned vehicle and define a simulated behavior to operate unmanned vehicles via the communication links. Finally, we demonstrate the feasibility of the proposed model within OneSAF and summarize system effectiveness analysis results.

A Study on the Trend of an Avionics System Architecture Development for UAV (무인기 항공전자 체계의 아키텍처 개발 동향연구)

  • Kim, Sung Woo;Sim, Jae Ick;Lee, Wang Gug;Lee, Woo Jin;Won, Dae Yeon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.4
    • /
    • pp.436-447
    • /
    • 2014
  • The major elements of avionics system architecture are requirements, Real Time Operating System, message communication, memory, and data format etc. Herein describes a state-of-the-art development trend for the avionics system architecture, system requirements and data bus among the major elements of avionics system. While, domestic technology has been tried to Integrated Modular Avionics(IMA) system based on the Avionics Full Duplex Switched Ethernet(AFDX) technology during Light Attack Helicopter(LAH) project in Korea, but not yet proved as the product case in Full Scale Development Phase. The avionics system architecture considering the domestic inexperience of the IMA system architecture are suggested for the Next-generation Corps Unmanned Aircraft System.

A Dispatching and Routing Algorithm for Personal Rapid Transit by Considering Congestion (정체를 고려한 Personal Rapid Transit 배차 및 경로 계획 알고리즘)

  • Han, Chung-Kyun;Kim, Baek-Hyun;Jeong, Rag-Gyo;Ha, Byung-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.11
    • /
    • pp.1578-1586
    • /
    • 2015
  • Personal rapid transit (PRT) is getting attention as a new form of transportation. It is energy efficient and provides the high level of passenger service. In this study, the dynamic PRT dispatching and routing problem is dealt with. Passengers request transportation service on a complex network, and an operating system monitors passenger arrivals and coordinates vehicles in real time. A new online dispatching and routing algorithm is proposed, which minimizes the total travel distance of vehicles and the waiting time of passengers. The algorithm dispatches vehicles by considering multiple vehicles' state and multiple passengers at the same time. In particular, finding the shortest-time path is attempted by taking into account the future congestion on lanes. Discrete-event simulation is employed to validate the performance of the proposed algorithm. The results show the algorithm in this study outperforms others.