• Title/Summary/Keyword: automatic identification

Search Result 649, Processing Time 0.028 seconds

Calculation of Travel Time Using Automatic Vehicle Identification Systems (주행차량 자동인식시스뎀을 이용한 구간 통행시간 산출)

  • Moon Hak-Yong;Ryu Seung-ki;Kim Sung Hyun;Park Hyun Suk
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.2 no.2 s.3
    • /
    • pp.23-29
    • /
    • 2003
  • This study is the empirical research about application and evaluation of AVI that is an essential technology for calculating and providing the travel time. Travel time calculation and provision is one of the technique for information collecting and providing in the ITS. Through the field test on a national highway, we proposed the travel time calculation technique from the data by non-contact vehicle detecting method and validated field application performance with field data. We proposed the technique of evaluating field application performance, then using this, analyzed recognition rate, detection rate and travel time with field data.

  • PDF

A Study on the Building of Open Operational System for the Integration Management System of the Maritime Traffic Facilities (해양교통시설 통합관리시스템을 위한 개방형 운영시스템 구축 방안에 관한 연구)

  • Jeon, Joong-Sung;Lee, Seo-Jeong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.34 no.8
    • /
    • pp.1135-1144
    • /
    • 2010
  • The high tech marine transportation infrastructure is an innovative transportation infrastructure that may be able to secure a safe transportation environment as well as efficient operation by connecting up-to-date skills including a broad range of wire and wireless communication-based information, control and electronics technologies. When integrated into the marine transportation infrastructure by the standard requirements, these standard technologies help monitoring and managing navigational aids. This paper defined a concept of middleware in the marine traffic management systems which gives characteristics of system independency, scalability, extensibility, and researches a functionality of the middleware and a software block of the middleware.

A Study on the Automatic Fuel-Filling-Recognition system for a city bus (자동인식 주유량 처리 시스템에 관한 연구)

  • 김현수;안병원;박중순;박영산;배철오;김철홍
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.414-417
    • /
    • 2001
  • In this paper the fuel filling system for a city bus was investigated in order to improve the system. The suggested fuel filling system was designed to have functions of identifying a bus arrival tine, and measuring volume of fuel filled. The system consisted of four parts of bus identification, IBM PC, interface card, fuel filling control system and program for integrating all parts. It is believed that the information obtained by this system can be used for analysing driver's driving habits and performance of engine of a bus, and accordingly the prime cost can be reduced.

  • PDF

Design on Flight-Critical Function of Mission Computer for KUH (한국형기동헬기 임무컴퓨터 비행필수기능 설계)

  • Yu, Yeon-Woon;Kim, Tae-Yeol;Jang, Won-Hong;Kim, Sung-Woo;Lim, Jong-Bong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.2
    • /
    • pp.213-221
    • /
    • 2011
  • Avionics system tends to be designed to have the integrated architecture, and it is getting difficult and complex to verify the flight-critical function because of sophisticated structure. In Korean Utility Helicopter, mission computer acts as the MUX Bus Controller to handle the data from both communication, identification, mission/display and survivability equipment inside Mission Equipment Package and aircraft subsystems such as fuel system and electrical system while it is interfacing with Automatic Flight Control System and Full-Authority Digital Engine Control via ARINC-429 bus. The Flight Displays which is classified as flight-critical function in aircraft is implemented on Primary Flight Display after mission computer processes data from AFCS in order to generate graphics. This paper defines the flight-critical function implemented in mission computer for KUH, and presents the static and dynamic test procedures which is performed on System Integration Laboratory along with Playback Recorder prior to flight test.

A Study on Deployment of Data Network in Marine VHF Bandwidth (VHF대역에서 디지틀 해상통신망 구축에 관한 연구)

  • Jang, Dong-Won;Lee, Young-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.159-162
    • /
    • 2007
  • 최근 통신 기술의 발달로 육상이동통신 기술을 해상 및 항공에 확대하려는 시도가 꾸준히 진행되고 있다. 해상 및 항공 통신은 인명 안전을 위한 통신으로 국제 기구에 의해서 최우선적인 보호를 받아 왔다. 그러나 통신 기술의 급속한 발전으로 해상 및 항공 통신망은 기존 음성 위주의 통신망에서 멀티미디어를 처리할 수 있는 디지틀망으로의 전환이 시급히 필요하게 되었다. 해상통신의 경우에는 디지틀 통신 방식을 이용하는 DSC(Digital Selective Calling), AIS(Automatic Identification System) 등을 이미 도입해서 운용 중에 있으며 다른 시스템으로의 확대가 진행 중에 있다. SOLAS 선박뿐 만 아니라 비 SOLAS(Safety Of Life At Sea) 선박들도 디지틀 통신을 활용하면 항행 안전에 매우 도움이 될 것이다. 최근에 ITU-R에서는 VHF(Very High Frequency) 대역에서 데이터 및 이메일 등을 송수신하기 위한 데이터 통신시스템 기술에 대한 논의가 진행 중에 있다. 본고에서는 이 VHF대역 데이터시스템에 대한 기술적 특성을 분석하고 향후 해상통신에서의 디지틀 기술이 도입된 후 전개될 해상통신망에 대해서 기술하였다.

  • PDF

A Study on the Efficient MES Using Automation in Automotive Module Assembly Line (자동차 모듈조립공정에서의 효율적 MES 인터페이스 모형)

  • Kong, Myung-Dal
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4618-4625
    • /
    • 2011
  • This paper suggests a specific model that could efficiently improve the interaction and the interface between MES(Manufacturing Execution System) server and POP(Point Of Production) Terminal through RFID(Radio Frequency Identification) system in Automative Module Assembly Line. The proposed model shows that the new method by RFID can more efficiently perform to receive work order informations and transmit work performances, compared with the current approach by proximity sensor. As a result of the certain test among the MES server, RFID system, PLC(Programmable Logic controller) and POP terminal, it is noted in case of the automatic control by RFID that the effects of proposed model are as follows; (a) While the processing time per truck for carrying by the current method was 10 minutes, the processing time by the new method was 1 minutes. (b) While the error rate by the current method was 20 %, the error rate by the new method was 1 %.

Locally-Weighted Polynomial Neural Network for Daily Short-Term Peak Load Forecasting

  • Yu, Jungwon;Kim, Sungshin
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.16 no.3
    • /
    • pp.163-172
    • /
    • 2016
  • Electric load forecasting is essential for effective power system planning and operation. Complex and nonlinear relationships exist between the electric loads and their exogenous factors. In addition, time-series load data has non-stationary characteristics, such as trend, seasonality and anomalous day effects, making it difficult to predict the future loads. This paper proposes a locally-weighted polynomial neural network (LWPNN), which is a combination of a polynomial neural network (PNN) and locally-weighted regression (LWR) for daily shortterm peak load forecasting. Model over-fitting problems can be prevented effectively because PNN has an automatic structure identification mechanism for nonlinear system modeling. LWR applied to optimize the regression coefficients of LWPNN only uses the locally-weighted learning data points located in the neighborhood of the current query point instead of using all data points. LWPNN is very effective and suitable for predicting an electric load series with nonlinear and non-stationary characteristics. To confirm the effectiveness, the proposed LWPNN, standard PNN, support vector regression and artificial neural network are applied to a real world daily peak load dataset in Korea. The proposed LWPNN shows significantly good prediction accuracy compared to the other methods.

Industrial Market Analysis System for Supporting Technology Commercialization of SMEs

  • Kim, Ji Hui;Jung, Ye Lim;Yoo, Hyoung Sun
    • International Journal of Contents
    • /
    • v.16 no.3
    • /
    • pp.33-44
    • /
    • 2020
  • Small and medium enterprises need a wide range of information regarding technologies, industries, market conditions, other companies, and products to facilitate identification of new growth opportunities and to respond quickly to changes in the business environment. Collecting such information, however, requires the input of resources (human resources, cost, and time), and the lack of marketability resulting from the shortage of such resources is often cited as the reason small and medium often fail in their effort to commercialize their technology. The purpose of this study was to analyze the environmental factors such as market concentration and the current level of competition to enable companies to make the necessary decisions when considering market entry following R&D planning and technology commercialization, or after the development of a new product. Also, an expert-based 5FORCE analysis can be performed using the KMAPS, an industry and market intelligence system: this facilitates automatic production of analyses based on the corporate finance and transaction data. The key contribution of the study is that it facilitates conveniently and quickly analyzing the 5 Forces, which had been a difficult task in the environmental analysis, and that the outcomes of this study empower companies in the decision-making process.

Icefex: Protocol Format Extraction from IL-based Concolic Execution

  • Pan, Fan;Wu, Li-Fa;Hong, Zheng;Li, Hua-Bo;Lai, Hai-Guang;Zheng, Chen-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.3
    • /
    • pp.576-599
    • /
    • 2013
  • Protocol reverse engineering is useful for many security applications, including intelligent fuzzing, intrusion detection and fingerprint generation. Since manual reverse engineering is a time-consuming and tedious process, a number of automatic techniques have been proposed. However, the accuracy of these techniques is limited due to the complexity of binary instructions, and the derived formats have missed constraints that are critical for security applications. In this paper, we propose a new approach for protocol format extraction. Our approach reasons about only the evaluation behavior of a program on the input message from concolic execution, and enables field identification and constraint inference with high accuracy. Moreover, it performs binary analysis with low complexity by reducing modern instruction sets to BIL, a small, well-specified and architecture-independent language. We have implemented our approach into a system called Icefex and evaluated it over real-world implementations of DNS, eDonkey, FTP, HTTP and McAfee ePO protocols. Experimental results show that our approach is more accurate and effective at extracting protocol formats than other approaches.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.