• Title/Summary/Keyword: driving

Search Result 11,233, Processing Time 0.035 seconds

Implementation of Plastic Bottle Classification System for Recycling (분리수거를 위한 페트병 분리시스템의 구현)

  • Park, Yongha;Park, Jihoon;Chung, Hoyeong;Lee, Joosang;Lee, Jungyeop
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.365-368
    • /
    • 2021
  • In this study, a plastic bottle recycling bin system that utilizes an infrared sensor was implemented. The proposed system consists of a recognition unit, a control unit, an alarm unit, and a driving unit. The recognition unit detects the plastic bottle, measures the distance between the plastic bottle and the infrared sensor, extracts the value of the bottle, compares the extracted value with a standard range, and then transmits the control value to the control unit if the extracted value of the bottle is outside the standard range. In this case, the result of the presence or absence of a brand label or bottle cap is transmitted to the controller. The control unit opens the entrance of the recycling bin or alerts the alarm unit according to the result value transmitted from the sensor unit. In order to implement the proposed system, the recognition unit was implemented with an infrared sensor, and the control unit was made with an Arduino IDE controller, based on the C programming language. Additionally, the recognition unit and the control unit are able to communicate using analog signals. The proposed system accurately judges the presence or absence of a brand label and bottle cap of plastic bottles according to a predetermined algorithm. It then blocks the entrance of the recycling bin when a brand label or bottle cap is still attached. As the amount of waste discharged per person is relatively high and the majority of such waste is incinerated rather than recycled, the system proposed in this study is expected to increase the recycling rate of plastic bottles.

  • PDF

The Effect of Franchise Entrepreneurial Passion on Corporate Trust, Identification, and Loyalty (프랜차이즈 기업가 열정이 기업신뢰, 일체감, 그리고 충성도에 미치는 영향)

  • Park, Heung-Jin;Han, Sang-Ho;Kim, Eun-Jung
    • The Korean Journal of Franchise Management
    • /
    • v.8 no.3
    • /
    • pp.17-27
    • /
    • 2017
  • Purpose - In align with the increasing competition in both online and offline franchise markets caused by the increasing impact of social networking service, entrepreneurial passion(EP) of the franchise owners has crucial impact on the stakeholders. This study proposed the customer among stakeholders has the critical influence firm's success and examined the structural relationship between entrepreneurial passion(EP) and trust, identification, and loyalty from the customer's perspective. Research design, data, and methodology - This study examines the structural relationship between entrepreneurial passion(EP), trust, identification, and loyalty from the customer's perspective. More specifically, the EP were measured using three sub-dimensions such as EP-inventing(Perceived passion for inventing), EP-founding(Perceived passion for foundting), and EP-developing(Perceived passion for developing). In order to verify the research purposes, research model and hypotheses were developed. All constructs were measured with multiple items developed and tested in the previous studies. Each item was measured on a 7 point Likert-scale anchored by '1 = strongly disagree, 7 = strongly agree'. The data were collected from 449 franchise consumers through online survey and were analyzed using SPSS 21.0 and Smart PLS 3.0. statistical program. Result - The results of this study are as follows. First, EP-inventing and EP-developing have significant impacts on corporate trust. Second, EP-founding does not have significant impact on corporate trust. Third, EP-inventing and EP-founding have significant impacts on consumer identification. Fourth, EP-developing does not have impact on identification directly, but does indirectly through corporate trust as a mediator. Fifth, corporate trust and identification have significant impacts on loyalty. Conclusions - This indicates that the foodservice franchise CEOs should continuously develop new menus and service to fulfill customer needs. EP-inventing of the food franchise CEOs may enhance customer trust for higher quality of product or service, and EP-developing can also be a driving force for customer trust as it embeds belief in customers that the franchise is sustainably developing. Also, food franchise CEOs should first clarify the support process for the existing brands before developing new ones. Customers tend to lead the trend by using brands that satisfy new trends in the foodservice franchise market, and it could have identification with the trend-setting franchise. Customers do not accept if a company is different from their personal image or norms. So the franchise CEOs must create identification with customers by building corporate trust. Corporate trust influences consumer behavior and emotion, thus the franchises need to secure trust by improving product or service continuously.

Deep Neural Network Analysis System by Visualizing Accumulated Weight Changes (누적 가중치 변화의 시각화를 통한 심층 신경망 분석시스템)

  • Taelin Yang;Jinho Park
    • Journal of the Korea Computer Graphics Society
    • /
    • v.29 no.3
    • /
    • pp.85-92
    • /
    • 2023
  • Recently, interest in artificial intelligence has increased due to the development of artificial intelligence fields such as ChatGPT and self-driving cars. However, there are still many unknown elements in training process of artificial intelligence, so that optimizing the model requires more time and effort than it needs. Therefore, there is a need for a tool or methodology that can analyze the weight changes during the training process of artificial intelligence and help out understatnding those changes. In this research, I propose a visualization system which helps people to understand the accumulated weight changes. The system calculates the weights for each training period to accumulates weight changes and stores accumulated weight changes to plot them in 3D space. This research will allow us to explore different aspect of artificial intelligence learning process, such as understanding how the model get trained and providing us an indicator on which hyperparameters should be changed for better performance. These attempts are expected to explore better in artificial intelligence learning process that is still considered as unknown and contribute to the development and application of artificial intelligence models.

The study of security management for application of blockchain technology in the Internet of Things environment (Focusing on security cases in autonomous vehicles including driving environment sensing data and occupant data) (사물인터넷 환경에서 블록체인 기술을 이용한 보안 관리에 관한 소고(주행 환경 센싱 데이터 및 탑승자 데이터를 포함한 자율주행차량에서의 보안 사례를 중심으로))

  • Jang Mook KANG
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.161-168
    • /
    • 2022
  • After the corona virus, as non-face-to-face services are activated, domain services that guarantee integrity by embedding sensing information of the Internet of Things (IoT) with block chain technology are expanding. For example, in areas such as safety and security using CCTV, a process is required to safely update firmware in real time and to confirm that there is no malicious intrusion. In the existing safe security processing procedures, in many cases, the person in charge performing official duties carried a USB device and directly updated the firmware. However, when private blockchain technology such as Hyperledger is used, the convenience and work efficiency of the Internet of Things environment can be expected to increase. This article describes scenarios in how to prevent vulnerabilities in the operating environment of various customers such as firmware updates and device changes in a non-face-to-face environment. In particular, we introduced the optimal blockchain technique for the Internet of Things (IoT), which is easily exposed to malicious security risks such as hacking and information leakage. In this article, we tried to present the necessity and implications of security management that guarantees integrity through operation applying block chain technology in the increasingly expanding Internet of Things environment. If this is used, it is expected to gain insight into how to apply the blockchain technique to guidelines for strengthening the security of the IoT environment in the future.

Class Classification and Validation of a Musculoskeletal Risk Factor Dataset for Manufacturing Workers (제조업 노동자 근골격계 부담요인 데이터셋 클래스 분류와 유효성 검증)

  • Young-Jin Kang;;;Jeong, Seok Chan
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.49-59
    • /
    • 2023
  • There are various items in the safety and health standards of the manufacturing industry, but they can be divided into work-related diseases and musculoskeletal diseases according to the standards for sickness and accident victims. Musculoskeletal diseases occur frequently in manufacturing and can lead to a decrease in labor productivity and a weakening of competitiveness in manufacturing. In this paper, to detect the musculoskeletal harmful factors of manufacturing workers, we defined the musculoskeletal load work factor analysis, harmful load working postures, and key points matching, and constructed data for Artificial Intelligence(AI) learning. To check the effectiveness of the suggested dataset, AI algorithms such as YOLO, Lite-HRNet, and EfficientNet were used to train and verify. Our experimental results the human detection accuracy is 99%, the key points matching accuracy of the detected person is @AP0.5 88%, and the accuracy of working postures evaluation by integrating the inferred matching positions is LEGS 72.2%, NECT 85.7%, TRUNK 81.9%, UPPERARM 79.8%, and LOWERARM 92.7%, and considered the necessity for research that can prevent deep learning-based musculoskeletal diseases.

Preparation of ZnO@TiO2 nano coreshell structure by the polymerized complex and sol-gel method (착체중합법과 sol-gel법에 의한 ZnO@TiO2 나노 코아쉘 구조의 제조)

  • Lim, Chang Sung
    • Analytical Science and Technology
    • /
    • v.21 no.3
    • /
    • pp.237-243
    • /
    • 2008
  • Nano core shell structures of $TiO_2$ particles coated on surface of ZnO nanoparticles were prepared by the polymerized complex and sol-gel method. The average particle size of ZnO by the polymerized complex method showed 100 nm and the average particle size of $TiO_2$ by the sol-gel method showed below 10 nm. The average particle size of $ZnO@TiO_2$ nano core shell struture represented about 150 nm. The agglomeration between the ZnO particles using the polymerized complex method was highly controlled by the uniform absorption of $TiO_2$ colloid on the spherical ZnO surfaces. The driving force of heterogeneous bonding between ZnO and $TiO_2$ was induced by the Coulomb force. The ZnO and $TiO_2$ particles electrified with + and - charges, respectively, resulted in strong bonding by the difference of iso-electric point (IEP) when they laid neutrality pH area, depending on the heterogeneous surface electron electrified by the different zeta potential on the pH values.

Efficient QoS Policy Implementation Using DSCP Redefinition: Towards Network Load Balancing (DSCP 재정의를 통한 효율적인 QoS 정책 구현: 네트워크 부하 분산을 위해)

  • Hanwoo Lee;Suhwan Kim;Gunwoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.715-720
    • /
    • 2023
  • The military is driving innovative changes such as AI, cloud computing, and drone operation through the Fourth Industrial Revolution. It is expected that such changes will lead to a rapid increase in the demand for information exchange requirements, reaching all lower-ranking soldiers, as networking based on IoT occurs. The flow of such information must ensure efficient information distribution through various infrastructures such as ground networks, stationary satellites, and low-earth orbit small communication satellites, and the demand for information exchange that is distributed through them must be appropriately dispersed. In this study, we redefined the DSCP, which is closely related to QoS (Quality of Service) in information dissemination, into 11 categories and performed research to map each cluster group identified by cluster analysis to the defense "information exchange requirement list" on a one-to-one basis. The purpose of the research is to ensure efficient information dissemination within a multi-layer integrated network (ground network, stationary satellite network, low-earth orbit small communication satellite network) with limited bandwidth by re-establishing QoS policies that prioritize important information exchange requirements so that they are routed in priority. In this paper, we evaluated how well the information exchange requirement lists classified by cluster analysis were assigned to DSCP through M&S, and confirmed that reclassifying DSCP can lead to more efficient information distribution in a network environment with limited bandwidth.

Liaohe National Park based on big data visualization Visitor Perception Study

  • Qi-Wei Jing;Zi-Yang Liu;Cheng-Kang Zheng
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.4
    • /
    • pp.133-142
    • /
    • 2023
  • National parks are one of the important types of protected area management systems established by IUCN and a management model for implementing effective conservation and sustainable use of natural and cultural heritage in countries around the world, and they assume important roles in conservation, scientific research, education, recreation and driving community development. In the context of big data, this study takes China's Liaohe National Park, a typical representative of global coastal wetlands, as a case study, and using Python technology to collect tourists' travelogues and reviews from major OTA websites in China as a source. The text spans from 2015 to 2022 and contains 2998 reviews with 166,588 words in total. The results show that wildlife resources, natural landscape, wetland ecology and the fishing and hunting culture of northern China are fully reflected in the perceptions of visitors to Liaohe National Park; visitors have strong positive feelings toward Liaohe National Park, but there is still much room for improvement in supporting services and facilities, public education and visitor experience and participation.

Detecting Vehicles That Are Illegally Driving on Road Shoulders Using Faster R-CNN (Faster R-CNN을 이용한 갓길 차로 위반 차량 검출)

  • Go, MyungJin;Park, Minju;Yeo, Jiho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.105-122
    • /
    • 2022
  • According to the statistics about the fatal crashes that have occurred on the expressways for the last 5 years, those who died on the shoulders of the road has been as 3 times high as the others who died on the expressways. It suggests that the crashes on the shoulders of the road should be fatal, and that it would be important to prevent the traffic crashes by cracking down on the vehicles intruding the shoulders of the road. Therefore, this study proposed a method to detect a vehicle that violates the shoulder lane by using the Faster R-CNN. The vehicle was detected based on the Faster R-CNN, and an additional reading module was configured to determine whether there was a shoulder violation. For experiments and evaluations, GTAV, a simulation game that can reproduce situations similar to the real world, was used. 1,800 images of training data and 800 evaluation data were processed and generated, and the performance according to the change of the threshold value was measured in ZFNet and VGG16. As a result, the detection rate of ZFNet was 99.2% based on Threshold 0.8 and VGG16 93.9% based on Threshold 0.7, and the average detection speed for each model was 0.0468 seconds for ZFNet and 0.16 seconds for VGG16, so the detection rate of ZFNet was about 7% higher. The speed was also confirmed to be about 3.4 times faster. These results show that even in a relatively uncomplicated network, it is possible to detect a vehicle that violates the shoulder lane at a high speed without pre-processing the input image. It suggests that this algorithm can be used to detect violations of designated lanes if sufficient training datasets based on actual video data are obtained.

Design of Algorithm for Collision Avoidance with VRU Using V2X Information (V2X 정보를 활용한 VRU 충돌 회피 알고리즘 개발)

  • Jang, Seono;Lee, Sangyeop;Park, Kihong;Shin, Jaekon;Eom, Sungwook;Cho, Sungwoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.240-257
    • /
    • 2022
  • Autonomous vehicles use various local sensors such as camera, radar, and lidar to perceive the surrounding environment. However, it is difficult to predict the movement of vulnerable road users using only local sensors that are subject to limits in cognitive range. This is true especially when these users are blocked from view by obstacles. Hence, this paper developed an algorithm for collision avoidance with VRU using V2X information. The main purpose of this collision avoidance system is to overcome the limitations of the local sensors. The algorithm first evaluates the risk of collision, based on the current driving condition and the V2X information of the VRU. Subsequently, the algorithm takes one of four evasive actions; steering, braking, steering after braking, and braking after steering. A simulation was performed under various conditions. The results of the simulation confirmed that the algorithm could significantly improve the performance of the collision avoidance system while securing vehicle stability during evasive maneuvers.