• Title/Summary/Keyword: electrical tree

Search Result 591, Processing Time 0.029 seconds

A study on the increase of user gesture recognition rate using data preprocessing (데이터 전처리를 통한 사용자 제스처 인식률 증가 방안)

  • Kim, Jun Heon;Song, Byung Hoo;Shin, Dong Ryoul
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.13-16
    • /
    • 2017
  • 제스처 인식은 HCI(Human-Computer Interaction) 및 HRI(Human-Robot Interaction) 분야에서 활발히 연구되고 있는 기술이며, 제스처 데이터의 특징을 추출해내고 그에 따른 분류를 통하여 사용자의 제스처를 정확히 판별하는 것이 중요한 과제로 자리 잡았다. 본 논문에서는 EMG(Electromyography) 센서로 측정한 사용자의 손 제스처 데이터를 분석하는 방안에 대하여 서술한다. 수집된 데이터의 노이즈를 제거하고 데이터의 특징을 극대화시키기 위하여 연속적인 데이터로 변환하는 전처리 과정을 거쳐 이를 머신 러닝 알고리즘을 사용하여 분류하였다. 이 때, 기존의 raw 데이터와 전처리 과정을 거친 데이터의 성능을 decision-tree 알고리즘을 통하여 비교하였다.

  • PDF

The Analysis of Weibull Distribution after an Accelerated Aging Test of MV Cable (배전케이블의 수트리 가속열화 후 와이블분포 해석)

  • Kim, Jin-Gook;Lim, Jang-Seob;Song, Il-Gun;Kim, Ju-Yong;Lee, Woo-Sun
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2003.08a
    • /
    • pp.7-11
    • /
    • 2003
  • for many years already, testing laboratories, research institutes and manufactures try to find a reliable water tree accelerated ageing test that is able to show whether a polymer Medium Voltage cable os susceptible to water treeing or not. Test on laboratory samples, model cable designs, and fell size cable are presented. Apart form aging, another important aspect of any accelerated aging test is the right choice of th preconditioning method. THTS paper is the analysis of weibull distribution method after an accelerated aging test of MV(Medium Cable) cable.

  • PDF

Modified Half-Fit Memory Allocation Scheme Based on BST (BST 기반 보완된 절반-적합 메모리 할당 방법)

  • Ryu, Je-Young;Choo, Hyun-Seung;Youn, Hee-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.675-678
    • /
    • 2002
  • 동적 메모리 관리는 컴퓨터 시스템의 중요하고 본질적인 동작이다. 메모리를 얼마나 효율적으로 이용 하느냐에 따라 시스템의 성능이 달라진다. 따라서 본 논문에서는 실시간 시스템을 위해 보다 효율적으로 메모리를 사용하는 동적 메모리 할당 알고리즘, BHF(Binary-search-tree-Half-Fit)를 제안한다. 제안된 알고리즘은 메모리 요청을 위해 2 의 거듭제곱의 프리 블럭 리스트를 이진 탐색 트리로 사용한다. 제안된 알고리즘의 효율성을 나타내기 위하여 절반-적합 알고리즘과 이진 버디 시스템과 비교, 분석하였다.

  • PDF

Application of Threat Modeling for Security Risk Analysis in Smart Home Service Environment (스마트홈 서비스 환경에서의 보안 위험 분석을 위한 위협 모델링 적용 방안)

  • Lee, Yun-Hwan;Park, Sang-Gun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.2
    • /
    • pp.76-81
    • /
    • 2017
  • In this paper, the risk analysis of smart home services was implemented by applying threat modeling. Identified possible threats for safe deployment of smart home services and identified threats through the STRIDE model. Through the creation of the Attack Tree, the attackable risk was analyzed and the risk was measured by applying the DREAD model. The derived results can be used to protect assets and mitigate risk by preventing security vulnerabilities from compromising and identifying threats from adversely affecting services. In addition, the modeled result of the derived threat can be utilized as a basis for performing the security check of the smart home service.

A study on Reliability Enhancement Method and the Prediction Model Construction of Medium-Voltage Customers Causing Distribution Line Fault Using Data Mining Techniques (데이터 마이닝 기법을 이용한 특별고압 파급고장 발생가능 고객 예측모델 구축 및 신뢰도 향상방안에 관한 연구)

  • Bae, Sung-Hwan;Kim, Ja-Hee;Hong, Jung-Sik;Lim, Han-Seung
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.58 no.10
    • /
    • pp.1869-1880
    • /
    • 2009
  • Distribution line fault has been reduced gradually by the efforts on improving the quality of electrical materials and distribution system maintenance. However faults caused by medium voltage customers have been increased gradually even though we have done many efforts. The problem is that we don't know which customer will cause the fault. This paper presents the concept to find these customers using data mining techniques, which is based on accumulated fault records of medium voltage customers in the past. It also suggests the prediction model construction of medium voltage customers causing distribution line fault and methods to enhance the reliability of distribution system. We expect that we can effectively reduce faults resulted from medium voltage customers, which is 30% of total faults.

FPGA-Based Design of Black Scholes Financial Model for High Performance Trading

  • Choo, Chang;Malhotra, Lokesh;Munjal, Abhishek
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.3
    • /
    • pp.190-198
    • /
    • 2013
  • Recently, one of the most vital advancement in the field of finance is high-performance trading using field-programmable gate array (FPGA). The objective of this paper is to design high-performance Black Scholes option trading system on an FPGA. We implemented an efficient Black Scholes Call Option System IP on an FPGA. The IP may perform 180 million transactions per second after initial latency of 208 clock cycles. The implementation requires the 64-bit IEEE double-precision floatingpoint adder, multiplier, exponent, logarithm, division, and square root IPs. Our experimental results show that the design is highly efficient in terms of frequency and resource utilization, with the maximum frequency of 179 MHz on Altera Stratix V.

Security Properties of Domain Extenders for Cryptographic Hash Functions

  • Andreeva, Elena;Mennink, Bart;Preneel, Bart
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.453-480
    • /
    • 2010
  • Cryptographic hash functions reduce inputs of arbitrary or very large length to a short string of fixed length. All hash function designs start from a compression function with fixed length inputs. The compression function itself is designed from scratch, or derived from a block cipher or a permutation. The most common procedure to extend the domain of a compression function in order to obtain a hash function is a simple linear iteration; however, some variants use multiple iterations or a tree structure that allows for parallelism. This paper presents a survey of 17 extenders in the literature. It considers the natural question whether these preserve the security properties of the compression function, and more in particular collision resistance, second preimage resistance, preimage resistance and the pseudo-random oracle property.

Discrimination of insulation defects using a neural network (신경회로망을 이용한 절연 결함의 판별)

  • 최재관;김재환;김성홍;윤헌주;박재준
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 1997.11a
    • /
    • pp.381-384
    • /
    • 1997
  • This paper describes the method of diagnosing the degradation by void defects of insulator inside in operation. Needle-shape void specimens, made from LDPE, were used to generate an electrical tree under ac voltage. The method uses a neural network system with input signal of AE patterns. AE pattern consists of the pulse count and average amplitude according to the phase angle. After the learning process was over, unknown emission patterns were put into the network. It was shown that the network discriminates the void deflects well. The effectiveness of the neural network system for partial discharge recognition was shown.

  • PDF

A Multi-Expression Programming Application to the Design of Planar Antennae

  • Braunstein, Jeffrey;Kim, Hyeong-Seok;Kahng, Sung-Tek
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1589-1590
    • /
    • 2006
  • A method to determine functional relationships between the variable physical dimensions of an antenna and the antenna performance characteristics is presented. By applying multi-expression programming (MEP) to this data set, optimization with regard to a given criteria can be subsequently performed on the functions instead of performing repealed electromagnetic simulations. The functionals are trained on an initial population of simulation samples and refined using a point-wise error estimate to identify design parameters for subsequent samples. Additionally, the depth of the MEP tree is adjusted for increased accuracy as the data set is deemed sufficient.

  • PDF

A Single-Pole, Eight-Throw, Radio-Frequency, MicroElectroMechanical Systems Switch for Multi-Band / Multi-Mode Front-End Module

  • Kang, Sung-Chan;Kim, Hyeon-Cheol;Chun, Kuk-Jin
    • Journal of Sensor Science and Technology
    • /
    • v.20 no.2
    • /
    • pp.77-81
    • /
    • 2011
  • This paper presents a single-pole eight-throw(SP8T) switch based on proposed a radio-frequency(RF) microelectromechanical systems (MEMS) switches. The proposed switch was driven by a double stop(DS) comb drive, with a lateral resistive contact. Additionally, the proposed switch was designed to have tapered signal line and bi-directionally actuated. A forward actuation connects between signal lines and contact part, and the output becomes on-state. A reverse actuation connects between ground lines and contact part, and the output becomes off-state. The SP8T switch of 3-stage tree topology was developed based on an arrangement of the proposed RF MEMS switches. The developed SP8T switch had an actuation voltage of 12 V, an insertion loss of 1.3 dB, a return loss of 15.1 dB, and an isolation of 31.4 dB at 6 GHz.