• Title/Summary/Keyword: operator.

Search Result 5,819, Processing Time 0.028 seconds

Lightweight Model for Energy Storage System Remaining Useful Lifetime Estimation (ESS 잔존수명 추정 모델 경량화 연구)

  • Yu, Jung-Un;Park, Sung-Won;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.436-442
    • /
    • 2020
  • ESS(energy storage system) has recently become an important power source in various areas due to increased renewable energy resources. The more ESS is used, the less the effective capacity of the ESS. Therefore, it is important to manage the remaining useful lifetime(RUL). RUL can be checked regularly by inspectors, but it is common to be monitored and estimated by an automated monitoring system. The accurate state estimation is important to ESS operator for economical and efficient operation. RUL estimation model usually requires complex mathematical calculations consisting of cycle aging and calendar aging that are caused by the operation frequency and over time, respectively. A lightweight RUL estimation model is required to be embedded in low-performance processors that are installed on ESS. In this paper, a lightweight ESS RUL estimation model is proposed to operate on low-performance micro-processors. The simulation results show less than 1% errors compared to the original RUL model case. In addition, a performance analysis is conducted based on ATmega 328. The results show 76.8 to 78.3 % of computational time reduction.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

A Study on the Perception of the Subjects about Automated Container Terminal (컨테이너터미널 자동화에 대한 관련 주체별 인식연구)

  • You, Ji-Won;Kim, Yul-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.3
    • /
    • pp.195-202
    • /
    • 2020
  • The production of larger of ships is a survival strategy for global shipping companies to pursue the economics of scale. According to this strategy, to respond to this situation, many containers are loading/unloading simultaneously in the hub port. Additionally, the container terminals are promoting the introduction of automation to expand the terminal facilities and increase efficiency/productivity of the container yards. European ports have introduced automation to address rising labor costs and shortages of labor. Recently, the construction of fully automated container terminals is increasing in the United States and China to resolve problems such as the slow growth of the global economy, the emergence of large ships, air pollution, and safety accidents. Domestic ports are at an early stage compared to the world's advanced container terminals, and countermeasures are being prepared to respond to the changing ports. However, research on the recognition difference analysis that examines the opinions of stakeholders is insufficient. As a result of analyzing the recognition among the groups, it was found that container terminal operators reduced labor costs, improved shipping services for shipping companies, prevented safety accidents for port union labor, and increased service for port authority and government agencies. Thus, to closely examine the perception among the groups, one-way ANOVA was performed, and then the implications were deduced as the basic data for the smooth introduction of automation.

Moving Object Segmentation using Space-oriented Object Boundary Linking and Background Registration (공간기반 객체 외곽선 연결과 배경 저장을 사용한 움직이는 객체 분할)

  • Lee Ho Suk
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.2
    • /
    • pp.128-139
    • /
    • 2005
  • Moving object boundary is very important for moving object segmentation. But the moving object boundary shows broken boundary We invent a novel space-oriented boundary linking algorithm to link the broken boundary The boundary linking algorithm forms a quadrant around the terminating pixel in the broken boundary and searches forward other terminating pixel to link within a radius. The boundary linking algorithm guarantees shortest distance linking. We also register the background from image sequence. We construct two object masks, one from the result of boundary linking and the other from the registered background, and use these two complementary object masks together for moving object segmentation. We also suppress the moving cast shadow using Roberts gradient operator. The major advantages of the proposed algorithms are more accurate moving object segmentation and the segmentation of the object which has holes in its region using these two object masks. We experiment the algorithms using the standard MPEG-4 test sequences and real video sequence. The proposed algorithms are very efficient and can process QCIF image more than 48 fps and CIF image more than 19 fps using a 2.0GHz Pentium-4 computer.

An Efficient Incremental Maintenance Method for Data Cubes in Data Warehouses (데이타 웨어하우스에서 데이타 큐브를 위한 효율적인 점진적 관리 기법)

  • Lee, Ki-Yong;Park, Chang-Sup;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.2
    • /
    • pp.175-187
    • /
    • 2006
  • The data cube is an aggregation operator that computes group-bys for all possible combination of dimension attributes. %on the number of the dimension attributes is n, a data cube computes $2^n$ group-bys. Each group-by in a data cube is called a cuboid. Data cubes are often precomputed and stored as materialized views in data warehouses. These data cubes need to be updated when source relation change. The incremental maintenance of a data cube is to compute and propagate only its changes. To compute the change of a data cube of $2^n$ cuboids, previous works compute a delta cube that has the same number of cuboids as the original data cube. Thus, as the number of dimension attributes increases, the cost of computing a delta cube increases significantly. Each cuboid in a delta cube is called a delta cuboid. In this paper. we propose an incremental cube maintenance method that can maintain a data cube by using only $_nC_{{\lceil}n/2{\rceil}}$ delta cuboids. As a result, the cost of computing a delta cube is substantially reduced. Through various experiments, we show the performance advantages of our method over previous methods.

The MTF Measurement of the Conventional X-ray System by using the Computed Radiography (CR을 이용한 일반촬영장치의 MTF 측정)

  • Kim, Chang-Bok
    • Journal of radiological science and technology
    • /
    • v.28 no.2
    • /
    • pp.111-115
    • /
    • 2005
  • The quality of image from the system that creates medical images by using X-ray depends on the various different reasons such as the X-ray generator, the subject and the image transmission medium. In other words, thereare various factors existing that can influence on the quality of image from the moment when the X-ray is generated and until the final image is created. Therefore, the operator who creates images at the clinical site should make continuous evaluation and observation from the final image. There are various methods of evaluating the medical images, but it is assumed that the MTF measurement method can be suitable for measuring actual or effective resolution. So in this study, the MTF measurement method by using X-ray film has been avoided and the MTF features according to the deterioration of the X-ray system have been measured by using the software (the program used Borland C++ builder software and LEAD tools software) that can measure the MTF of the digital medical images. As the result of this measurement, it has been found out through the MTF graph that the resolution and sharpness from the old x-ray generator with a many years of using and many numbers of times of using were deteriorated for the quality of image comparing to those from the new system. Also a simple and easy measurement method for the MTF from the digital medical images can be obtained in this study.

  • PDF

Analysis of Total Loss of Feedwater Event for the Determination of Safety Depressurization Bleed Capacity (안전감압계통의 방출유량을 결정하기 위한 완전급수상실사고 해석)

  • Kwon, Young-Min;Song, Jin-Ho;Ro, Tae-Sun
    • Nuclear Engineering and Technology
    • /
    • v.27 no.4
    • /
    • pp.470-482
    • /
    • 1995
  • The Ulchin 3&4, which are 2825 MWt PWRs, adopted Safety Depressurization System (SDS) to mitigate the beyond design basis event of Total Less of Feedwater(TLOFW). In this study the results and methodology of the analyses for the determination of SDS bleed capacity are discussed. The SDS design bleed capacity has been determined from the CEFLASH-4AS/REM simulation according to the following design criteria : 1) Each SDS flow path, in conjunction with one of two High Pressure Safety Injection (HPSI) pumps, is designed to have a sufficient capacity to prevent core uncovery if one SDS path is opened simultaneously with the opening of the Pressurizer Safety Valves (PSVs). 2) Both SDS bleed paths are designed to have sufficient total capacity with both HPSI pumps operating to prevent core uncovery if the Feed and Bleed (F&B) initiation is delayed up to thirty minutes from the time of the PSVs lift. To verify the results of CEFLASH-4AS/REM simulation a comparative analysis kas also been per-formed by more sophisticated computer code, RELAP5/MOD3. The TLOFW event without operator recovery and TLOFW event with F&B are analyzed. The predictions by the CEFLASH-4AS/REM of the transient too phase system behavior are in good qualitative and quantitative agreement with those by the RELAP5/MOD3 simulation. Both of the results of analyses by CEFLASH-4AS/REM and RELAP5/MOD3 have demonstrated that decay heat removal and core inventory make-up can be successfully accomplished by F&B operation during now event for the Ulchin 3&4.

  • PDF

LiDAR Chip for Automated Geo-referencing of High-Resolution Satellite Imagery (라이다 칩을 이용한 고해상도 위성영상의 자동좌표등록)

  • Lee, Chang No;Oh, Jae Hong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.4_1
    • /
    • pp.319-326
    • /
    • 2014
  • The accurate geo-referencing processes that apply ground control points is prerequisite for effective end use of HRSI (High-resolution satellite imagery). Since the conventional control point acquisition by human operator takes long time, demands for the automated matching to existing reference data has been increasing its popularity. Among many options of reference data, the airborne LiDAR (Light Detection And Ranging) data shows high potential due to its high spatial resolution and vertical accuracy. Additionally, it is in the form of 3-dimensional point cloud free from the relief displacement. Recently, a new matching method between LiDAR data and HRSI was proposed that is based on the image projection of whole LiDAR data into HRSI domain, however, importing and processing the large amount of LiDAR data considered as time-consuming. Therefore, we wmotivated to ere propose a local LiDAR chip generation for the HRSI geo-referencing. In the procedure, a LiDAR point cloud was rasterized into an ortho image with the digital elevation model. After then, we selected local areas, which of containing meaningful amount of edge information to create LiDAR chips of small data size. We tested the LiDAR chips for fully-automated geo-referencing with Kompsat-2 and Kompsat-3 data. Finally, the experimental results showed one-pixel level of mean accuracy.

Scalable RDFS Reasoning Using the Graph Structure of In-Memory based Parallel Computing (인메모리 기반 병렬 컴퓨팅 그래프 구조를 이용한 대용량 RDFS 추론)

  • Jeon, MyungJoong;So, ChiSeoung;Jagvaral, Batselem;Kim, KangPil;Kim, Jin;Hong, JinYoung;Park, YoungTack
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.998-1009
    • /
    • 2015
  • In recent years, there has been a growing interest in RDFS Inference to build a rich knowledge base. However, it is difficult to improve the inference performance with large data by using a single machine. Therefore, researchers are investigating the development of a RDFS inference engine for a distributed computing environment. However, the existing inference engines cannot process data in real-time, are difficult to implement, and are vulnerable to repetitive tasks. In order to overcome these problems, we propose a method to construct an in-memory distributed inference engine that uses a parallel graph structure. In general, the ontology based on a triple structure possesses a graph structure. Thus, it is intuitive to design a graph structure-based inference engine. Moreover, the RDFS inference rule can be implemented by utilizing the operator of the graph structure, and we can thus design the inference engine according to the graph structure, and not the structure of the data table. In this study, we evaluate the proposed inference engine by using the LUBM1000 and LUBM3000 data to test the speed of the inference. The results of our experiment indicate that the proposed in-memory distributed inference engine achieved a performance of about 10 times faster than an in-storage inference engine.

Comparing Validity of Body Mass Index, Waist to Hip Ratio, and Waist Circumference to Cardiovascular Disease Risk Factors in Korean Elderly (한국노인에서 심장혈관계 질환 위험인자에 대한 비만지표인 체질량지수, 허리-엉덩이둘레비, 및 허리둘레의 타당도 비교)

  • Moon Hyun-Kyung;Kim Eu-Gene
    • Journal of Nutrition and Health
    • /
    • v.38 no.6
    • /
    • pp.445-454
    • /
    • 2005
  • The purpose of this study was to compare the validity of obese index among body mass index (BMI), waist to hip ratio (WHR), and waist circumference (WC) and to determine which is the best in relation to cardiovascular disease (CVD) risk in Korean elderly more than 65 ages. Data from the 1998 Korean Health and Nutrition Survey were used (n=1017). Anthropometric indices and CVD risk factors were measured, and chi-square test, analysis of variance following duncan's multiple range test, partial correlation analysis, and Receiver Operator Characteristic (ROC) curves were used in the analysis. Anthropometric values were decreased in both male and female when ages were goes up. In female elderly, it specially showed the characteristics of upper body fat and systolic blood pressure risk (p<0.05). Among life style factors the current smokers were prevalent in obese male (p<0.05), but not prevalent in female having obese or upper body fat. Also, person with upper body obesity have more exercise than that of normal group (p<0.01). Mean BMI values of the current smoker was lower than that of normal group in both sexes (p<0.01). Mean BMI value of person with other risk factors were higher than that of normal groups (p<0.05). Among 7 CVD risk factors in partial correlation analysis, WC had the highest correlation coefficient in 5 in male, whereas BMI in 4 in female. In ROC analyses of 12 risk factors and health conditions, the largest area under curve of obese indices for risk factors were WC>WHR>BMI in male and BMI>WHR>WC in female. The optimal cutoff values of each index (BMI : WHR : WC) for one or more risk factors were 19.02 : 0.84 : 71.3 in male and 19.04 : 0.88 : 85.6 in female. In conclusion, Most Korean elderly showed non-obese and abdominal obesity likewise other Asians. Also CVD risk factors were prevalent in Korean elderly within normal limits of obese indices. Therefore the upper body fat indices reflected in the aged whose muscle mass is replaced by fat must be used as an indicator of CVD risk together with BMI. Although WHR was the worst index based on partial correlation analysis and so located between BMI and WC in ROC curve analysis in both sexes, it need to be use with WC to screen the cardiovascular risk group.