• Title/Summary/Keyword: system identification

Search Result 5,877, Processing Time 0.044 seconds

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

The Hangul 4 State Bar Code System for the Automatic processing of Mail Items (우편물 자동처리를 위한 한글 4 State 바코드 시스템)

  • Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.146-155
    • /
    • 2000
  • This paper describes a 4-state bar code called HANGUL 4 ST that has been specifically designed for automatic processing of the letter mails, A HANGUL 4 ST bar code is a necessary data base that is applied data capture and data carrier with it all the information necessary for sorting, the amount capture for transportation of mail items, and valued-added services such as indicia, tracking and trace. The 4-state bar code information contents are composed of a postal code, delivery point, customer information including customer identification number and name, and parity bits for error detect and correct. The data density capability of HANGUL 4 St allows all useful sorting data and customer data to be encoded on one label. This supports better automatic processing in mail items, higher level of customer service and more efficient operation.

  • PDF

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

Statistical analysis and probabilistic modeling of WIM monitoring data of an instrumented arch bridge

  • Ye, X.W.;Su, Y.H.;Xi, P.S.;Chen, B.;Han, J.P.
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.1087-1105
    • /
    • 2016
  • Traffic load and volume is one of the most important physical quantities for bridge safety evaluation and maintenance strategies formulation. This paper aims to conduct the statistical analysis of traffic volume information and the multimodal modeling of gross vehicle weight (GVW) based on the monitoring data obtained from the weigh-in-motion (WIM) system instrumented on the arch Jiubao Bridge located in Hangzhou, China. A genetic algorithm (GA)-based mixture parameter estimation approach is developed for derivation of the unknown mixture parameters in mixed distribution models. The statistical analysis of one-year WIM data is firstly performed according to the vehicle type, single axle weight, and GVW. The probability density function (PDF) and cumulative distribution function (CDF) of the GVW data of selected vehicle types are then formulated by use of three kinds of finite mixed distributions (normal, lognormal and Weibull). The mixture parameters are determined by use of the proposed GA-based method. The results indicate that the stochastic properties of the GVW data acquired from the field-instrumented WIM sensors are effectively characterized by the method of finite mixture distributions in conjunction with the proposed GA-based mixture parameter identification algorithm. Moreover, it is revealed that the Weibull mixture distribution is relatively superior in modeling of the WIM data on the basis of the calculated Akaike's information criterion (AIC) values.

Assessment of modal parameters considering measurement and modeling errors

  • Huang, Qindan;Gardoni, Paolo;Hurlebaus, Stefan
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.717-733
    • /
    • 2015
  • Modal parameters of a structure are commonly used quantities for system identification and damage detection. With a limited number of studies on the statistics assessment of modal parameters, this paper presents procedures to properly account for the uncertainties present in the process of extracting modal parameters. Particularly, this paper focuses on how to deal with the measurement error in an ambient vibration test and the modeling error resulting from a modal parameter extraction process. A bootstrap approach is adopted, when an ensemble of a limited number of noised time-history response recordings is available. To estimate the modeling error associated with the extraction process, a model prediction expansion approach is adopted where the modeling error is considered as an "adjustment" to the prediction obtained from the extraction process. The proposed procedures can be further incorporated into the probabilistic analysis of applications where the modal parameters are used. This study considers the effects of the measurement and modeling errors and can provide guidance in allocating resources to improve the estimation accuracy of the modal data. As an illustration, the proposed procedures are applied to extract the modal data of a damaged beam, and the extracted modal data are used to detect potential damage locations using a damage detection method. It is shown that the variability in the modal parameters can be considered to be quite low due to the measurement and modeling errors; however, this low variability has a significant impact on the damage detection results for the studied beam.

A Study on the Unsteady Flow Characteristics of a Delta Wing by 3-D Stereo PIV (3-D Stereo PIV에 의한 비정상 델타윙 유동특성에 대한 연구)

  • Kim, Beom-Seok;Lee, Hyun;Kim, Jeong-Hwan;Lee, Young-Ho
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1672-1677
    • /
    • 2004
  • Leading edge extension(LEX) in a highly swept shape applied to a delta wing features the modem air-fighters. The LEX vortices generated upon the upper surface of the wing at high angle of attack enhance the lift force of the delta wing by way of increased negative suction pressure over the surfaces. The present 3-D stereo PIV includes the Identification of 2-D cross-correlation equation, stereo matching of 2-D velocity vectors of two cameras, accurate calculation of 3-D velocity vectors by homogeneous coordinate system, removal of error vectors by a statistical method followed by a continuity equation criterion and so on. A delta wing model with or without LEX was immersed in a circulating water channel. Two high-resolution, high-speed digital cameras($1280pixel{\times}1024pixel$) were used to allow the time-resolved animation work. The present dynamic stereo PIV represents the complicated vortex behavior, especially, in terms of time-dependent characteristics of the vortices at given measuring sections. Quantities such as three velocity vector components, vorticity and other flow information can be easily visualized via the 3D time-resolved post-processing to make the easy understanding of the LEX effect or vortex emerging and collapse which are important phenomena occurring in the field of delta wing aerodynamics.

  • PDF

The System Reliability Analysis of Web Frame by Plastic Strength Analysis (소성 강도 해석에 의한 Web Frame의 시스템 신뢰성 해석)

  • Y.S. Yang;S.J. Yim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.28 no.2
    • /
    • pp.251-267
    • /
    • 1991
  • Plastic strength analysis using plastic failure mode as a limit state is adopted instead of a conventional elastic structural analysis to predict the ultimate strength of Web frame idealized by a plane frame. Linear programming arid Compact procedure are developed for determining the collapse load factor. It is found that the final results are good agreement with the results of Elasto-plastic analysis. Besides, the redundant structures like Web frame is known to have multiple failure modes. Web frame may collapse under any of the possible failure modes. Thus, the identification of these possible failure modes is necessary and very important in the reliability analysis of Web frame. In order to deal with multiple failure modes, automatic generation method of all failure modes and basic failure modes is used for selecting the dominant failure modes. The probability of failure pastic collapse of Web frame is calculated using these dominant failure modes. The safety of Web frame is asscssed and compared by performing the deterministic and probabilistic analysis.

  • PDF

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Business Transaction Preparation Plan for Business Reference Model Management (BRM 운영을 위한 단위과제 정비방안)

  • Kim, Hwa-Kyoung;Kim, Eun-Ju
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.14 no.4
    • /
    • pp.199-219
    • /
    • 2014
  • BRM (Business Reference Model, hereinafter referred to as BRM) has been introduced with the objective to improve task-related information sharing among organizations, task processing speed, efficiency of organization management, and administrative services. Furthermore, a Records Management Reference Table, which is a business-based records management system, has been put in to operation. However, it is necessary to reidentify if the BRM is put into use according to its initial objectives and purposes after 10 years of its introduction based on the pending problems and matters of improvement. Therefore, in this study, the necessity for business transaction management has been reviewed based on the problems present in the "business transaction" operation, which is the lowest unit of BRM, and it proposes a business transaction identification plan through a business analysis. As a result, three major points to improve BRM management have been suggested.

The Design of Adaptive Fuzzy Polynomial Neural Networks Architectures Based on Fuzzy Neural Networks and Self-Organizing Networks (퍼지뉴럴 네트워크와 자기구성 네트워크에 기초한 적응 퍼지 다항식 뉴럴네트워크 구조의 설계)

  • Park, Byeong-Jun;Oh, Sung-Kwun;Jang, Sung-Whan
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.2
    • /
    • pp.126-135
    • /
    • 2002
  • The study is concerned with an approach to the design of new architectures of fuzzy neural networks and the discussion of comprehensive design methodology supporting their development. We propose an Adaptive Fuzzy Polynomial Neural Networks(APFNN) based on Fuzzy Neural Networks(FNN) and Self-organizing Networks(SON) for model identification of complex and nonlinear systems. The proposed AFPNN is generated from the mutually combined structure of both FNN and SON. The one and the other are considered as the premise and the consequence part of AFPNN, respectively. As the premise structure of AFPNN, FNN uses both the simplified fuzzy inference and error back-propagation teaming rule. The parameters of FNN are refined(optimized) using genetic algorithms(GAs). As the consequence structure of AFPNN, SON is realized by a polynomial type of mapping(linear, quadratic and modified quadratic) between input and output variables. In this study, we introduce two kinds of AFPNN architectures, namely the basic and the modified one. The basic and the modified architectures depend on the number of input variables and the order of polynomial in each layer of consequence structure. Owing to the specific features of two combined architectures, it is possible to consider the nonlinear characteristics of process system and to obtain the better output performance with superb predictive ability. The availability and feasibility of the AFPNN are discussed and illustrated with the aid of two representative numerical examples. The results show that the proposed AFPNN can produce the model with higher accuracy and predictive ability than any other method presented previously.