Journal of the Korean Society of Marine Environment & Safety
/
v.29
no.6
/
pp.704-711
/
2023
This paper discusses the control method of BLDC(Brushless Direct Current) motor that has similar electrical characteristics with DC motor but has improved its lifespan and reliability. The BLDC motor can improve durability and speed stability by using rotor position information to eliminate commutators that require mechanical contact with DC motors. In this study, a controller for a DC motor was designed based on the fact that the current in the windings of a BLDC motor is a square-wave current like the current flowing in the armature of a DC motor. Next, the designed controller was applied to a 3-phase BLDC motor to confirm the effectiveness of the controller. In detail, a single-phase DC motor with electrical parameter values of a three-phase BLDC motor was modeled and a PI controller for motor speed control was designed by applying the root locus method to the derived system. The speed control simulation of the DC motor was performed to confirm the validity of the controller, and the same controller was applied to the speed control of the 3-phase BLDC motor implemented in MATLAB. From the simulation, similar results of the DC motor were obtained in the 3 phase BLDC motor and confirmed the usefulness of the proposed control scheme.
The Journal of The Korea Institute of Intelligent Transport Systems
/
v.23
no.2
/
pp.1-14
/
2024
The most optimal route-search algorithm thus far has introduced a method of applying node labels and link labels. Node labels consider two nodes simultaneously in the optimal route-search process, while link labels consider two links simultaneously. This study proposes a turn-label-based optimal route-search technique that considers two turns simultaneously in the process. Turn-label-based optimal route search guarantees the optimal solution of dynamic programming based on Bellman's principle as it considers a two-turn search process. Turn-label-based optimal route search can accommodate the advantages of applying link labels because the concept of approaching the limit of link labels is applied equally. Therefore, it is possible to reflect rational cyclic traffic where nodes allow multiple visits without expanding the network, while links do not allow visits. In particular, it reflects the additional cost structure that appears in two consecutive turns, making it possible to express the structure of the travel-cost function more flexibly. A case study was conducted on the metropolitan urban railway network consisting of transportation card terminal readers, aiming to examine the scalability of the research by introducing parameters that reflect psychological resistance in travel with continuous pedestrian transfers into turn label optimal path search. Simulation results showed that it is possible to avoid conservative transfers even if the travel time and distance increase as the psychological resistance value for continuous turns increases, confirming the need to reflect the cost structure of turn labels. Nevertheless, further research is needed to secure diversity in the travel-cost functions of road and public-transportation networks.
KSCE Journal of Civil and Environmental Engineering Research
/
v.44
no.1
/
pp.85-93
/
2024
The monitoring of environmental information (e.g. noise, dust, vibration, temperature, humidity) is crucial to the safe and sustainable operation of a construction site. However, commercial sensors exhibit certain drawbacks when applied on-site. First, the installation cost is prohibitively high. Second, these sensors have been engineered without considering the rugged and harsh conditions of a construction site, resulting in error-prone sensing. Third, construction sites are compelled to allocate additional resources in terms of manpower, expenses, and physical spaces to accommodate individual sensors. This research developed an integrated sensing module to measure the environmental information in construction site. The sensing module slashes the installation cost to 3.3%, is robust enough to harsh and outdoor sites, and consolidates multiple sensors into a single unit. The sensing module also supports GPS, LTE, and real-time sensing. The evaluation showed remarkable results including 97.5% accuracy and 99.9% precision in noise measurement, an 89.7% accuracy in dust measurement, and a 93.5% reliability in data transmission. This research empowers the collection of substantial volumes and high-quality environmental data from construction sites, providing invaluable support to decision-making process. These encompass objective regulatory compliance checking, simulations of environmental data dispersion, and the development of environmental mitigation strategies.
Dae-kyeong Park;Woo-jin Lee;Byeong-jin Kim;Jae-yeon Lee
Journal of Internet Computing and Services
/
v.25
no.1
/
pp.147-155
/
2024
Currently, the 4th Industrial Revolution, like other revolutions, is bringing great change and new life to humanity, and in particular, the demand for and use of drones, which can be applied by combining various technologies such as big data, artificial intelligence, and information and communications technology, is increasing. Recently, it has been widely used to carry out dangerous military operations and missions, such as the Russia-Ukraine war and North Korea's reconnaissance against South Korea, and as the demand for and use of drones increases, concerns about the safety and security of drones are growing. Currently, a variety of research is being conducted, such as detection of wireless communication abnormalities and sensor data abnormalities related to drones, but research on real-time detection of threats using radio frequency characteristic data is insufficient. Therefore, in this paper, we conduct a study to determine whether the characteristic data is normal or abnormal signal data by collecting radio frequency signal characteristic data generated while the drone communicates with the ground control system while performing a mission in a HITL(Hardware In The Loop) simulation environment similar to the real environment. proceeded. In addition, we propose an unsupervised learning-based threat detection system and optimal threshold that can detect threat signals in real time while a drone is performing a mission.
In this paper, we propose a moving target localization algorithm using acoustic spectrograms. A time-versus-frequency spectrogram provide a information of trajectory of the moving target in underwater. For a source at sufficiently long range from a receiver, broadband striation patterns seen in spectrogram represents the mutual interference between modes which reflected by surface and bottom. The slope of the maximum intensity striation is influenced by waveguide invariant parameter ${\beta}$ and distance between target and sensor. When more than two sensors are applied to measure the moving ship-radited noise, the slope and frequency of the maximum intensity striation are depend on distance between target and receiver. We assumed two sensors to fixed point then form a circle of apollonios which set of all points whose distances from two fixed points are in a constant ratio. In case of three sensors are applied, two circle form an intersection point so coordinates of this point can be estimated as a position of target. To evaluates a performance of the proposed localization algorithm, simulation is performed using acoustic propagation program.
Minsung Kim;Ji-hye Kang;Kyung Heon Koo;Kyung-Soon Lee
Journal of Advanced Navigation Technology
/
v.28
no.3
/
pp.254-261
/
2024
Accurate guidance during landing and take-off is important, and instrument landing system (ILS) has been used for stability and verification. Regular inspections are conducted for stable operation, and there is research to perform inspection using drones in addition to ground vehicles and measurement aircraft. Using SDR and single board computer, which can receive wide frequency range, we designed a small system that receives and processes localizer signals through GNU Radio. To check signal processing characteristics through GNU Radio, we simulated with MATLAB Simulink and confirmed the theoretical values. Difference in depth of modulation (DDM) and approach angle can be calculated when the aircraft enters the runway. And GNU Radio implemented real-time signal processing wirelessly using transmission control protocol (TCP). This gives the results within the error of 0.5% when the aircraft entered the runway center line and 0.27% for the angle of 1° degree. Compared to the inspecting and maintaining ILS signals using aircraft or ground vehicles, it is possible to implement a receiving system using small SDR that can be mounted for drone.
In order to assess the feasibility of the dipole-dipole electric method to the investigation of metallic ore deposit, both field data simulation and inversion are carried out for several simplified ore deposit models. Our interest is in a vein-type model, because most of the ore deposits (more than 70%) exist in a vein type in Korea. Based on the fact that the width of the vein-type ore deposits ranges from tens of centimeters to 2m, we change the width and the material property of the vein, and we use 40m-electrode spacing for our test. For the vein-type model with too small width, the low resistivity zone is not detected, even though the resistivity of the vein amounts to 1/300 of that of the surrounding rock. Considering a wide electrode interval and cell size used in the inversion, it is natural that the size of the low resistivity zone is overestimated. We also perform field data simulation and inversion for a vein-type model with surrounding hydrothermal alteration zones, which is a typical structure in an epithermal ore deposits. In the model, the material properties are assumed on the basis of resistivity values directly observed in a mine originated from an epithermal ore deposits. From this simulation, we can also note that the high resistivity value of the vein does not affect the results when the width of the vein is narrow. This indicates that our main target should be surrounding hydrothermal alteration zones rather than veins in field survey. From these results, we can summarize that when the vein is placed at the deep part and the difference of resistivity values between the vein and the surrounding rock is not large enough, we cannot detect low resistivity zone and interpret the subsurface structures incorrectly using the electric method performed at the surface. Although this work is a little simple, it can be used as references for field survey design and field data Interpretation. If we perform field data simulation and inversion for a number of models and provide some references, they will be helpful in real field survey and interpretation.
Recent underground common utility tunnels are underground facilities for jointly accommodating more than 2 kinds of air-conditioning and heating facilities, vacuum dust collector, information processing cables as well as electricity, telecommunications, waterworks, city gas, sewerage system required when citizens live their daily lives and facilities responsible for the central function of the country but it is difficult to cope with fire accidents quickly and hard to enter into common utility tunnels to extinguish a fire due to toxic gases and smoke generated when various cables are burnt. Thus, in the event of a fire, not only the nerve center of the country is paralyzed such as significant property damage and loss of communication etc. but citizen inconveniences are caused. Therefore, noticing that most fires break out by a short circuit due to electrical works and degradation contact due to combustible cables as the main causes of fires in domestic and foreign common utility tunnels fire cases that have occurred so far, the purpose of this paper is to scientifically analyze the behavior of a fire by producing the model of actual common utility tunnels and reproducing the fire. A fire experiment was conducted in a state that line type fixed temperature detector, fire door, connection deluge set and ventilation equipment are installed in underground common utility tunnels and transmission power distribution cables are coated with fire proof paints in a certain section and heating pipes are fire proof covered. As a result, in the case of Type II, the maximum temperature was measured as $932^{\circ}C$ and line type fixed temperature detector displayed the fire location exactly in the receiver at a constant temperature. And transmission power distribution cables painted with fire proof paints in a certain section, the case of Type III, were found not to be fire resistant and fire proof covered heating pipes to be fire resistant for about 30 minutes. Also, fire simulation was carried out by entering fire load during a real fire test and as a result, the maximum temperature is $943^{\circ}C$, almost identical with $932^{\circ}C$ during a real fire test. Therefore, it is considered that fire behaviour can be predicted by conducting fire simulation only with common utility tunnels fire load and result values of heat release rate, height of the smoke layer, concentration of O2, CO, CO2 etc. obtained by simulation are determined to be applied as the values during a real fire experiment. In the future, it is expected that more reliable information on domestic underground common utility tunnels fire accidents can be provided and it will contribute to construction and maintenance repair effectively and systematically by analyzing and accumulating experimental data on domestic underground common utility tunnels fire accidents built in this study and fire cases continuously every year and complementing laws and regulations and administration manuals etc.
Journal of the Korea institute for structural maintenance and inspection
/
v.15
no.3
/
pp.142-154
/
2011
This study predicted the probability of corrosion initiation of reinforced concrete tunnel boxes structures using the Monte Carlo Simulation. For the inner wall and outer wall in the tunnel boxes, exposed to airborne chloride ion and seawater directly respectively, statistical values of parameters like diffusion coefficient D, surface chloride content $C_s$, cover depth c, and the chloride threshold level $C_{lim}$ were examined from experiment or literature review. Their average values accounted for $3.77{\times}10^{-12}m^2/s$, 3.0% by weight of cement, 94.7mm and 45.5mm for outer wall and inner wall, respectively, and 0.69% by weight of cement for D, $C_s$, c, and $C_{lim}$, respectively. With these parametric values, the distribution of chloride contents at rebar with time and the probability of corrosion initiation of the tunnel boxes, inner wall and outer wall, was examined by considering time dependency of chloride transport. From the examination, the histogram of chloride contents at rebar is closer to a gamma distribution, and the mean value increases with time, while the coefficient of variance decreases with time. It was found that the probability of corrosion initiation and the time to corrosion were dependent on the time dependency of chloride transport. Time independent model predicted time to corrosion initiation of inner wall and outer wall as 8 and 12 years, respectively, while 178 and 283 years of time to corrosion was calculated by time dependent model for inner wall and outer wall, respectively. For time independent model, the probability of corrosion at 100 years of exposure for inner wall and outer wall was ranged 59.5 and 95.5%, respectively, while time dependent model indicated 2.9 and 0.2% of the probability corrosion, respectively. Finally, impact of $C_{lim}$, including values specified in current codes, on the probability of corrosion initiation and corrosion free life is discussed.
Purpose: In order to obtain better quantitation of kidney uptake, this study is to evaluate a conjugate view method (CVM) using a geometric mean attenuation correction for kidney uptake and to compare it to Gate's method. Materials & Methods: We used a Monte Carlo code, SIMIND and a Zubal phantom, to simulate kidney uptake. SIMIND was both simulated with or without scatter for the Zubal phantom. Also, a real phantom test was carried out using a dual-head gamma camera. The activity of 0.5 mCi was infused into two small cylinder phantoms of 5 cm diameter, and then, they were inserted into a cylinder phantom of 20 cm diameter. The results by the CVM method were compared with ideal data without both of attenuation and scatter and with Gate's method. The CVM was performed with or without scatter correction. The Gate's method was performed without scatter correction and it was evaluated with regards to $0.12cm^{-1}\;and\;0.15cm^{-1}$ attenuation coefficients. Data were analyzed with comparisons of mean counts in the legions of interest (ROI), profiles drawn over kidney images and linear regression. Correlation coefficients were calculated with ideal data, as well. Results: In the case of the computer simulation, mean counts measured from ideal data, the CVM and the Gate's method were (right $998{\pm}209$, left: $896{\pm}249$), (right: $911{\pm}207$, left: $815{\pm}265$), and (right: $1065{\pm}267$, left: $1546{\pm}267$), respectively. The ideal data showed good correlation with the CVM and the correlation coefficients of the CVM, Gate's method were (right: 0.91, left: 0.93) and (right: 0.85, left: 0.90), respectively. Conclusion: The conjugate view method using geometric mean attenuation correction resulted in better accuracy than the Gate's method. In conclusion, the conjugate view method independent of renal depths may provide more accurate kidney uptake.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.