• Title/Summary/Keyword: 철도 신호 데이터

Search Result 182, Processing Time 0.042 seconds

A Study on Estimating the Crossing Speed of Mobility Handicapped for the Activation of the Smart Crossing System (스마트횡단시스템 활성화를 위한 교통약자의 횡단속도 추정)

  • Hyung Kyu Kim;Sang Cheal Byun;Yeo Hwan Yoon;Jae Seok Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.87-96
    • /
    • 2022
  • The traffic vulnerable, including elderly pedestrians, have a relatively low walking speed and slow cognitive response time due to reduced physical ability. Although a smart crossing system has been developed and operated to improve problem, it is difficult to operate a signal that reflects the appropriate walking speed for each pedestrian. In this study, a neural network model and a multiple regression model-based traversing speed estimation model were developed using image information collected in an area with a high percentage of traffic vulnerability. to support the provision of optimal walking signals according to real-time traffic weakness. actual traffic data collected from the urban traffic network of Paju-si, Gyeonggi-do were used. The performance of the model was evaluated through seven selected indicators, including correlation coefficient and mean absolute error. The multiple linear regression model had a correlation coefficient of 0.652 and 0.182; the neural network model had a correlation coefficient of 0.823 and 0.105. The neural network model showed higher predictive power.

Verification of safety integrity for vital data processing device through quantitative safety analysis (정량적 안전성 분석을 통한 Vital 데이터 처리장치의 안전무결성 요구사항 검증)

  • Choi, Jin-Woo;Park, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4863-4870
    • /
    • 2015
  • Currently, as a priority to secure the safety of the railway signalling system, verification for satisfy of the safety integrity requirements(SIR) is required to the essential elements. Safety Integrity Requirements(SIR) verification is performed based on the system safety analysis. But the probability of securing basic data for system safety analysis significantly dropped because there is no experience yet performed in the country. Therefore we are had to rely on a qualitative analysis. There are methods such as qualitative risk analysis matrix, and risk graphs. The qualitative analysis is wide, the width of the accident. However, the reliability of the result is significantly less has a disadvantage. Therefore, it should be parallel quantitative safety analysis of the system/products in order to compensate for the disadvantages of the qualitative analysis. This paper presents a quantitative safety analysis method to overcome the disadvantages of the qualitative analysis. And through a result, highly reliable Safety Integrity Requirements(SIR) verification measures proposed. Verification results, the dangerous failure incidence for vital data processing device was calculated to be $1.172279{\times}10^{-9}$. The result was verified to exceed the required safety integrity targets more.

Smart-clothes System for Realtime Privacy Monitoring on Smart-phones (스마트폰에서 실시간 개인 모니터링을 위한 스마트의류 시스템)

  • Park, Hyun-Moon;Jeon, Byung-Chan;Park, Won-Ki;Park, Soo-Hyun;Lee, Sung-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.8
    • /
    • pp.962-971
    • /
    • 2013
  • In this paper, we propose a method to infer the user's behavior and situation through collected data from multi-sensor equipped with a smart clothing and it was implemented as a smart-phone App. This smart-clothes is able to monitor wearer users' health condition and activity levels through the gyro, temp and acceleration sensor. Sensed vital signs are transmitted to a bluetooth-enabled smart-phone in the smart-clothes. Thus, users are able to have real time information about their user condition, including activities level on the smart-application. User context reasoning and behavior determine is very difficult using multi-sensor depending on the measured value of the sensor varies from environmental noise. So, the reasoning and the digital filter algorithms to determine user behavior reducing noise and are required. In this paper, we used Multi-black Filter and SVM processing behavior for 3-axis value as a representative value of one.

Kinematic Modelling of the Trot of a Lizard Based on the Motion Capture (모션 캡쳐에 기반한 도마뱀 속보에 대한 기구학적 모델링)

  • Kim, Chang Hoi;Shin, Ho Cheol;Lee, Heung Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.264-273
    • /
    • 2013
  • The importance of the robots has emerged as the means of minimizing the casualties in the future war, and, thus, the biomimetic robots mimicking the optimized organisms has been actively studied. The robot inspired lizard is suitable for reconnaissance and the surveillance in narrow areas. In this paper, we analyzed the locomotion of a lizard by motion capture system using the infrared markers. We attached 21 markers to the joints of the lizard. By considering the measured data, we analyzed the walking motion of the lizard which trots in a sprawled posture. Moreover, we proposed the 25 dof kinematic model which was able to reproduce the gait of the lizard faithfully. The model was verified by simulations.

A Study on the Physical-Layer Network Coding in a Two-Way Relay Network with Multiple Antennas (다중 안테나 기반 양방향 중계 네트워크를 위한 물리계층 네트워크 코딩에 관한 연구)

  • Lim, Hyeonwoo;Ban, Tae-Won;Jung, Bang Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.54-56
    • /
    • 2015
  • In this paper, we investigate a physical-layer network coding (PNC) in a two-way relay channel (TWRC) where two sources send and receive data with each other by help of a relay node with multiple antennas. We focus on the multiple-access phase of the TWRC in this paper. It is assumed that the source nodes do not know the wireless channel and the wireless channel independently varies in time, that is, fast fading environments. At the relay node, the channel is assumed to be perfectly known. The relay node utilizes the channel sate information and applies maximum likelihood ratio for detecting received signals. Through extensive simulations, it is shown that a bit error rate (BER) performance becomes improved as the number of antennas at the relay node increases.

  • PDF

A Study on Motion Estimator Design Using Bit Plane (비트 플레인을 이용한 움직임 추정기 설계에 관한 연구)

  • 박종진;이권철;김은원;조원경
    • The Journal of Information Technology
    • /
    • v.3 no.2
    • /
    • pp.39-47
    • /
    • 2000
  • Among the compression methods of moving picture information, a motion estimation method is used to remove time-repeating. The Block Matching Algorithm in motion estimation methods is the commonest one. In recent days, it is required the more advanced high quality in many image processing fields, for example HDTV, etc. Therefore, we have to accomplish not by means of Partial Search Algorithm, but by means of Full Search Algorithm in Block Matching Algorithm. In this paper, it is suggested a structure that reduce total calculation quantity and size, because the structure using Bit Plane select and use only 3bit of 8bit luminance signal.

  • PDF

Secrecy Performance of Secure Amplify-and-Forward Transmission with Multi-Antenna Relay (다중 안테나 릴레이 기반의 Secure Amplifyand-Forward 전송 시스템의 보안 성능 분석)

  • Hwang, Kyu-Sung;Ju, MinChul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.733-738
    • /
    • 2013
  • In this paper, we consider a physical layer security of an amplify-and-forward (AF) transmission in a presence of an eavesdropper in a wiretap channel. The proposed wiretap channel consists of a source, a destination, a relay, and an eavesdropper. Specifically, we consider that the relay has multiple antennas to exploit a diversity gain and a receive/transmit antenna selection schemes are applied to maximize a signal-to-noise ratio. In a practical point of view, we focus on the practical scenario where the relay does not have any channel state information of the eavesdropper while performing an AF protocol at the relay. For a secrecy performance analysis, we analyze a secrecy outage probability of the proposed system in one-integral form and verify our analysis with the computer-based simulation.

Design of Synchronized Power Control Embedded System Based on Core-A Platform (Core-A 플랫폼을 이용한 동기형 전력제어 임베디드 시스템 설계)

  • Lee, Woo-Kyung;Moon, Dai-Tchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1413-1421
    • /
    • 2014
  • This paper realize power control embedded system with one master of Core-A 32-bit RISC processor and several slaves controling power with synchronized digital signals. Core-A platform is consisted of Core-A processor, AMBA bus, SSRAM, AC97, DMA, UART, GPIO etc. Slave is made by both digital part and analog part. The former generates various power control patterns synchronized with master signal. The latter converts 220V power proportional to 4 bit digital signals. design of Embedded system is executed in Flowrian II, in which software is cross-compiled and hardware is verified by simulation. Embedded system is implemented in FPGA board and CPLD chips as well as PCB board for analog power control.

Development of Mobile u-Healthcare System in WSN (무선센서네트워크 환경의 모바일 u-헬스케어 시스템 개발)

  • Lee, Seung-Chul;Chung, Wan-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.338-346
    • /
    • 2012
  • Wireless sensor network (WSN) technology provides a variety of medical and healthcare solutions to assist detection and communication of body conditions. However, data reliability inside WSN might be influenced to healthcare routing protocol due to limited hardware resources of computer, storage, and communication bandwidth. For this reason, we have conducted various wireless communication experiments between nodes using parameters such as RF strength, battery status, and deployment status to get a optimal performance of mobile healthcare routing protocol. This experiment may also extend the life time of the nodes. Performance analysis is done to obtain some important parameters in terms of distance and reception rate between the nodes. Our experiment results show optimal distance between nodes according to battery status and RF strength, or deployment status and RF strength. The packet reception rate according to deployment status and RF strength of nodes was also checked. Based on this performance evaluation, the optimized sensor node battery and deployment in the developed our mobile healthcare routing protocol were proposed.

A Study on the Uplink SDMA Systems: User Scheduling, Transmit Power Control, and Receive Beamforming (상향링크 공간 분할 다중 접속 시스템에서 사용자 스케쥴링, 송신 전력 제어, 수신 빔포밍에 관하여)

  • Cho, Moon-Je;Ban, Tae-Won;Jung, Bang Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.289-294
    • /
    • 2014
  • In this paper, we investigate the user scheduling, transmit beamforming, and receive beamforming of uplink space division multiple access (SDMA) systems where multiple users are allowed to transmit their signal to a base station (BS) using the same frequency band simultaneously. The BS performs a receive beamforming using the predetermined pseudo-random pattern and select users with a specific criterion. Especially, in this paper, we propose the threshold-based transmit power control, in which a user decrease its transmit power according if its generating interference to other users's signal is larger than a predetermined threshold. Assuming that the TDD system is used, the channel state information (CSI) can be obtained at each user from pilot signals from the BS. Simulation results show that the proposed technique significantly outperforms the existing user scheduling algorithms.