• Title/Summary/Keyword: Checking Application

Search Result 285, Processing Time 0.029 seconds

Application of Deep Learning Algorithm for Detecting Construction Workers Wearing Safety Helmet Using Computer Vision (건설현장 근로자의 안전모 착용 여부 검출을 위한 컴퓨터 비전 기반 딥러닝 알고리즘의 적용)

  • Kim, Myung Ho;Shin, Sung Woo;Suh, Yong Yoon
    • Journal of the Korean Society of Safety
    • /
    • v.34 no.6
    • /
    • pp.29-37
    • /
    • 2019
  • Since construction sites are exposed to outdoor environments, working conditions are significantly dangerous. Thus, wearing of the personal protective equipments such as safety helmet is very important for worker safety. However, construction workers are often wearing-off the helmet as inconvenient and uncomportable. As a result, a small mistake may lead to serious accident. For this, checking of wearing safety helmet is important task to safety managers in field. However, due to the limited time and manpower, the checking can not be executed for every individual worker spread over a large construction site. Therefore, if an automatic checking system is provided, field safety management should be performed more effectively and efficiently. In this study, applicability of deep learning based computer vision technology is investigated for automatic checking of wearing safety helmet in construction sites. Faster R-CNN deep learning algorithm for object detection and classification is employed to develop the automatic checking model. Digital camera images captured in real construction site are used to validate the proposed model. Based on the results, it is concluded that the proposed model may effectively be used for automatic checking of wearing safety helmet in construction site.

Automated Scenario Generation for Model Checking Trampoline Operating System

  • Chowdhury, Nahida Sultana;Choi, Yunja
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1342-1345
    • /
    • 2011
  • A valid scenario generation is essential for model checking software. This paper suggests an automated scenario generation technique through the analysis of function called-by graphs and call graphs of the program source code. We provide the verification process including the scenario generation and show application results on the Trampoline operating system using CBMC as a back-end model checker.

Analysis on a Minimum Infinity-norm Solution for Kinematically Redundant Manipulators

  • Insoo Ha;Lee, Jihong
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.130-139
    • /
    • 2002
  • In this paper, at first, we investigate existing algorithms for finding the minimum infinity-norm solution of consistent linear equations and then propose a new algorithm. The proposed algorithm is intended to includes the advantages of computational efficiency as well as geometric explicitness. As a practical application example, optimum trajectory planning for redundant robot manipulators is considered. Also, an efficient approach avoiding discontinuity in trajectory is proposed by resolving the non-uniqueness problem of minimum infinity-norm solution. To be specific, the proposed method for checking possible discontinuity does not need any other algorithms in checking the possibility of discontinuity while previous work needs specially designed checking courses. To show the usefulness of the proposed techniques, an example calculating minimum infinity-norm solution for comparing the computational efficiency as well as the trajectory planning for a redundant robot manipulator are included.

Architectural model driven dependability analysis of computer based safety system in nuclear power plant

  • Wakankar, Amol;Kabra, Ashutosh;Bhattacharjee, A.K.;Karmakar, Gopinath
    • Nuclear Engineering and Technology
    • /
    • v.51 no.2
    • /
    • pp.463-478
    • /
    • 2019
  • The most important non-functional requirements for dependability of any Embedded Real-Time Safety Systems are safety, availability and reliability requirements. System architecture plays the primary role in achieving these requirements. Compliance with these non-functional requirements should be ensured early in the development cycle with appropriate considerations during architectural design. In this paper, we present an application of system architecture modeling for quantitative assessment of system dependability. We use probabilistic model checker (PRISM), for dependability analysis of the DTMC model derived from system architecture model. In general, the model checking techniques do not scale well for analyzing large systems, because of prohibitively large state space. It limits the use of model checking techniques in analyzing the systems of practical interest. We propose abstraction based compositional analysis methodology to circumvent this limitation. The effectiveness of the proposed methodology has been demonstrated using the case study involving the dependability analysis of safety system of a large Pressurized Water Reactor (PWR).

Development and Effectiveness of Smartphone Application for the Medication Confirmation of High-alert Medications (고 위험약물의 투약확인을 위한 스마트 폰 어플리케이션의 개발 및 효과)

  • Kim, Myoung Soo
    • Korean Journal of Adult Nursing
    • /
    • v.26 no.3
    • /
    • pp.253-265
    • /
    • 2014
  • Purpose: This study was done to develop and evaluate a smartphone application for the medication confirmation of high-alert medications. Methods: A nonequivalent control group non-synchronized design was used for this study. Participants in the treatment group used the application for four weeks. Data were analyzed using descriptive analysis, ${\chi}^2$-test, and t-test for the homogeneity of participants, and a paired t-test for effectiveness in each group with the SPSS 18.0. Results: Stability of medication administration was estimated by knowledge and certainty, ranged from a score of one to three. A correct answer with high certainty was coded as high stability, low certainty regardless of correct answer was coded as a moderate stability, and incorrect answers with high certainty were rated as low stability. There were no differences in 'knowledge of high alert medication', 'Certainty of knowledge', 'stability of medication administration', 'confidence of single checking medication', and 'medication safety activities' between the treatment group and the comparison group. The treatment group reported a greater difference between pretest and post-test in 'certainty of medication knowledge' (t=3.51, p=.001) than the comparison group. Conclusion: Smartphone application for medication confirmation of high-alert medications will provide an important platform for reducing medication errors risk.

A Qualitative analysis of students' factorization of xn-1 using a CAS application (CAS 어플리케이션을 이용한 xn-1의 인수분해 일반화 과정에 대한 질적 분석)

  • Cho, Yeong Ju;Kim, Kyung Mi;Whang, Woo Hyung
    • The Mathematical Education
    • /
    • v.52 no.3
    • /
    • pp.271-301
    • /
    • 2013
  • The purpose of the study was to investigate how students generalize and prove the factoring of $x^n-1$ using a Computer Algebra System application and the role of CAS in this process. The theoretical framework consists of the anthropological and the instrumental approach. In particular, the basis of the Task-Technique-Theorization(T-T-T) frame adapted form Chevallard's anthropological approach of Didactics is utilized. We found that Technique-Theorization emerges in mutual interaction between paper-and-pencil techniques and computer algebra techniques. And this interaction led to the students' theoretical reflection and conceptual understanding. In this process, we could identify three epistemic role of CAS : the role of checking the result, the role of cognitive stimulation and the role of extending thinking. Therefore CAS plays on a epistemic role of checking the result of a task, stimulating the student' cognition and extending their thinking as well as pragmatic role of producing the result of a input.

Detecting Errors and Checking Consistency in the Object-Oriented Design Models (객체지향 설계방법에서 오류 검출과 일관성 점검기법 연구)

  • Jeong, Gi-Won;Jo, Yong-Seon;Gwon, Seong-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.8
    • /
    • pp.2072-2087
    • /
    • 1999
  • As software size ever increases and user's requirements become more and more sophisticated., the importance of software quality is more and more emphasized. However, we are not satisfied for the present techniques on detecting errors and checking consistency in the object-oriented design model. This paper proposes a systematic approach which produces implementable rules to detect errors and check consistency. At first, the meta-models for UML diagrams are constructed, generalized meta-rules are reduced from the meta-models, and then the meta-rules are applied to produce the implementable rules. This approach enables to pursue the completeness of the rules and the automation of rule application. An example of rule application shows the feasibility of the rule application.

  • PDF

Conceptual Study of the Application Software Manager Using the Xlet Model in the Nuclear Fields (원자력 관점에서의 Xlet 모델을 이용한 응용 소프트웨어 관리자 개념 연구)

  • Joon-Koo Lee;Hee-Seok Park;Heui-Youn Park;In-Soo Koo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.59-65
    • /
    • 2003
  • In order to reduce the cost of software maintenance including software modification, we suggest the object oriented program with checking the version of application program using the Java language and the technique of executing the downloaded application program via network using the application manager. In order to change the traditional scheduler to the application manager we have adopted the Xlet concept in the nuclear fields using the network. In usual Xlet means a Java application that runs on the digital television receiver. The Java TV Application Program Interface(API) defines an application model called the Xlet application lifecycle. Java applications that use this lifecycle model are called Xlets. The Xlet application lifecycle is compatible with the existing application environment and virtual machine technology. The Xlet application lifecycle model defines the dialog(protocol) between an Xlet and its environment

  • PDF

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

Development of High-level Method for Representing Explicit Verb Phrases of Building Code Sentences for the Automated Building Permit System of Korea (서술부의 함수체계화를 통한 인허가관련 건축법규의 자동검토 응용방안)

  • Park, Seokyung;Lee, Jin-Kook;Kim, Inhan
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.3
    • /
    • pp.313-324
    • /
    • 2016
  • As building information modeling (BIM) is expanding its influence in various fields of architecture, engineering, construction and facility management (AEC-FM) industry, BIM-based automated code compliance checking has become possible prospects. For the automated code compliance checking, requirements in building code need to be processed into explicit representation that enables automated reasoning. This paper aims to develop high-level methods that translate verb phrases into explicit representation. The high-level methods represent conditions, properties, and related actions of the building objects and clarify the core content of the constraints. The authors analyze building permit requirements in Korea Building Code and establish a standardized process of deriving the high-level methods. As a result, 60 kinds of the high-level methods were derived. In addition, method classification, analysis, and application are introduced. This study will contribute to the representation of explicit building code sentences and establishment of the automated building permit system of Korea.