• Title/Summary/Keyword: Computer-control

Search Result 11,884, Processing Time 0.039 seconds

Variation of the CO2 Capture Reaction by Ammonia Solution with Temperature (온도에 따른 암모니아 용액에 의한 CO2 포집 반응의 변화 양상)

  • Kim, Soo-Yeon;Choi, Ye-Seul;Kim, Dong-Su
    • Journal of Korean Society on Water Environment
    • /
    • v.27 no.6
    • /
    • pp.896-904
    • /
    • 2011
  • The features of the capture reaction of $CO_2$ by ammonia solution have been investigated along with the effect of temperature on the reaction based upon computer program-utilizing calculation and thermodynamic estimation. The stable region of $CO{_3}^{2-}$ was observed to increase with temperature and the change of the stable region of $CO{_3}^{2-}$ with temperature was greater than the temperature variation of the stable region of other carbonate species. The distribution diagram for $NH_4{^+}-NH_3$ system was constructed and the rise of temperature resulted in the decrease of the stability of $NH_4{^+}$ ion, which was thought to be due to the endothermic nature of its acidic dissociation. Considering the introduction of $Ca^{2+}$ ion in the carbon capture reaction by $NH_4{^+}$, the temperature was observed to be important in the determination of the order of reaction between carbonate ion and these cations. The removal process of $CO_2$ gas by ammonia solution was presumed to occur in open system and the temperature variations of the concentration of carbonate system species along with their total concentration were calculated for the proper control and design of the real process.

Authentication Protocol Using Hamming Distance for Mobile Ad-hoc Network (모바일 Ad-hoc 네트워크에서 Hamming Distance를 이용한 인증프로토콜)

  • Lee, Seok-Lae;Song, Joo-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • Mobile Ad-hoc networks have various implementation constraints such as infrastructure-free, no trusted authority, node mobility, and the limited power and small memory of mobile device. And just like wired networks, various security issues such as authentication, confidentiality, integrity, non-repudiation, access control, availability and so on have been arisen in mobile Ad-hoc networks. But we focus on authentication of these security issues because it is quitely affected by the characteristics of networks. In this paper, we propose the authentication protocol that can limit the size of certificate repository as $log_2N$ and assures to make a trusted certificate path from one node to another, adopting the concept of Hamming distance. Particularly, our protocol can construct a trusted certificate path in spite of decreasing or increasing the number of nodes in mobile Ad-hoc network.

Gateway platform for interoperability between OPC UA Publisher and DDS Subscribers (OPC UA Publisher와 DDS Subscriber의 상호운용성을 위한 게이트웨이 플랫폼)

  • Sim, Woong-Bin;Song, Byung-Kwen;Shin, Jun-Ho
    • Journal of IKEEE
    • /
    • v.25 no.2
    • /
    • pp.291-301
    • /
    • 2021
  • OPC UA at the control and field level does not provide enough performance to replace the field bus. The OPC Foundation aims for a real-time and connection-less mechanism, and has added the OPC UA publish-subscribe model, a new specification that supports broker functions such as MQTT and AMQP, as the OPC UA Part 14 standard. This paper is about a gateway for interoperability between OPC UA publisher with the addition of OPC UA Part14 standard and DDS subscribers. Raspberry Pi 4 is used for the gateway proposed in this paper, and OpenDDS, an open source, is used for DDS. OPC UA publish-subscribe module used A-Open62541 publish-subscribe module, which additionally implements functions not provided by the corresponding source based on Open62541 publish-subscribe open source.

A Smart Closet Using Deep Learning and Image Recognition for the Blind (시각장애인을 위한 딥러닝과 이미지인식을 이용한 스마트 옷장)

  • Choi, So-Hee;Kim, Ju-Ha;Oh, Jae-Dong;Kong, Ki-Sok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.51-58
    • /
    • 2020
  • The blind people have difficulty living an independent clothing life. The furniture and home appliance are adding AI or IoT with the recent growth of the smart appliance market. To support the independent clothing life of the blind, this paper suggests a smart wardrobe with closet control function, voice recognition function and clothes information recognition using CNN algorithm. The number of layers of the model was changed and Maxpooling was adjusted to create the model to increase accuracy in the process of recognizing clothes. Early Stopping Callback option is applied to ensure learning accuracy when creating a model. We added Dropout to prevent overfitting. The final model created by this process can be found to have 80 percent accuracy in clothing recognition.

Design and Implementation of User Pattern based Standby Power Reduction System Applying Zigbee-MQTT in a Smart Building Environment (스마트빌딩 환경에서 Zigbee-MQTT를 이용한 사용자 패턴 기반 대기전력 저감 시스템 설계 및 구현)

  • Jang, Young-Hwan;Lee, Sang-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.9
    • /
    • pp.1158-1164
    • /
    • 2020
  • In Korea, the dependence on imported energy is very high, and research to reduce standby power is being conducted based on Zigbee, a low-power technology, to reduce wasted power and improve power efficiency. However, because Zigbee is not an IoT standard protocol and is not network-based, it is necessary to build a network with a separate gateway, and research on standby power is insufficient because the standards for international power consumption of devices are ambiguous. Therefore, in this paper, we applied the IoT standard protocol MQTT to the existing Zigbee technology to build a network network without a separate gateway, and designed and implemented a standby power reduction system that collects standby power degradation and user patterns. As a result of evaluating with the existing system, it was confirmed that about 7.11% of standby power was consumed compared to the existing system.

Design of Industrial Communication Gateway Using Additive Layer Type Communication Module (적층형 통신 모듈을 이용한 산업용 통신 게이트웨이 설계)

  • Nam, Jae-Hyun;Eum, Sang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1673-1678
    • /
    • 2019
  • There are various networks and communication methods are used in industrial communication. Enterprises need to convert communications between industrial devices and networks for production line expansion, factory upgrades, network segmentation, and SI. This requires designers manufactured by many manufacturers to provide communication equipment for data or protocol conversion in order to connect and transmit various other mechanical devices to the network. This paper designed industrial communication gateway that can support the transformation of industrial communication protocol using multi-layered communication module. Industrial communication gateways have a structure that connects individual communication modules using RS485 communication to multiple layers. Each communication module consisted of analog and digital data card, LAN, and CAN-enabled card. The main board processor used Atmega micro-processor, and the RS485 slot was placed to have a multi-layer communication module structure. These additive layer type communication modules support analog and digital I/O functions and LAN and CAN for wide use in industrial communication control and monitoring.

Low-cost privacy protection integrated monitoring system using interest emphasis method (관심강조 방법을 활용한 저비용 사생활보호 통합관제시스템)

  • Shin, Kwang-Seong;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.234-239
    • /
    • 2021
  • Recently, as the installation of a large number of high-performance CCTVs for crime prevention and traffic control has increased rapidly, the problem of increasing system requirements for response to privacy infringement factors and analysis of high-definition image information transmitted from multiple cameras has been actively emerging. Accordingly, there is a need for a method for responding to privacy infringement and a method for efficiently processing surveillance images input from multiple cameras. In this paper, in order to reduce the processing cost of the input image and improve the processing speed, an integrated image is generated by grouping images input from a plurality of cameras. After analyzing the pre-generated integrated video, it detects a preset privacy event or an event that highlights interest. Depending on whether or not an event is detected, you will perform an editing operation corresponding to the event.

A Study on the Image Based Auto-focus Method Considering Jittering of Airborne EO/IR (항공탑재 EO/IR의 영상떨림을 고려한 영상기반 자동 초점조절 기법 연구)

  • Kang, Myung-Ho;Kim, Sung-Jae;Koh, Yeong Jun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.50 no.1
    • /
    • pp.39-45
    • /
    • 2022
  • In this paper, we propose methods to improve image-based auto-focus that can compensate for drawbacks of traditional auto-focus control. When adjusting the focus, there is a problem that the focus window cannot be set to the same position if the camera's LOS is not directed at the same location and flow or shake. To address this issue, we applied image tracking techniques to improve optimal focus localization accuracy. And also, although the same focus value should be calculated at the same focus step, but different values can be calculated by camera's fine shaking or image disturbance due to atmospheric scattering. To tackle this problem a SAFS (Stable Adjacency Frame Selection) has been proposed. As a result of this study, our proposed methodology shows more accurate than traditional methods in terms of finding best focus position.

Integrative Comparison of Burrows-Wheeler Transform-Based Mapping Algorithm with de Bruijn Graph for Identification of Lung/Liver Cancer-Specific Gene

  • Ajaykumar, Atul;Yang, Jung Jin
    • Journal of Microbiology and Biotechnology
    • /
    • v.32 no.2
    • /
    • pp.149-159
    • /
    • 2022
  • Cancers of the lung and liver are the top 10 leading causes of cancer death worldwide. Thus, it is essential to identify the genes specifically expressed in these two cancer types to develop new therapeutics. Although many messenger RNA (mRNA) sequencing data related to these cancer cells are available due to the advancement of next-generation sequencing (NGS) technologies, optimized data processing methods need to be developed to identify the novel cancer-specific genes. Here, we conducted an analytical comparison between Bowtie2, a Burrows-Wheeler transform-based alignment tool, and Kallisto, which adopts pseudo alignment based on a transcriptome de Bruijn graph using mRNA sequencing data on normal cells and lung/liver cancer tissues. Before using cancer data, simulated mRNA sequencing reads were generated, and the high Transcripts Per Million (TPM) values were compared. mRNA sequencing reads data on lung/liver cancer cells were also extracted and quantified. While Kallisto could directly give the output in TPM values, Bowtie2 provided the counts. Thus, TPM values were calculated by processing the Sequence Alignment Map (SAM) file in R using package Rsubread and subsequently in python. The analysis of the simulated sequencing data revealed that Kallisto could detect more transcripts and had a higher overlap over Bowtie2. The evaluation of these two data processing methods using the known lung cancer biomarkers concludes that in standard settings without any dedicated quality control, Kallisto is more effective at producing faster and more accurate results than Bowtie2. Such conclusions were also drawn and confirmed with the known biomarkers specific to liver cancer.

Evaluation of Environmental Contamination and Disinfection Effects in Patient Rooms with Carbapenem-Resistant Enterobacteriaceae Using ATP Measurements and Microbial Cultures (ATP 측정과 미생물 배양검사를 이용한 카바페넴내성장내세균 보유환자 병실 환경 오염 및 환경 소독 효과 평가)

  • Kim, Ji Eun;Jeong, Jae Sim;Kim, Mi Na;Park, Eun Suk
    • Journal of Korean Biological Nursing Science
    • /
    • v.23 no.4
    • /
    • pp.339-346
    • /
    • 2021
  • Purpose: To determine the extent of environmental contamination and the effect of disinfection around patients with carbapenem-resistant Enterobacteriaceae (CRE) using adenosine triphosphate (ATP) measurements and microbial culture tests. Methods: The subjects of this study were 10 patients hospitalized in a single room due to CRE from April 13 to 21, 2021. One hundred and sixty samples were collected using cotton swabs from the patients' environment including the surface and drain of sinks and toilet seats before and after disinfection of the room after discharge. Twenty-one samples were collected from the nurses' personal digital assistants (PDAs), keyboards, and computer mice before disinfection. The relative light units (RLUs) and CRE colony-forming units (CFU) of 181 samples were measured using ATP test equipment and chrome agar plates, respectively. Results: The highest RLUs were measured at the sink drains before and after disinfection. Four CRE samples from the sink drains (2), sink surface (1), and toilet bowl (1) before disinfection were cultured. Based on the failure criteria (≥ 250 RLU/cm2 and ≥ 1 CFU/100 cm2), 90 % and 50 % of the samples from the drain exceeded the failure criteria before and after disinfection, respectively. In the culture tests, CRE was not detected after disinfection. Conclusion: According to the RLU and CFU measurements of drain samples, disinfection was not effective. Thus, improvements in the disinfection methods of drains, as well as more efficient and systematic environmental decontamination and disinfection evaluation tools, are needed to accurately evaluate the effectiveness of disinfection in various places.