• Title/Summary/Keyword: Generate Data

Search Result 3,066, Processing Time 0.032 seconds

A Development of a Real-time, Traffic Adaptive Control Scheme Through VIDs. (영상검지기를 이용한 실시간 교통신호 감응제어)

  • 김성호
    • Journal of Korean Society of Transportation
    • /
    • v.14 no.2
    • /
    • pp.89-118
    • /
    • 1996
  • The development and implementation of a real-time, traffic adaptive control scheme based on fuzzy logic through Video Image Detector systems (VIDs) is presented. Through VIDs based image processing, fuzzy logic can be used for a real-time traffic adaptive signal control scheme. Fuzzy control logic allows linguistic and inexact traffic data to be manipulated as a useful tool in designing signal timing plans. The fuzzy logic has the ability to comprehend linguistic instructions and to generate control strategy based on a priori verbal communication. The implementation of fuzzy logic controller for a traffic network is introduced. Comparisons are made between implementations of the fuzzy logic controller and the actuated controller in an isolated intersection. The results obtained from the application of the fuzzy logic controller are also compared with those corresponding to a pretimed controller for the coordinated intersections. Simulation results from the comparisons indicate the performance of the system is between under the fuzzy logic controller. Integration of the aforementioned schemes into and ATMS framework will lead to real-time adjustment of the traffic control signals, resulting in significant reduction in traffic congestion.

  • PDF

Vibration Analysis of Ball Bearings with Ball Geometric Imperfections (볼의 기하학적 불완전성을 갖는 볼베어링의 진동해)

  • 김영철;최상규;윤기찬
    • Proceedings of the Korean Society of Tribologists and Lubrication Engineers Conference
    • /
    • 2001.11a
    • /
    • pp.237-242
    • /
    • 2001
  • In this paper, we theoretically analyzed the NRRO(the non-repeatable run-out) of a ball bearing with ball geometric imperfection. The quasi-static and dynamic analysis of a ball bearing was performed to calculate the displacement of shaft center caused by the ball form errors while the shaft is rotating. From consideration of the generating mechanism of NRRO, it is found that the size and form errors of ball generate vibrations with (equation omitted)$\_$c/ and n(equation omitted)$\_$b/${\pm}$(equation omitted)$\_$c/(where n is even) components, respectively. The ball form errors of a ball bearing were precisely measured and NRRO of a ball bearing was calculated using the measured data. A statistical approach was peformed to analyze NRRO of ball bearings with radial errors.

  • PDF

Localization and Autonomous Control of PETASUS System II for Manipulation in Structured Environment (구조화된 수중 환경에서 작업을 위한 PETASUS 시스템 II의 위치 인식 및 자율 제어)

  • Han, Jonghui;Ok, Jinsung;Chung, Wan Kyun
    • The Journal of Korea Robotics Society
    • /
    • v.8 no.1
    • /
    • pp.37-42
    • /
    • 2013
  • In this paper, a localization algorithm and an autonomous controller for PETASUS system II which is an underwater vehicle-manipulator system, are proposed. To estimate its position and to identify manipulation targets in a structured environment, a multi-rate extended Kalman filter is developed, where map information and data from inertial sensors, sonar sensors, and vision sensors are used. In addition, a three layered control structure is proposed as a controller for autonomy. By this controller, PETASUS system II is able to generate waypoints and make decisions on its own behaviors. Experiment results are provided for verifying proposed algorithms.

Reconstruction of Neural Circuits Using Serial Block-Face Scanning Electron Microscopy

  • Kim, Gyu Hyun;Lee, Sang-Hoon;Lee, Kea Joo
    • Applied Microscopy
    • /
    • v.46 no.2
    • /
    • pp.100-104
    • /
    • 2016
  • Electron microscopy is currently the only available technique with a spatial resolution sufficient to identify fine neuronal processes and synaptic structures in densely packed neuropil. For large-scale volume reconstruction of neuronal connectivity, serial block-face scanning electron microscopy allows us to acquire thousands of serial images in an automated fashion and reconstruct neural circuits faster by reducing the alignment task. Here we introduce the whole reconstruction procedure of synaptic network in the rat hippocampal CA1 area and discuss technical issues to be resolved for improving image quality and segmentation. Compared to the serial section transmission electron microscopy, serial block-face scanning electron microscopy produced much reliable three-dimensional data sets and accelerated reconstruction by reducing the need of alignment and distortion adjustment. This approach will generate invaluable information on organizational features of our connectomes as well as diverse neurological disorders caused by synaptic impairments.

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

COLLABORATIVE PROCESS PLANNING AND FLOW ANALYSIS FOR AUTOMOTIVE ASSEMBLY SHOPS

  • Noh, S.D.;Kim, G.
    • International Journal of Automotive Technology
    • /
    • v.7 no.2
    • /
    • pp.217-226
    • /
    • 2006
  • To maintain competitiveness in the modern automotive market, it is important to carry out process planning concurrently with new car development processes. Process planners need to make decisions concurrently and collaboratively in order to reduce manufacturing preparation time for developing a new car. Automated generation of a simulation model by using the integrated process plan database can reduce time consumed for carrying out a simulation and allow a consistent model to be used throughout. In this research, we developed a web-based system for concurrent and collaborative process planning and flow analysis for an automotive general assembly using web, database, and simulation technology. A single integrated database is designed to automatically generate simulation models from process plans without having to rework the data. This system enables process planners to evaluate their decisions quickly, considering various factors, and easily share their opinions with others. By using this collaborative system, time and cost put into the assembly process planning can be reduced and the reliability of the process plan would be improved.

Quantized DCT Coefficient Category Address Encryption for JPEG Image

  • Li, Shanshan;Zhang, Yuanyuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1790-1806
    • /
    • 2016
  • Digital image encryption is widely used for image data security. JPEG standard compresses image with great performance on reducing file size. Thus, to encrypt an image in JPEG format we should keep the quality of original image and reduced size. This paper proposes a JPEG image encryption scheme based on quantized DC and non-zero AC coefficients inner category scrambling. Instead of coefficient value encryption, the address of coefficient is encrypted to get the address of cipher text. Then 8*8 blocks are shuffled. Chaotic iteration is employed to generate chaotic sequences for address scrambling and block shuffling. Analysis of simulation shows the proposed scheme is resistant to common attacks. Moreover, the proposed method keeps the file size of the encrypted image in an acceptable range compared with the plain text. To enlarge the cipher text possible space and improve the resistance to sophisticated attacks, several additional procedures are further developed. Contrast experiments verify these procedures can refine the proposed scheme and achieve significant improvements.

An Efficient Biometric Identity Based Signature Scheme

  • Yang, Yang;Hu, Yupu;Zhang, Leyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.8
    • /
    • pp.2010-2026
    • /
    • 2013
  • The combination of biometrics and cryptography gains a lot of attention from both academic and industry community. The noisy biometric measurement makes traditional identity based cryptosystems unusable. Also the extraction of key from biometric information is difficult. In this paper, we propose an efficient biometric identity based signature scheme (Bio-IBS) that makes use of fuzzy extractor to generate the key from a biometric data of user. The component fuzzy extraction is based on error correction code. We also prove that the security of suggested scheme is reduced to computational Diffie-Hellman (CDH) assumption instead of other strong assumptions. Meanwhile, the comparison with existing schemes shows that efficiency of the system is enhanced.

Rhythmic Differences between Spontaneous and Read Speech of English

  • Kim, Sul-Ki;Jang, Tae-Yeoub
    • Phonetics and Speech Sciences
    • /
    • v.1 no.3
    • /
    • pp.49-55
    • /
    • 2009
  • This study investigates whether rhythm metrics can be used to capture the rhythmic differences between spontaneous and read English speech. Transcription of spontaneous speech tokens extracted from a corpus is read by three English native speakers to generate the corresponding read speech tokens. Two data sets are compared in terms of seven rhythm measures that are suggested by previous studies. Results show that there is a significant difference in the values of vowel-based metrics (VarcoV and nPVI-V) between spontaneous and read speech. This manifests a greater variability in vocalic intervals in spontaneous speech than in read speech. The current study is especially meaningful as it demonstrates a way in which speech styles can be differentiated and parameterized in numerical terms.

  • PDF

A realization of simulator for reliability verification on turbine controller for boiler feed Pump (급수펌프 구동용 증기터빈 제어기의 신뢰성 검증을 위한 시뮬레이터 구현)

  • Choi, I.K.;Jeong, W.J.
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2307-2309
    • /
    • 2002
  • A simulator had been developed and will be used for reliability verification on turbine control programs for boiler feed pump in power plant prior to its actual operation in field. A mathematical model on thermal dynamics pertaining to prime mover steam turbine and pump was realized and included in this simulator. Also, many design and operating data acquired from fields were utilized in order to decide mechanical and thermal dynamic characteristics such as friction loss windage loss and inertia. A user can decide closing or opening velocity of steam stop valves and steam regulation valves. This simulator is able to generate steam pressure, turbine speed, pump power.

  • PDF