• 제목/요약/키워드: IT-based system

검색결과 37,336건 처리시간 0.064초

통신기반 열차제어시스템 성능평가용 계측시스템 구현 및 적용 (Implementation & Application of Instrumentation System on Performance Evaluation for Korea-Radio Train Control System)

  • 이재호;이강미;박평식
    • 전기학회논문지
    • /
    • 제62권12호
    • /
    • pp.1777-1783
    • /
    • 2013
  • This study aims to implement an instrumentation system measuring and analysing real-time data of information flow between respective subunits composing train control system as the performance evaluation method for wireless communication based urban railway train control system under development for a Korean model. It analyses system functional requirements regarding subsystems composing wireless communication based train control system and test items for functions presented in each specification and examines data and measurement point for measuring according to test items in order to implement an instrumentation system. And, it clearly defines requirements of an instrumentation system to avoid malfunction or error in operation of train control system. It reviews data processing method and display method for effective analysis of data flow between respective subunits with measured data, designs and makes an instrumentation system. Ultimately, it applies to a performance test of train control system and makes sure an instrumentation system in normal working order.

심층 강화학습 기반의 대학 전공과목 추천 시스템 (Recommendation System of University Major Subject based on Deep Reinforcement Learning)

  • 임덕선;민연아;임동균
    • 한국인터넷방송통신학회논문지
    • /
    • 제23권4호
    • /
    • pp.9-15
    • /
    • 2023
  • 기존의 단순 통계 기반 추천 시스템은 학생들의 수강 이력 데이터만을 활용하기 때문에 선호하는 수업을 찾는 것에 많은 어려움을 겪고 있다. 이를 해결하기 위해, 본 연구에서는 심층 강화학습 기반의 개인화된 전공과목 추천 시스템을 제안한다. 이 시스템은 학생의 학과, 학년, 수강 이력 등의 정형 데이터를 기반으로 학생들 간의 유사도를 측정하며, 이를 통해 각 전공과목에 대한 정보와 학생들의 강의 평가를 종합적으로 고려하여 가장 적합한 전공과목을 추천한다. 본 논문에서는 이 DRL 기반의 추천 시스템을 통해 대학생들이 전공과목을 선택하는 데에 유용한 정보를 제공하며, 이를 통계 기반 추천 시스템과 비교하였을 때 더 우수한 성능을 보여주는 것을 확인하였다. 시뮬레이션 결과, 심층 강화학습 기반의 추천 시스템은 통계 기반 추천 시스템에 비해 수강 과목 예측률에서 약 20%의 성능 향상을 보였다. 이러한 결과를 바탕으로, 학생들의 강의 평가를 반영하여 개인화된 과목 추천을 제공하는 새로운 시스템을 제안한다. 이 시스템은 학생들이 자신의 선호와 목표에 맞는 전공과목을 찾는 데에 큰 도움이 될 것으로 기대한다.

Motion predictive control for DPS using predicted drifted ship position based on deep learning and replay buffer

  • Lee, Daesoo;Lee, Seung Jae
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제12권1호
    • /
    • pp.768-783
    • /
    • 2020
  • Typically, a Dynamic Positioning System (DPS) uses a PID feed-back system, and it often adopts a wind feed-forward system because of its easier implementation than a feed-forward system based on current or wave. But, because a ship's drifting motion is caused by wind, current, and wave drift loads, all three environmental loads should be considered. In this study, a motion predictive control for the PID feedback system of the DPS is proposed, which considers the three environmental loads by utilizing predicted drifted ship positions in the future since it contains information about the three environmental loads from the moment to the future. The prediction accuracy for the future drifted ship position is ensured by adopting deep learning algorithms and a replay buffer. Finally, it is shown that the proposed motion predictive system results in better station-keeping performance than the wind feed-forward system.

네트워크 기반 자동화 변전소에서 SOAP을 이용한 IED간 정보교환기술 연구 (A Study on the Information Exchange Technology Between IEDs Using SOAP in Network Based Substation Automation System)

  • 고윤석
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제55권9호
    • /
    • pp.376-383
    • /
    • 2006
  • In this paper, autonomous information exchange methodology is studied between IEDs using SOAP protocol based on XML and PtP communication to archive the safety and reliability of large-scale system operation. The SOAP protocol has the advantages in the independency Problem for operating systems, using language, platforms and the security problem because it is XML-based RPC protocol. Inference-based solution of the IED is designed as rule-based solution so that the IED internal status, the system status or the faulted zone can be inferred autonomously using the internal data as well as information data obtained from free information exchange among other IEDS, Also, it is designed so that the inference results and the operation information are transmitted to the above SCADA system, and determined autonomously whether the commands from the SCADA are executed or not. Finally, The inference-based solution of IED and information exchange system among IEDS is implemented using MS Visual C++ MFC, MS SOAP and MS XML. Availability and accuracy of the proposed methodology and the design is verified from diversity simulation reviews for typical distribution substation.

An image analysis system Design using Arduino sensor and feature point extraction algorithm to prevent intrusion

  • LIM, Myung-Jae;JUNG, Dong-Kun;KWON, Young-Man
    • 한국인공지능학회지
    • /
    • 제9권2호
    • /
    • pp.23-28
    • /
    • 2021
  • In this paper, we studied a system that can efficiently build security management for single-person households using Arduino, ESP32-CAM and PIR sensors, and proposed an Android app with an internet connection. The ESP32-CAM is an Arduino compatible board that supports both Wi-Fi, Bluetooth, and cameras using an ESP32-based processor. The PCB on-board antenna may be used independently, and the sensitivity may be expanded by separately connecting the external antenna. This system has implemented an Arduino-based Unauthorized intrusion system that can significantly help prevent crimes in single-person households using the combination of PIR sensors, Arduino devices, and smartphones. unauthorized intrusion system, showing the connection between Arduino Uno and ESP32-CAM and with smartphone applications. Recently, if daily quarantine is underway around us and it is necessary to verify the identity of visitors, it is expected that it will help maintain a safety net if this system is applied for the purpose of facial recognition and restricting some access. This technology is widely used to verify that the characters in the two images entered into the system are the same or to determine who the characters in the images are most similar to among those previously stored in the internal database. There is an advantage that it may be implemented in a low-power, low-cost environment through image recognition, comparison, feature point extraction, and comparison.

소셜 네트워크 서비스 기반의 POS 시스템 설계 및 개발 (Design and Development of POS System Based on Social Network Service)

  • 윤정현;문현실;김재경;최주철
    • 한국IT서비스학회지
    • /
    • 제14권2호
    • /
    • pp.143-158
    • /
    • 2015
  • Companies and governments in an era of big data have been tried to create new values with their data resources. Among many data resources, many companies especially pay attention to data which is obtained from Social Network Service (SNS) because it reveals precise opinion of customers and can be used to estimate profiles of them from their social relationships. However, it is not only hard to collect, store, and analyze the data, but system applications are also insufficient. Therefore, this study proposes a S-POS (Social POS) system which consists of three parts; Twitter Side, POS Side and TPAS (Twitter&POS Analysis System). In this system, SNS data and POS data which are collected from Twitter Side and POS Side are stored in Mongo D/B. And it provides several services with POS terminal based on analysis and matching results which are generated from TPAS. Through S-POS system, we expect to efficient and effective store and sales managements of system users. Moreover, they can provide some differentiated services such as cross-selling and personalized recommendation services.

정보시스템 감리에서의 정보보호 감리모형 설계 (A Design on the Information Security Auditing Framework of the Information System Audit)

  • 이지용;김동수;김희완
    • 디지털산업정보학회논문지
    • /
    • 제6권2호
    • /
    • pp.233-245
    • /
    • 2010
  • This paper proposes security architecture, security audit framework, and audit check item. These are based on the security requirement that has been researched in the information system audit. The proposed information security architecture is built in a way that it could defend a cyber attack. According to its life cycle, it considers a security service and security control that is required by the information system. It is mapped in a way that it can control the security technology and security environment. As a result, an audit framework of the information system is presented based on the security requirement and security architecture. The standard checkpoints of security audit are of the highest level. It was applied to the system introduction for the next generation of D stock and D life insurance company. Also, it was applied to the human resources information system of K institution and was verified. Before applying to institutions, system developers and administrators were educated about their awareness about security so that they can follow guidelines of a developer security. As a result, the systemic security problems were decreased by more than eighty percent.

온라인 기반의 패키징 IT 서비스를 위한 패키징 디자인 사양 설계 시스템 개발에 관한 연구 (Development of the Packaging Specification Design System Based on Web Online Packaging IT Service)

  • 유연화;장동식;박상희;심진기;이준영
    • 한국IT서비스학회지
    • /
    • 제11권2호
    • /
    • pp.275-289
    • /
    • 2012
  • Although the specification of packaging box is one of the most important process to be considered before deciding cost in terms of production and logistics, there are no efficient services in our country at this time as such the making decision only through the empirical knowledge. In this research, we have developed the packaging specification design system based on the web online packaging IT service. The developed system was advanced from the existing-inefficient process of deciding the specification of packaging box, and which can decide the specification of packaging box considering the efficiency of logistics through use of IT based tool. Therefore, this study shows applied cases of normalized packaging process through the obtained packaging design simulation program. The packaging specification design system can provide the simulation and user interface. Those could calculate the specification of packaging box(packaging box size, packaging box quantity, packaging box pattern, packaging compressive strength, packaging cost etc.) considering the efficiency of logistics.

IT 기반의 터널 최적 설계를 위한 시스템 개발 (Development of IT-based tunnel design system)

  • 유충식;김선빈;유광호
    • 한국터널지하공간학회 논문집
    • /
    • 제10권2호
    • /
    • pp.153-166
    • /
    • 2008
  • 본 논문에서는 IT 기술을 이용한 터널 자동화 설계 시스템 개발에 관한 내용을 다루었다. 먼저 개발 시스템에 대한 개념 및 개발 과정과 시스템을 구성하는 각 요소기술 및 개별 모듈 개발에 관한 내용을 기술하였다. 본 시스템의 요소기술인 ANN-기반의 터널 저동 예측 기술에 대해 그 개념과 ANN 학습과정 및 검증과정을 기술하였다 ANN-기반의 터널거동 예측은 FEM 및 FDM 등 연속체 기반의 해석을 토대로 구축한 DB를 ANN을 통해 일반화 한 후 개발된 엔진을 세부모듈에 접목시켜 별도의 해석 없이 유사 단면 혹은 현장에 적용이 가능하도록 하였다. 본 논문에서는 구체적인 개발과정과 향후 적용방향에 대해 구체적인 내용을 기술하였다.

  • PDF

SD를 이용한 공공 프로젝트의 지체요인 분석 (Delay Factor Analysis of Public Project Based on System Dynamics)

  • 이만형;이정민
    • 한국시스템다이내믹스연구
    • /
    • 제4권2호
    • /
    • pp.95-130
    • /
    • 2003
  • The purpose of this study is to find what causes make public projects hold off, going beyond the planned deadline and budget. Using System Dynamics(SD) and their derivative Urban Dynamics(UD) models, it intends to analyze major feedback loops based on VENSIM and to simulate them with STELLA software, all of which are interrelated with various causes of project delay. To prevent or ameliorate project delay, first of all it advises to focus on endogenous delaying factors not exogenous ones. These factors either reinforce or balance certain loops in complex causal structure, In the case example on the Cremation Building Project in Cheongju, Residents’ participation demand make negotiation put off and delayed negotiation reinforces administrative-expediency planning in order to observe a time limit, on the other hand, once building consensus, it increase both the level of planning performance and public trust. In the meantime, the real planning process used to neglect residents opinions and manage public grievance only through compensation, he a result of simulation, visible fruit of negotiation in the initial phase seems to be not satisfactory owing to funds and time consumed, but after reaching an mutual agreement among stakeholders, planning performance is effective and strategic than administrative-expediency planning viewed in both financial and time angle. It proposes to devise specific tools schematizing project implementation. In order to upgrade the quality of project management, it recommends for planners to adopt key concepts based on SD/UD diagrams and causal loops, which would contribute to enriching Planning abbots.

  • PDF