• Title/Summary/Keyword: System operation line

Search Result 1,500, Processing Time 0.03 seconds

Web-based Measurement of ECU Signals on Vehicle using Embedded Linux

  • Choi, Kwang-Hun;Lee, Lee;Lee, Young-Choon;Kwon, Tae-Kyu;Lee, Seong-Cheol
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.138-142
    • /
    • 2004
  • In this paper, we present a new method for monitoring of ECU's sensor signals of vehicle. In order to measure the ECU's sensor signals, the interfaced circuit is designed to communicate ECU and the Embedded Linux is used to monitor communication result through Web the Embedded Linux system and this system is said "ECU Interface Part". In ECU Interface Part the interface circuit is designed to match voltage level between ECU and SA-1110 micro controller and interface circuit to communicate ECU according to the ISO, SAE communication protocol standard. Because Embedded Linux does not allow to access hardware directly in application level, anyone who wants to modify any low level hardware must develop device driver. To monitor ECU's sensor signals the most important thing is to match serial level between ECU and ECU Interface Part. It means to communicate correctly between two hardware we need to match voltage and signal level, and need to match baudrate. The voltage of SA-1110 is 0 ${\sim}$ +3.3V and ECU is 0 ${\sim}$ +12V and, ECU's communication Line K does multiple operation so, the interface circuit is used to match voltage and signal level. In Addition to ECU's baudrate is 10400bps, it's not standard baudrate in computer environment. So, we need to develop a device driver to control the interface circuit, and change baudrate. To monitor ECU's sensor signals through web there's a network socket program is working in Embedded Linux. It works as server program and manages user's connections and commands. Anyone who wants to monitor ECU's sensor signals he just only connect to Embedded Linux system with web browser then, Embedded Linux webserver will return the ActiveX webbased measurement software. It works in web browser and inits ECU, as a result it returns sensor signals through web. All the programs are developed with GCC(GNU C Compiler) and, webbased measurement software is developed with Borland C++ Builder.

  • PDF

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

Development of an Underwater Rope-cutter Device and Controller for Removal of Propeller and Shaft Foreign Material for Small Vessel (소형선박용 프로펠러 및 샤프트 이물질 제거를 위한 수중절단기 기구 설계 및 제어기 개발)

  • Lee, Hunseok;Oh, Jin-Seok;Choi, Sun-Hong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.7
    • /
    • pp.927-935
    • /
    • 2019
  • Screw-failure accidents in small ships frequently occur in coastal waters. In particular, vessels' propulsion systems are frequently coiled due to objects such as fish-nets and ropes that float on the sea. The failure of the ship's propulsion system can cause primary accidents such as ship operation delays and drifting due to loss of power; furthermore, the possibility of secondary accidents such as those involving operators in the underwater removal of rope stuck in a propeller. Ships that do not have the proper tools to solve these problems must be either lifted onto land to be repaired or divers must dive directly under the ship to solve the problem. Accordingly, some small vessels have been equipped with rope-cutter devices on the propeller shaft to prevent ship propeller system accidents in recent years; however, they are not being applied efficiently due to the cost and time of installation. To solve these problems, this study develops an underwater rope-cutter device and controller for the removal of propeller and shaft foreign material in small vessels. This device has simple structures that use the principle of a saw. Meteor gears and crank pins were used for the straight-line rotation of saw blades of the underwater rope-cutters to allow for long strokes. Furthermore, the underwater rope-cutting machines can be operated by being connected to the ship battery. The user, a non-professional, can ensure convenience and stability by applying reverse current prevention and a speed control circuit so that it can be used more conveniently and safely.

Importance and Management of the Laboratory Notebooks in the Research Record (연구기록물 중 연구노트의 중요성과 관리 제도화)

  • Kim, Sang-Jnu
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.45-74
    • /
    • 2008
  • The purpose of this study was to promote the understanding of laboratory notebook's record characteristics through getting a line on the importance of the notebooks which have record, information, communication, and proof functions. To improve the research ethics and cultures, this study was examined and investigated by literature references and survey results. This study analyzed the status of the notebooks in part of laboratory information system of the R&D institutes, paper notebooks for laboratory records management, and the introduction of ELN for digital record. For the notebook's institutionalization, more review is needed to the possibility of involvement in the conflict, evidential requisite and signature by inspector, the limitation of autonomous policy for the notebook's operation, the difficulty of preservation for 30 years, the introduction of ELN and utilization for the notebooks. To improve management and institutionalization for the notebooks, it is needed to the notebook's record for knowledge management and evidential values, support and budget for the notebook's management department, researcher's recognition conversion for the notebooks related to the intellectual property and technology transference, the record method train for the notebooks from the university classes, and the introduction of ELN related to the laboratory information management system or project management system.

Development of Underwater Positioning System using Asynchronous Sensors Fusion for Underwater Construction Structures (비동기식 센서 융합을 이용한 수중 구조물 부착형 수중 위치 인식 시스템 개발)

  • Oh, Ji-Youn;Shin, Changjoo;Baek, Seungjae;Jang, In Sung;Jeong, Sang Ki;Seo, Jungmin;Lee, Hwajun;Choi, Jae Ho;Won, Sung Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.352-361
    • /
    • 2021
  • An underwater positioning method that can be applied to structures for underwater construction is being developed at the Korea Institute of Ocean Science and Technology. The method uses an extended Kalman filter (EKF) based on an inertial navigation system for precise and continuous position estimation. The observation matrix was configured to be variable in order to apply asynchronous measured sensor data in the correction step of the EKF. A Doppler velocity logger (DVL) can acquire signals only when attached to the bottom of an underwater structure, and it is difficult to install and recover. Therefore, a complex sensor device for underwater structure attachment was developed without a DVL in consideration of an underwater construction environment, installation location, system operation convenience, etc.. Its performance was verified through a water tank test. The results are the measured underwater position using an ultra-short baseline, the estimated position using only a position vector, and the estimated position using position/velocity vectors. The results were compared and evaluated using the circular error probability (CEP). As a result, the CEP of the USBL alone was 0.02 m, the CEP of the position estimation with only the position vector corrected was 3.76 m, and the CEP of the position estimation with the position and velocity vectors corrected was 0.06 m. Through this research, it was confirmed that stable underwater positioning can be carried out using asynchronous sensors without a DVL.

A Study on Improvement Measures to Strengthen the Police's Ability to Respond to CBRN Terrorism at the Scene (경찰의 화생방테러 현장대응역량 강화를 위한 개선방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.116-125
    • /
    • 2022
  • Recent aspects of terrorism varies in various ways according to means, targets, and regions. In particular, the 9/11 terrorist attacks in the United States in 2001 changed the paradigm of each country's terrorism, and the South Korea also participated in the enactment and enforcement of the Anti-Terrorism Act in 2016. Based on this, CBRN terrorism is included in general terrorism, and the National Police Agency plays the role of a control tower, and a system supported by related organizations such as the Ministry of Environment is being built and operated. However, restrictions were confirmed in the organizational system, manpower composition, and equipment and materials in operation in preparation for CBRN within the police. Based on the identified limitations, we proposed improvement plans to strengthen the capacity for CBRN terrorism: establishing a dedicated CBRN organization; creating research organization; and securing additional dedicated personnel. Based on this, as an improvement plan to strengthen the capability of CBRN, the establishment of an organization dedicated to CBRN and a research organization within the National Police Agency, and expansion of electronic equipment suitable for the characteristics of CBRN were proposed. It is expected that the police's on-site response capability system for CBRN terrorism will be strengthened via the proposed improvement measures to recover the various restrictions on the response to CBRN terrorism.

Multiple damage detection of maglev rail joints using time-frequency spectrogram and convolutional neural network

  • Wang, Su-Mei;Jiang, Gao-Feng;Ni, Yi-Qing;Lu, Yang;Lin, Guo-Bin;Pan, Hong-Liang;Xu, Jun-Qi;Hao, Shuo
    • Smart Structures and Systems
    • /
    • v.29 no.4
    • /
    • pp.625-640
    • /
    • 2022
  • Maglev rail joints are vital components serving as connections between the adjacent F-type rail sections in maglev guideway. Damage to maglev rail joints such as bolt looseness may result in rough suspension gap fluctuation, failure of suspension control, and even sudden clash between the electromagnets and F-type rail. The condition monitoring of maglev rail joints is therefore highly desirable to maintain safe operation of maglev. In this connection, an online damage detection approach based on three-dimensional (3D) convolutional neural network (CNN) and time-frequency characterization is developed for simultaneous detection of multiple damage of maglev rail joints in this paper. The training and testing data used for condition evaluation of maglev rail joints consist of two months of acceleration recordings, which were acquired in-situ from different rail joints by an integrated online monitoring system during a maglev train running on a test line. Short-time Fourier transform (STFT) method is applied to transform the raw monitoring data into time-frequency spectrograms (TFS). Three CNN architectures, i.e., small-sized CNN (S-CNN), middle-sized CNN (M-CNN), and large-sized CNN (L-CNN), are configured for trial calculation and the M-CNN model with excellent prediction accuracy and high computational efficiency is finally optioned for multiple damage detection of maglev rail joints. Results show that the rail joints in three different conditions (bolt-looseness-caused rail step, misalignment-caused lateral dislocation, and normal condition) are successfully identified by the proposed approach, even when using data collected from rail joints from which no data were used in the CNN training. The capability of the proposed method is further examined by using the data collected after the loosed bolts have been replaced. In addition, by comparison with the results of CNN using frequency spectrum and traditional neural network using TFS, the proposed TFS-CNN framework is proven more accurate and robust for multiple damage detection of maglev rail joints.

Analysis and Evaluation of CPC / COLSS Related Test Result During YGN 3 Initial Startup (영광 3호기 초기 시운전 동안 CPC / COLSS 관련시험 결과 분석 및 평가)

  • Chi, S.G.;Yu, S.S.;In, W.K.;Auh, G.S.;Doo, J.Y.;Kim, D.K.
    • Nuclear Engineering and Technology
    • /
    • v.27 no.6
    • /
    • pp.877-887
    • /
    • 1995
  • YGN 3 is the first nuclear power plant to use the Core Protection Calculator (CPC) as the core protection system and the Core Operating Limit Supervisory System (COLSS) as the core monitor-ing system in Korea. The CPC is designed to provide on-line calculations of Departure from Nucleate Boiling Ratio (DNBR) and Local Power Density (LPD) and to initiate reactor trip if the core conditions exceed the DNBR or LPD design limit. The COLSS is designed to assist the operator in implementing the Limiting Conditions for Operation (LCOs) in Technical Specifications for DNBR/Linear Heat Rate (LHR) margin, azimuthal tilt, and axial shape index and to provide alarm when the LCOs are reached. During YGN 3 initial startup testing, extensive CPC/COLSS related tests ore peformed to ver-ify the CPC/COLSS performance and to obtain optimum CPC/COLSS calibration constants at var, -ious core conditions. Most of test results met their specific acceptance criteria. In the case of missing the acceptance criteria, the test results ore analyzed, evaluated, and justified. Through the analysis and evaluation of each of the CPC/COLSS related test results, it can be concluded that the CPC/COLSS are successfully Implemented as designed at YGN 3.

  • PDF

A Study Security Measures for Protection of VIP in the G20 Summit (G20 정상회의 시 주(主)행사장에서의 VIP 안전대책 방안에 관한 연구)

  • Lee, Sun-Ki;Lee, Choong-Soo
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.91-123
    • /
    • 2010
  • The threat factors available for occurrence given G20 Summit Meeting are expected leader terrorism, hostage terrorism, bomb terrorism, public facilities terrorism, and aircraft terrorism. As for the threat groups, which are expected in Korea, the North Korea, Islam extremist group, and the group such as NGO organization of being opposed to international meeting are regarded as having possibility of causing hazard. Thus, the purpose of this study is to suggest VIP Security-measure plans in the main site in preparation for G20 Summit Meeting. Accordingly, each country in the world is adopting 'the principle of Triple Ring' in common. Thus, it elicited a coping plan by 1st line(inner ring) 2nd line(middle ring) 3rd line(outer ring) based on this principle, and proposed even an opinion together that will need to be reflected in light of policy for the VIP security measures. In conclusion, as for the VIP Security-measure plans in the main site in preparation for G20 Summit Meeting, In the inner ring(safety sector), first, an intercepting measure needs to be devised for a spot of getting into and out of vehicles given the Straight Street. Second, the Walking Formation needs to be reinforced boldly in the exposed area. In the middle ring(security sector), first, the control plan needs to be devised by considering particularity of the main site. Second, there is necessity for adopting the efficient security badge operation plan that is included RFID function within security badge. In the outer ring(aid protective sector), first, there is necessity of preparing for several VIP terrorisms, of collecting information and intelligence, and of reinforcing the information collection system against terrorism under the cooperation with the overseas information agency. Second, the urgent measure training in time of emergency needs to be carried out toward security agent event manpower. Third, to maintain the certain pace in VIP motorcade, the efficient traffic control system needs to be operated. Finally, as for what will need to be reflected in light of policy for VIP security measures, first, there is necessity for allowing VIP residence to be efficiently dispersed to be distributed and controlled. Second, there is necessity for allowing impure element to misjudge or attack to be failed by utilizing diverse deception operations. Third, according to the reorganization in North Korea's Organization of the South Directed Operations, the powerful 'military-support measure' needs to be driven from this G20 Summit Meeting. For this, the necessity was proposed for further reinforcing the front back defense posture under the supervision of the Ministry of National Defense and for positively coping even with detecting and removing poison in preparation for CBR (chemical, biological, and radio-logical) terrorism.

  • PDF

Study on the Improvement of Stow Net Fishing Technique and the Enlargement of Fishing Ground to the Distant Waters - 3 . Field Experiment on the Efficiency of Newly Designed Net and the Stern Operation System (안강망어법의 개량과 어장의 원해로의 확대를 위한 연구 - 3 . 시험어구의 전개성능과 선미식 어업방법에 관한 해상시험 -)

  • 이병기
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.25 no.2
    • /
    • pp.75-81
    • /
    • 1989
  • In this paper, the authors describe on the field experiment of the newly designed actual stow net, standing on the result of the model experiment to examine the performance of the conventional net and the newly designed net, presented in two previous reports of this series. Concurrently the additional experiment to find out the possibility of changing of operating system from the side to the stern was carried out. 1. Fundamental shape of the experimented net was 20 times aslarge asthe newly designed model net. Performance of the net was detected by using two ultrasonic echo sounders: one was set downward at the top-most spreader of the shearing device to detect the opening height of the device from the sea bed, and the other sidewise at the starboard top-most spreader to detect the top-most opening width of the devices. Opening height of the newly designed net showed about 3m smaller than the conventional net at slow current of 0.6m/sec and less but it overcome 1m at speedy current of 0.8m/sec and more. Opening width of the newly designed net was 1.4 times as large as that of the conventional net, ant the front projection area of the newly designed net mouth was estimated as 1.3~1.6 times as large as that of the conventional net. 2. The experiment on the stern operating system was tightly limited by the structure of the ship employed in the experiment, which was a stern trawler of 2275 GT. The ship confronted by the wind with main anchor, while the net was put over the stern slipway and the hauling line of shearing device was operated through the top rollers of gallows. The experiment was very suggestive in the view point to mechanize the operating system, and so to decrease the man power except the following question. The of bow-stern line of ship, and that of net is much different.

  • PDF