• Title/Summary/Keyword: embedded software

Search Result 1,317, Processing Time 0.03 seconds

A Comparative Study on Behavior-based Agent Control for Computer Games

  • Kim, Tae-Hee
    • Journal of Korea Game Society
    • /
    • v.2 no.2
    • /
    • pp.37-45
    • /
    • 2002
  • Computer games could be regarded as simulation of the real world. Control problems of software agents have long been studied in the field of Artificial Intelligence (AI), resulting in giving a birth to the behavior-based approach. three main approaches might be categorized out of the history of AI study. First, Cognitivists propose that intelligence could be represented and manipulated in terms of symbols. Second, Connectionists claim that symbols could not be isolated but they are embedded in the body structure. Third, the behavior-based approach is an approach to AI which suggests that intelligence is dynamic property that exists nowhere but emerges in the relationship of an agent and the world including observers while the agent performs behavior. This paper explains and compares the three approaches to AI, then discusses the plausibility of the behavior-based approach and problems. Finally, this paper proposes application of behavior-based approach to computer games in terms of agent control.

  • PDF

Implementation of the wireless headset using Bluetooth (블루투스를 이용한 무선 헤드셋 구현)

  • 이병로
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1138-1145
    • /
    • 2003
  • The Bluetooth wireless technology is the new short-range RF transmission standard for low-power, low-cost, short-range radio links between mobile devices and electric product. The technology can eliminate the confusion of cables, connectors and protocols confounding communications between devices. Mobile phones, pagers, laptops, PDAs, digital cameras and more, all now have a common structure for communicating across their product platforms. In this paper, we present the Bluetooth protocol stack and headset profiles for the communication between mobile phone and headset. And then, we construct application software which is embedded in the device that operates an application over the Bluetooth protocol stack Next we implement wireless headset using MSP430, not real time operating system.

Design and Simulation of ARM Processor using VHDL (VHDL을 이용한 ARM 프로세서의 설계 및 모의실행)

  • Lee, Jongbok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.5
    • /
    • pp.229-235
    • /
    • 2018
  • As of in the year of 2016, 40 million ARM processors are being shipped everyday and more than 86 billion ARM processors are mounted in mobile communications, consumer electronics, enterprises, and embedded systems. Nationally, we are capable of designing high-end memory semiconductors, but not in processors, resulting in unbalance. Generally, highly expensive software programs are necessary for designing processors which makes it difficult to set up proper environments. However, ModelSim simulator provided by Altera is free and everybody can use it. In this paper, the VHDL language which is widely used in Europe, universities, and research centers around the world for the ASIC design is selected for designing 32-bit ARM processor and simulated by ModelSim. As a result, 37 instructions of ARMv4 has been successfully executed.

Spatial Error Concealment Technique for Losslessly Compressed Images Using Data Hiding in Error-Prone Channels

  • Kim, Kyung-Su;Lee, Hae-Yeoun;Lee, Heung-Kyu
    • Journal of Communications and Networks
    • /
    • v.12 no.2
    • /
    • pp.168-173
    • /
    • 2010
  • Error concealment techniques are significant due to the growing interest in imagery transmission over error-prone channels. This paper presents a spatial error concealment technique for losslessly compressed images using least significant bit (LSB)-based data hiding to reconstruct a close approximation after the loss of image blocks during image transmission. Before transmission, block description information (BDI) is generated by applying quantization following discrete wavelet transform. This is then embedded into the LSB plane of the original image itself at the encoder. At the decoder, this BDI is used to conceal blocks that may have been dropped during the transmission. Although the original image is modified slightly by the message embedding process, no perceptible artifacts are introduced and the visual quality is sufficient for analysis and diagnosis. In comparisons with previous methods at various loss rates, the proposed technique is shown to be promising due to its good performance in the case of a loss of isolated and continuous blocks.

Processing and Pressure Test of Filament Wound Composite Pressure Vessels for Oxygen Tanks (복합재료 산소 압력용기의 성형 및 내압 시험)

  • 황병선;김병하;김병선;박승범;엄문광
    • Composites Research
    • /
    • v.14 no.3
    • /
    • pp.10-17
    • /
    • 2001
  • A reseach was peformed to develop composite pressure vessels in conjunction with design, fabrication, and test. Fiber pattern and angels were decided by CADFIL software and they were [$liner/15^{\circ}/15^{\circ}/90^{\circ}/18^{\circ}/90^{\circ}/21^{\circ}/21^{\circ}/90^{\circ}$]. Fabrication of bottles were done by 5-axis filament winding machine. During fabrication fiber optic sensors were embedded to measure the strain at points when internal pressure was applied by water pump. Conventional strain gage instrumentation showed the stable test results. The test results were compared to finite element analysis results and they were close each other in strain values. One can see the successful design and fabrication of single boss composite vessels.

  • PDF

Outlier detection of GPS monitoring data using relational analysis and negative selection algorithm

  • Yi, Ting-Hua;Ye, X.W.;Li, Hong-Nan;Guo, Qing
    • Smart Structures and Systems
    • /
    • v.20 no.2
    • /
    • pp.219-229
    • /
    • 2017
  • Outlier detection is an imperative task to identify the occurrence of abnormal events before the structures are suffered from sudden failure during their service lives. This paper proposes a two-phase method for the outlier detection of Global Positioning System (GPS) monitoring data. Prompt judgment of the occurrence of abnormal data is firstly carried out by use of the relational analysis as the relationship among the data obtained from the adjacent locations following a certain rule. Then, a negative selection algorithm (NSA) is adopted for further accurate localization of the abnormal data. To reduce the computation cost in the NSA, an improved scheme by integrating the adjustable radius into the training stage is designed and implemented. Numerical simulations and experimental verifications demonstrate that the proposed method is encouraging compared with the original method in the aspects of efficiency and reliability. This method is only based on the monitoring data without the requirement of the engineer expertise on the structural operational characteristics, which can be easily embedded in a software system for the continuous and reliable monitoring of civil infrastructure.

Experimental and numerical investigation of wire rope devices in base isolation systems

  • Calabrese, Andrea;Spizzuoco, Mariacristina;Losanno, Daniele;Barjani, Arman
    • Earthquakes and Structures
    • /
    • v.18 no.3
    • /
    • pp.275-284
    • /
    • 2020
  • The scope of this study is the comparison between experimental results of tests performed on a base isolated building using helical wire rope isolators (WRs), and results of Nonlinear Response History Analyses (NRHAs) performed using SAP 2000, a commercial software for structural analysis. In the first stage of this research, WRs have been tested under shear deformation beyond their linear range of deformation, and analytical models have been derived to describe the nonlinear response of the bearings under different directions of loading. On the following stage, shaking table tests have been carried out on a 1/3 scale steel model isolated at the base by means of curved surface sliders (CSS) and WRs. The response of the structure under ground motion excitation has been compared to that obtained using numerical analyses in SAP 2000. The feasibility of modelling the nonlinear behavior of the tested isolation layer using multilinear link elements embedded in SAP 2000 is discussed in this paper, together with the advantages of using WRs as supplemental devices for CSSs base isolated structures.

Design of Heat-Activated Reversible Integral Attachments for Product-Embedded Disassembly

  • Li, Ying;Kikuchi, Noboru;Saitou, Kazuhiro
    • International Journal of CAD/CAM
    • /
    • v.3 no.1_2
    • /
    • pp.19-29
    • /
    • 2003
  • Disassembly is a fundamental process needed for component reuse and material recycling in all assembled products. Integral attachments, also known as 'snap' fits, are favored fastening means in design for assembly (DFA) methodologies, but not necessarily a favored choice for design for disassembly. In this paper, design methods of a new class of integral attachments are proposed, where the snapped joints can be disengaged by the application of localized heat sources. The design problem of reversible integral attachments is posed as the design of compliant mechanisms actuated with localized thermal expansion of materials. Topology optimization technique is utilized to obtain conceptual layout of snap-fit mechanisms that realizes a desired deformation of snapped features for joint release. Two design approaches are attempted and design results of each approach are presented, where the geometrical configuration extracted from optimal topologies are simplified to enhance the manufacturability for the conventional injection molding technologies. To maximize the magnitude of deformation, a design scheme has been proposed to include boundary conditions as design variables. Final designs are verified using commercial software for finite element analysis.

Design and Prototype Implementation of Museum Asset Management System Using Mobile RFID Devices (모바일 RFID 장치를 이용한 박물관 관리 시스템 설계 및 구현)

  • Kim, Young-Il;Cheong, Tae-Su
    • Proceedings of the CALSEC Conference
    • /
    • 2005.11a
    • /
    • pp.78-84
    • /
    • 2005
  • As the research activities related to 'Ubiquitous Computing' whose concept was introduced by Mark Weiser are growing, RFID(Radio Frequency Identification) technology has recently gained attention as a technology to advance the ubiquitous computing and a lot of related researches are also in progress. Research works done so far are mainly linked to the situation that the research outputs apply to meet the requirements for asset tracking and data sharing with partners over supply chain by using fixed RFID readers. However, it is essential that users have access to real-time information about the tagged objects and services whenever and wherever they want in the era of ubiquitous computing, so mobile devices-including PDA, smart phone, cellular phone, etc - which are equipped with an RFID reader can be regarded as an essential terminal for users living in ubiquitous computing environment. As far as the application with mobile devices are concerned, there are many considerations due to their limited capabilities of data processing, battery consumption and so on. In this paper, we review the generic RFID network model and introduce the revised RFID network model in consideration of incorporation with mobile devices equipped with an RFID reader. Also, we derive the requirements for software embedded within an RFID- enabled mobile terminal and then discuss essential components for implementation. Moreover, we develop the applications for asset management at museum by using mobile RFID network model.

  • PDF

Design and Implementation of Finger Keyboard with Video Camera (비디오 카메라를 이용한 핑거 키보드의 설계 및 구현)

  • Hwang, Kitae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.157-163
    • /
    • 2016
  • This paper presents Finger Keyboard which detects the user's key types on a keyboard drawn on the paper using a video camera. The Finger Keyboard software was written in standard C/C++ language and thus easy to port to other computing environments. We installed a popular USB-type web camera on a Windows PC and implemented the Finger Keyboard as a Windows application which detects key typing and then injects the key code into the message queue of the Windows operating system. Also we implemented the Finger Keyboard on the Raspberry Pi 2 embedded computer with a dedicated camera and connected it to the Android device as an external keyboard through the Bluetooth. The result of experiments showed that the average ratio of recognition success is around 80% at the typing speed of 120 characters per minute.