• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.032 seconds

Self-driving quarantine robot with chlorine dioxide system (이산화염소 시스템을 적용한 자율주행 방역 로봇)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.145-150
    • /
    • 2021
  • In order to continuously perform quarantine in public places, it is not easy to secure manpower, but using self-driving-based robots can solve problems caused by manpower. Self-driving-based quarantine robots can continuously prevent the spread of harmful viruses and diseases in public institutions and hospitals without additional manpower. The location of the autonomous driving function was estimated by applying the Pinnacle filter algorithm, and the UV sterilization system and chlorine dioxide injection system were applied for quarantine. The driving time is more than 3 hours and the position error is 0.5m.Soon, the stop-avoidance function was operated at 95% and the obstacle detection distance was 1.5 m, and the automatic charge recovery was charged by moving to the charging cradle at the remaining 10% of the battery capacity. As a result of quarantine with an unmanned quarantine system, UV sterilization is 99% and chlorine dioxide is sterilized more than 95%, which can contribute to reducing enormous social costs.

Equal Energy Consumption Routing Protocol Algorithm Based on Q-Learning for Extending the Lifespan of Ad-Hoc Sensor Network (애드혹 센서 네트워크 수명 연장을 위한 Q-러닝 기반 에너지 균등 소비 라우팅 프로토콜 기법)

  • Kim, Ki Sang;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.269-276
    • /
    • 2021
  • Recently, smart sensors are used in various environments, and the implementation of ad-hoc sensor networks (ASNs) is a hot research topic. Unfortunately, traditional sensor network routing algorithms focus on specific control issues, and they can't be directly applied to the ASN operation. In this paper, we propose a new routing protocol by using the Q-learning technology, Main challenge of proposed approach is to extend the life of ASNs through efficient energy allocation while obtaining the balanced system performance. The proposed method enhances the Q-learning effect by considering various environmental factors. When a transmission fails, node penalty is accumulated to increase the successful communication probability. Especially, each node stores the Q value of the adjacent node in its own Q table. Every time a data transfer is executed, the Q values are updated and accumulated to learn to select the optimal routing route. Simulation results confirm that the proposed method can choose an energy-efficient routing path, and gets an excellent network performance compared with the existing ASN routing protocols.

Assessment of Backprojection-based FMCW-SAR Image Restoration by Multiple Implementation of Kalman Filter (Kalman Filter 복수 적용을 통한 Backprojection 기반 FMCW-SAR의 영상복원 품질평가)

  • Song, Juyoung;Kim, Duk-jin;Hwang, Ji-hwan;An, Sangho;Kim, Junwoo
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.5_3
    • /
    • pp.1349-1359
    • /
    • 2021
  • Acquisition of precise position and velocity information of GNSS-INS (Global Navigation Satellite System; Inertial Navigation System) sensors in obtaining SAR SLC (Single Look Complex) images from raw data using BPA (Backprojection Algorithm) was regarded decisive. Several studies on BPA were accompanied by Kalman Filter for sensor noise oppression, but often implemented once where insufficient information was given to determine whether the filtering was effectively applied. Multiple operation of Kalman Filter on GNSS-INS sensor was presented in order to assess the effective order of sensor noise calibration. FMCW (Frequency Modulated Continuous Wave)-SAR raw data was collected from twice airborne experiments whose GNSS-INS information was practically and repeatedly filtered via Kalman Filter. It was driven that the FMCW-SAR raw data with diverse path information could derive different order of Kalman Filter with optimum operation of BPA image restoration.

Formal Model of Extended Reinforcement Learning (E-RL) System (확장된 강화학습 시스템의 정형모델)

  • Jeon, Do Yeong;Song, Myeong Ho;Kim, Soo Dong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.4
    • /
    • pp.13-28
    • /
    • 2021
  • Reinforcement Learning (RL) is a machine learning algorithm that repeat the closed-loop process that agents perform actions specified by the policy, the action is evaluated with a reward function, and the policy gets updated accordingly. The key benefit of RL is the ability to optimze the policy with action evaluation. Hence, it can effectively be applied to developing advanced intelligent systems and autonomous systems. Conventional RL incoporates a single policy, a reward function, and relatively simple policy update, and hence its utilization was limited. In this paper, we propose an extended RL model that considers multiple instances of RL elements. We define a formal model of the key elements and their computing model of the extended RL. Then, we propose design methods for applying to system development. As a case stud of applying the proposed formal model and the design methods, we present the design and implementation of an advanced car navigator system that guides multiple cars to reaching their destinations efficiently.

Phase-Shift Full-Bridge DC-DC Converter using the One-Chip Micom (단일칩 마이컴을 이용한 위상변위 방식 풀브리지 직류-직류 전력변환기)

  • Jeong, Gang-Youl
    • Journal of IKEEE
    • /
    • v.25 no.3
    • /
    • pp.517-527
    • /
    • 2021
  • This paper presents the phase-shift full-bridge DC-DC converter using the one-chip micom. The proposed converter primary is the full-bridge power topology that operates with the unipolar pulse-width modulation (PWM) by the phase-shift method, and the secondary is the full-bridge full-wave rectifier composed of four diodes. The control of proposed converter is performed by the one-chip micom and its MOSFET switches are driven by the bootstrap circuit. Thus the total system of proposed converter is simple. The proposed converter achieves high-efficiency using the resonant circuit and blocking capacitor. In this paper, first, the power-circuit operation of proposed converter is explained according to each operation mode. And the power-circuit design method of proposed converter is shown, and the software control algorithm on the micom and the feedback and switch drive circuits operating the proposed converter are described, briefly. Then, the operation characteristics of proposed converter are validated through the experimental results of a designed and implemented prototype converter by the shown design and implementation method in this paper. The highest efficiency in the results was about 92%.

Tourism Potential of the Regions in the Conditions of European Integration

  • Tkach, Viktoriia;Rogovyi, Andrii;Zelenska, Olena;Gonta, Olena;Aleshugina, Nataliya;Tochylina, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.356-364
    • /
    • 2021
  • In the formation of a socially oriented economy in the context of European integration, the development of tourism is one of the priority areas that positively affects the socio-economic situation of the country as a whole and its regions in particular, stimulates important economic activities and strengthens Ukraine's positive image in Europe and the world. In view of this, in the framework of a thorough study of the tourism industry it is necessary to assess its potential. This study proposes an assessment of tourism potential in the regional context, which consists of consistent implementation of six steps, namely: first, the definition of research objects for which the tourism potential is determined; secondly, the formation of a set of basic features for assessing tourism potential of certain objects; thirdly, the collection of information on individual indicators, which are selected to assess the tourism potential of the objects; fourth, the calculation of parametric indices by comparing the indicators of each individual object of study (region) with the average values in the set of objects under study; fifth, the definition of a generalized index of tourism potential of the region; sixth, grouping regions by the values of the generalized index of tourism potential. Execution of the stated algorithm involves the use of various methods, in particular, statistical, graphical, parametric, the analysis of hierarchies, matrix and cartographic. Approbation of the proposed assessment of tourism potential at the regional level in Ukraine allowed to group regions according to the values of the generalized index of tourism potential, which can be used as a basis for developing measures to increase and enhance their tourism potential in Ukraine in terms of European integration.

Implementation of In-Car GNSS Jamming Signal Data Generator to Test Autonomous Driving Vehicles under RFI Attack on Navigation System (항법 시스템 오작동 시 자율주행 알고리즘 성능 테스트를 위한 차량 내 재밍 신호 데이터 발생기 구현)

  • Kang, Min Su;Jin, Gwon Gyu;Won, Jong Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.2
    • /
    • pp.79-94
    • /
    • 2021
  • A GNSS receiver installed in autonomous vehicles is the most essential device for its navigation. However, if an intentional jamming signal is generated, there is a risk of exposure to an accident risk due to deterioration of the GNSS sensor's performance. Research is required to prevent this, and accordingly, a jamming generating device must be provided. However, according to the provisions of the law related to jamming, this is illegal. In this paper, we implement an in-vehicle jamming device that complies with the provisions of the law and does not affect the surrounding GNSS sensors. Driving simulation is used to evaluate the performance of the GNSS algorithm, and the malfunction of autonomous vehicles occurring in the interference environment and data errors output from the GNSS sensor are analyzed.

Study on Intelligence (AI) Detection Model about Telecommunication Finance Fraud Accident (전기통신금융사기 사고에 대한 이상징후 지능화(AI) 탐지 모델 연구)

  • Jeong, Eui-seok;Lim, Jong-in
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.1
    • /
    • pp.149-164
    • /
    • 2019
  • Digital Transformation and the Fourth Industrial Revolution, electronic financial services should be provided safely in accordance with rapidly changing technology changes in the times of change. However, telecommunication finance fraud (voice phishing) accidents are currently ongoing, and various efforts are being made to eradicate accidents such as legal amendment and improvement of policy system in order to cope with continuous increase, intelligence and advancement of accidents. In addition, financial institutions are trying to prevent fraudulent accidents by improving and upgrading the abnormal financial transaction detection system, but the results are not very clear. Despite these efforts, telecommunications and financial fraud incidents have evolved to evolve against countermeasures. In this paper, we propose an intelligent over - the - counter financial transaction system modeled through scenario - based Rule model and artificial intelligence algorithm to prevent financial transaction accidents by voice phishing. We propose an implementation model of artificial intelligence abnormal financial transaction detection system and an optimized countermeasure model that can block and respond to analysis and detection results.

Application of Social Big Data Analysis for CosMedical Cosmetics Marketing : H Company Case Study (기능성 화장품 마케팅의 소셜 빅데이터 분석 활용 : H사 사례를 중심으로)

  • Hwang, Sin-Hae;Ku, Dong-Young;Kim, Jeoung-Kun
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.35-41
    • /
    • 2019
  • This study aims to analyze the cosmedical cosmetics market and the nature of customer through the social big data analysis. More than 80,000 posts were analyzed using R program. After data cleansing, keyword frequency analysis and association analysis were performed to understand customer needs and competitor positioning, formulated several implications for marketing strategy sophistication and implementation. Analysis results show that "prevention" is a new and essential attribute for appealing target customers. The expansion of the product line for the gift market is also suggested. It has been shown that there is a high correlation with products that can be complementary to each other. In addition to the traditional marketing technique, the social big data analysis based on evidence was useful in deriving the characteristics of the customers and the market that had not been identified before. Word2vec algorithm will be beneficial to find additional.

IoT and Wireless Sensor Network Monitoring for Campus Security (캠퍼스 보안을 위한 IoT 및 무선 센서 네트워크 모니터링)

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Usman, Muhammad
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.33-41
    • /
    • 2018
  • The idea of the Internet of Things as a platform on the Smart Campus has become increasingly popular. It requires an infrastructure consisting of communication networks, sensor nodes and gateways to connect to the Internet. Each sensor node is responsible for gathering data from the environment. This document outlines a network of wireless sensors on the Internet for the application of Smart Campus monitoring. Wireless sensor network Monitoring have become a complete solution to using a low power implementation and integrated systems. The numerous restrictions however result from the low communication range, the limited computing power, the lack of availability of the network protocol, the lack of programming security and the security failures in the areas of confidentiality, integrity and availability. A new security technique and its functionality for WSNM nodes developed. Development in the research of a secure network and suggestions for avoiding denial of service (DOS) and complexity attacks. These systems if properly implemented can provide an energy efficiency mechanism through pre-allocation and a new key from key management models with a secure routine algorithm.