• Title/Summary/Keyword: software algorithms

Search Result 1,093, Processing Time 0.029 seconds

Optimization of Extended UNIQUAC Parameter for Activity Coefficients of Ions of an Electrolyte System using Genetic Algorithms

  • Hashemi, Seyed Hossein;Dehghani, Seyed Ali Mousavi;Khodadadi, Abdolhamid;Dinmohammad, Mahmood;Hosseini, Seyed Mohsen;Hashemi, Seyed Abdolrasoul
    • Korean Chemical Engineering Research
    • /
    • v.55 no.5
    • /
    • pp.652-659
    • /
    • 2017
  • In the present research, in order to predict activity coefficient of inorganic ions in electrolyte solution of a petroleum system, we studied 13 components in the electrolyte solution, including $H_2O$, $CO_2$ (aq), $H^+$, $Na^+$, $Ba^{2+}$, $Ca^{2+}$, $Sr^{2+}$, $Mg^{2+}$, $SO_4$, $CO_3$, $OH^-$, $Cl^-$, and $HCO_3$. To predict the activity coefficient of the components of the petroleum system (a solid/liquid equilibrium system), activity coefficient model of Extended UNIQUAC was studied, along with its adjustable parameters optimized based on a genetic algorithm. The total calculated error associated with optimizing the adjustable parameters of Extended UNIQUAC model considering the 13 components under study at three temperature levels (298.15, 323.15, and 373.15 K) using the genetic algorithm is found to be 0.07.

Modeling of EMB (Electro Mechanical Brake) to Emulate Gearbox Fault and Control (기어의 고장을 구현하기 위한 EMB(Electro Mechanical Brake) 모델링 및 제어)

  • Choe, Byung-Do;Hwang, Woo-Hyun;Huh, Kun-Soo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.6
    • /
    • pp.33-38
    • /
    • 2012
  • EMB is considered as the next generation braking mechanism because it has simple structure and is environment friendly. However, as other brake mechanisms, EMB should be operated reliably for any operating conditions. EMB should be designed with fail-safe and fault-tolerant control concepts which require robust fault detection algorithms for various possible faults. In the design of fault detection algorithms, it is very difficult to construct faulty conditions in real EMB and thus, simulations are often used to emulate the faulty conditions. In this paper, a simulation tool is developed using the commercial software to emulate gear faults in the EMB mechanism. A backlash compensation algorithm is introduced based on contact point detection because screw backlash causes a delay in clamping force response time.

Development of a Hover-capable AUV System for In-water Visual Inspection via Image Mosaicking (영상 모자이킹을 통한 수중 검사를 위한 호버링 타입 AUV 시스템 개발)

  • Hong, Seonghun;Park, Jeonghong;Kim, Taeyun;Yoon, Sukmin;Kim, Jinwhan
    • Journal of Ocean Engineering and Technology
    • /
    • v.30 no.3
    • /
    • pp.194-200
    • /
    • 2016
  • Recently, UUVs (unmanned underwater vehicles) have increasingly been applied in various science and engineering applications. In-water inspection, which used to be performed by human divers, is a potential application for UUVs. In particular, the operational safety and performance of in-water inspection missions can be greatly improved by using an underwater robotic vehicle. The capabilities of hovering maneuvers and automatic image mosaicking are essential for autonomous underwater visual inspection. This paper presents the development of a hover-capable autonomous underwater vehicle system for autonomous in-water inspection, which includes both a hardware platform and operational software algorithms. Some results from an experiment in a model basin are presented to demonstrate the feasibility of the developed system and algorithms.

A StyleGAN Image Detection Model Based on Convolutional Neural Network (합성곱신경망 기반의 StyleGAN 이미지 탐지모델)

  • Kim, Jiyeon;Hong, Seung-Ah;Kim, Hamin
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.12
    • /
    • pp.1447-1456
    • /
    • 2019
  • As artificial intelligence technology is actively used in image processing, it is possible to generate high-quality fake images based on deep learning. Fake images generated using GAN(Generative Adversarial Network), one of unsupervised learning algorithms, have reached levels that are hard to discriminate from the naked eye. Detecting these fake images is required as they can be abused for crimes such as illegal content production, identity fraud and defamation. In this paper, we develop a deep-learning model based on CNN(Convolutional Neural Network) for the detection of StyleGAN fake images. StyleGAN is one of GAN algorithms and has an excellent performance in generating face images. We experiment with 48 number of experimental scenarios developed by combining parameters of the proposed model. We train and test each scenario with 300,000 number of real and fake face images in order to present a model parameter that improves performance in the detection of fake faces.

Real-time Humanoid Robot Trajectory Estimation and Navigation with Stereo Vision (스테레오 비전을 이용한 실시간 인간형 로봇 궤적 추출 및 네비게이션)

  • Park, Ji-Hwan;Jo, Sung-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.8
    • /
    • pp.641-646
    • /
    • 2010
  • This paper presents algorithms for real-time navigation of a humanoid robot with a stereo vision but no other sensors. Using the algorithms, a robot can recognize its 3D environment by retrieving SIFT features from images, estimate its position through the Kalman filter, and plan its path to reach a destination avoiding obstacles. Our approach focuses on estimating the robot’s central walking path trajectory rather than its actual walking motion by using an approximate model. This strategy makes it possible to apply mobile robot localization approaches to humanoid robot localization. Simple collision free path planning and motion control enable the autonomous robot navigation. Experimental results demonstrate the feasibility of our approach.

Efficient Hybrid Transactional Memory Scheme using Near-optimal Retry Computation and Sophisticated Memory Management in Multi-core Environment

  • Jang, Yeon-Woo;Kang, Moon-Hwan;Chang, Jae-Woo
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.499-509
    • /
    • 2018
  • Recently, hybrid transactional memory (HyTM) has gained much interest from researchers because it combines the advantages of hardware transactional memory (HTM) and software transactional memory (STM). To provide the concurrency control of transactions, the existing HyTM-based studies use a bloom filter. However, they fail to overcome the typical false positive errors of a bloom filter. Though the existing studies use a global lock, the efficiency of global lock-based memory allocation is significantly low in multi-core environment. In this paper, we propose an efficient hybrid transactional memory scheme using near-optimal retry computation and sophisticated memory management in order to efficiently process transactions in multi-core environment. First, we propose a near-optimal retry computation algorithm that provides an efficient HTM configuration using machine learning algorithms, according to the characteristic of a given workload. Second, we provide an efficient concurrency control for transactions in different environments by using a sophisticated bloom filter. Third, we propose a memory management scheme being optimized for the CPU cache line, in order to provide a fast transaction processing. Finally, it is shown from our performance evaluation that our HyTM scheme achieves up to 2.5 times better performance by using the Stanford transactional applications for multi-processing (STAMP) benchmarks than the state-of-the-art algorithms.

Redundancy Module Operation Analysis of MMC using Scaled Hardware Model (축소모형을 이용한 MMC의 Redundancy Module 동작분석)

  • Yoo, Seung-Hwan;Shin, Eun-Suk;Choi, Jong-Yun;Han, Byung-Moon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.8
    • /
    • pp.1046-1054
    • /
    • 2014
  • In this paper, a hardware prototype for the 10kVA 11-level MMC was built and various experimental works were conducted to verify the operation algorithms of MMC. The hardware prototype was designed using computer simulation with PSCAD/EMTDC software. After manufactured in the lab, the hardware prototype was tested to verify the modulation algorithms to form the output voltage, the balancing algorithm to equalize the sub-module capacitor voltage, and the redundancy operation algorithm to improve the system reliability. The developed hardware prototype can be utilized for analyzing the basic operation and performance improvement of MMC according to the modulation and redundancy operation scheme. It also can be utilize to analyze the basic operational characteristics of HVDC system based on MMC.

Analysis of the Hashing and Encryption Algorithms Applied to the Linux (리눅스에 적용된 해시 및 암호화 알고리즘 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Wooyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.72-78
    • /
    • 2016
  • MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.

VQ Codebook Index Interpolation Method for Frame Erasure Recovery of CELP Coders in VoIP

  • Lim Jeongseok;Yang Hae Yong;Lee Kyung Hoon;Park Sang Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9C
    • /
    • pp.877-886
    • /
    • 2005
  • Various frame recovery algorithms have been suggested to overcome the communication quality degradation problem due to Internet-typical impairments on Voice over IP(VoIP) communications. In this paper, we propose a new receiver-based recovery method which is able to enhance recovered speech quality with almost free computational cost and without an additional increment of delay and bandwidth consumption. Most conventional recovery algorithms try to recover the lost or erroneous speech frames by reconstructing missing coefficients or speech signal during speech decoding process. Thus they eventually need to modify the decoder software. The proposed frame recovery algorithm tries to reconstruct the missing frame itself, and does not require the computational burden of modifying the decoder. In the proposed scheme, the Vector Quantization(VQ) codebook indices of the erased frame are directly estimated by referring the pre-computed VQ Codebook Index Interpolation Tables(VCIIT) using the VQ indices from the adjacent(previous and next) frames. We applied the proposed scheme to the ITU-T G.723.1 speech coder and found that it improved reconstructed speech quality and outperforms conventional G.723.1 loss recovery algorithm. Moreover, the suggested simple scheme can be easily applicable to practical VoIP systems because it requires a very small amount of additional computational cost and memory space.

An In-Tunnel Traffic Accident Detection Algorithm using CCTV Image Processing (CCTV 영상처리를 이용한 터널 내 사고감지 알고리즘)

  • Baek, JungHee;Min, Joonyoung;Namkoong, Seong;Yoon, SeokHwan
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.2
    • /
    • pp.83-90
    • /
    • 2015
  • Almost of current Automatic Incident Detection(AID) algorithms involve the vulnerability that detects the traffic accident in open road or in tunnel as the traffic jam not as the traffic accident. This paper proposes the improved accident detection algorithm to enhance the detection probability based on accident detection algorithms applied in open roads. The improved accident detection algorithm provides the preliminary judgment of potential accident by detecting the stopped object by Gaussian Mixture Model. Afterwards, it measures the detection area is divided into blocks so that the occupancy rate can be determined for each block. All experimental results of applying the new algorithm on a real incident was detected image without error.