• Title/Summary/Keyword: 고정응답

Search Result 349, Processing Time 0.03 seconds

Precision Speed Control of PMSM Using Disturbance Observer and Parameter Compensator (외란관측기와 파라미터 보상기를 이용한 PMSM의 정밀속도제어)

  • 고종선;이택호;김칠환;이상설
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.6 no.1
    • /
    • pp.98-106
    • /
    • 2001
  • This paper presents external load disturbance compensation that used to deadbeat load torque observer and regulation of the compensation gain by parameter estimator. As a result, the response of PMSM follows that of the nominal plant. The load torque compensation method is compose of a dead beat observer that is well-known method. However it has disadvantage such as a noise amplification effect. To reduce of the effect, the post-filter, which is implemented by MA process, is proposed. The parameter compensator with RLSM(recursive least square method) parameter estimator is suggested to increase the performance of the load torque observer and main controller. Although RLSM estimator is one of the most effective methods for online parameter identification, it is difficult to obtain unbiased result in this application. It is caused by disturbed dynamic model with external torque. The proposed RLSM estimator is combined with a high performance torque observer to resolve the problems. As a result, the proposed control system becomes a robust and precise system against the load torque and the parameter variation. A stability and usefulness, through the verified computer simulation and experiment, are shown in this paper.

  • PDF

Endowment of Duplicated Serial Number for Window-controlled Selective-repeat ARQ (Window-controlled Selective-repeat ARQ에서 중복된 순차 번호의 부여)

  • Park, Jin-Kyung;Shin, Woo-Cheol;Ha, Jun;Choi, Cheon-Won
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.288-298
    • /
    • 2003
  • We consider a window-controlled selective-repeat ARQ scheme for error control between two adjacent nodes lying on a communication path. In this scheme, each packet to be transmitted is endowed with a serial number in a cyclic and sequential fashion. In turn, the transmitting node is not allowed to transmit a packet belonging to a window before every packet in the previous window is positively acknowledged. Such postponement of packet transmission incurs a degradation in throughput and delay performance. In this paper, aiming at improving packet delay performance, we employs a supplement scheme in which a serial number is duplicated within a frame. Classifying duplication rules into fixed, random and adaptive categories, we present candidate rules in each category and evaluate the packet delay performance induced by each duplication rule. From numerical examples, we observe that duplicating serial numbers, especially ADR-T2 effectively reduces mean packet delay for the forward channel characterized by a low packet error rate. We also reveal that such delay enhancement is achieved by a high probability of hitting local optimal window size.

  • PDF

Performance of an Efficient Backoff Retransmission Algorithm with a Proactive Jamming Scheme for Realtime transmission in Wireless LAN (재밍 기반의 재전송 방식을 사용한 무선 LAN에서의 효율적인 실시간 트래픽 전송 방안의 성능 분석)

  • Koo Do-Jung;Yoon Chong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2B
    • /
    • pp.98-106
    • /
    • 2006
  • In order to provide a realtime transmission over a wireless LAM, we here present a new jamming based retransmission mechanism. In a legacy wireless LAN system, all stations use the binary exponential backoff algorithm to avoid collisions among frames. It is well known that the backoff algorithm causes more collisions as the numbers of active stations increases. This makes transmission of real time traffic hard. In the proposed scheme, when each station senses collisions, it promptly allows to send a jamming signal during a unique jamming window period which is determined by its own channel access count database(CACDB). This jamming windows is chosen not to be overlapped each other by using of CACDB, and thus channel access of another station is prevented. Hereafter the station gets the ownership of the medium when the wireless medium becomes idle after sending the jamming signal and sensing carrier, and then sends frame in medium. In our proposal, repeating collisions is never happened. We here assume that real time traffic use a frame of fixed length in order to make the time for receiving its ACK frame same. Comparing the proposed jamming-based retransmission scheme with the the 802.11 and 802.11e MAC by simulation. one can find that the proposed scheme have advantages in terms of delay, average backoff time, and average number of collisions per frame. One can find that the proposed scheme might be practically applicable to several applications of realtime traffic transmission in wireless LAN systems.

A Study on Low-Floor Bus Routes Selection - Focused on the Case of Jeollabuk-Do - (저상버스 노선선정 방안에 관한 연구 -전라북도 사례를 중심으로-)

  • Lee, Chang-Hyun;Kim, Sang-Youp;Kim, Jai-Sung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.4
    • /
    • pp.73-85
    • /
    • 2014
  • Approaching to aging society with increasing transportation vulnerable, most developed countries has positively promote low-floor bus. Such circumstance in Korea has plan to introduce low-floor bus to intra-city bus system which accounted for 30 percent of total number of buses however there is no specific operating plan for this matter. According to the revealed preference study on bus service, the study shows that the efficiency of low-floor is relatively low than that of other buses, therefore, it is necessary to establish feasible plan for bus route selection. Thus, this study is to conduct research on analyzing trip characteristics of transportation vulnerable and establish bus route selection measures for low-floor bus. The result from the survey in Jeollabuk-do Province reveals that the trip purpose of transportation vulnerable is mainly for welfare and medical service, which was made less than 6 times a week. Futhermore, 37.6 percent of transportation vulnerable use buses, thus, it is essential to improve its service quality for enhancing user's convenience and safety. In that transportation vulnerable O-D needs to be established and forecasts future demand for selecting optimal bus route. According to the estimation, route passing through densely populated areas with transportation vulnerable should take the first priority, city circular and other route would be next. Moreover, it is economically efficient that areas populated more than 200,000 with fixed route and less than 200,000 with limited route responsive to demands would be feasible plans. This study will have greater an impact on transportation planning and further research on transportation vulnerable.

Structural Integrity Assessment of Helicopter Composite Rotor Blade by Analyzing Bird-strike Resistance (조류충돌 해석을 통한 헬리콥터 복합재 로터 블레이드 구조 건전성 평가)

  • Park, Jehong;Jang, Jun Hwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.8
    • /
    • pp.8-14
    • /
    • 2019
  • Bird-strike is one of the most important design factors for safety in the aviation industry. Bird-strikes have been the cause of significant damage to aircraft and rotorcraft structures and the loss of life. This study used DYTRAN software to simulate the transient response of an Euler-Lagrangian composite helicopter blade that has been impacted by a bird. The Arbitrary Lagrangian Eulerian (ALE) method and a suitable equation of state were applied to model the bird. ALE was applied to the bird-strike analysis due to the large difference between the properties of the blade and bird. The debris of the bird was assumed to be a fluid and applied as Euler elements after the collision. Through the analysis of bird impacts, the leading-edge of the rotor blade (50.8 mm) was used to identify a positive margin of 1.18 based on the TSAI-FILL criteria. The results are assessed to be sufficiently reliable and may be evaluated to replace tests with various analysis conditions. The structural stability of the rotor blade could be assessed by applying various load conditions and different modeling methods in the future.

A Qualitative Study on Coping strategies of Older adults with Depression: Focused on the Experience of Coping with Depression in Older Adults Living in Seoul (노인의 우울 대처 전략에 관한 질적 연구: 서울시 거주 도시 노인의 우울 대처 경험을 중심으로)

  • Eo, Yugyeong;Ko, Jung Eun;Kim, Soon Eun
    • 한국노년학
    • /
    • v.37 no.3
    • /
    • pp.583-600
    • /
    • 2017
  • The purpose of this study is to explore qualitatively what kind of coping strategy the Korean older adults use when they are depressed and why. Participants were users, older than 60, of an elderly welfare center in Seoul, and answers of 34 respondents who experienced depression were included in the analysis. The collected data were analyzed through content analysis. The results of the analysis showed that strategies to cope with depression used by participants were composed of 6 domains and 11 sub-domains: health behavior (medical approach / exercise and diet), family and social contact (social interaction / going out and going on a trip / communication with family), Religious activities (Religious activities), lifelong education (hobbies / educational activities), productive activities (labor), health risk behaviors (drinking and gambling / resignation). The depression coping strategies of the older adults and their characteristics are as follows. First, older adults used diverse problem-focused coping strategies to cope with depression. Second, older adults considered various coping strategies together and used them simultaneously. Third, the facility space for older adults functions as a shelter. Fourth, although there were cases where medical approach was used, the intention to reuse was very low. Through this study, the following suggestions were made to help older adults cope with depression more successfully. First, access to various coping strategies should be promoted. Second, more places where older adults can spend their time comfortably need to be provided. Third, resistance to mental health care should be resolved.

Analysis of Spatial Trip Regularity using Trajectory Data in Urban Areas (도시부 경로자료를 이용한 통행의 공간적 규칙성 분석)

  • Lee, Su jin;Jang, Ki tae
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.6
    • /
    • pp.96-110
    • /
    • 2018
  • As the development of ICT has made it easier to collect various traffic information, research on creating new traffic attributes is drawing attention. Estimation and forecasts of demand and traffic volume are one of the main indicators that are essential to traffic operation, assuming that the traffic pattern at a particular node or link is repeated. Traditionally, a survey method was used to demonstrate this similarity on trip behavior. However, the method was limited to achieving high accuracy with high costs and responses that relied on the respondents' memory. Recently, as traffic data has become easier to gather through ETC system, smart card, studies are performed to identify the regularity of trip in various ways. In, this study, route-level trip data collected in Daegu metropolitan city were analyzed to confirm that individual traveler forms a spatially similar trip chain over several days. For this purpose, we newly define the concept of spatial trip regularity and assess the spatial difference between daily trip chains using the sequence alignment algorithm, Dynamic Time Warping. In addition, we will discuss the applications as the indicators of fixed traffic demand and transportation services.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Proper Orthogonal Decomposition Based Intrusive Reduced Order Models to Accelerate Computational Speed of Dynamic Analyses of Structures Using Explicit Time Integration Methods (외연적 시간적분법 활용 동적 구조해석 속도 향상을 위한 적합직교분해 기반 침습적 차수축소모델 적용 연구)

  • Young Kwang Hwang;Myungil Kim
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.1
    • /
    • pp.9-16
    • /
    • 2024
  • Using the proper orthogonal decomposition (POD) based intrusive reduced order model (ROM), the total degrees of freedom of the structural system can be significantly reduced and the critical time step satisfying the conditional stability increases in the explicit time integrations. In this study, therefore, the changes in the critical time step in the explicit time integrations are investigated using both the POD-ROM and Voronoi-cell lattice model (VCLM). The snapshot matrix is composed of the data from the structural response under the arbitrary dynamic loads such as seismic excitation, from which the POD-ROM is constructed and the predictive capability is validated. The simulated results show that the significant reduction in the computational time can be achieved using the POD-ROM with sufficiently ensuring the numerical accuracy in the seismic analyses. In addition, the validations show that the POD based intrusive ROM is compatible with the Voronoi-cell lattice based explicit dynamic analyses. In the future study, the research results will be utilized as an elemental technology for the developments of the real-time predictive models or monitoring system involving the high-fidelity simulations of structural dynamics.

SANET-CC : Zone IP Allocation Protocol for Offshore Networks (SANET-CC : 해상 네트워크를 위한 구역 IP 할당 프로토콜)

  • Bae, Kyoung Yul;Cho, Moon Ki
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.4
    • /
    • pp.87-109
    • /
    • 2020
  • Currently, thanks to the major stride made in developing wired and wireless communication technology, a variety of IT services are available on land. This trend is leading to an increasing demand for IT services to vessels on the water as well. And it is expected that the request for various IT services such as two-way digital data transmission, Web, APP, etc. is on the rise to the extent that they are available on land. However, while a high-speed information communication network is easily accessible on land because it is based upon a fixed infrastructure like an AP and a base station, it is not the case on the water. As a result, a radio communication network-based voice communication service is usually used at sea. To solve this problem, an additional frequency for digital data exchange was allocated, and a ship ad-hoc network (SANET) was proposed that can be utilized by using this frequency. Instead of satellite communication that costs a lot in installation and usage, SANET was developed to provide various IT services to ships based on IP in the sea. Connectivity between land base stations and ships is important in the SANET. To have this connection, a ship must be a member of the network with its IP address assigned. This paper proposes a SANET-CC protocol that allows ships to be assigned their own IP address. SANET-CC propagates several non-overlapping IP addresses through the entire network from land base stations to ships in the form of the tree. Ships allocate their own IP addresses through the exchange of simple requests and response messages with land base stations or M-ships that can allocate IP addresses. Therefore, SANET-CC can eliminate the IP collision prevention (Duplicate Address Detection) process and the process of network separation or integration caused by the movement of the ship. Various simulations were performed to verify the applicability of this protocol to SANET. The outcome of such simulations shows us the following. First, using SANET-CC, about 91% of the ships in the network were able to receive IP addresses under any circumstances. It is 6% higher than the existing studies. And it suggests that if variables are adjusted to each port's environment, it may show further improved results. Second, this work shows us that it takes all vessels an average of 10 seconds to receive IP addresses regardless of conditions. It represents a 50% decrease in time compared to the average of 20 seconds in the previous study. Also Besides, taking it into account that when existing studies were on 50 to 200 vessels, this study on 100 to 400 vessels, the efficiency can be much higher. Third, existing studies have not been able to derive optimal values according to variables. This is because it does not have a consistent pattern depending on the variable. This means that optimal variables values cannot be set for each port under diverse environments. This paper, however, shows us that the result values from the variables exhibit a consistent pattern. This is significant in that it can be applied to each port by adjusting the variable values. It was also confirmed that regardless of the number of ships, the IP allocation ratio was the most efficient at about 96 percent if the waiting time after the IP request was 75ms, and that the tree structure could maintain a stable network configuration when the number of IPs was over 30000. Fourth, this study can be used to design a network for supporting intelligent maritime control systems and services offshore, instead of satellite communication. And if LTE-M is set up, it is possible to use it for various intelligent services.