• Title/Summary/Keyword: 규칙기반제어

Search Result 266, Processing Time 0.022 seconds

A Study on Development of Peak-Shaving Operation Algorithm for Energy Storage System (ESS의 Peak-Shaving 운용 알고리즘 개발 연구)

  • Lee, Seongjun;Baek, Jongbok;Kang, Mose
    • Proceedings of the KIPE Conference
    • /
    • 2019.11a
    • /
    • pp.208-209
    • /
    • 2019
  • 본 논문에서는 ESS를 이용한 전력 계통의 Peak-Shaving 제어 알고리즘 수립에 대한 연구 결과를 제시한다. 과거의 요일별 전력수요 데이터를 이용하는 경우 ESS가 포함된 전력 시스템의 연결점(PCC)에서 전력 및 에너지 평형 방정식을 수립할 수 있고, ESS의 전력 및 에너지 용량에 따른 전기요금 최소화를 목적 함수로 한 선형 계획법 문제를 정식화할 수 있다. 선형 계획법 문제 해결을 통해 ESS가 추가되는 경우에 대한 경제성을 분석할 수 있고, 이로부터 ESS의 적합한 용량도 선정할 수 있다. 또한 부하 크기 및 시간대별 ESS 최적 전력 이용 패턴을 확인할 수 있기 때문에 실 운용 로직 설계를 위한 가이드로 결과를 활용할 수 있다. 본 논문에서는 제안된 방법을 설명하기 위한 일 예시로서, 시간대별 전력 부하 패턴의 기존 연구 결과로부터 도출한 부하 전력 곡선을 이용하여 선형 계획법을 이용한 Peak-Shaving 최적 제어 결과를 제시하고, 이를 기반으로 실시간 운전 가능한 규칙 기반 알고리즘을 설계하여 ESS의 적용에 따른 요금 절감 효과를 제시한다.

  • PDF

러프집합과 계층적 분류구조를 이용한 데이터마이닝에서 분류지식발견

  • Lee, Chul-Heui;Seo, Seon-Hak
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.12 no.3
    • /
    • pp.202-209
    • /
    • 2002
  • This paper deals with simplification of classification rules for data mining and rule bases for control systems. Datamining that extracts useful information from such a large amount of data is one of important issues. There are various ways in classification methodologies for data mining such as the decision trees and neural networks, but the result should be explicit and understandable and the classification rules be short and clear. The rough sets theory is an effective technique in extracting knowledge from incomplete and inconsistent data and provides a good solution for classification and approximation by using various attributes effectively This paper investigates granularity of knowledge for reasoning of uncertain concopts by using rough set approximations and uses a hierarchical classification structure that is more effective technique for classification by applying core to upper level. The proposed classification methodology makes analysis of an information system eary and generates minimal classification rules.

Sampled-data Fuzzy Controller for Network-based Systems with Neutral Type Delays (뉴트럴 타입 시간 지연을 갖는 네트워크 기반 시스템의 샘플치 퍼지 제어기 설계)

  • Joo, Young-Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.151-156
    • /
    • 2008
  • This paper presents the stability analysis and design for a sampled-data fuzzy control system with neutral type of time delay, which is formed by a nonlinear plant and a sampled-data fuzzy controller connected in a closed loop. The sampling activity and neutral type of time delay will complicate the system dynamics and make the stability analysis much more difficult than that for a pure continuous-time fuzzy control system. Based on the fuzzy-model-based control approach, LMI(linear matrix inequality)-based stability conditions are derived to guarantee the nonlinear networked system stability. An application example will be given to show the merits and design a procedure of the proposed approach.

Improved Access Control using Context-Aware Security Service (상황인식 보안 서비스를 이용한 개선된 접근제어)

  • Yang, Seok-Hwan;Chung, Mok-Dong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.133-142
    • /
    • 2010
  • As the ubiquitous technology has penetrated into almost every aspect of modern life, the research of the security technology to solve the weakness of security in the ubiquitous environment is received much attention. Because, however, today's security systems are usually based on the fixed rules, many security systems can not handle diverse situations in the ubiquitous environment appropriately. Although many existing researches on context aware security service are based on ACL (Access Control List) or RBAC (Role Based Access Control), they have an overhead in the management of security policy and can not manipulate unexpected situations. Therefore, in this paper, we propose a context-aware security service providing multiple authentications and authorization from a security level which is decided dynamically in a context-aware environment using FCM (Fuzzy C-Means) clustering algorithm and Fuzzy Decision Tree. We show proposed model can solve typical conflict problems of RBAC system due to the fixed rules and improve overhead problem in the security policy management. We expect to apply the proposed model to the various applications using contextual information of the user such as healthcare system, rescue systems, and so on.

Performance Improvement for Back-stepping Controller of a Mobile Robot Based on Fuzzy Systems (퍼지추론을 이용한 이동로봇의 백스테핑 제어기 성능개선)

  • 박재훼;진태석;이만형
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.40 no.5
    • /
    • pp.308-316
    • /
    • 2003
  • This paper describes a tracking control for the mobile robot based on fuzzy systems. The conventional back-stepping controller includes the dynamics and kinematics of the mobile robot, which is affected by the derived velocity reference by a kinematic controller. To improve the performance of conventional back-stepping controller, this paper uses the fuzzy systems known as the nonlinear controller. In this paper, the new velocity reference for the back-stepping controller is derived through the fuzzy inference. Fuzzy rules are selected for gains of the kinematic controller. The produced velocity reference has properly considered the varying reference trajectories. And simulation results show that the proposed controller is more robust than the conventional back-stepping controller.

A Virtualization Management Convergence Access Control Model for Cloud Computing Environments (클라우드 컴퓨팅 환경에서 가상화 관리 융합접근제어 모델)

  • Choi, Eun-Bok
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.69-75
    • /
    • 2018
  • The purpose of access control is to prevent computing resources from illegal behavior such as leakage, modification, and destruction by unauthorized users. As the cloud computing environment is expanded to resource sharing services using virtualization technology, a new security model and access control technique are required to provide dynamic and secure cloud-based computing services. The virtualization management convergence access control model provides a flexible user authorization function by applying the dynamic privilege assignment function to the role based access control mechanism. In addition, by applying access control mechanism based on security level and rules, we solve the conflict problem in virtual machine system and guarantee the safeness of physical resources. This model will help to build a secure and efficient cloud-based virtualization management system and will be expanded to a mechanism that reflects the multi-level characteristics.

A Method of Self-Organizing for Fuzzy Logic Controller Through Learning of the Proper Directioin of Control (바람직한 제어 방향의 학습을 통한 퍼지 제어기의 자기 구성방법)

  • 이연정;최봉열
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.3
    • /
    • pp.21-33
    • /
    • 1997
  • In this paper, a method of self-organizing for fuzzy logic controller(FLC) through learning of the proper direction of coritrol is proposed. In case of designing a self-organizing FLC for unknown dynamic plants based on the gradient descent method, it is difficult to identify the desirable direction of the change of control inpul. in which the error would be decreased. To resolve this problem, we propose a method as fo1lows:at first, assign representative values for the direction of change of error with respect to control input to each partitioned region of the states, and then, learn the fuzzy control rules using the reinforced representative values through iterative trials. 'The proposed self-organizing FLC has simple structure and it is easy to design. The validity of the proposed method is proved by the computer simulation for an inverted pendulum system.

  • PDF

Design of PCA Architecture Based on Quantum-Dot Cellular Automata (QCA 기반의 효율적인 PCA 구조 설계)

  • Shin, Sang-Ho;Lee, Gil-Je;Yoo, Kee-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.2
    • /
    • pp.178-184
    • /
    • 2014
  • CMOS technology based on PCA is very efficient at an implementation of memory or ALU. However, there has been a growing interest in quantum-dot cellular automata (QCA) because of the limitation of CMOS scaling. In this paper, we propose a design of PCA architecture based on QCA. In the proposed PCA design, we utilize D flip-flop and XOR logic gate without wire crossing technique, and design a input and rule control switches. In experiment, we perform the simulation of the proposed PCA architecture by QCADesigner. As the result, we confirm the efficiency the proposed architecture.

장애물에 의한 휴먼 모션의 적응적 변형기법

  • Kim, Gi-Hyeon
    • 한국게임학회지
    • /
    • v.6 no.1
    • /
    • pp.61-63
    • /
    • 2009
  • 가상환경에서 다양한 객체 요소들이 휴먼 캐릭터와 서로 상호작용을 한다. 이것은 휴먼 모션 애니메이션에 영향을 준다. 기본모션데이터는 동적, 고정된 객체의 접촉 상태, 지면과의 관계에 따라 영향을 받는다. 모션이 적절히 수정되지 않으면 불규칙, 비합리적인 표현이 생성될수 있다. 본 논문은 모션 데이터 커브를 추적하고 적절히 장애물 객체의 속성을 포함하는 관절데이터를 추적한다. 상호작용의 결과에 적절히 응답하여 데이터를 수정한다. 본 논문은 애니메이션 시나리오상에서 상호작용하는 객체를 위한 동적 제어 메커니즘을 설계하는 기법을 제시한다. 특정한 규칙을 이용하여 의사 결정할 수 있는 지능형 에이젼트에 기반한 구조로 에이젼트 시스템을 제안한다.

  • PDF

Model-based Tuning Rules of the PID Controller Using Real-coded Genetic Algorithms (RCGA를 이용한 PID 제어기의 모델기반 동조규칙)

  • 김도응;진강규
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.12
    • /
    • pp.1056-1060
    • /
    • 2002
  • Model-based tuning rules of the PID controller are proposed incorporating with real-coded genetic algorithms. The optimal parameter sets of the PID controller for step set-point tracking are obtained based on the first-order time delay model and a real-coded genetic algorithm as an optimization tool. As for assessing the performance of the controllers, performance indices(ISE, IAE and ITAE) are adopted. Then tuning rules are derived using the tuned parameter sets, potential rule models and another real-coded genetic algorithm A set of simulation works is carried out to verify the effectiveness of the proposed rules.