• Title/Summary/Keyword: 데이터 기반 제어

Search Result 2,019, Processing Time 0.03 seconds

Edge to Edge Model and Delay Performance Evaluation for Autonomous Driving (자율 주행을 위한 Edge to Edge 모델 및 지연 성능 평가)

  • Cho, Moon Ki;Bae, Kyoung Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.1
    • /
    • pp.191-207
    • /
    • 2021
  • Up to this day, mobile communications have evolved rapidly over the decades, mainly focusing on speed-up to meet the growing data demands of 2G to 5G. And with the start of the 5G era, efforts are being made to provide such various services to customers, as IoT, V2X, robots, artificial intelligence, augmented virtual reality, and smart cities, which are expected to change the environment of our lives and industries as a whole. In a bid to provide those services, on top of high speed data, reduced latency and reliability are critical for real-time services. Thus, 5G has paved the way for service delivery through maximum speed of 20Gbps, a delay of 1ms, and a connecting device of 106/㎢ In particular, in intelligent traffic control systems and services using various vehicle-based Vehicle to X (V2X), such as traffic control, in addition to high-speed data speed, reduction of delay and reliability for real-time services are very important. 5G communication uses high frequencies of 3.5Ghz and 28Ghz. These high-frequency waves can go with high-speed thanks to their straightness while their short wavelength and small diffraction angle limit their reach to distance and prevent them from penetrating walls, causing restrictions on their use indoors. Therefore, under existing networks it's difficult to overcome these constraints. The underlying centralized SDN also has a limited capability in offering delay-sensitive services because communication with many nodes creates overload in its processing. Basically, SDN, which means a structure that separates signals from the control plane from packets in the data plane, requires control of the delay-related tree structure available in the event of an emergency during autonomous driving. In these scenarios, the network architecture that handles in-vehicle information is a major variable of delay. Since SDNs in general centralized structures are difficult to meet the desired delay level, studies on the optimal size of SDNs for information processing should be conducted. Thus, SDNs need to be separated on a certain scale and construct a new type of network, which can efficiently respond to dynamically changing traffic and provide high-quality, flexible services. Moreover, the structure of these networks is closely related to ultra-low latency, high confidence, and hyper-connectivity and should be based on a new form of split SDN rather than an existing centralized SDN structure, even in the case of the worst condition. And in these SDN structural networks, where automobiles pass through small 5G cells very quickly, the information change cycle, round trip delay (RTD), and the data processing time of SDN are highly correlated with the delay. Of these, RDT is not a significant factor because it has sufficient speed and less than 1 ms of delay, but the information change cycle and data processing time of SDN are factors that greatly affect the delay. Especially, in an emergency of self-driving environment linked to an ITS(Intelligent Traffic System) that requires low latency and high reliability, information should be transmitted and processed very quickly. That is a case in point where delay plays a very sensitive role. In this paper, we study the SDN architecture in emergencies during autonomous driving and conduct analysis through simulation of the correlation with the cell layer in which the vehicle should request relevant information according to the information flow. For simulation: As the Data Rate of 5G is high enough, we can assume the information for neighbor vehicle support to the car without errors. Furthermore, we assumed 5G small cells within 50 ~ 250 m in cell radius, and the maximum speed of the vehicle was considered as a 30km ~ 200 km/hour in order to examine the network architecture to minimize the delay.

Novel Collision Warning System using Neural Networks (신경회로망을 이용한 새로운 충돌 경고 시스템)

  • Kim, Beomseong;Choi, Baehoon;An, Jhonghyun;Hwang, Jaeho;Kim, Euntai
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.4
    • /
    • pp.392-397
    • /
    • 2014
  • Recently, there are many researches on active safety system of intelligent vehicle. To reduce the probability of collision caused by driver's inattention and mistakes, the active safety system gives warning or controls the vehicle toward avoiding collision. For the purpose, it is necessary to recognize and analyze circumstances around. In this paper, we will treat the problem about collision risk assessment. In general, it is difficult to calculate the collision risk before it happens. To consider the uncertainty of the situation, Monte Carlo simulation can be employed. However it takes long computation time and is not suitable for practice. In this paper, we apply neural networks to solve this problem. It efficiently computes the unseen data by training the results of Monte Carlo simulation. Furthermore, we propose the features affects the performance of the assessment. The proposed algorithm is verified by applications in various crash scenarios.

An Effective Method Guaranteeing Mutual Exclusion of Lock Waiting Information for Deadlock Detection in Main Memory Databases (주기억장치 데이타베이스에서 교착 상태의 검출을 위한 락 대기 정보의 효과적인 상호 배제 기법)

  • Kim, Sang-Wook;Lee, Seung-Sun;Choi, Wan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1313-1321
    • /
    • 1999
  • The two-phase locking protocol(2PL) is the most widely-used concurrency control mechanism for guaranteeing logical consistency of data in a database environment where a number of transactions perform concurrently. The problem inherent in the 2PL protocol is a deadlock, where a set of transactions holding some locks indefinitely wait an additional lock that is already held by other transactions in the set. The deadlock detector is a DBMS sub-component that examines periodically whether a system is in a deadlock state based on lock waiting information of transactions. The deadlock detector and transactions execute concurrently in a DBMS and read and/or write the lock waiting information simultaneously. Since the lock waiting information is a shared one, we need an efficient method guaranteeing its physical consistency by using mutual exclusion. The efficiency of the mutual exclusion method is crucial especially in a main memory DBMS with high performance since it seriously affects the performance of an entire system. In this paper, we propose a new method that effectively guarantees physical consistency of lock waiting information. Two primary goals of our method are to minimize the processing overhead and to maximize system concurrency.

  • PDF

Design of Secure Scheme based on Bio-information Optimized for Car-sharing Cloud (카 쉐어링 클라우드 환경에서 최적화된 바이오 정보 기반 보안 기법 설계)

  • Lee, Kwang-Hyoung;Park, Sang-Hyeon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.469-478
    • /
    • 2019
  • Car-sharing services have been settled on as a new type of public transportation owing to their enhanced convenience, expanded awareness of practical consumption patterns, the inspiration for environmental conscientiousness, and the diffusion of smart phones following the economic crisis. With development of the market, many people have started using such services. However, security is still an issue. Damage is expected since IDs and passwords are required for log-in when renting and controlling the vehicles. The protocol suggested in this study uses bio-information, providing an optimized service, and convenient (but strong) authentication with various service-provider clouds registering car big data about users through brokers. If using the techniques suggested here, it is feasible to reduce the exposure of the bio-information, and to receive service from multiple service-provider clouds through one particular broker. In addition, the proposed protocol reduces public key operations and session key storage by 20% on mobile devices, compared to existing car-sharing platforms, and because it provides convenient, but strong, authentication (and therefore constitutes a secure channel), it is possible to proceed with secure communications. It is anticipated that the techniques suggested in this study will enhance secure communications and user convenience in the future car-sharing-service cloud environment.

A Study on Implementation of Robot Overlay Welding System Based on OLP for Ball of Ball Valves (볼밸브용 볼의 OLP 기반 로봇육성용접 시스템 구현에 관한 연구)

  • Jang, Jae-Sung;Hwang, Seong-Hyun;Lho, Tae-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.446-452
    • /
    • 2016
  • Recently, heat resistant super alloys (which are wear-resistant, corrosion-resistant, and heat-resistant), have been used as the basic structural material in offshore and petrochemical plants. On the other hand, making valves from very expensive, high heat-resistant alloys increases the production cost and decreases its market competitiveness. To solve these problems, the technique of overlaying only those that flow on the fluid has been used as an effective method. Nevertheless, because the former technique of overlaying the ball is performed manually, it takes too much time and perfect welding is difficult to perform. To solve this problem, this study developed a robot automation system that can make uniformly overlay welding of the ball for ball-valves. The system consists of a 6-axis welding robot with a welding torch and additional 2 axes for the rotation of positioner, the controller, and a robot path OLP (Off-Line Programming). The CAD drawing data was entered in the Off-line program to obtain the robot teaching point and drive source. Overlay welding paths were implemented using Matlab. Through an automated overlaying system that implemented the OLP, the productivity rose 2.58 times, as the amount of time required for work decreased from 88 hours to 41 hours.

The implementation of cable path and overfill visualization based on cable occupancy rate in the Shipbuilding CAD (조선 CAD에서 선박의 Cable 점유율을 기반으로 Cable 경로 및 Overfill 가시화 구현)

  • Kim, Hyeon-Jae;Kim, Bong-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.740-745
    • /
    • 2016
  • Cables are installed for tens of thousands of connections between various pieces of equipment to operate and control a commercial ship. The correct shortest-route data is necessary since these are complicated cable installations. Therefore, an overfill interval commonly exists in the shortest paths for cables as estimated by Dijkstra's algorithm, even if this algorithm is generally used. It is difficult for an electrical engineer to find the overfill interval in 3D cable models because the occupancy rate data exist in a data sheet unlinked to three-dimensional (3D) computer-aided design (CAD). The purpose of this study is to suggest a visualization method that displays the cable path and overfill interval in 3D CAD. This method also provides various color visualizations for different overfill ranges to easily determine the overfill interval. This method can reduce cable-installation man-hours from 7,000 to 5,600 thanks to a decreased re-installation rate, because the cable length calculation's accuracy is raised through fast and accurate reviews based on 3D cable visualization. As a result, material costs can also be reduced.

Small-Swing Low-Power SRAM Based on Source-Controlled 4T Memory Cell (소스제어 4T 메모리 셀 기반 소신호 구동 저전력 SRAM)

  • Chung, Yeon-Bae;Kim, Jung-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.3
    • /
    • pp.7-17
    • /
    • 2010
  • In this paper, an innovative low-power SRAM based on 4-transistor latch cell is described. The memory cells are composed of two cross-coupled inverters without access transistors. The sources of PMOS transistors are connected to bitlines while the sources of NMOS transistors are connected to wordlines. They are accessed by totally new read and write method which results in low operating power dissipation in the nature. Moreover, the design reduces the leakage current in the memory cells. The proposed SRAM has been demonstrated through 16-kbit test chip fabricated in a 0.18-${\mu}m$ CMOS process. It shows 17.5 ns access at 1.8-V supply while consuming dynamic power of $87.6\;{\mu}W/MHz$ (for read cycle) and $70.2\;{\mu}W/MHz$ (for write cycle). Compared with those of the conventional 6-transistor SRAM, it exhibits the power reduction of 30 % (read) and 42 % (write) respectively. Silicon measurement also confirms that the proposed SRAM achieves nearly 64 % reduction in the total standby power dissipation. This novel SRAM might be effective in realizing low-power embedded memory in future mobile applications.

A Grouping Technique for Synchronous Digital Duplexing Systems (동기식 디지털 이중화 시스템을 위한 그룹핑 기법)

  • Ko, Yo-Han;Park, Chang-Hwan;Park, Kyung-Won;Jeon, Won-Gi;Paik, Jong-Ho;Lee, Seok-Pil;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.341-348
    • /
    • 2009
  • In this paper, we propose a grouping technique for the SDD(Synchronous Digital Duplexing) based on OFDMA(Orthogonal Frequency Division Multiple Access). The SDD has advantages of increasing data efficiency and flexibility of resource since SDD can transmit uplink signals and downlink signals simultaneously by using mutual time information and mutual channel information, obtained during mutual ranging process. However, the SDD has a disadvantage of requiring additional CS to maintain orthogonality of OFDMA symbols when the sum of mutual time difference and mutual channel length between AP(access point) and SS(subscriber station) or among SSs are larger than CP length. In order to minimize the length of CS for the case of requiring additional CS in SDD, we proposes a grouping technique which controls transmit timing and receive timing of AP and SS in a cell by classifying them into groups. Performances of the proposed grouping technique are evaluated by computer simulation.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Fuzzy Rule Generation and Building Inference Network using Neural Networks (신경망을 이용한 퍼지 규칙 생성과 추론망 구축)

  • 이상령;이현숙;오경환
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.3
    • /
    • pp.43-54
    • /
    • 1997
  • Knowledge acquisition is one of the most difficult problems in designing fuzzy systems. As application domains of fuzzy systems become larger and more complex, it is more difficult to find the relations among the system's input- outpiit variables. Moreover, it takes a lot of efforts to formulate expert's knowledge about complex systems' control actions by linguistic variables. Another difficulty is to define and adjust membership functions properly. Soin conventional fuzzy systems, the membership functions should be adjusted to improve the system performance. This is time-consuming process. In this paper, we suggest a new approach to design a fuzzy system. We design a fuzzy system using two neural networks, Kohonen neural network and backpropagation neural network, which generate fuzzy rules automatically and construct inference network. Since fuzzy inference is performed based on fuzzy relation in this approach, we don't need the membership functions of each variable. Therefore it is unnecessary to define and adjust membership functions and we can get fuzzy rules automatically. The design process of fuzzy system becomes simple. The proposed approach is applied to a simulated automatic car speed control system. We can be sure that this approach not only makes the design process of fuzzy systems simple but also produces appropriate inference results.

  • PDF