• Title/Summary/Keyword: 데이터 기반 제어

Search Result 2,012, Processing Time 0.038 seconds

A Grouping Technique for Synchronous Digital Duplexing Systems (동기식 디지털 이중화 시스템을 위한 그룹핑 기법)

  • Ko, Yo-Han;Park, Chang-Hwan;Park, Kyung-Won;Jeon, Won-Gi;Paik, Jong-Ho;Lee, Seok-Pil;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4C
    • /
    • pp.341-348
    • /
    • 2009
  • In this paper, we propose a grouping technique for the SDD(Synchronous Digital Duplexing) based on OFDMA(Orthogonal Frequency Division Multiple Access). The SDD has advantages of increasing data efficiency and flexibility of resource since SDD can transmit uplink signals and downlink signals simultaneously by using mutual time information and mutual channel information, obtained during mutual ranging process. However, the SDD has a disadvantage of requiring additional CS to maintain orthogonality of OFDMA symbols when the sum of mutual time difference and mutual channel length between AP(access point) and SS(subscriber station) or among SSs are larger than CP length. In order to minimize the length of CS for the case of requiring additional CS in SDD, we proposes a grouping technique which controls transmit timing and receive timing of AP and SS in a cell by classifying them into groups. Performances of the proposed grouping technique are evaluated by computer simulation.

Interoperable Security Framework for Heterogeneous IoT Platforms (이종 사물인터넷 플랫폼 간 보안 상호운용을 위한 프레임워크)

  • Oh, Se-Ra;Kim, Young-Gab
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.3
    • /
    • pp.81-90
    • /
    • 2018
  • Due to the dramatic advancement of IoT (Internet of Things), it is expected that tens of billions of IoT devices will be connected by the year 2024. Furthermore, as IoT technologies evolves, the security management in IoT platforms has become a critical issue. For example, there are interworking problems between heterogeneous IoT platforms caused by differences from communication protocols, security policies, etc. in each platform. In addition, unsecured interworking can cause major security issues including the information leakage. In this paper, in order to solve these problems, a security interworking architecture is proposed and implemented in both FIWARE and oneM2M, which are representative IoT platforms. First, the security architecture of FIWARE is analyzed and implemented, and then the security framework based on OAuth 2.0 is developed on Mobius platform. Finally, in order to validate the proposed security interworking architecture, a LED (Light-Emitting Diode) example, where the LED is controlled by only authorized users, is developed. The proposed architecture can be extended to the diverse IoT platforms and devices.

Fuzzy Rule Generation and Building Inference Network using Neural Networks (신경망을 이용한 퍼지 규칙 생성과 추론망 구축)

  • 이상령;이현숙;오경환
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.7 no.3
    • /
    • pp.43-54
    • /
    • 1997
  • Knowledge acquisition is one of the most difficult problems in designing fuzzy systems. As application domains of fuzzy systems become larger and more complex, it is more difficult to find the relations among the system's input- outpiit variables. Moreover, it takes a lot of efforts to formulate expert's knowledge about complex systems' control actions by linguistic variables. Another difficulty is to define and adjust membership functions properly. Soin conventional fuzzy systems, the membership functions should be adjusted to improve the system performance. This is time-consuming process. In this paper, we suggest a new approach to design a fuzzy system. We design a fuzzy system using two neural networks, Kohonen neural network and backpropagation neural network, which generate fuzzy rules automatically and construct inference network. Since fuzzy inference is performed based on fuzzy relation in this approach, we don't need the membership functions of each variable. Therefore it is unnecessary to define and adjust membership functions and we can get fuzzy rules automatically. The design process of fuzzy system becomes simple. The proposed approach is applied to a simulated automatic car speed control system. We can be sure that this approach not only makes the design process of fuzzy systems simple but also produces appropriate inference results.

  • PDF

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.

A Study on the Signal Control Unit's Reconstitution to Control the Separated Through/Left(or Right) Turn and the Median Bus Lane Signal for the Standard Traffic Signal Controller (표준규격 교통신호제어기에서 교통류별 전용신호 구현방안 연구)

  • Han, Won-Sub;Lee, Ho-Won;Hyun, Cheol-Seung;Joo, Doo-Hwan;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • According to the change of the traffic conditions, the requirement of controlling the separated left(or right) turn, the median bus lane and bicycle signal is increasing. However, the traffic signal controller standard based on the four-set lights restricts to control the three-set lights which control the separated direction and kind of traffics. This study suggests the method to control the three-set lights signal by improving the hardware and software for the traffic signal controller which is operated currently in the traffic scene. The 6 output ports of Load Signal Unit(LSU) which is consisted of Pedestrian Red, Pedestrian Green, Red, Yellow, Arrow and Green signal reconstitute 2 rows of the Red, Yellow, Green for three-set lights while the Signal Map data's code values which control the signal step of an individual Ring and LSU are established to adjust the LSU's output ports(R1 Y1 G1 R2 Y2 G2) of the three-set lights. The effect of using the separated through/left turn and the median lane bus signal of three-set lights is analyzed from a Mangwoo intersection in Seoul. The results of analysis show that the delay time of the east-west direction where the median bus lane is operated is especially improved with over 70 sec/veh.

  • PDF

A Study on Automatic Generation of Interface Circuits Based on FSM between Standard Buses and Ips (FSM을 이용한 표준화된 버스와 IP간의 인터페이스 회로 자동생성에 관한 연구)

  • Lee, Ser-Hoon;Moon, Jong-Uk;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.137-146
    • /
    • 2005
  • IP-based design methodology has been popularly employed for SoC design to reduce design complexity and to cope with time-to-market pressure. Interface modules for communication between system buses and IPs are required, since many IPs employ different protocols. Automatic generation of these interface modules would enhance designer's productivity and IP's reusability. This paper proposes an automatic interface generation system based on FSM generated from the protocol description of IPs. The proposed system provides the library modules for the standard buses to reduce the burdens of describing the protocols for data transfer from/to standard buses. Experimental results show that the area of the interface circuits generated by the proposed system had been increased slightly by 4.5% on the average when compared to manual designs. In the experiment, where bus clock is 100 Mhz and slave module clock is 34 Mhz, the latency of the interface had been increased by 7.1% in burst mode to transfer 16 data words. However, occupation of system bus can be reduce by 64.9%. A chip designer can generate an interface that improves the efficiency of system bus, by using this system.

Nonlinear Characteristic Analysis of Charging Current for Linear Type Magnetic Flux Pump Using RBFNN (RBF 뉴럴네트워크를 이용한 리니어형 초전도 전원장치의 비선형적 충전전류특성 해석)

  • Chung, Yoon-Do;Park, Ho-Sung;Kim, Hyun-Ki;Oh, Sung-Kwun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.140-145
    • /
    • 2010
  • In this work, to theoretically analyze the nonlinear charging characteristic, a Radial Basis Function Neural Network (RBFNN) is adopted. Based on the RBFNN, an charging characteristic tendency of a Linear Type Magnetic Flux Pump (LTMFP) is analyzed. In the paper, we developed the LTMFP that generates stable and controllable charging current and also experimentally investigated its charging characteristic in the cryogenic system. From these experimental results, the charging current of the LTMFP was also found to be frequency dependent with nonlinear quality due to the nonlinear magnetic behaviour of superconducting Nb foil. On the whole, in the case of essentially cryogenic experiment, since cooling costs loomed large in the cryogenic environment, it is difficult to carry out various experiments. Consequentially, in this paper, we estimated the nonlinear characteristic of charging current as well as realized the intelligent model via the design of RBFNN based on the experimental data. In this paper, we view RBF neural networks as predominantly data driven constructs whose processing is based upon an effective usage of experimental data through a prudent process of Fuzzy C-Means clustering method. Also, the receptive fields of the proposed RBF neural network are formed by the FCM clustering.

Development of Wireless Smart Sensing Framework for Structural Health Monitoring of High-speed Railway Bridges (고속 철도 교량의 구조 건전성 모니터링을 위한 스마트 무선 센서 프레임워크 개발)

  • Kim, Eunju;Park, Jong-Woong;Sim, Sung-Han
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.1-9
    • /
    • 2016
  • Railroad bridges account for 25% of the entire high-speed rail network. Railway bridges are subject to gradual structural degradation or fatigue accumulation due to consistent and repeating excitation by fast moving trains. Wireless sensing technology has opened up a new avenue for bridge health monitoring owing to its low-cost, high fidelity, and multiple sensing capability. On the other hand, measuring the transient response during train passage is quite challenging that the current wireless sensor system cannot be applied due to the intrinsic time delay of the sensor network. Therefore, this paper presents a framework for monitoring such transient responses with wireless sensing systems using 1) real-time excessive vibration monitoring through ultra-low-power MEMS accelerometers, and 2) post-event time synchronization scheme. The ultra-low power accelerometer continuously monitors the vibration and trigger network when excessive vibrations are detected. The entire network of wireless smart sensors starts sensing through triggering and the post-event time synchronization is conducted to compensate for the time error on the measured responses. The results of this study highlight the potential of detecting the impact load and triggering the entire network, as well as the effectiveness of the post-event time synchronized scheme for compensating for the time error. A numerical and experimental study was carried out to validate the proposed sensing hardware and time synchronization method.

An Experimental Environment for Simulation of Stealthy Deception Attack in CPS Using PLCitM (PLC in the Middle) (중간자 PLC를 이용한 CPS 은닉형 공격 실험환경 구축 방안)

  • Chang, Yeop;Lee, Woomyo;shin, Hyeok-Ki;Kim, Sinkyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.123-133
    • /
    • 2018
  • Cyber-Physical System (CPS) is a system in which a physical system and a cyber system are strongly integrated. In order to operate the target physical system stably, the CPS constantly monitors the physical system through the sensor and performs control using the actuator according to the current state. If a malicious attacker performs a forgery attack on the measured values of the sensors in order to conceal their attacks, the cyber system operated based on the collected data can not recognize the current operation status of the physical system. This causes the delay of the response of the automation system and the operator, and then more damage will occur. To protect the CPS from increasingly sophisticated and targeted attacks, countermeasures must be developed that can detect stealthy deception attacks. However, in the CPS environment composed of various heterogeneous devices, the process of analyzing and demonstrating the vulnerability to actual field devices requires a lot of time. Therefore, in this study, we propose a method of constructing the experiment environment of the PLCitM (PLC in the middle) which can verify the performance of the techniques to detect the CPS stealthy deception attack and present the experimental results.

Fault Detection and Reuse of Self-Adaptive Module (자가 적응 모듈의 오류 탐지와 재사용)

  • Lee, Joon-Hoon;Lee, Hee-Won;Park, Jeong-Min;Jung, Jin-Su;Lee, Eun-Seok
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10b
    • /
    • pp.247-252
    • /
    • 2007
  • 오늘날 컴퓨팅 환경은 점차 복잡해지고 있으며, 복잡한 환경을 관리하는 이 점차 중요해 지고 있다. 이러한 관리를 위해 어플리케이션의 내부 구조를 드러내지 않은 상태에서 환경에 적응하는 자가치유에 관한 연구가 중요한 이슈가 되고 있다. 우리의 이전 연구에서는 자가 적응 모듈의 성능 향상을 위해 스위치를 사용하여 컴포넌트의 동작 유무를 결정하였다. 그러나 바이러스와 같은 외부 상황에 의해 자가 적응 모듈이 정상적으로 동작하지 않을 수 있으며 다수의 파일을 전송할 때 스위치가 꺼진 컴포넌트들은 메모리와 같은 리소스를 낭비한다. 본 연구에서는 이전 연구인 성능 개선 자가 적응 모듈에서 발생할 수 있는 문제점을 해결하기 위한 방법을 제안한다. 1) 컴포넌트의 동작 여부를 결정하는 스위치를 확인하여 비정상 상태인 컴포넌트를 찾아 치유를 하고, 2) 현재 단계에서 사용하지 않는 컴포넌트를 다른 작업에서 재사용한다. 이러한 제안 방법론을 통해 파일 전송이 않은 상황에서도 전체 컴포넌트의 수를 줄일 수 있으며 자가 적응 제어 모듈을 안정적으로 작동할 수 있도록 한다. 본 논문에서는 명가를 위하여 비디오 회의 시스템 내의 파일 전송 모듈에 제안 방법론을 적용하여 이전 연구의 모듈과 제안 방법론을 적용한 모듈이 미리 정한 상황들에서 정상적으로 적응할 수 있는지를 비교한다. 또한 파일 전송이 많은 상황에서 제안 방법론을 적용하였을 때 이전 연구 방법론과의 컴포넌트 수를 비교한다. 이를 통해 이전 연구의 자가 적응 모듈의 비정상 상태를 찾아낼 수 있었고, 둘 이상의 파일 전송이 이루어 질 때 컴포넌트의 재사용을 통해 리소스의 사용을 줄일 수 있었다.위해 잡음과 그림자 영역을 제거한다. 잡음과 그림자 영역을 제거하면 구멍이 발생하거나 실루엣이 손상되는 문제가 발생한다. 손상된 정보는 근접한 픽셀이 유사하지 않을 때 낮은 비용을 할당하는 에너지 함수의 스무드(smooth) 항에 의해 에지 정보를 기반으로 채워진다. 결론적으로 제안된 방법은 스무드 항과 대략적으로 설정된 데이터 항으로 구성된 에너지 함수를 그래프 컷으로 전역적으로 최소화함으로써 더욱 정확하게 목적이 되는 영역을 추출할 수 있다.능적으로 우수한 기호성, 즉석에서 먹을 수 있는 간편성, 장기저장에 의한 식품 산패, 오염 및 변패 미생물의 생육 등이 발생하지 않는 우수한 생선가공, 저장방법, 저가 생선류의 부가가치 상승 등 여러 유익한 결과를 얻을 수 있는 효과적인 가공방법을 증명하였다.의 평균섭취량에도 미치지 못하는 매우 저조한 영양상태를 보여 경제력, 육체적 활동 및 건강상태 등이 매우 열악한 이들 집단에 대한 질 좋은 영양서비스의 제공이 국가적 차원에서 시급히 재고되어야 할 것이다. 연구대상자 특히 배달급식 대상자의 경우 모집의 어려움으로 인해 적은 수의 연구대상자의 결과를 보고한 것은 본 연구의 제한점이라 할 수 있다 따라서 본 연구결과를 바탕으로 좀 더 많은 대상자를 대상으로 한 조사 연구가 계속 이루어져 가정배달급식 프로그램의 개선을 위한 유용한 자료로 축적되어야 할 것이다.상범주로 회복함을 알수 있었고 실험결과 항암제 투여후 3 일째 피판 형성한 군에서 피판치유가 늦어진 것으로 관찰되어 인체에서 항암 투여후 수술시기는 인체면역계가 회복하는 시기를 3주이상 경과후 적어도 4주째 수술시기를 정하는 것이 유리하리라 생각되

  • PDF