• Title/Summary/Keyword: 제어방안

Search Result 2,558, Processing Time 0.035 seconds

자율운항선박 원격제어에서 제어지연의 본선 도메인 침공 연구

  • 임정빈;예병덕
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.172-173
    • /
    • 2021
  • 자율운항선박의 원격제어에서 제어지연이 발생하면 선박은 충돌위험에 처하게 됨으로 이에 대한 해결방안 필요하다. 연구 목적은 자율운항선박의 원격제어에서 제어지연이 선박충돌에 미치는 영향을 조사하기 위함이다. 연구 방법은, 선박의 터닝서클을 시뮬레이션을 통해서 관측하고, 이 데이터를 이용하여 제어지연에 의한 영향을 분석하였다. 이를 위하여 제어지연(시간)에 따른 선박조종 시뮬레이션의 선회권 측정 데이터를 이용하였다. 연구 결과, 제어지연에 의해서 본선 도메인 침공당하는 방위와 최소거리 분석 가능함을 알았다.

  • PDF

An Adaptive Delay Control based on the Transmission Urgency of the Packets in the Wireless Networks (무선망에서 패킷의 전송 긴급성을 고려한 적응적 지연 제어 방안)

  • Jeong, Dae-In
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.44-53
    • /
    • 2010
  • This paper proposes a traffic management policy for delay control in the wireless networks. The so-called EDD(Earliest Due Date) scheme is adopted as the packet scheduling policy, so that the service provision is performed in the order of the transmission urgency of the backlogged packets. In addition, we derive a formula to determine the contention window, one of the MAC parameters, with the goal of minimizing the non-work conserving characteristics of the traditional MAC scheme. This method eliminates the burden of the class-wise parameter settings which is typically required for the priority control. Simulations are performed to show the validity of the proposed scheme in comparison with the policy that adopts the class-level queue management such as the IEEE 802.11e standard. Smaller delays and higher rates of delay guarantees are observed throughout the experiments.

로버스트 파라미터 설계에서 인자분석을 이용한 동시 최적화 방안에 관한 연구

  • Gwon, Yong-Man;Hong, Yeon-Ung
    • 한국데이터정보과학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.163-170
    • /
    • 2003
  • 본 논문에서는 로버스트 파라미터(robust parameter) 설계에서 다특성(multiple quality characteristics)인 경우 제어인자의 동시 최적화 조건을 찾는 방안으로 인자분석(factor analysis)에 의한 최적화 방안을 제시한다. 또한 하나의 사례를 들어 제안한 방안과 기존의 방안을 비교 연구하였다.

  • PDF

A Design of Heat-Sink and DMX512 Communication Control for High-Power LEDs (고출력 LED 방열 및 DMX512 통신 제어 설계)

  • Kim, Ki-Yun;Ham, Kwang-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.725-732
    • /
    • 2013
  • Recently, various applications for LED lightings are growing continuously due to their better performances such as low power consumption, longer life time, operation speed, controllability, high quality color rendering, and sustainability. However, in developing the high-powered LEDs illumination system, heat-sink problem is one of the important obstacle. In this paper, a heat-sink design with multi-layered structure for high-powered LEDs is proposed, which is composed of metal core PCB, heat-pipes, heat-sink plates, and fans. And also, in this paper, a design for LED controls using DMX512 protocols through RS-485 communications is proposed, which is considered as de facto international standard in LEDs illumination control and is widely used in landscape lighting and stage lighting. In this paper, LED control and its application techniques are introduced and the method of wireless remote control for main controller is proposed.

Call Admission Control Approach to Support Group Mobility in Wireless Ad Hoc Networks (무선 Ad Hoc망에서 그룹 이동성을 지원하기 위한 호 수락 제어 방안)

  • 서주환;이원열;한기준
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.205-212
    • /
    • 2003
  • Because a wireless ad hoc network does not have fixed infrastructure, a call admission control approach researched in a wireless network is not feasible to this network. In this paper, we propose call admission control scheme to support this problem and the burst handoff traffic due to group mobility in a wireless ad hoc network. This scheme is an adaptive guard channel scheme which adapt the number of guard channels in each MBS(mobile base station) according to the current estimate of the potential handoff call rate derived from the number of ongoing calls within the coverage area of an MBS that initiate group handoff in a wireless ad hoc network. Our simulation studies are performed for comparisons of the proposed scheme with the other channel allocation schemes. Simulation results show that the proposed scheme efficiently reduces handoff call blocking probability in wireless ad hoc networks.

A Study on the Probabilistic Vulnerability Assessment of COTS O/S based I&C System (상용 OS기반 제어시스템 확률론적 취약점 평가 방안 연구)

  • Euom, Ieck-Chae
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.8
    • /
    • pp.35-44
    • /
    • 2019
  • The purpose of this study is to find out quantitative vulnerability assessment about COTS(Commercial Off The Shelf) O/S based I&C System. This paper analyzed vulnerability's lifecycle and it's impact. this paper is to develop a quantitative assessment of overall cyber security risks and vulnerabilities I&C System by studying the vulnerability analysis and prediction method. The probabilistic vulnerability assessment method proposed in this study suggests a modeling method that enables setting priority of patches, threshold setting of vulnerable size, and attack path in a commercial OS-based measurement control system that is difficult to patch an immediate vulnerability.

A Study on Developing and Applying Access Point Control System Using SRU Protocol (SRU 프로토콜을 이용한 접근점제어 시스템의 구축과 활용에 관한 연구)

  • Lee, Ji-Won;Kim, Tae-Soo
    • Journal of the Korean Society for information Management
    • /
    • v.22 no.1 s.55
    • /
    • pp.229-248
    • /
    • 2005
  • This study proposes a national cooperative model of access point control, that enables local systems to utilize national access point control record, without creating their own authority records. In order to applying this model, a client/server system is developed using SRU (Search and Retrieve URL Service) protocol. The suggested access point control system will be a cost-effective and time-saving model for the local system, and will be more flexible and extensible with concept of access point control, XML record format and SRU protocol.

An application method for industrial control cyber security system (산업제어시스템을 위한 사이버 보안 시스템적용 방안)

  • Han, Kyung-su;Jung, Hyun-mi;Lee, Gang-Soo;Jang, Su Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.774-777
    • /
    • 2011
  • 산업제어시스템(ICS: Industrial Control System)은 전력 생산, 댐 운영, 가스 생산, 수자원 관리, 원자력 발전 설비 등의 운영을 제어하고 관리하는 시스템이다. 대부분의 국가 기반 시설은 이러한 제어시스템에 의해 관리되고 있으며, 정보통신 기술이 발전하면서 업무망과 제어시스템망을 나누워 구축하며 점차 개방화되어 가고 있다. 이로 인한 IT측면에서 발생하는 사이버 공격이 비교적 폐쇄적인 제어 시스템 망으로 언제든지 이루어질 수 있으며, 실제 국내에서 독립적인 네트워크를 사용함에도 불구하고 금융권의 전산망이 마비되는 사태가 발생하였다. 또한 국외에서는 이란의 원자력 발전소 제어 시스템을 목적으로 하는 'Stuxnet' 악성코드로 인해 발전소 운용이 중단돼는 사례도 발생하였다. 산업용 시스템의 목적과 특성상 사이버 침해사고 발생 시 국가적 손실 및 생명에도 위협을 받을 수 있다. 본 논문은 과거에 보안을 고려하지 않고 구축되었던 제어시스템을 사이버 침해로부터 보호하기 위해 제어시스템을 위한 통신 프로토콜 암호화 및 화이트리스트보안 기술을 이용한 시스템 적용 방안을 소개하며, 네트워크 접속시 인가된 산업용 PC의 안전성을 평가하기 위해 요구되는 보안 플렛폼 설계를 한다.

A Study on Direction of Authority Control by Surveying the Authority Control in University Libraries (대학도서관 전거제어 현황분석을 통한 전거제어 방안 모색)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.3
    • /
    • pp.5-26
    • /
    • 2012
  • This study is to find the new method for authority control in Korea by surveying status of authority control in university libraries and by analyzing international conceptual model of authority control and VIAF. 2 kinds of survey were done: one is for libraries having authority records and the other is for libraries not having authority records. In survey result, libraries that have authority records want to sustain their own forms of authorized access points and libraries that have no authority records want the rules related to authority and the national cooperative authority control system to be constructed. Based on ICP 2009, FRAD conceptual model, VIAF and this survey result, new authority control is to respect the diversity of forms of the authorized access points. New authority control is to permit authority records that reflect provision for linguistic or cultural environments of each library, confirming to the national cataloging code. Therefore, authorized access points will be displayed according to user preferred forms. For this new authority control, it is needed to make national authority rule, to build the authority records according to library's own rules, and to construct the cooperative authority control system. Also for user preferred authority control, it is needed to describe detailed elements for authority control and relation data between authorized access points, between authorized access points and variant forms. This study could contribute to suggest new authority control that could accept all kinds of authorized access points preferred by nation, libraries, and users.