• Title/Summary/Keyword: 제어 시스템 시뮬레이터

Search Result 448, Processing Time 0.032 seconds

Application of Greenhouse Climate Management Model for Educational Simulation Design (교육용 시뮬레이션 설계를 위한 온실 환경 제어 모델의 활용)

  • Yoon, Seungri;Kim, Dongpil;Hwang, Inha;Kim, Jin Hyun;Shin, Minju;Bang, Ji Wong;Jeong, Ho Jeong
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.485-496
    • /
    • 2022
  • Modern agriculture is being transformed into smart agriculture to maximize production efficiency along with changes in the 4th industrial revolution. However, rural areas in Korea are facing challenges of aging, low fertility, and population outflow, making it difficult to transition to smart agriculture. Among ICT technologies, simulation allows users to observe or experience the results of their choices through imitation or reproduction of reality. The combination of the three-dimension (3D) model and the greenhouse simulator enable a 3D experience by virtual greenhouse for fruits and vegetable cultivation. At the same time, it is possible to visualize the greenhouse under various cultivation or climate conditions. The objective of this study is to apply the greenhouse climate management model for simulation development that can visually see the state of the greenhouse environment under various micrometeorological properties. The numerical solution with the mathematical model provided a dynamic change in the greenhouse environment for a particular greenhouse design. Light intensity, crop transpiration, heating load, ventilation rate, the optimal amount of CO2 enrichment, and daily light integral were calculated with the simulation. The results of this study are being built so that users can be linked through a web page, and software will be designed to reflect the characteristics of cladding materials and greenhouses, cultivation types, and the condition of environmental control facilities for customized environmental control. In addition, environmental information obtained from external meteorological data, as well as recommended standards and set points for each growth stage based on experiments and research, will be provided as optimal environmental factors. This simulation can help growers, students, and researchers to understand the ICT technologies and the changes in the greenhouse microclimate according to the growing conditions.

A Study on Extendable Instruction Set Computer 32 bit Microprocessor (확장 명령어 32비트 마이크로 프로세서에 관한 연구)

  • 조건영
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.5
    • /
    • pp.11-20
    • /
    • 1999
  • The data transfer width between the mocroprocessor and the memory comes to a critical part that limits system performance since the data transfer width has been as it was while the performance of a microprocessor is getting higher due to its continuous development in speed. And it is important that the memory should be in small size for the reduction of embedded microprocessor's price which is integrated on a single chip with the memory and IO circuit. In this paper, a mocroprocessor tentatively named as Extendable Instruction Set Computer(EISC) is proposed as the high code density 32 bit mocroprocessor architecture. The 32 bit EISC has 16 general purpose registers and 16 bit fixed length instruction which has the short length offset and small immediate operand. By using and extend register and extend flag, the offset and immediate operand could be extended. The proposed 32 bit EISC is implemented with an FPGA and all of its functions have been tested and verified at 1.8432MHz. And the cross assembler, the cross C/C++ compiler and the instruction simulator of the 32 bit EISC shows 140-220% and 120-140% higher code density than RISC and CISC respectively, which is much higher than any other traditional architectures. As a consequence, the EISC is suitable for the next generation computer architecture since it requires less data transfer width compared to any other ones. And its lower memory requirement will embedded microprocessor more useful.

  • PDF

Study on Improving the Navigational Safety Evaluation Methodology based on Autonomous Operation Technology (자율운항기술 기반의 선박 통항 안전성 평가 방법론 개선 연구)

  • Jun-Mo Park
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.30 no.1
    • /
    • pp.74-81
    • /
    • 2024
  • In the near future, autonomous ships, ships controlled by shore remote control centers, and ships operated by navigators will coexist and operate the sea together. In the advent of this situation, a method is required to evaluate the safety of the maritime traffic environment. Therefore, in this study, a plan to evaluate the safety of navigation through ship control simulation was proposed in a maritime environment, where ships directly controlled by navigators and autonomous ships coexisted, using autonomous operation technology. Own ship was designed to have autonomous operational functions by learning the MMG model based on the six-DOF motion with the PPO algorithm, an in-depth reinforcement learning technique. The target ship constructed maritime traffic modeling data based on the maritime traffic data of the sea area to be evaluated and designed autonomous operational functions to be implemented in a simulation space. A numerical model was established by collecting date on tide, wave, current, and wind from the maritime meteorological database. A maritime meteorology model was created based on this and designed to reproduce maritime meteorology on the simulator. Finally, the safety evaluation proposed a system that enabled the risk of collision through vessel traffic flow simulation in ship control simulation while maintaining the existing evaluation method.

A Study on the Development of $CO_2$ Recycle Oxy-Fuel Combustion Heating System ($CO_2$ 재순환형 산소연소 가열시스템 개발에 관한 연구)

  • Jeong Yu-Seok;Lee Eun-Kyung;Go Chang-Bok;Jang Byung-Lok;Han Hyung-Kee;Noh Dong-Soon
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 2006.05a
    • /
    • pp.412-419
    • /
    • 2006
  • An Experimental study was conducted on $CO_{2}$ recycle combustion heating system using pure oxygen instead of conventional air as an oxidant, which is thereby producing a flue gas of mostly $CO_{2}$ and water vapor($H_{2}O$ and water vapor($H_{2}O$) and resulting in higher $CO_{2}$ concentration. The advantages of the system are not only the ability to control high temperatures characteristic of oxygen combustion with recycling $CO_{2}$ but also the possibility to reduce NOx emission in the flue gas. A small scale industrial reheating furnace simulator and specially designed variable flame burner were used to characterize the $CO_{2}$ recycle oxy-fuel combustion, such as the variations of furnace pressure, temperature and composition in the flue gas during recycle. It was found that $CO_{2}$ concentration in the flue gas was about 80% without $CO_{2}$recycle. The furnace temperature and pressure and pressure were decreased due to recycle and the NOx emission was also reduced to maintain under 100ppm.

  • PDF

A Study on the Performance Improvement of the Security Transmission Using the SSFNet (SSFNet을 이용한 보안전송 성능개선에 관한 연구)

  • Ryu, Jung-Eun;Ryu, Dong-Ju;Lee, Taek-Hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.811-815
    • /
    • 2005
  • IPSec(Internet Protocol Security) is a framework for a set of protocols for security at the network or packet processing layer of network communication. IPSec is providing authentication, integrity and confidentiality security services. The specifications for Internet Key Exchange(IKEv1) were released to the world. Some criticisms of IKEv1 were that it was too complex and endeavored to define too much functionality in one place. Multiple options for multiple scenarios were built into the specification. The problem is that some of the included scenarios are rarely if ever encountered. For IPsec to work, the sending and receiving devices must chare a Public Key. This is accomplished through a protocol known as Internet Security Association and Key Management Protocol/Oakley(ISAKMP/Oakley), which allows the receiver to obtain a public key and authenticate the sender using digital certificates. This thesis is a study on the performance improvement of the security transmission using the SSFNet(Scalable Simulation Framework Network Models)

  • PDF

An Adaptive Chord for Minimizing Network Traffic in a Mobile P2P Environment (비정기적 데이터 수집 모드에 기반한 효율적인 홈 네트워크 서비스 제어 시스템의 설계)

  • Woo, Hyun-Je;Lee, Mee-Jeong
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.773-782
    • /
    • 2009
  • A DHT(Distributed Hash Table) based P2P is a method to overcome disadvantages of the existing unstructured P2P method. If a DHT algorithm is used, it can do a fast data search and maintain search efficiency independent of the number of peer. The peers in the DHT method send messages periodically to keep the routing table updated. In a mobile environment, the peers in the DHT method should send messages more frequently to keep the routing table updated and reduce the failure of a request. Therefore, this results in increase of network traffic. In our previous research, we proposed a method to reduce the update load of the routing table in the existing Chord by updating it in a reactive way, but the reactive method had a disadvantage to generate more traffic than the existing Chord if the number of requests per second becomes large. In this paper, we propose an adaptive method of routing table update to reduce the network traffic. In the proposed method, we apply different routing table update method according to the number of request message per second. If the number of request message per second is smaller than some threshold, we apply the reactive method. Otherwsie, we apply the existing Chord method. We perform experiments using Chord simulator (I3) made by UC Berkeley. The experimental results show the performance improvement of the proposed method compared to the existing methods.

Adaptive Mapping Information Management Scheme for High Performance Large Sale Flash Memory Storages (고성능 대용량 플래시 메모리 저장장치의 효과적인 매핑정보 캐싱을 위한 적응적 매핑정보 관리기법)

  • Lee, Yongju;Kim, Hyunwoo;Kim, Huijeong;Huh, Taeyeong;Jung, Sanghyuk;Song, Yong Ho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.3
    • /
    • pp.78-87
    • /
    • 2013
  • NAND flash memory has been widely used as a storage medium in mobile devices, PCs, and workstations due to its advantages such as low power consumption, high performance, and random accessability compared to a hard disk drive. However, NAND flash cannot support in-place update so that it is mandatory to erase the entire block before overwriting the corresponding page. In order to overcome this drawback, flash storages need a software support, named Flash Translation Layer. However, as the high performance mass NAND flash memory is getting widely used, the size of mapping tables is increasing more than the limited DRAM size. In this paper, we propose an adaptive mapping information caching algorithm based on page mapping to solve this DRAM space shortage problem. Our algorithm uses a mapping information caching scheme which minimize the flash memory access frequency based on the analysis of several workloads. The experimental results show that the proposed algorithm can increase the performance by up to 70% comparing with the previous mapping information caching algorithm.

Gaze Detection by Computing Facial and Eye Movement (얼굴 및 눈동자 움직임에 의한 시선 위치 추적)

  • 박강령
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.2
    • /
    • pp.79-88
    • /
    • 2004
  • Gaze detection is to locate the position on a monitor screen where a user is looking by computer vision. Gaze detection systems have numerous fields of application. They are applicable to the man-machine interface for helping the handicapped to use computers and the view control in three dimensional simulation programs. In our work, we implement it with a computer vision system setting a IR-LED based single camera. To detect the gaze position, we locate facial features, which is effectively performed with IR-LED based camera and SVM(Support Vector Machine). When a user gazes at a position of monitor, we can compute the 3D positions of those features based on 3D rotation and translation estimation and affine transform. Finally, the gaze position by the facial movements is computed from the normal vector of the plane determined by those computed 3D positions of features. In addition, we use a trained neural network to detect the gaze position by eye's movement. As experimental results, we can obtain the facial and eye gaze position on a monitor and the gaze position accuracy between the computed positions and the real ones is about 4.8 cm of RMS error.