• Title/Summary/Keyword: 탐색 제어

Search Result 522, Processing Time 0.024 seconds

Design and Implementation of Loop Bound Analyzer based on PS-Block (PS-Block 구조 기반의 반복횟수 분석기 설계 및 구현)

  • Kim Yun-Kwan;Shin Won;Kim Tae-Wan;Chang Chun-Hyon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.133-135
    • /
    • 2006
  • 실시간 프로그램은 다양한 분야에서 사용되고 있으며, 그 개발자는 논리적, 시간적 정확성을 고려해야 한다. 시간적 정확성은 실시간 프로그램에서 가장 중요한 부분이며, 이를 위한 데드라인은 개발자에 의해 정의된다. 따라서 개발자는 데드라인의 정의를 위하여 기준점을 제시할 수 있는 정적 실행시간 분석이 필요하다. 정적 실행시간 분석에서 프로그램의 반복횟수 분석은 큰 비중을 차지한다. 현재 이러한 반복횟수 분석을 자동화하는 연구가 진행 중이다. 하지만 반복횟수 분석은 반복횟수에 영향을 주는 제어변수의 결정정책에 따라 결과가 달라지고, 자동화를 위한 반복횟수 계산 수식의 적용 범위가 제한되어 있다. 본 논문에서는 이러한 제어변수를 결정 및 탐색하고, 수집된 정보를 개선된 수식을 사용하여 반복횟수 분석을 수행할 수 있도록 PS-Block 구조를 기반으로 반복횟수 분석기를 설계 및 구현하였다. 반복횟수 분석기는 제어변수의 탐색 및 결정 분석 과정을 자동화하고, 수식의 개선으로 자동화 범위를 확대하며, 개별 반복 문 단위의 정밀한 반복횟수 분석을 통해 정확도를 높이고, 신뢰성을 향상시킬 수 있다.

  • PDF

Composite Guidance Law for Impact Angle Control of Passive Homing Missiles (수동 호밍 유도탄의 충돌각 제어를 위한 복합 유도법칙)

  • Park, Bong-Gyun;Kim, Tae-Hun;Tahk, Min-Jea;Kim, Youn-Hwan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.1
    • /
    • pp.20-28
    • /
    • 2014
  • In this paper, based on the characteristics of proportional navigation, a composite guidance law is proposed for impact angle control of passive homing missiles maintaining the lock-on condition of the seeker. The proposed law is composed of two guidance commands: the first command is to keep the look angle constant after converging to the specific look angle of the seeker, and the second is to impact the target with terminal angle constraint and is implemented after satisfying the specific line of sight(LOS) angle. Because the proposed law considers the seeker's filed-of-view(FOV) and acceleration limits simultaneously and requires neither time-to-go estimation nor relative range information, it can be easily applied to passive homing missiles. The performance and characteristics of the proposed law are investigated through nonlinear simulations with various engagement conditions.

Development of application for guidance and controller unit for low cost and small UAV missile based on smartphone (스마트폰을 활용한 소형 저가 유도탄 유도조종장치용 어플리케이션 개발)

  • Noh, Junghoon;Cho, Kyongkuk;Kim, Seongjun;Kim, Wonsop;Jeong, Jinseob;Sang, Jinwoo;Park, Chung-Woon;Gong, Minsik
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.45 no.7
    • /
    • pp.610-617
    • /
    • 2017
  • In the recent weapon system trend, it is required to develop small and low cost guidance missile to track and strike the enemy target effectively. Controling the such small drone typed weapon demands a integrated electronic device that equipped with not only a wireless network interface, a high resolution camera, various sensors for target tracking, and position and attitude control but also a high performance processor that integrates and processes those sensor outputs in real-time. In this paper, we propose the android smartphone as a solution for that and implement the guidance and control application of the missile. Furthermore, the performance of the implemented guidance and control application is analyzed through the simulation.

Implementation of Signal Processing Algorithms for an FMCW Radar Altimeter (FMCW 전파고도계의 신호처리 알고리즘 구현)

  • Choi, Jae-Hyun;Jang, Jong-Hun;Lee, Jae-Hwan;Roh, Jin-Eep
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.26 no.6
    • /
    • pp.555-563
    • /
    • 2015
  • This paper presents signal processing algorithms of a frequency-modulated continuous-wave(FMCW) radar altimeter and provides a practical assessment technique. The radar altimeter is initially operated in search mode, when the radar altimeter detects a valid altitude, search mode is switched to track mode and a altitude being tracked is displayed. The sweep bandwidth in each mode is a function of altitude to narrow the beat frequency bandwidth. In addition, transmit power and receiver gain in each mode are controlled to compensate for the dynamic range of wide altitude range. To assess more realistic operation, the radar altimeter was tested using the crane setup. The crane test demonstrated that signal processing algorithms described in this paper resulted in a reduced measurement error rate.

The Signal Acquisition Algorithm for Ultra Wide-band Communication Systems (UWB 통신시스템에서 동기 획득 알고리즘)

  • Park, Dae-Heon;Kang, Beom-Jin;Park, Jang-Woo;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.2
    • /
    • pp.146-153
    • /
    • 2008
  • Due to the extremely short pulse in the Ultra-Wideband (UWB) technology, the accurate synchronization acquisition method is very important for both high data-rate WPAN and low data-rate WPAN. In this paper, we propose the synchronization acquisition algorithm based on two-step signal search method to acquire the synchronization in the UWB multi-path channel. At the first step, the search window is divided by two and the window that has higher power is chosen as a next search window. This operation is repeated until the measure power of the search window is smaller than the threshold value. At the second step, we employ Linear Search algorithm to the search window obtained at the first step for fine search. The proposed algorithm is proved that the synchronization acquisition is faster than the parallel search algorithm and it shows good performance in environment of the SNR extreme changes by the simulation.

  • PDF

An Efficient Routing Protocol Considering Path Reliability in Cognitive Radio Ad-hoc Networks (인지 무선 애드혹 네트워크에서 경로 신뢰성을 고려한 효율적인 라우팅 기법)

  • Choi, Jun-Ho;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.11
    • /
    • pp.730-742
    • /
    • 2014
  • In the case of On-demand routing protocol in cognitive radio ad-hoc networks, broadcasting of control packets may occur common control channel overload and packet collisions during the routing procedure. This situation is to increase the overhead of path finding and also limited to find the accurate and reliable path. Since reliable channel and path finding is restricted, path life time is shorten and path reliability is reduced. In this paper, we propose a new routing algorithm that reduces control channel overhead and increases path life time by considering the probability of appearance of primary user and channel status of neighbor nodes. Each node performs periodic local sensing to detect primary user signal and to derive primary user activity patterns. The probability of primary appearance on the current channel and the channel status can be obtained based on the periodic sensing. In addition, each node identifies the quality of the channel by message exchange through a common channel with neighbor nodes, then determines Link_Levels with neighbor nodes. In the proposed method, the Link Level condition reduces the number of control messages that are generated during the route discovery process. The proposed method can improve path life time by choosing a path through Path_Reliability in which stability and quality are weighted depending on the location. Through simulation, we show that our proposed algorithm reduces packet collisions and increases path life time in comparison with the traditional algorithm.

A Study on Identification of Optimal Fuzzy Model Using Genetic Algorithm (유전알고리즘을 이용한 최적 퍼지모델의 동정에 관한연구)

  • 김기열
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.2
    • /
    • pp.138-145
    • /
    • 2000
  • A identification algorithm that finds optimal fuzzy membership functions and rule base to fuzzy model isproposed and a fuzzy controller is designed to get more accurate position and velocity control of wheeled mobile robot. This procedure that is composed of three steps has its own unique process at each step. The elements of output term set are increased at first step and then the rule base is varied according to increase of the elements. The adjusted system is in competition with system which doesn't include any increased elements. The adjusted system will be removed if the system lost. Otherwise, the control system is replaced with the adjusted system. After finished regulation of output term set and rule base, searching for input membership functions is processed with constraints and fine tuning of output membership functions is done.

  • PDF

Fast Motion Estimation Algorithm Based on Thresholds with Controllable Computation (계산량 제어가 가능한 문턱치 기반 고속 움직임 예측 알고리즘)

  • Kim, Jong-Nam
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.20 no.2
    • /
    • pp.84-90
    • /
    • 2019
  • Tremendous computation of full search or lossless motion estimation algorithms for video coding has led development of many fast motion estimation algorithms. We still need proper control of computation and prediction quality. In the paper, we suggest an algorithm that reduces computation effectively and controls computational amount and prediction quality, while keeping prediction quality as almost the same as that of the full search. The proposed algorithm uses multiple thresholds for partial block sum and times of counting unchanged minimum position for each step. It also calculates the partial block matching error, removes impossible candidates early, implements fast motion estimation by comparing times of keeping the position of minimum error for each step, and controls prediction quality and computation easily by adjusting the thresholds. The proposed algorithm can be combined with conventional fast motion estimation algorithms as well as by itself, further reduce computation while keeping the prediction quality as almost same as the algorithms, and prove it in the experimental results.

A PD-Fuzzy Controller Design of 2 D.O.F. Wheeled Mobile Robot Using Genetic and Immune Algorithm (유전 및 면역 알고리즘을 이용한 2자유도 구륜 이동 로봇에 대한 PD-Fuzzy 제어기 설계)

  • Kim, Sung-Hoe;Kim, Ki-Yeoul;Lim, Ho;Park, Chong-Kug
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.5
    • /
    • pp.19-28
    • /
    • 2000
  • It is not so easy to control the wheeled mobile robot because of some causes like non-holonomic constraints. To overcome these problems, a controller that PD system is combined with fuzzy process is composed of several steps that have each separate algorithm and niche search algorithm and immune algorithm is applied partly. Output term set is changed by search that is performed to get optimal elements and then the rule base is also reformed. The fitness for the altered system is estimated and the surplus elements are removed. After the adjustment of output term set and rule base is finished, input and output membership functions is tuned.

  • PDF

A Study on the Framework of Integrated Vulnerability Analysis of Domestic Nuclear Facilities (국내 원자력 시설 통합 취약점 분석 프레임워크 연구)

  • Mi-Joo Shin;Seong-su Yoon;Ieck-chae Euom
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Cyber attacks on national infrastructure, including large-scale power outages in Ukraine, have continued in recent years. As a result, ICS-CERT vulnerabilities have doubled compared to last year, and vulnerabilities to industrial control systems are increasing day by day. Most control system operators develop vulnerability countermeasures based on the vulnerability information sources provided by ICS-CERT in the United States. However, it is not applicable to the security of domestic control systems because it does not provide weaknesses in Korean manufacturers' products. Therefore, this study presents a vulnerability analysis framework that integrates CVE, CWE, CAPE, and CPE information related to the vulnerability based on ICS-CERT information (1843 cases). It also identifies assets of nuclear facilities by using CPE information and analyzes vulnerabilities using CVE and ICS-CERT. In the past, only 8% of ICS-CERT's vulnerability information was searched for information on any domestic nuclear facility during vulnerability analysis, but more than 70% of the vulnerability information could be searched using the proposed methodology.