• Title/Summary/Keyword: AI network

Search Result 774, Processing Time 0.027 seconds

Maximum Torque Control of IPMSM Drive with LM-FNN Controller (LM-FNN 제어기에 의한 IPMSM 드라이브의 최대토크 제어)

  • Nam, Su-Myeong;Ko, Jae-Sub;Choi, Jung-Sik;Chung, Dong-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2005.10b
    • /
    • pp.566-569
    • /
    • 2005
  • Interior permanent magnet synchronous motor(IPMSM) has become a popular choice in electric vehicle applications, due to their excellent power to weight ratio. The paper is proposed maximum torque control of IPMSM drive using artificial intelligent(AI) controller. The control method is applicable over the entire speed range and considered the limits of the inverter's current and voltage rated value. For each control mode, a condition that determines the optimal d-axis current $i_d$ for maximum torque operation is derived. This paper considers the design and implementation of novel technique of high performance speed control for IPMSM using AI controller. This paper is proposed speed control of IPMSM using learning mechanism fuzzy neural network(LM-FNN) and estimation of speed using artificial neural network(ANN) controller. The back propagation neural network technique is used to provide a real time adaptive estimation of the motor speed. The proposed control algorithm is applied to IPMSM drive system controlled LM-FNN and ANN controller, the operating characteristics controlled by maximum torque control are examined in detail. Also. this paper is proposed the experimental results to verify the effectiveness of AI controller.

  • PDF

Maximum Torque Control of IPMSM Drive with ALM-FNN Controller (ALM-FNN 제어기에 의한 IPMSM 드라이브의 최대토크 제어)

  • Chung, Dong-Hwa
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.3
    • /
    • pp.110-114
    • /
    • 2006
  • Interior permanent magnet synchronous motor(IPMSM) has become a popular choice in electric vehicle applications, due to their excellent power to weight ratio. In this paper maximum torque control of IPMSM drive using artificial intelligent(AI) controller is proposed. The control method is applicable over the entire speed range and considered the limits of the inverter's current and voltage rated value. For each control mode, a condition that determines the optimal d-axis current $i_d$ for maximum torque operation is derived. This paper considers the design and implementation of novel technique of high performance speed control for IPMSM using AI controller. This paper is proposed speed control of IPMSM using adaptive learning mechanism fuzzy neural network(ALM-FNN) and estimation of speed using artificial neural network(ANN) controller. The back propagation neural network technique is used to provide a real time adaptive estimation of the motor speed. The proposed control algorithm is applied to IPMSM drive system controlled ALM-FNN and ANN controller, the operating characteristics controlled by maximum torque control are examined in detail. Also, this paper is proposed the experimental results to verify the effectiveness of AI controller.

SAR Recognition of Target Variants Using Channel Attention Network without Dimensionality Reduction (차원축소 없는 채널집중 네트워크를 이용한 SAR 변형표적 식별)

  • Park, Ji-Hoon;Choi, Yeo-Reum;Chae, Dae-Young;Lim, Ho
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.3
    • /
    • pp.219-230
    • /
    • 2022
  • In implementing a robust automatic target recognition(ATR) system with synthetic aperture radar(SAR) imagery, one of the most important issues is accurate classification of target variants, which are the same targets with different serial numbers, configurations and versions, etc. In this paper, a deep learning network with channel attention modules is proposed to cope with the recognition problem for target variants based on the previous research findings that the channel attention mechanism selectively emphasizes the useful features for target recognition. Different from other existing attention methods, this paper employs the channel attention modules without dimensionality reduction along the channel direction from which direct correspondence between feature map channels can be preserved and the features valuable for recognizing SAR target variants can be effectively derived. Experiments with the public benchmark dataset demonstrate that the proposed scheme is superior to the network with other existing channel attention modules.

Examination of Required Functions in the PBNM Scheme for Multiple Domains as Cyber Physical System that Utilizes Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.31-38
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, required functions in the PBNM Scheme for multiple domains as cyber physical system that utilizes data science and AI is examined.

Basic System Design in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.1-7
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is proposed.

Experiment in the PBNM Scheme for Multiple Domains as Cyber Physical System Using Data Science and AI

  • Kazuya Odagiri;Shogo Shimizu;Naohiro Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.54-60
    • /
    • 2024
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, basic system design for PBNM scheme for multi-domain management utilizing data science and AI is showed with experiment in feasibility.

Vest-type System on Machine Learning-based Algorithm to Detect and Predict Falls

  • Ho-Chul Kim;Ho-Seong Hwang;Kwon-Hee Lee;Min-Hee Kim
    • PNF and Movement
    • /
    • v.22 no.1
    • /
    • pp.43-54
    • /
    • 2024
  • Purpose: Falls among persons older than 65 years are a significant concern due to their frequency and severity. This study aimed to develop a vest-type embedded artificial intelligence (AI) system capable of detecting and predicting falls in various scenarios. Methods: In this study, we established and developed a vest-type embedded AI system to judge and predict falls in various directions and situations. To train the AI, we collected data using acceleration and gyroscope values from a six-axis sensor attached to the seventh cervical and the second sacral vertebrae of the user, considering accurate motion analysis of the human body. The model was constructed using a neural network-based AI prediction algorithm to anticipate the direction of falls using the collected pedestrian data. Results: We focused on developing a lightweight and efficient fall prediction model for integration into an embedded AI algorithm system, ensuring real-time network optimization. Our results showed that the accuracy of fall occurrence and direction prediction using the trained fall prediction model was 89.0% and 78.8%, respectively. Furthermore, the fall occurrence and direction prediction accuracy of the model quantized for embedded porting was 87.0 % and 75.5 %, respectively. Conclusion: The developed fall detection and prediction system, designed as a vest-type with an embedded AI algorithm, offers the potential to provide real-time feedback to pedestrians in clinical settings and proactively prepare for accidents.

Quantitative evaluation of transfer learning for image recognition AI of robot vision (로봇 비전의 영상 인식 AI를 위한 전이학습 정량 평가)

  • Jae-Hak Jeong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.909-914
    • /
    • 2024
  • This study suggests a quantitative evaluation of transfer learning, which is widely used in various AI fields, including image recognition for robot vision. Quantitative and qualitative analyses of results applying transfer learning are presented, but transfer learning itself is not discussed. Therefore, this study proposes a quantitative evaluation of transfer learning itself based on MNIST, a handwritten digit database. For the reference network, the change in recognition accuracy according to the depth of the transfer learning frozen layer and the ratio of transfer learning data and pre-training data is tracked. It is observed that when freezing up to the first layer and the ratio of transfer learning data is more than 3%, the recognition accuracy of more than 90% can be stably maintained. The transfer learning quantitative evaluation method of this study can be used to implement transfer learning optimized according to the network structure and type of data in the future, and will expand the scope of the use of robot vision and image analysis AI in various environments.

Study on Prediction of Similar Typhoons through Neural Network Optimization (뉴럴 네트워크의 최적화에 따른 유사태풍 예측에 관한 연구)

  • Kim, Yeon-Joong;Kim, Tae-Woo;Yoon, Jong-Sung;Kim, In-Ho
    • Journal of Ocean Engineering and Technology
    • /
    • v.33 no.5
    • /
    • pp.427-434
    • /
    • 2019
  • Artificial intelligence (AI)-aided research currently enjoys active use in a wide array of fields thanks to the rapid development of computing capability and the use of Big Data. Until now, forecasting methods were primarily based on physics models and statistical studies. Today, AI is utilized in disaster prevention forecasts by studying the relationships between physical factors and their characteristics. Current studies also involve combining AI and physics models to supplement the strengths and weaknesses of each aspect. However, prior to these studies, an optimization algorithm for the AI model should be developed and its applicability should be studied. This study aimed to improve the forecast performance by constructing a model for neural network optimization. An artificial neural network (ANN) followed the ever-changing path of a typhoon to produce similar typhoon predictions, while the optimization achieved by the neural network algorithm was examined by evaluating the activation function, hidden layer composition, and dropouts. A learning and test dataset was constructed from the available digital data of one typhoon that affected Korea throughout the record period (1951-2018). As a result of neural network optimization, assessments showed a higher degree of forecast accuracy.

AI Security Plan for Public Safety Network App Store (재난안전통신망 앱스토어를 위한 AI 보안 방안 마련)

  • Jung, Jae-eun;Ahn, Jung-hyun;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.458-460
    • /
    • 2021
  • The provision and application of public safety network in Korea is still insufficient for security response to the mobile app of public safety network in the stages of development, initial construction, demonstration, and initial service. The available terminals on the Disaster Safety Network (PS-LTE) are open, Android-based, dedicated terminals that potentially have vulnerabilities that can be used for a variety of mobile malware, requiring preemptive responses similar to FirstNet Certified in U.S and Google's Google Play Protect. In this paper, before listing the application service app on the public safety network mobile app store, we construct a data set for malicious and normal apps, extract features, select the most effective AI model, perform static and dynamic analysis, and analyze Based on the result, if it is not a malicious app, it is suggested to list it in the App Store. As it becomes essential to provide a service that blocks malicious behavior app listing in advance, it is essential to provide authorized authentication to minimize the security blind spot of the public safety network, and to provide certified apps for disaster safety and application service support. The safety of the public safety network can be secured.

  • PDF