• Title/Summary/Keyword: Behavior monitoring

Search Result 1,155, Processing Time 0.026 seconds

Design of Fuzzy PD Depth Controller for an AUV

  • Loc, Mai Ba;Choi, Hyeung-Sik;Kim, Joon-Young;Kim, Yong-Hwan;Murakami, Ri-Ichi
    • International Journal of Ocean System Engineering
    • /
    • v.3 no.1
    • /
    • pp.16-21
    • /
    • 2013
  • This paper presents a design of fuzzy PD depth controller for the autonomous underwater vehicle entitled KAUV-1. The vehicle is shaped like a torpedo with light weight and small size and used for marine exploration and monitoring. The KAUV-1 has a unique ducted propeller located at aft end with yawing actuation acting as a rudder. For depth control, the KAUV-1 uses a mass shifter mechanism to change its center of gravity, consequently, can control pitch angle and depth of the vehicle. A design of classical PD depth controller for the KAUV-1 was presented and analyzed. However, it has inherent drawback of gains, which is their values are fixed. Meanwhile, in different operation modes, vehicle dynamics might have different effects on the behavior of the vehicle. In this reason, control gains need to be appropriately changed according to vehicle operating states for better performance. This paper presents a self-tuning gain for depth controller using the fuzzy logic method which is based on the classical PD controller. The self-tuning gains are outputs of fuzzy logic blocks. The performance of the self-tuning gain controller is simulated using Matlab/Simulink and is compared with that of the classical PD controller.

Effectiveness of Obesity management programs: systematic review and meta-analysis (메타분석을 이용한 비만관리 프로그램의 효과분석)

  • Lee, Hyo-Young
    • Korean Journal of Health Education and Promotion
    • /
    • v.24 no.4
    • /
    • pp.131-147
    • /
    • 2007
  • As overweight and obese people have increased, obesity management programs have generated much concern in Korea. Many types of obesity management programs were operated, aimed at reducing weight, BMI, body fat percentage and so on. This study was conducted to review the features of studies in obesity management programs and systematically assess the effects which were published from 1995 to 2006 in Korea. Databases were systematically searched for published data in Korea. It were KISS (Korean studies information services system) and KERIS (Korean Education research information system), which were major literature search systems for all academic fields in Korea. Total 114 studies were initially identified, of which 21 satisfied our inclusion data. The effects of obesity management programs were assessed on the results in weight, BMI (body mass index), HDL (high density lipids), body fat percentage, self-efficacy. Effect size estimated on the equation of M1 - M2 / Sp, where M1 was mean of the experimental group, M2 was the mean of control group, and Sp was the pooled standard deviation. Magnitude of effect size was interpreted by using Cohen's definition. Cohen described small, medium, and large effect sizes as 0.2, 0.5, and 0.8 respectively. The studies about obesity management programs were the most published in 2005(26.1%). Obesity management programs were popularly operated as the type of 12 weeks intervention, exercise intervention(52.4%), quasi-experimental study(85.7%). Ten studies reported significant effects on weight, and nine studies reported significant effects on BMI and HDL. Only five and three studies reported significant effects on body fat percentage and self-efficacy respectively. The effects of each outcome were generally significant when the studies included these elements, intervention over 10 weeks, evaluation over 3 times, a comprehensive program (exercise, nutrition education, behavior modification) and reinforcing factors (self-monitoring, group discussion, one's goal setting, and etc.). Effective obesity management programs should contain these essential elements and objectives of obesity management programs must be set out evident at the beginning. The participants should be registered, educated and evaluated by continuous obesity management programs.

Design of Mobile Agent-based Software Module For Reducing Load of RFID Middleware (RFID 미들웨어 부하를 줄이기 위한 이동 에이전트 기반 소프트웨어 모듈의 설계)

  • Ahn, Yong-Sun;Ahn, Jin-Ho
    • Journal of Internet Computing and Services
    • /
    • v.10 no.3
    • /
    • pp.95-101
    • /
    • 2009
  • As RFID technology has been developed rapidly, its technical potential has it be widely used in many industrial fields. Particularly, in the physical distribution industry, the introduction of RFID has enormously contributed to effectively monitoring locations and information of products in real-time. Also, a significant decline in tag prices and RFID related technical competitiveness enabled each tag to be managed much more minutely by attaching it to an item, not a pallet nor a container. However, if a very large volume of tag data are continuously flowed into a RFID middleware with limited hardware resources, its entire data processing time may become considerably longer. Therefore, specific technologies are in great demand to handle and further to reduce the load of the middleware. In this paper, we proposed a mobile agent-based software module to efficiently reduce the load of the middleware by pre-processing a lot of tag data while items are in transit. Simulation results show that using the proposed software module considerably enhances the speed of processing tag data than otherwise. This behavior increases the tag recognition rate in a certain time limit and improves reliability of RFID middlewares.

  • PDF

A Study on NOx Emission Control Methods in the Cement Firing Process Using Data Mining Techniques (데이터 마이닝을 이용한 시멘트 소성공정 질소산화물(NOx)배출 관리 방법에 관한 연구)

  • Park, Chul Hong;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.3
    • /
    • pp.739-752
    • /
    • 2018
  • Purpose: The purpose of this study was to investigate the relationship between kiln processing parameters and NOx emissions that occur in the sintering and calcination steps of the cement manufacturing process and to derive the main factors responsible for producing emissions outside emission limit criteria, as determined by category models and classification rules, using data mining techniques. The results from this study are expected to be useful as guidelines for NOx emission control standards. Methods: Data were collected from Precalciner Kiln No.3 used in one of the domestic cement plants in Korea. Thirty-four independent variables affecting NOx generation and dependent variables that exceeded or were below the NOx emiision limit (>1 and <0, respectively) were examined during kiln processing. These data were used to construct a detection model of NOx emission, in which emissions exceeded or were below the set limits. The model was validated using SPSS MODELER 18.0, artificial neural network, decision treee (C5.0), and logistic regression analysis data mining techniques. Results: The decision tree (C5.0) algorithm best represented NOx emission behavior and was used to identify 10 processing variables that resulted in NOx emissions outside limit criteria. Conclusion: The results of this study indicate that the decision tree (C5.0) can be applied for real-time monitoring and management of NOx emissions during the cement firing process to satisfy NOx emission control standards and to provide for a more eco-friendly cement product.

A Review of Emissions Studies for Transportation Engineering (교통환경분야의 국내외 연구동향 및 시사점 (차량배출량 관련 연구를 중심으로))

  • Gang, Jong-Ho;Lee, Cheong-Won
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.6
    • /
    • pp.7-18
    • /
    • 2007
  • There are few studies on air pollution due to vehicle emissions in spite of the importance of this field. Therefore, this study describes trends and suggests implications through analysis relating to existing emissions research. This study has been divided into three areas. The first part is about estimating vehicle emissions. In this part, the authors analyze limits in ways of calculating emissions in the existing macroscopic view and then suggest the development of a model for calculating emissions considering velocity and acceleration. These variables are a function of traffic and individual driving behavior in the microscopic view. The second part is about management techniques for reducing vehicle emissions. The traffic management techniques for reducing vehicle emissions should conform to regional characteristics. The final part is about traffic operation for reducing vehicle emissions. The authors suggest the development of a micro-simulator and then the development of strategies for traffic operation. It is necessary to design better models estimating emissions and then, using real time data, to make a monitoring system simulating emission rates. This study serves as a literature review to make a foundation for further research about emissions research for transportation engineering.

Frequency Estimation Method using Recursive Discrete Wavelet Transform for Fault Disturbance Recorder (FDR를 위한 RDWT에 의한 주파수 추정 기법)

  • Park, Chul-Won;Ban, Yu-Hyeon
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.8
    • /
    • pp.1492-1501
    • /
    • 2011
  • A wide-area protection intelligent technique has been used to improve a reliability in power systems and to prevent a blackout. Nowadays, voltage and current phasor estimation has been executed by GPS-based synchronized PMU, which has become an important way of wide-area blackout protection for the prevention of expending faults in power systems. As this technique has the difficulties in collecting and sharing of information, there have been used a FNET method for the wide-area intelligent protection. This technique is very useful for the prediction of the inception fault and for the prevention of fault propagation with accurate monitoring frequency and frequency deviation. It consists of FDRs and IMS. It is well known that FNET can detect the dynamic behavior of system and obtain the real-time frequency information. Therefore, FDRs must adopt a optimal frequency estimation method that is robust to noise and fault. In this paper, we present comparative studies for the frequency estimation method using IRDWT(improved recursive discrete wavelet transform), for the frequency estimation method using FRDWT(fast recursive discrete wavelet transform). we used the Republic of Korea 345kV power system modeling data by EMTP-RV. The user-defined arbitrary waveforms were used in order to evaluate the performance of the proposed two kinds of RDWT. Also, the frequency variation data in various range, both large range and small range, were used for simulation. The simulation results showed that the proposed frequency estimation technique using FRDWT can be the optimal frequency measurement method applied to FDRs.

Ransomware Detection and Recovery System Based on Cloud Storage through File System Monitoring (파일 시스템 모니터링을 통한 클라우드 스토리지 기반 랜섬웨어 탐지 및 복구 시스템)

  • Kim, Juhwan;Choi, Min-Jun;Yun, Joobeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.357-367
    • /
    • 2018
  • As information technology of modern society develops, various malicious codes with the purpose of seizing or destroying important system information are developing together. Among them, ransomware is a typical malicious code that prevents access to user's resources. Although researches on detecting ransomware performing encryption have been conducted a lot in recent years, no additional methods have been proposed to recover damaged files after an attack. Also, because the similarity comparison technique was used without considering the repeated encryption, it is highly likely to be recognized as a normal behavior. Therefore, this paper implements a filter driver to control the file system and performs a similarity comparison method that is verified based on the analysis of the encryption pattern of the ransomware. We propose a system to detect the malicious process of the accessed process and recover the damaged file based on the cloud storage.

Assessment of Applicability of Pretentioned Soil-Nail Systems with in-situ monitoring (현장 계측을 통한 프리텐션 쏘일네일링 시스템의 적용성 평가)

  • Lee, Hyuk-Jin;Ahn, Kwang-Kuk;Kim, Hong-Taek;Bang, Yoon-Kyung
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2005.10a
    • /
    • pp.320-329
    • /
    • 2005
  • The use of diverse methods for the retaining system has been continuously increased in order to maintain the stability during excavation. However, ground anchor system occasionally may have the restriction in urban excavation sites nearby the existing structures because of space limitation. In this case, soil nailing system with relatively short length of nails could be efficiently useful as an alternative method. The general soil nailing support system, however, may result in excessive deformations particularly in excavating the zone of weak soils or nearby the existing structures. Therefore, applying the pretension force to the soil nails then could play important roles to reduce deformations mainly in an upper part of the nailed-soil excavation system as well as to improve the local slope stability. In this study, a newly modified soil nailing technology named as the PSN(Pretention Soil Nailing) is developed to reduce both facing displacements and ground surface settlements during top-down excavation process as well as to increase the global slope stability. Up to now, the PSN system has been investigated mainly focusing on an establishment of the design procedure. In the present study, the field tests including pull-out tests were fulfilled to investigate the behavior of characteristics for PSN system. All results of tests were also analyzed to provide a fundamental and efficient design.

  • PDF

Permission Management System for Secure IoT Devices in Android-Based IoT Environment (안드로이드 기반 IoT 환경에서 안전한 IoT 디바이스를 위한 권한 관리 시스템)

  • Park, In Kyu;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.2
    • /
    • pp.59-66
    • /
    • 2018
  • Android Things is an Android-based platform running in Google's IoT environment. Android smartphones require permissions from application users to use certain features, but in the case of Android Things, there is no display to send request notifications to users. Therefore Does not make a request to use the permissions and automatically accepts the permissions from the system. If the privilege is used indiscriminately, malicious behavior such as system failure or leakage of personal information can be performed by a function which is not related to the function originally. Therefore, By monitoring the privileges that a device uses in an Android-based IoT system, users can proactively respond to security threats that can arise through unauthorized use of the IoT system. This paper proposes a system that manages the rights currently being used by IoT devices in the Android Things based IoT environment, so that Android-based IoT devices can cope with irrelevant use of rights.

Analysis of Tunnel Behavior Using Progressive Rockmass Failure Technique (암반의 진행성 파괴 기법을 이용한 터널거동 분석)

  • 이성민;이윤규;신성렬
    • Tunnel and Underground Space
    • /
    • v.9 no.4
    • /
    • pp.288-295
    • /
    • 1999
  • Concentrated stresses due to the underground tunnel excavation easily cause many problems such as yielding, popping, and failure at the immediate roof, wall and floor of tunnel. Therefore, it is very important to predict the possibility of these problems when a tunnel is excavated underground. There are two typical methods to predict these problems. The one is to predict problems from the analysis of field monitoring data and the other is to predict them from computer simulations using good site investment data. Using the second method, this study attempted to describe the time-dependent or progressive manner of immediate roof and wall due to the underground tunnel excavation. An iterative technique was used to represent progressive failure of rockmass with the Hoek and Brown theory. By developing and simulating three different shapes of twin tunnels, this research estimated the proper size of critical pillar width between tunnels, distributed stresses on the tunnel walls, and convergences of tunnel crowns. Moreover, results out of progressive failure technique based on the Hoek and Brown theory were compared with the results out of Mohr-Coulomb theory.

  • PDF