• Title/Summary/Keyword: Behavior-Based Decentralized Method

Search Result 8, Processing Time 0.019 seconds

Development of robust flocking control law for multiple UAVs using behavioral decentralized method (다수 무인기의 행위 기반 강인 군집비행 제어법칙 설계)

  • Shin, Jongho;Kim, Seungkeun;Suk, Jinyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.10
    • /
    • pp.859-867
    • /
    • 2015
  • This study proposes a robust formation flight control technique of multiple unmanned aerial vehicles(UAVs) using behavior-based decentralized approach. The behavior-based decentralized method has various advantages because it utilizes information of neighboring UAVs only instead of information of whole UAVs in the formation maneuvering. The controllers in this paper are divided into two methods: first one is based on position and velocity of neighboring UAVs, and the other one is based on position of neighboring UAVs and passivity technique. The proposed controllers assure uniformly ultimate boundedness of closed-loops system under time varying bounded disturbances. Numerical simulations are performed to validate the effectiveness of the proposed method.

Decentralized LTL Specifications for Ensuring Quality of Interaction-centralized System (상호 작용 중심 시스템의 품질 확보를 위한 LTL 분산 명세)

  • Kwon, Ryoungkwo;Kwon, Gihwon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.5
    • /
    • pp.169-178
    • /
    • 2014
  • In this paper, we present a research utilizing decentralized LTL specifications for ensuring a quality for interaction-centralized system. In this system, for ensuring the quality, we need to validate interactions between modules of the system and then we should check whether the system achieves the expected requirements. This task remains difficult and labor-intensive and requires an expert. In this paper, we present a method to assist such a task. First of all, the requirements of the system is written as multiple LTL specifications. Interactions between modules mean that behaviors of one module are related with other one's behavior. We generate the automaton model fully achieving specification through GR(1) synthesis. And we simulate them using the simulator based on the software agent for checking behaviors of the system. Finally, we validate the whole system whether it achieves given requirements.

A De Facto Standard for ERC-20 API Functional Specifications and Its Conformance Review Method for Ethereum Smart Contracts (이더리움 스마트 계약 프로그램의 ERC-20 API 기능 명세의 관례상 표준과 적합성 리뷰 방법)

  • Moon, Hyeon-Ah;Park, Sooyong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.10
    • /
    • pp.399-408
    • /
    • 2022
  • ERC-20, the standard API for Ethereum token smart contracts, was introduced to ensure compatibility among applications such as wallets and decentralized exchanges. However, many compatibility vulnerability problems have existed because there is no rigorous functional specifications for each API nor conformance review tools for the standard. In this paper, we proposed a new review procedure and a tool to perform the procedure to review if ERC-20 token smart contract programs for the Ethereum blockchain conform to the de facto standards. Based on the knowledge from an analysis on the ERC-20 API functional behavior of the top 100 token smart contract programs in the existing Ethereum blockchain, a new specification for the de facto standard for ERC-20 API was explicitly defined. The new specification enabled us to design a systematic review method for Ethereum smart contract programs. We developed a tool to support this review method and we evaluated a few benchmark programs with the tool.

Distributed Virtual Topology Adaptation Method to Support IP Traffic in WDM Mesh Networks (WDM Mesh 네트워크에서 IP 트래픽을 수용하기 위한 분산형 가상토폴로지 적응 기법)

  • Kim, Eal-Lae;Lee, Sung-Kuen;Lee, Yong-Won;Chang, Sun-Hyok;Lee, Myung-Moon;Park, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.1B
    • /
    • pp.1-10
    • /
    • 2007
  • We propose a new approach to accommodate bidirectional asymmetric traffic demands as well as unexpected dynamic internet traffic variation in the WDM mesh network by using optical networking technologies. In the proposed scheme, an intermediate node determines the optical path based on the switching statistics of IP router of the node which characterizes the Internet traffic variation, which in effect provides a dynamic and distributed traffic control over the network. It is expected to reduce the efficiency deterioration of RWA(Routing and Wavelength Assignment) due to the real-time variation of Internet traffic so that expandability and flexibility of the network can be enhanced. In this paper, we describe a methodology for traffic behavior analysis at a node, and the decision policy of the establishment/release of optical path. In addition, we evaluate the performance of the proposed scheme through the computer simulations.

Development and Comparison of Centralized and Decentralized ATIS Models with Simulation Method

  • Kim, Hoe-Kyoung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.2
    • /
    • pp.1-8
    • /
    • 2011
  • Traffic congestion is a source of significant economic and social costs in urban areas. Intelligent Transportation Systems (ITS) are a promising means to help alleviate congestion by utilizing advanced sensing, computing, and communication technologies. This paper proposes and investigates a basic and advanced ITS framework Advanced Traveler Information System (ATIS) using wireless Vehicle to Roadside (Centralized ATIS model: CA model) and Vehicle to Vehicle (DeCentralized ATIS model: DCA model) communication and assuming an ideal communication environment in the typical $6{\times}6$ urban grid traffic network. Results of this study indicate that an ATIS using wireless communication can save travel time given varying combinations of system characteristics: traffic flow, communication radio range, and penetration ratio. Also, all tested metrics of the CA and DCA models indicate that the system performance of both models is almost identical regardless of varying traffic demand and penetration ratios. Therefore, DCA model can be a reasonable alternative to the fixed infrastructure based ATIS model (CA model).

Intelligent Tuning Of a PID Controller Using Immune Algorithm (면역 알고리즘을 이용한 PID 제어기의 지능 튜닝)

  • Kim, Dong-Hwa
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.1
    • /
    • pp.8-17
    • /
    • 2002
  • This paper suggests that the immune algorithm can effectively be used in tuning of a PID controller. The artificial immune network always has a new parallel decentralized processing mechanism for various situations, since antibodies communicate to each other among different species of antibodies/B-cells through the stimulation and suppression chains among antibodies that form a large-scaled network. In addition to that, the structure of the network is not fixed, but varies continuously. That is, the artificial immune network flexibly self-organizes according to dynamic changes of external environment (meta-dynamics function). However, up to the present time, models based on the conventional crisp approach have been used to describe dynamic model relationship between antibody and antigen. Therefore, there are some problems with a less flexible result to the external behavior. On the other hand, a number of tuning technologies have been considered for the tuning of a PID controller. As a less common method, the fuzzy and neural network or its combined techniques are applied. However, in the case of the latter, yet, it is not applied in the practical field, in the former, a higher experience and technology is required during tuning procedure. In addition to that, tuning performance cannot be guaranteed with regards to a plant with non-linear characteristics or many kinds of disturbances. Along with these, this paper used immune algorithm in order that a PID controller can be more adaptable controlled against the external condition, including moise or disturbance of plant. Parameters P, I, D encoded in antibody randomly are allocated during selection processes to obtain an optimal gain required for plant. The result of study shows the artificial immune can effectively be used to tune, since it can more fit modes or parameters of the PID controller than that of the conventional tuning methods.

C-COMA: A Continual Reinforcement Learning Model for Dynamic Multiagent Environments (C-COMA: 동적 다중 에이전트 환경을 위한 지속적인 강화 학습 모델)

  • Jung, Kyueyeol;Kim, Incheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.4
    • /
    • pp.143-152
    • /
    • 2021
  • It is very important to learn behavioral policies that allow multiple agents to work together organically for common goals in various real-world applications. In this multi-agent reinforcement learning (MARL) environment, most existing studies have adopted centralized training with decentralized execution (CTDE) methods as in effect standard frameworks. However, this multi-agent reinforcement learning method is difficult to effectively cope with in a dynamic environment in which new environmental changes that are not experienced during training time may constantly occur in real life situations. In order to effectively cope with this dynamic environment, this paper proposes a novel multi-agent reinforcement learning system, C-COMA. C-COMA is a continual learning model that assumes actual situations from the beginning and continuously learns the cooperative behavior policies of agents without dividing the training time and execution time of the agents separately. In this paper, we demonstrate the effectiveness and excellence of the proposed model C-COMA by implementing a dynamic mini-game based on Starcraft II, a representative real-time strategy game, and conducting various experiments using this environment.

Fandom-Persona Design based on Social Network Analysis (소셜 네트워크 분석을 이용한 팬덤 페르소나 디자인)

  • Sul, Sanghun;Seong, Kihun
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.87-94
    • /
    • 2019
  • In this paper, the method of analyzing the unformatted data of consumers accumulated on social networks in the era of the Fourth Industrial Revolution by utilizing data from the service design and social psychology aspects was proposed. First, the fandom phenomenon, which shows subjective and collective behavior in a space on a social network rather than physical space, was defined from a data service perspective. The fandom model has been transformed into a collective level of customer Persona that has been analyzed at a personal level in traditional service design, and social network analysis that analyzes consumers' big data has been presented as an efficient way to pattern and visually analyze it. Consumer data collected through social leasing were pre-processed by column based on correlation, stability, missing, and ID-ness. Based on the above data, the company's brand strategy was divided into active and passive interventions and the effect of this strategic attitude on the growth direction of the consumer's fandom community was analyzed. To this end, the fandom model of consumers was proposed by dividing it into four strategies that the brand strategy had: stand-alone, decentralized, integrated and centralized, and the fandom shape of consumers was proposed as a growth model analysis technique that analyzes changes over time.