• Title/Summary/Keyword: Computing methodologies

Search Result 113, Processing Time 0.024 seconds

SDRE controller considering Multi Observer applied to nonlinear IPMC model

  • Bernat, Jakub;Kolota, Jakub;Stepien, Slawomir
    • Smart Structures and Systems
    • /
    • v.20 no.1
    • /
    • pp.1-10
    • /
    • 2017
  • Ionic Polymer Metal Composite (IPMC) is an electroactive polymer (EAP) and a promising candidate actuator for various potential applications mainly due to its flexible, low voltage/power requirements, small and compact design, and lack of moving parts. Although widely used in industry, this material requires accurate numerical models and knowledge of optimal control methods. This paper presents State-Dependent Riccati Equation (SDRE) approach as one of rapidly emerging methodologies for designing nonlinear controllers. Additionally, the present paper describes a novel method of Multi HGO Observer design. In the proposed design, the calculated position of the IPMC strip accurately tracks the target position, which is illustrated by the experiments. Numerical results and comparison with experimental data are presented and the effectiveness of the proposed control strategy is verified in experiments.

On the Intersection of Human-Centered Computing and Web Science

  • Jaimes, Alejandro
    • Journal of Computing Science and Engineering
    • /
    • v.7 no.4
    • /
    • pp.211-219
    • /
    • 2013
  • Human-centered computing (HCC) as a field was defined several years ago. Since then, the Web has grown significantly, and so has its impact in society at every level, creating the grounds for a new Web science. In this paper, we examine the definitions of HCC and Web science, and discuss how they might be related. On the one hand, HCC can be viewed as a set of methodologies, and on the other hand, Web science can be viewed as a platform or repository, from which behavioral data can be drawn. We examine the relationship between the two, and summarize three different research approaches that in many ways show this intersection.

Tuning of a PID Controller Using Soft Computing Methodologies Applied to Basis Weight Control in Paper Machine

  • Nagaraj, Balakrishnan;Vijayakumar, Ponnusamy
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.43 no.3
    • /
    • pp.1-10
    • /
    • 2011
  • Proportional.Integral.Derivative control schemes continue to provide the simplest and effective solutions to most of the control engineering applications today. However PID controller is poorly tuned in practice with most of the tuning done manually which is difficult and time consuming. This research comes up with a soft computing approach involving Genetic Algorithm, Evolutionary Programming, and Particle Swarm Optimization and Ant colony optimization. The proposed algorithm is used to tune the PID parameters and its performance has been compared with the conventional methods like Ziegler Nichols and Lambda method. The results obtained reflect that use of heuristic algorithm based controller improves the performance of process in terms of time domain specifications, set point tracking, and regulatory changes and also provides an optimum stability. This research addresses comparison of tuning of the PID controller using soft computing techniques on Machine Direction of basics weight control in pulp and paper industry. Compared to other conventional PID tuning methods, the result shows that better performance can be achieved with the soft computing based tuning method. The ability of the designed controller, in terms of tracking set point, is also compared and simulation results are shown.

Analysis of SNE Learner's Performance Using NASA Scaling

  • Naveen, A.;Babu, Sangita
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.3
    • /
    • pp.45-51
    • /
    • 2014
  • Computer science and computing technologies are applied into mathematical, science, medical, engineering and educational applications. The models are used to solve the issues in all the domains. Educational systems are used top down, bottom up, Gap Analysis model in the educational learning system. Educational learning process integrated with Lerner, content and the methodology. The Learners and content are same in the educational system or similar courses but the teaching methodologies are differing one with another. The determinations of teaching methodologies are based on the factors related to that particular model or subject. The learning model influencing determinations are made by the surveys, analysis and observation of data to maximize the learning outcome. This paper attempted to evaluate the SNE learners cognitive using NASA Scaling.

A Study on Efficient Test Methodologies on Dual-port Embedded Memories (내장된 이중-포트 메모리의 효율적인 테스트 방법에 관한 연구)

  • Han, Jae-Cheon;Yang, Sun-Woong;Jin, Myoung-Gu;Chang, Hoon
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.8
    • /
    • pp.22-34
    • /
    • 1999
  • In this paper, an efficient test algorithm for embedded dual-port memories is presented. The proposed test algorithm can be used to test embedded dual-port memories faster than the conventional multi-port test algorithms and can be used to completely detect stuck-at faults, transition faults and coupling faults which are major target faults in embedded memories. Also, in this work, BIST which performs the proposed memory testing algorithm is designed using Verilog-HDL, and simulation and synthesis for BIST are performed using Cadence Verilog-XL and Synopsys Design-Analyzer. It has been shown that the proposed test algorithm has high efficiency through experiments on various size of embedded memories.

  • PDF

Integrating Software Security into Agile-Scrum Method

  • Ghani, Imran;Azham, Zulkarnain;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.646-663
    • /
    • 2014
  • Scrum is one of the most popular and efficient agile development methods. However, like other agile methods such as Extreme Programming (XP), Feature Driven Development (FDD), and the Dynamic Systems Development Method (DSDM), Scrum has been criticized because of lack of support to develop secure software. Thus, in 2011, we published research proposing the idea of a security backlog (SB). This paper represents the continuation of our previous research, with a focus on the evaluation in industry-based case study. Our findings highlight an improved agility in Scrum after the integration of SB. Furthermore, secure software can be developed quickly, even in situations involving requirement changes of software. Based on our experimental findings, we noticed that, when integrating SB, it is quite feasible to develop secure software using an agile Scrum model.

Discovering classification knowledge using Rough Set and Granular Computing (러프집합과 Granular Computing을 이용한 분류지식 발견)

  • Choi, Sang-Chul;Lee, Chul-Heui
    • Proceedings of the KIEE Conference
    • /
    • 2000.11d
    • /
    • pp.672-674
    • /
    • 2000
  • There are various ways in classification methodologies of data mining such as neural networks but the result should be explicit and understandable and the classification rules be short and clear. Rough set theory is a effective technique in extracting knowledge from incomplete and inconsistent information and makes an offer classification and approximation by various attributes with effect. This paper discusses granularity of knowledge for reasoning of uncertain concepts by using generalized rough set approximations based on hierarchical granulation structure and uses hierarchical classification methodology that is more effective technique for classification by applying core to upper level. The consistency rules with minimal attributes is discovered and applied to classifying real data.

  • PDF

Modeling of Value Chain for Big Data (빅데이터를 위한 가치사슬 설계)

  • Lee, Sangwon;Park, Sungbum;Lee, Jumin;Ahn, Hyunsup;Choi, Yong Goo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.01a
    • /
    • pp.277-278
    • /
    • 2015
  • The volume sub-challenge requires novel approaches, often referred to as Big Data technologies and methodologies. Data is generated constantly in an ever growing number of places and by an ever growing number of actors while a large proportion of potentially re-usable data resides within silos within institutions or companies. These are needed when conventional database technologies cannot be applied to storage and computing issues. The issue of big data has been referred to as the next frontier in computing. In this paper, we research on factors to design an organizational value chain for Big Data.

  • PDF

Design and Development of a Monitoring System based on Smart Device for Service Robot Applications

  • Lee, Jun;Seo, Yong-Ho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.35-41
    • /
    • 2018
  • Smart device has become an affordable main computing resource for robotic ap-plications in accordance with a fast growth of mobile internet environment. Since the computing power of smart device has been increased, smart device based ro-bot system attempts to replace traditional robot applications with laptop-based system. Methodologies for acquisition of remote sensory information and control of various types of robots using smart device have been proposed recently. In this paper, we propose a robot control system using a monitoring program and a communication protocol. The proposed system is a combination of an educa-tional programming oriented robot named EPOR-S. as small service robot plat-form and a smart device. Through a simulation study using image processing, the feasibility of combination of the proposed robot monitoring program and control system was verified.

A Multi-Layered Approach for the Valuation of Location Based Services

  • Kim, Ji-Hoon;Kwon, Oh-Byung
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.147-156
    • /
    • 2005
  • In developing the ubiquitous computing technology based services (ubiquitous services), evaluating how much value of those services is created or added is very crucial. The efforts to evaluate the ubiquitous services have been progressed in two perspectives - technical perspective and behavioral perspective. Despite its importance, however, the methodologies which integrate both perspectives have been still very rare. Hence, this paper aims perspectives have been still very rare. Hence, this paper aims to propose an integrated ubiquitous service valuation methodology based on the multi-layered approach including technical and behavioral perspectives. To do so, we conducted a case study with currently existing location based service (LBS) such as navigation systems by conducting focus group interview (FGI) and field survey.

  • PDF