• Title/Summary/Keyword: Constrained Control

Search Result 512, Processing Time 0.025 seconds

A study on context-aware and Energy Efficient Routing Protocol for Mobile Ad-hoc Network (상황인식 기반의 에너지 효율적인 경로 설정 기법 연구)

  • Mun, Chang-Min;Lee, Kang-Whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.377-380
    • /
    • 2010
  • MANET(Mobile Ad-hoc Network) has been proposed as a infrastructure-less network using distributed algorithm for remote environment monitoring and control. The mobility of MANET would make the topology change frequently compared with a static network and a node is resource-constrained. Hence, to improve the routing protocol in MANET, energy efficient routing protocol is required as well as considering the mobility would be needed. In this paper, we extend RODMRP(Resilient Ontology-based Dynamic Multicast Routing Protocol) structure by a modifying the level of cluster. We call this network protocol CACH-RODMRP. Our contribution consists estimating the optimal level of clustering depth with considering node position and reducing the network residual energy. The simulation results of proposal algorithm show that the energy is significantly reduced compared with the previous clustering based routing algorithm for the MANET.

  • PDF

A Software Framework for Verifying Sensor Network Operations and Sensing Algorithms (센서네트워크 동작 및 센싱 알고리즘 검증을 위한 소프트웨어 프레임워크)

  • Yoo, Seong-Eun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.63-71
    • /
    • 2012
  • Most of sensor networks are difficult to be debugged, verified, and upgraded once they are deployed in the fields, for they are usually deployed in real world and large scale. Therefore, before deploying the sensor networks, we should test and verify them sufficiently in realistic testbeds. However, since we need to control physical environments which interact with sensor networks, it takes much of time and cost to test and verify sensor networks at the level of resource-constrained sensor nodes in such environments. This paper proposes an efficient software framework for evaluating and verifying sensor networks in the view points of network and application operations (i.e., accuracy of sensing algorithms). Applying the proposed software framework to the development of a simulator for a smart parking application based on wireless sensor network, this paper verifies the feasibility of the proposed framework.

Reservoir Management in Flood Period with Chance Constrained LP (위험도제약(危險度制約) 선형계획법(線形計劃法)에 위한 홍수기(洪水期) 저수지운영(貯水池運營))

  • Lee, Kil Seong;Kang, Bu Sik
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.12 no.3
    • /
    • pp.139-151
    • /
    • 1992
  • A reservoir operation model was established under the varying restricted water level(r.w.l.) subject to the inflow distributions in flood period. The optimization model consists of 2 sub-models. One model minimizes deviations of releases from the expected release and the other minimizes capacity requirement for flood control. In order to make deterministic equivalents, the inflow distribution of reservoir is assumed to be 2-parameter Lognormal, and its parameters are estimated by the maximum likelihood method. The model is applied to joint operation of Soyang and Chungju dam. The results show that Soyang was designed for larger flood event than that for Chungju. The operation under the varying r.w.l. turns out to be more effective than one under the uniform r.w.l. Such effect is more obvious at Chungju compared with Soyang. Release pattern shows diminishing and delaying effect in a period of high inflows and larger discharges than actual in a period of low inflows.

  • PDF

Parametric optimization of an inerter-based vibration absorber for wind-induced vibration mitigation of a tall building

  • Wang, Qinhua;Qiao, Haoshuai;Li, Wenji;You, Yugen;Fan, Zhun;Tiwari, Nayandeep
    • Wind and Structures
    • /
    • v.31 no.3
    • /
    • pp.241-253
    • /
    • 2020
  • The inerter-based vibration absorber (IVA) is an enhanced variation of Tuned Mass Damper (TMD). The parametric optimization of absorbers in the previous research mainly considered only two decision variables, namely frequency ratio and damping ratio, and aimed to minimize peak displacement and acceleration individually under the excitation of the across-wind load. This paper extends these efforts by minimizing two conflicting objectives simultaneously, i.e., the extreme displacement and acceleration at the top floor, under the constraint of the physical mass. Six decision variables are optimized by adopting a constrained multi-objective evolutionary algorithm (CMOEA), i.e., NSGA-II, under fluctuating across- and along-wind loads, respectively. After obtaining a set of optimal individuals, a decision-making approach is employed to select one solution which corresponds to a Tuned Mass Damper Inerter/Tuned Inerter Damper (TMDI/TID). The optimization procedure is applied to parametric optimization of TMDI/TID installed in a 340-meter-high building under wind loads. The case study indicates that the optimally-designed TID outperforms TMDI and TMD in terms of wind-induced vibration mitigation under different wind directions, and the better results are obtained by the CMOEA than those optimized by other formulae. The optimal TID is proven to be robust against variations in the mass and damping of the host structure, and mitigation effects on acceleration responses are observed to be better than displacement control under different wind directions.

System Modeling and Waypoint Guidance Law Designing for 6-DOF Quadrotor Unmanned Aerial Vehicle (6-자유도 쿼드로터 무인항공기의 모델링 및 유도기법 설계)

  • Lee, Sanghyun;Kim, Youdan
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.42 no.4
    • /
    • pp.305-316
    • /
    • 2014
  • As avionics and mechanical devices have been developed, the size of unmanned aerial vehicle (UAV) is getting smaller. However, the complicated and accurate missions are provided to the UAV. Among various types of UAVs, quadrotors are widely used for their availability by virtue of simple structure and hovering function. However, the control of quadrotor is highly constrained, because the quadrotor is an under-actuated system which has only 4 actuator inputs. To deal with this under-actuated problem, a new quadrotor model with two more actuators in addition to the 4 propeller inputs is provided to make the system fully-actuated. For the proposed model, a controller is designed using feedback linearization methods. To validate the model and to verify the performance of the proposed controller, numerical simulation is performed.

Location-based Clustering for Skewed-topology Wireless Sensor Networks (편향된 토플로지를 가진 무선센서네트워크를 위한 위치기반 클러스터링)

  • Choi, Hae-Won;Ryu, Myung-Chun;Kim, Sang-Jin
    • Journal of Digital Convergence
    • /
    • v.14 no.1
    • /
    • pp.171-179
    • /
    • 2016
  • The energy consumption problem in wireless sensor networks is investigated. The problem is to expend as little energy as possible receiving and transmitting data, because of constrained battery. In this paper, in order to extend the lifetime of the network, we proposed a location-based clustering algorithm for wireless sensor network with skewed-topology. The proposed algorithm is to deploy multiple child nodes at the sink to avoid bottleneck near the sink and to save energy. Proposed algorithm can reduce control traffic overhead by creating a dynamic cluster. We have evaluated the performance of our clustering algorithm through an analysis and a simulation. We compare our algorithm's performance to the best known centralized algorithm, and demonstrate that it achieves a good performance in terms of the life time.

A hybrid self-adaptive Firefly-Nelder-Mead algorithm for structural damage detection

  • Pan, Chu-Dong;Yu, Ling;Chen, Ze-Peng;Luo, Wen-Feng;Liu, Huan-Lin
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.957-980
    • /
    • 2016
  • Structural damage detection (SDD) is a challenging task in the field of structural health monitoring (SHM). As an exploring attempt to the SDD problem, a hybrid self-adaptive Firefly-Nelder-Mead (SA-FNM) algorithm is proposed for the SDD problem in this study. First of all, the basic principle of firefly algorithm (FA) is introduced. The Nelder-Mead (NM) algorithm is incorporated into FA for improving the local searching ability. A new strategy for exchanging the information in the firefly group is introduced into the SA-FNM for reducing the computation cost. A random walk strategy for the best firefly and a self-adaptive control strategy of three key parameters, such as light absorption, randomization parameter and critical distance, are proposed for preferably balancing the exploitation and exploration ability of the SA-FNM. The computing performance of the SA-FNM is evaluated and compared with the basic FA by three benchmark functions. Secondly, the SDD problem is mathematically converted into a constrained optimization problem, which is then hopefully solved by the SA-FNM algorithm. A multi-step method is proposed for finding the minimum fitness with a big probability. In order to assess the accuracy and the feasibility of the proposed method, a two-storey rigid frame structure without considering the finite element model (FEM) error and a steel beam with considering the model error are taken examples for numerical simulations. Finally, a series of experimental studies on damage detection of a steel beam with four damage patterns are performed in laboratory. The illustrated results show that the proposed method can accurately identify the structural damage. Some valuable conclusions are made and related issues are discussed as well.

Continuum Mechanics-Based Environment Modeling for Telemanipulation of Soft Tissues in a Telepalpation System (생체조직의 원격촉진시스템을 위한 연속체역학 기반의 환경 모델링)

  • Kim, Jung-Sik;Kim, Jung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.35 no.11
    • /
    • pp.1199-1204
    • /
    • 2011
  • The capability to bilaterally telemanipulate soft-tissues for medical applications could increase the quality of telemanipulation systems. Since most soft-tissue manipulation tasks include constrained motion interacting with an unknown and dynamic bioenvironment through contact, bilateral telemanipulation raises problems due to stability and transparency issues. It is well understood that knowledge of environments plays an important role in pursuing transparent telemanipulation and achieving telepresence, and in particular, online estimation of environmental parameters with an explicit environment model can improve these systems' performance. In this study, a continuum mechanics-based environment model with an online environmental property estimation algorithm and an adaptive telemanipulation control scheme is proposed. The proposed method can improve the telemanipulation performance in terms of stability and transparency and can offer valuable information (e.g., elastic modulus of soft tissues) pertaining to diagnostic examinations.

Response characteristics and suppression of torsional vibration of rectangular prisms with various width-to-depth ratios

  • Takai, Kazunori;Sakamoto, Hiroshi
    • Wind and Structures
    • /
    • v.9 no.1
    • /
    • pp.1-22
    • /
    • 2006
  • The response characteristics and suppression of flow-induced vibrations of rectangular prisms with various width-to-depth ratios were experimentally investigated. The prisms were rigid and elastically mounted at both ends to enable constrained torsional vibrations only. The present study focused on torsional vibrations, one of the three types of flow-induced vibrations generated in a rectangular prism. First, the response characteristics of torsional vibrations generated in rectangular prisms were investigated by free-vibration tests. It was found that the response characteristics of torsional vibrations generated in rectangular prisms could be classified into six patterns depending on the width-to-depth ratio. Next, the response characteristics of torsional vibrations observed in the free-vibration tests were reproduced by forced-vibration tests, and the mechanisms by which the three types of flow-induced vibrations, low-speed torsional flutter, vortex excitation and high-speed torsional flutter, are generated in the rectangular prisms were elucidated on the basis of characteristics of fluid forces and visualized flow patterns. Experiments were also carried out to establish an effective method for suppressing flow-induced vibrations generated in the rectangular prisms, and it was found that low-speed torsional flutter and high-speed torsional flutter could be suppressed by placing a small normal plate upstream of the prism, which results in suppression of the alternating rolling-up of the shear layers separating from the leading edges of the prism. It was also found that vortex excitation could be suppressed by placing a splitter plate downstream of the prism, which results in suppression of the generation of wake vortices.

Modified MQTT-SN Protocol for End-to-End Security in a Constrained Embedded Environment (자원제약적 임베디드 환경에서 종단간 보안을 지원하는 수정된 MQTT-SN)

  • Nam, Hye-min;Park, Chang-seop
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.859-870
    • /
    • 2020
  • The MQTT-SN (Message Queuing Telemetry Transport-Sensor Network) protocol is a message transmission protocol used in a sensor-based Internet of Things (IoT) environment. This MQTT-SN protocol is a publish-subscribe model with a broker in the middle of message transmission, and each IoT device sends and receives messages through an intermediary when delivering messages. However, the MQTT-SN protocol does not provide security-related functions such as message security, mutual authentication, access control, and broker security. Accordingly, various security problems have recently occurred, and a situation in which security is required has emerged. In this paper, we review the security requirements of MQTT-SN once again, and propose a modified protocol that improves security while satisfying the constraints in the environment where the resource of IoT to which this protocol is applied is limited. Unlike the existing protocol, the security field and authentication server have been added to satisfy the security requirements. In addition, the proposed protocol is actually implemented and tested, and the proposed protocol is evaluated for practical use in terms of energy consumption.