• Title/Summary/Keyword: Design Algorithm

Search Result 10,334, Processing Time 0.041 seconds

A Study on Tracking Control of Omni-Directional Mobile Robot Using Fuzzy Multi-Layered Controller (퍼지 다층 제어기를 이용한 전방향 이동로봇의 추적제어에 관한 연구)

  • Kim, Sang-Dae;Kim, Seung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.4
    • /
    • pp.1786-1795
    • /
    • 2011
  • The trajectory control for omni-directional mobile robot is not easy. Especially, the tracking control which system uncertainty problem is included is much more difficult. This paper develops trajectory controller of 3-wheels omni-directional mobile robot using fuzzy multi-layered algorithm. The fuzzy control method is able to solve the problems of classical adaptive controller and conventional fuzzy adaptive controllers. It explains the architecture of a fuzzy adaptive controller using the robust property of a fuzzy controller. The basic idea of new adaptive control scheme is that an adaptive controller can be constructed with parallel combination of robust controllers. This new adaptive controller uses a fuzzy multi-layered architecture which has several independent fuzzy controllers in parallel, each with different robust stability area. Out of several independent fuzzy controllers, the most suited one is selected by a system identifier which observes variations in the controlled system parameter. This paper proposes a design procedure which can be carried out mathematically and systematically from the model of a controlled system; related mathematical theorems and their proofs are also given. Finally, the good performance of the developed mobile robot is confirmed through live tests of path control task.

Regional Frequency Analysis for Rainfall Under Climate Change (기후변화를 고려한 일강우량의 지역빈도해석)

  • Song, Chang Woo;Kim, Yon Soo;Kang, Na Rae;Lee, Dong Ryul;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.15 no.1
    • /
    • pp.125-137
    • /
    • 2013
  • Global warming and climate change have influence on abnormal weather pattern and the rainstorm has a localized and intensive tendency in Korea. IPCC(2007) also reported the rainstorm and typhoon will be more and more stronger due to temperature increase during the 21st century. Flood Estimation Handbook(Institute of Hydrology, 1999) published in United Kingdom, in the case that the data period is shorter than return period, recommends the regional frequency analysis rather than point frequency analysis. This study uses Regional Climate Model(RCM) of Korea Meteorological Administration(KMA) for obtaining the rainfall and for performing the regional frequency analysis. We used the rainfall data from 58 stations managed by KMA and used L-moment algorithm suggested by Hosking and wallis(1993) for the regional frequency analysis considering the climate change. As the results, in most stations, the rainfall amounts in frequencies have an increasing tendency except for some stations. According to the A1B scenario, design rainfall is increased by 7~10% compared with the reference period(1970-2010).

Trajectory Index Structure based on Signatures for Moving Objects on a Spatial Network (공간 네트워크 상의 이동객체를 위한 시그니처 기반의 궤적 색인구조)

  • Kim, Young-Jin;Kim, Young-Chang;Chang, Jae-Woo;Sim, Chun-Bo
    • Journal of Korea Spatial Information System Society
    • /
    • v.10 no.3
    • /
    • pp.1-18
    • /
    • 2008
  • Because we can usually get many information through analyzing trajectories of moving objects on spatial networks, efficient trajectory index structures are required to achieve good retrieval performance on their trajectories. However, there has been little research on trajectory index structures for spatial networks such as FNR-tree and MON-tree. Also, because FNR-tree and MON-tree store the segment unit of moving objects, they can't support the trajectory of whole moving objects. In this paper, we propose an efficient trajectory index structures based on signatures on a spatial network, named SigMO-Tree. For this, we divide moving object data into spatial and temporal attributes, and design an index structure which supports not only range query but trajectory query by preserving the whole trajectory of moving objects. In addition, we divide user queries into trajectory query based on spatio-temporal area and similar-tralectory query, and propose query processing algorithms to support them. The algorithm uses a signature file in order to retrieve candidate trajectories efficiently Finally, we show from our performance analysis that our trajectory index structure outperforms the existing index structures like FNR-Tree and MON-Tree.

  • PDF

A Management for IMS Network Using SDN and SNMP (SDN과 SNMP를 이용한 IMS 네트워크 관리)

  • Yang, Woo-Seok;Kim, Jung-Ho;Lee, Jae-Oh
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.694-699
    • /
    • 2017
  • In accordance with the development of information and communications technology, a network user has to be able to use quality of service (QoS)-based multimedia services easily. Thus, information and communications operators began to focus on a technique for providing multimedia services. The IP Multimedia Subsystem (IMS) is a platform based on Internet Protocol (IP) as a technology for providing multimedia services and application services. The emerging 5G networks are described as having massive capacity and connectivity, adaptability, seamless heterogeneity, and great flexibility. The explosive growth in network services and devices for 5G will cause excessive traffic loads. In this paper, software-defined networking (SDN) is applied as a kind of virtualization technology for the network in order to minimize the traffic load, and Simple Network Management Protocol (SNMP) is used to provide more efficient network management. To accomplish these purposes, we suggest the design of a dynamic routing algorithm to be utilized in the IMS network using SDN and an SNMP private management information base (MIB). The proposal in this paper gives information and communications operators the ability to supply more efficient network resources.

The Motion Estimator Implementation with Efficient Structure for Full Search Algorithm of Variable Block Size (다양한 블록 크기의 전역 탐색 알고리즘을 위한 효율적인 구조를 갖는 움직임 추정기 설계)

  • Hwang, Jong-Hee;Choe, Yoon-Sik
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.11
    • /
    • pp.66-76
    • /
    • 2009
  • The motion estimation in video encoding system occupies the biggest part. So, we require the motion estimator with efficient structure for real-time operation. And for motion estimator's implementation, it is desired to design hardware module of an exclusive use that perform the encoding process at high speed. This paper proposes motion estimation detection block(MED), 41 SADs(Sum of Absolute Difference) calculation block, minimum SAD calculation and motion vector generation block based on parallel processing. The parallel processing can reduce effectively the amount of the operation. The minimum SAD calculation and MED block uses the pre-computation technique for reducing switching activity of the input signal. It results in high-speed operation. The MED and 41 SADs calculation blocks are composed of adder tree which causes the problem of critical path. So, the structure of adder tree has changed the most commonly used ripple carry adder(RCA) with carry skip adder(CSA). It enables adder tree to operate at high speed. In addition, as we enabled to easily control key variables such as control signal of search range from the outside, the efficiency of hardware structure increased. Simulation and FPGA verification results show that the delay of MED block generating the critical path at the motion estimator is reduced about 19.89% than the conventional strukcture.

Research and development on image luminance meter of road tunnel internal and external (도로터널 내/외부의 영상휘도 측정기 연구개발)

  • Jang, Soon-Chul;Park, Sung-Lim;Ko, Seok-Yong;Lee, Mi-Ae
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2015
  • This paper introduces the development of imaging luminance meter which measures the luminances of external/internal road tunnel. The developed imaging luminance meter complies with both L20 method and Veiling luminance method of the international standards, CIE88. In this paper the L20 method is mainly presented because most of tunnels currently adapt L20 method. The developed system has an embedded computer to operate at stand-alone. The system has a ethernet port, a heater, a fan, a defroster, a wiper and sun shielder. Compensation algorithm is applied for correcting non-linear responses to the luminance and integration time. The accuracy of measurement is less than 1% when it calibrated at the public certification institute. The developed system was also tested at the real field, road tunnel. The test results were very similar with the reference luminance meter and showed that the developed system operates well at the real field. Partial sensor saturations were happened to show the less luminance, because there were the high reflecting objects in the real field. Further study should be followed for high luminance measurement.

Method of Detecting and Isolating an Attacker Node that Falsified AODV Routing Information in Ad-hoc Sensor Network (애드혹 센서 네트워크에서 AODV 라우팅 정보변조 공격노드 탐지 및 추출기법)

  • Lee, Jae-Hyun;Kim, Jin-Hee;Kwon, Kyung-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.12
    • /
    • pp.2293-2300
    • /
    • 2008
  • In ad-hoc sensor network, AODV routing information is disclosed to other nodes because AODV protocol doesn't have any security mechanisms. The problem of AODV is that an attacker can falsify the routing information in RREQ packet. If an attacker broadcasts the falsified packet, other nodes will update routing table based on the falsified one so that the path passing through the attacker itself can be considered as a shortest path. In this paper, we design the routing-information-spoofing attack such as falsifying source sequence number and hop count fields in RREQ packet. And we suggest an efficient scheme for detecting the attackers and isolating those nodes from the network without extra security modules. The proposed scheme doesn't employ cryptographic algorithm and authentication to reduce network overhead. We used NS-2 simulation to evaluate the network performance. And we analyzed the simulation results on three cases such as an existing normal AODV, AODV under the attack and proposed AODV. Simulation results using NS2 show that the AODV using proposed scheme can protect the routing-information-spoofing attack and the total n umber of received packets for destination node is almost same as the existing norm at AODV.

Smart Synthetic Path Search System for Prevention of Hazardous Chemical Accidents and Analysis of Reaction Risk (반응 위험성분석 및 사고방지를 위한 스마트 합성경로 탐색시스템)

  • Jeong, Joonsoo;Kim, Chang Won;Kwak, Dongho;Shin, Dongil
    • Korean Chemical Engineering Research
    • /
    • v.57 no.6
    • /
    • pp.781-789
    • /
    • 2019
  • There are frequent accidents by chemicals during laboratory experiments and pilot plant and reactor operations. It is necessary to find and comprehend relevant information to prevent accidents before starting synthesis experiments. In the process design stage, reaction information is also necessary to prevent runaway reactions. Although there are various sources available for synthesis information, including the Internet, it takes long time to search and is difficult to choose the right path because the substances used in each synthesis method are different. In order to solve these problems, we propose an intelligent synthetic path search system to help researchers shorten the search time for synthetic paths and identify hazardous intermediates that may exist on paths. The system proposed in this study automatically updates the database by collecting information existing on the Internet through Web scraping and crawling using Selenium, a Python package. Based on the depth-first search, the path search performs searches based on the target substance, distinguishes hazardous chemical grades and yields, etc., and suggests all synthetic paths within a defined limit of path steps. For the benefit of each research institution, researchers can register their private data and expand the database according to the format type. The system is being released as open source for free use. The system is expected to find a safer way and help prevent accidents by supporting researchers referring to the suggested paths.

Design of detection method for smoking based on Deep Neural Network (딥뉴럴네트워크 기반의 흡연 탐지기법 설계)

  • Lee, Sanghyun;Yoon, Hyunsoo;Kwon, Hyun
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.191-200
    • /
    • 2021
  • Artificial intelligence technology is developing in an environment where a lot of data is produced due to the development of computing technology, a cloud environment that can store data, and the spread of personal mobile phones. Among these artificial intelligence technologies, the deep neural network provides excellent performance in image recognition and image classification. There have been many studies on image detection for forest fires and fire prevention using such a deep neural network, but studies on detection of cigarette smoking were insufficient. Meanwhile, military units are establishing surveillance systems for various facilities through CCTV, and it is necessary to detect smoking near ammunition stores or non-smoking areas to prevent fires and explosions. In this paper, by reflecting experimentally optimized numerical values such as activation function and learning rate, we did the detection of smoking pictures and non-smoking pictures in two cases. As experimental data, data was constructed by crawling using pictures of smoking and non-smoking published on the Internet, and a machine learning library was used. As a result of the experiment, when the learning rate is 0.004 and the optimization algorithm Adam is used, it can be seen that the accuracy of 93% and F1-score of 94% are obtained.

A Study on the Improvement of Injection Molding Process Using CAE and Decision-tree (CAE와 Decision-tree를 이용한 사출성형 공정개선에 관한 연구)

  • Hwang, Soonhwan;Han, Seong-Ryeol;Lee, Hoojin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.580-586
    • /
    • 2021
  • The CAT methodology is a numerical analysis technique using CAE. Recently, a methodology of applying artificial intelligence techniques to a simulation has been studied. A previous study compared the deformation results according to the injection molding process using a machine learning technique. Although MLP has excellent prediction performance, it lacks an explanation of the decision process and is like a black box. In this study, data was generated using Autodesk Moldflow 2018, an injection molding analysis software. Several Machine Learning Algorithms models were developed using RapidMiner version 9.5, a machine learning platform software, and the root mean square error was compared. The decision-tree showed better prediction performance than other machine learning techniques with the RMSE values. The classification criterion can be increased according to the Maximal Depth that determines the size of the Decision-tree, but the complexity also increases. The simulation showed that by selecting an intermediate value that satisfies the constraint based on the changed position, there was 7.7% improvement compared to the previous simulation.