• 제목/요약/키워드: Digital Control Model

검색결과 973건 처리시간 0.033초

틸팅 시뮬레이터의 운동판 설계에 관한 연구 (Development for Motion Evaluation of Tilting Simulator)

  • 송용수;김정석;이수길;한성호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2004년도 하계학술대회 논문집 D
    • /
    • pp.2631-2633
    • /
    • 2004
  • This paper describes the construction of a half sphere screen driving tilting simulator that can perform six degree-of-freedom( DOF) motions simmulator to a tilting train. The mathematical equations of Tilting Train dynamics are first derived from the 6-DOF bicycle model and incorporated with the bogie. carbody, and suspension subsystems. The equations of motion are then programmed by visual C++ code. To achieve the simulator functions. a motion platform that is constructed by six electric-driven actuators is designed. and its kinetics/inverse kinetics analysis is also conducted. Driver operation signals such as carbady angle, accelerator. and tilting positions are measured to trigger the Tilting dynamics calculation and further actuate the cylinders by the motion platform control program. In addition. a digital PID controller is added to achieve the stable and accurate displacements of the motion platform. The experiments prove that the designed simulator is adequate in performing some special rail mad driving situations discussed in this paper.

  • PDF

Discretization of Nonlinear Systems with Delayed Multi-Input VIa Taylor Series and Scaling and Squaring Technique

  • Yuanliang Zhang;Chong Kil To
    • Journal of Mechanical Science and Technology
    • /
    • 제19권11호
    • /
    • pp.1975-1987
    • /
    • 2005
  • An input time delay always exists in practical systems. Analysis of the delay phenomenon in a continuous-time domain is sophisticated. It is appropriate to obtain its corresponding discrete-time model for implementation via digital computers. In this paper a new scheme for the discretization of nonlinear systems using Taylor series expansion and the zero-order hold assumption is proposed. The mathematical structure of the new discretization method is analyzed. On the basis of this structure the sampled-data representation of nonlinear systems with time-delayed multi-input is presented. The delayed multi-input general equation has been derived. In particular, the effect of the time-discretization method on key properties of nonlinear control systems, such as equilibrium properties and asymptotic stability, is examined. Additionally, hybrid discretization schemes that result from a combination of the scaling and squaring technique (SST) with the Taylor series expansion are also proposed, especially under conditions of very low sampling rates. Practical issues associated with the selection of the method's parameters to meet CPU time and accuracy requirements, are examined as well. A performance of the proposed method is evaluated using a nonlinear system with time delay maneuvering an automobile.

프랙탈에 기초한 해저지형의 보간 (Fractal-Based Interpolation of Sea Floor Terrains)

  • 이현식;박동진;진강규
    • 한국항해항만학회지
    • /
    • 제33권6호
    • /
    • pp.451-456
    • /
    • 2009
  • 저해상도 3D 해저 디지털 지형 모형(Digital terrain model: DTM)의 이미지를 컴퓨터 화면에 확대 표시할 때 데이터가 없는 픽셀은 인위적으로 보간해서 표시할 수밖에 없다. 따라서 본 연구에서는 기존의 선형 보간법의 문제점을 개선하기 위해 저해상도 DTM으로부터 지형정보를 추출하고 이로부터 보간하는 방법을 다룬다. 이를 위해 DTM을 다수의 패치로 분할하고 프랙탈 이론(Fractal theory)를 이용하여 프랙탈 차원을 추정하고, 추정 정보와 원래의 데이터를 근간으로 패치 지형을 Midpoint Displacement법으로 보간하고, 보간된 이미지의 국부적인 기복을 완화해 자연스런 해저지형을 만들기 위해 미디언 필터(Median filter)를 이용한다. 가상의 프랙탈 지형 맵을 이용하여 제안된 알고리즘의 그 유효성을 검정한다.

인터넷 Identity 관리 시스템을 위한 프라이버시 인가 (Privacy Authorization for Internet Identity Management System)

  • 노종혁;진승헌;이균하
    • 한국통신학회논문지
    • /
    • 제30권10B호
    • /
    • pp.648-659
    • /
    • 2005
  • 인터넷에 산재되어 있는 사용자 개인정보의 오남용은 더 이상 간과할 수 없는 문제이다. 개인정보의 유통은 반드시 소유자의 허가 하에서만 이루어져야 하고, 개인정보를 관리하는 사이트는 인터넷에 익숙하지 않은 사용자들에게 개인정보 유출에 관한 두려움을 없애줄 수 있는 환경을 제공하여야 한다. 본 논문은 인터넷 Identity 관리시스템에서 개인정보를 안전하게 관리하고 유통할 수 있는 기술을 소개한다. 개인정보의 소유자가 자신의 정보를 관리하는 방법, 정보 관리 시스템 차원에서 사용자 정보를 관리하기 위한 정책, 개인정보 접근을 제어하는 Privacy Controller 등 여러 관점에서의 프라이버시 인가 기술을 제안한다. 그리고, 정책 기반의 프라이버시 인가 기술을 인터넷 Identity 관리 시스템에 적용하기 위한 다양한 모델을 제시한다.

적층식 제조(Additive manufacturing) 기술동향 (Technology Trend of the additive Manufacturing (AM))

  • 오지원;나현웅;최한신
    • 한국분말재료학회지
    • /
    • 제24권6호
    • /
    • pp.494-507
    • /
    • 2017
  • A three-dimensional physical part can be fabricated from a three-dimensional digital model in a layer-wise manner via additive manufacturing (AM) technology, which is different from the conventional subtractive manufacturing technology. Numerous studies have been conducted to take advantage of the AM opportunities to penetrate bespoke custom product markets, functional engineering part markets, volatile low-volume markets, and spare part markets. Nevertheless, materials issues, machines issues, product issues, and qualification/certification issues still prevent the AM technology from being extensively adopted in industries. The present study briefly reviews the standard classification, technological structures, industrial applications, technological advances, and qualification/certification activities of the AM technology. The economics, productivity, quality, and reliability of the AM technology should be further improved to pass through the technology adoption lifecycle of innovation technology. The AM technology is continuously evolving through the introduction of PM materials, hybridization of AM and conventional manufacturing technologies, adoption of process diagnostics and control systems, and enhanced standardization of the whole lifecycle qualification and certification methodology.

XML을 이용한 프로젝트 학습사이트의 설계 및 구현 (Design and Implementation of Project Learning Site by Using XML)

  • 최현근;하태현
    • 한국디지털정책학회:학술대회논문집
    • /
    • 한국디지털정책학회 2005년도 추계학술대회
    • /
    • pp.613-628
    • /
    • 2005
  • The purpose of this study was to design and implementation of project learning site by using XML. The development of the Internet site for project learning was planned as per preparation, development and test/application stages. At the stage of preparation, literature and cases were reviewed to find the elements of design principles needed for development of a project learning program and those required in the actual development. At the stage of development, the elements of the design principles and those for the actual development, both explored from the stage of preparation were used to develop a draft Internet site for project learning. The elements used for the development of the Internet site for project learning were motivation, specification of learning goals, reminiscence of preceding knowledge, positive participation in teaching activities, learning-guide feedback, evaluation, reinforcement and correction. It is changing web based format. XML advent because of HTML limitations of web based internet and expand it's field. XML is able to gather data on HTML of text based format, thus it is possible to control it's inside. It is expected that many teachers apply this model to their classes and show realistic results.

  • PDF

H.264/AVC 부호기에서의 고정 비트율 제어 방안 연구 (A Study on the constant bit-rate control for H.264/AVC encoders)

  • 윤혁상;김용한
    • 한국방송∙미디어공학회:학술대회논문집
    • /
    • 한국방송공학회 2003년도 정기총회 및 학술대회
    • /
    • pp.17-20
    • /
    • 2003
  • 동등한 영상의 풀질을 유지하면서 기존의 비디오 압축 표준보다 30퍼센트 이상의 비트 절감효과를 내는 H.264/MPEG-4 Part 10 AVC(Advanced Video Coding) 표준이 최근 확정되었다. AVC는 국내 지상파 DMB(Digital Multimedia Broadcasting) 멀티미디어 서비스의 비디오 표준으로도 채택되어 많은 관심을 불러일으키고 있다. 본 논문에서는 H.264/AVC 부호기를 위한 고정 비트 율 제어 알고리듬을 구현하고 이를 실험을 통하여 검증하였다. 비디오 부호화 과정에서 각 픽처마다 발생하는 비트 량이 같지는 않지만 부호기 출력 비트 율은 일정하게 한 수 있으며 이를 고정 비트 율 제어라 한다 부호기는 입력 영상의 복잡도를 예측하고 실제 버퍼 점유도에 대한 피프백 정보를 이용하여 발생 비트 수글 조절한다. 특히 전송 대역폭 제한사항이 있는 고정 비트 율 채널 환경에서 비디오 부호기의 고정 비트 율 제어는 반드시 필요하다. JVT에서 제공하는 참조 소프트웨어인 JM(Joint Model) 소프트웨어가 아직까지 고정 비트 율 제어 기능을 지원하지 않으므로, MPEG-2 Part 2 Video 표준과 MPEG-4 Part 2 Visual 표준에서 고정 비트 율 제어에 이용되었던 TM5 고정 비트 율 제어 모델을 적용하여 H.264/AVC 부호기의 고정 비트 율 제어를 구현하였다.

  • PDF

UAV를 이용한 홍수모니터링 기술 (Technology of flood monitoring using UAV)

  • 최미경;이근상;김성원;정관수
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2019년도 학술발표회
    • /
    • pp.275-275
    • /
    • 2019
  • 기후변화에 따른 집중호우의 발생빈도와 강도가 증가하면서 대규모 홍수로 인한 인명 및 재산피해가 발생하고 있다. 그에 따라 홍수 상황을 신속하게 확보하고 홍수피해를 빠르게 예측하는 모니터링 기술이 필요하다. 최근 공간정보 분야에서 무인항공기 (UAV: Unmanned aerial vehicles)를 이용한 3차원 지형자료 확보 연구가 활발하게 이용되고 있다. 무인항공기는 지형자료 구축 뿐 만 아니라 홍수 시 신속한 홍수 모니터링이 가능하기 때문에, 본 연구에서는 무인항공기를 이용하여 홍수 전 지형자료 구축을 비롯하여, 홍수 시 모니터링, 홍수 후 지형자료 구축에 이르기까지 UAV를 이용한 홍수 모니터링 기술을 소개한다. 연구대상지는 금강 합류 직전 논산천 하류 1 km 지점으로, UAV를 이용한 지형자료를 구축하기 이전에 좌표 매칭을 위한 GCP (Ground Control Point ) 측량을 실시하고, UAV 비행계획을 수립하고 촬영한다. 촬영된 영상을 GCP좌표와 소프트웨어 (Pix4D)를 이용하여 정사영상과 DSM(Digital Surface Model)자료를 구축한다. 홍수시 UAV를 이용한 촬영을 통하여 동영상은 수재해 플랫폼에 송신하고, 이미지 영상은 홍수 전 영상처리와 동일한 방법을 이용하여 지형 자료를 구축하여, 홍수시 침수심이나 지형변화를 분석한다.

  • PDF

Laying Off Versus Training Workers: How Can Saudi Entrepreneurs Manage the COVID-19 Crisis?

  • RAIES, Asma;BEN MIMOUN, Mohamed
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권4호
    • /
    • pp.673-685
    • /
    • 2021
  • This study aims to determine theoretically the best workers layoff/training strategy that entrepreneurs should apply to manage the COVID-19 crisis successfully. It also examines the impacts of the Saudi government's emergency measures on firm performance. The paper develops a theoretical framework in which the optimal control technics is applied to model the entrepreneur's hiring, layoff, and training behaviors. The results show that, during the current COVID-19 pandemic, the entrepreneur should first lay off the less productive workers to reduce labor costs. As more and more inefficient workers quit and profit increases, the entrepreneur starts expanding his activity and training workers. In the long run, only the training activity allows the firm efficiency to grow at a constant rate. This finding suggests that the key to long-run economic recovery in Saudi Arabia will rely on training, innovation, and adaptability to the new digital environment. The paper also shows that the Saudi government initiative of covering 60% of salaries for the small- and medium-sized entrepreneurs during the COVID-19 pandemic will enhance training activities in small- and medium-sized enterprises and improve their efficiency in both the short and long run. This policy will also prevent Saudi entrepreneurs from laying off half of their staff.

Enhancing Cyber-Physical Systems Security: A Comprehensive SRE Approach for Robust CPS Methodology

  • Shafiq ur Rehman
    • International Journal of Computer Science & Network Security
    • /
    • 제24권5호
    • /
    • pp.40-52
    • /
    • 2024
  • Cyber-Physical Systems (CPS) are introduced as complex, interconnected systems that combine physical components with computational elements and networking capabilities. They bridge the gap between the physical world and the digital world, enabling the monitoring and control of physical processes through embedded computing systems and networked communication. These systems introduce several security challenges. These challenges, if not addressed, can lead to vulnerabilities that may result in substantial losses. Therefore, it is crucial to thoroughly examine and address the security concerns associated with CPS to guarantee the safe and reliable operation of these systems. To handle these security concerns, different existing security requirements methods are considered but they were unable to produce required results because they were originally developed for software systems not for CPS and they are obsolete methods for CPS. In this paper, a Security Requirements Engineering Methodology for CPS (CPS-SREM) is proposed. A comparison of state-of-the-art methods (UMLSec, CLASP, SQUARE, SREP) and the proposed method is done and it has demonstrated that the proposed method performs better than existing SRE methods and enabling experts to uncover a broader spectrum of security requirements specific to CPS. Conclusion: The proposed method is also validated using a case study of the healthcare system and the results are promising. The proposed model will provide substantial advantages to both practitioners and researcher, assisting them in identifying the security requirements for CPS in Industry 4.0.