• Title/Summary/Keyword: Dynamic Collection

Search Result 271, Processing Time 0.027 seconds

Robust Controller Design for Non-square Linear Systems Using a Passivation Approach (수동화 기법에 의한 비정방 선형 시스템의 강인 제어기 설계)

  • 손영익
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.8 no.11
    • /
    • pp.907-915
    • /
    • 2002
  • We present a state-space approach to design a passivity-based dynamic output feedback control of a finite collection of non-square linear systems. We first determine a squaring gain matrix and an additional dynamics that is connected to the systems in a feedforward way, then a static passivating (i.e. rendering passive) control law is designed. Consequently, the actual feedback controller will be the static control law combined with the feedforward dynamics. A necessary and sufficient condition for the existence of the parallel feedfornward compensator (PFC) is given by the static output feedback fomulation, which enables to utilize linear matrix inequality (LMI). The effectiveness of the proposed method is illustrated by some examples including the systems which can be stabilized by the proprotional-derivative (PD) control law.

Dynamic Wear Leveling Technique using Block Sequence Number in Non-volatile Memory (비휘발성 메모리 환경에서 블록 생성 번호를 활용한 동적 마모도 평준화 기법)

  • Hwang, Sang-Ho;Kwak, Jong Wook
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.5-7
    • /
    • 2016
  • 본 논문에서는 블록 생성 번호를 활용한 동적 마모도 평준화 기법을 제안한다. 지금까지 제안된 동적 마모도 평준화 기법들은 콜드 블록을 판별하기 위해 경과 시간을 사용하고 있다. 하지만 저장장치의 데이터 접근은 일정한 시간 간격으로 이루어지는 것이 아니기 때문에 이와 같은 경과 시간을 사용하는 방식은 데이터에 대한 블록 접근 정보가 왜곡될 수 있는 단점이 있다. 이러한 단점을 해결하기 위해, 본 논문에서 제안하는 기법은 블록을 할당할 때 블록 순차 번호를 테이블에 저장하고 이를 이용하여 블록의 접근 빈도를 판별한다. 실험에서 제한하는 기법은 기존의 CB, CAT 기법과 비교하여 최대 11% 수명이 향상됨을 확인하였다.

  • PDF

An On Demand Routing Algorithm for Mobile Wireless Networks

  • Yan, Huai-Zhi;Ajith, P.K.;Park, Dong-Won;Joo, Gi-Ho
    • The Journal of Engineering Research
    • /
    • v.7 no.1
    • /
    • pp.37-51
    • /
    • 2005
  • An and hoc network is a collection of wireless mobile nodes forming a temporary network without the centralized administration. Due to the limited transmission range of wireless work interface, multiple networks "hops" maybe needed for one node to exchange data with adjacent node. In recent years, a variety of new routing protocol about ad hoc network was developed. This paper presents a new routing protocol based on the Dynamic Source Routing which is not suitable for the high mobility ad hoc network. The Enhanced DR adapts quickly to routing changes when node movement is frequent. When a trunk route is broken, this protocol will utilize the alternative route saved in the route to discovery quickly the new route. It improves the performance of the existing DSR algorithm, so that the negative impacts from weakness of DSR are reduced.

  • PDF

Implementation and Performance Aanalysis of Efficient Big Data Processing System Through Dynamic Configuration of Edge Server Computing and Storage Modules (BigCrawler: 엣지 서버 컴퓨팅·스토리지 모듈의 동적 구성을 통한 효율적인 빅데이터 처리 시스템 구현 및 성능 분석)

  • Kim, Yongyeon;Jeon, Jaeho;Kang, Sungjoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.259-266
    • /
    • 2021
  • Edge Computing enables real-time big data processing by performing computing close to the physical location of the user or data source. However, in an edge computing environment, various situations that affect big data processing performance may occur depending on temporary service requirements or changes of physical resources in the field. In this paper, we proposed a BigCrawler system that dynamically configures the computing module and storage module according to the big data collection status and computing resource usage status in the edge computing environment. And the feature of big data processing workload according to the arrangement of computing module and storage module were analyzed.

Design and Implementation of Road Construction Risk Management System based on LPWA and Bluetooth Beacon

  • Lee, Seung-Soo;Kim, Yun-cheol;Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.145-151
    • /
    • 2018
  • While commercialization of IoT technologies in the safety management sector is being promoted in terms of industrial safety of large indoor businesses, implementing a system for risk management of small outdoor work sites with frequent site movements is not actively implemented. In this paper, we propose an efficient dynamic workload balancing strategy which combined low-power, wide-bandwidth (LPWA) communication and low-power Bluetooth (BLE) communication technologies to support customized risk management alarm systems for each individual (driver/operator/manager). This study was designed to enable long-term low-power collection and transmission of traffic information in outdoor environment, as well as to implement an integrated real-time safety management system that notifies a whole field worker who does not carry a separate smart device in advance. Performance assessments of the system, including risk alerts to drivers and workers via Bluetooth communication, the speed at which critical text messages are received, and the operation of warning/lighting lamps are all well suited to field application.

GPS-Based Shortest-Path Routing Scheme in Mobile Ad Hoc Network

  • Park, Hae-Woong;Won, Soo-Seob;Kim, So-Jung;Song, Joo-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1529-1532
    • /
    • 2004
  • A Mobile Ad Hoc NETwork (MANET) is a collection of wireless mobile nodes that forms a temporary network without the need for any existing network infrastructure or centralized administration. Therefore, such a network is designed to operate in a highly dynamic environment due to node mobility. In mobile ad hoc network, frequent topological changes cause routing a challenging problem and without the complete view of the network topology, establishing the shortest path from the source node to the destination node is difficult. In this paper, we suggest a routing approach which utilizes location information to setup the shortest possible path between the source node and the destination node. Location information is obtained through Global Positioning System (GPS) and this geographical coordinate information of the destination node is used by the source node and intermediate nodes receiving route request messages to determine the shortest path to the destination from current node.

  • PDF

A method for preventing online games hacking using memory monitoring

  • Lee, Chang Seon;Kim, Huy Kang;Won, Hey Rin;Kim, Kyounggon
    • ETRI Journal
    • /
    • v.43 no.1
    • /
    • pp.141-151
    • /
    • 2021
  • Several methods exist for detecting hacking programs operating within online games. However, a significant amount of computational power is required to detect the illegal access of a hacking program in game clients. In this study, we propose a novel detection method that analyzes the protected memory area and the hacking program's process in real time. Our proposed method is composed of a three-step process: the collection of information from each PC, separation of the collected information according to OS and version, and analysis of the separated memory information. As a result, we successfully detect malicious injected dynamic link libraries in the normal memory space.

Augmentation of Hidden Markov Chain for Complex Sequential Data in Context

  • Sin, Bong-Kee
    • Journal of Multimedia Information System
    • /
    • v.8 no.1
    • /
    • pp.31-34
    • /
    • 2021
  • The classical HMM is defined by a parameter triple �� = (��, A, B), where each parameter represents a collection of probability distributions: initial state, state transition and output distributions in order. This paper proposes a new stationary parameter e = (e1, e2, …, eN) where N is the number of states and et = P(|xt = i, y) for describing how an input pattern y ends in state xt = i at time t followed by nothing. It is often said that all is well that ends well. We argue here that all should end well. The paper sets the framework for the theory and presents an efficient inference and training algorithms based on dynamic programming and expectation-maximization. The proposed model is applicable to analyzing any sequential data with two or more finite segmental patterns are concatenated, each forming a context to its neighbors. Experiments on online Hangul handwriting characters have proven the effect of the proposed augmentation in terms of highly intuitive segmentation as well as recognition performance and 13.2% error rate reduction.

Influence of asphalt removal on operational modal analysis of Egebækvej Bridge

  • Umut Yildirim
    • Smart Structures and Systems
    • /
    • v.31 no.2
    • /
    • pp.171-181
    • /
    • 2023
  • Using the most up-to-date system identification methods in both time and frequency domains, the dynamic monitoring data from the reinforced concrete Egebaekvej Bridge near Holte, Denmark, is examined in this investigation. The bridge was erected in the 1960s and was still standing during test campaign before demolishing. The ARTeMIS Modal was adopted to derive the modal parameters from ambient vibration data. Several Operational Modal Analysis (OMA) approaches were applied, including Enhanced Frequency Domain Decomposition (EFDD), Curve-fit Frequency Domain Decomposition (CFDD), and Frequency Domain Decomposition (FDD). Afterward, Principal Component (SSI-PC), Unweighted Principal Component (SSI-UPC) Stochastic Subspace Identification methods were utilized. Danish engineering consulting company, COWI with the allowance of the bridge contractor BARSLUND, allow the researcher for this experimental test to demonstrate the impact of OMA applications.

Video Image Analysis in Accordance with Power Density of Arcing for Current Collection System in Electric Railway (전기철도 집전장치의 아크량에 따른 비디오 이미지 분석)

  • Park, Young;Lee, Kiwon;Park, Chulmin;Kim, Jae-Kwang;Jeon, Ahram;Kwon, Sam-Young;Cho, Yong Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.9
    • /
    • pp.1343-1347
    • /
    • 2013
  • This paper presents an analysis methods for current collection quality in catenary system by means of video image based monitoring system. Arcing is the sparking at the interface point between pantograph and contact wire when the electric trains have traction current values at speed. Percentage of arcing at maximum line speed is measurable parameters for compliance with the requirements on dynamic behaviour of the interface between pantograph and contact wire in accordance with requirement of IEC and EN standards. The arc detector and video is installed on a train aim at the trailing contact strip according to the travel direction. The arc detector presented and measured verity of value such as the duration and power density of each arc and the video image is measured a image when the arc is occurred in pantograph. In this paper we analysis of video image in accordance with power density of arcing from arc detector and compared with video image and power density of arcing so as to produce quality of arcing from image.