• Title/Summary/Keyword: Event Based Control

Search Result 422, Processing Time 0.028 seconds

Crowd escape event detection based on Direction-Collectiveness Model

  • Wang, Mengdi;Chang, Faliang;Zhang, Youmei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4355-4374
    • /
    • 2018
  • Crowd escape event detection has become one of the hottest problems in intelligent surveillance filed. When the 'escape event' occurs, pedestrians will escape in a disordered way with different velocities and directions. Based on these characteristics, this paper proposes a Direction-Collectiveness Model to detect escape event in crowd scenes. First, we extract a set of trajectories from video sequences by using generalized Kanade-Lucas-Tomasi key point tracker (gKLT). Second, a Direction-Collectiveness Model is built based on the randomness of velocity and orientation calculated from the trajectories to express the movement of the crowd. This model can describe the movement of the crowd adequately. To obtain a generalized crowd escape event detector, we adopt an adaptive threshold according to the Direction-Collectiveness index. Experiments conducted on two widely used datasets demonstrate that the proposed model can detect the escape events more effectively from dense crowd.

Failure Diagnosis of Discrete Event Systems (이산이벤트시스템이 고장진단)

  • Son, Hyoung-Il;Kim, Kee-Woong;Lee, Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.7 no.5
    • /
    • pp.375-383
    • /
    • 2001
  • As many industrial systems become more complex, it becomes extremely difficult to diagnose the cause of failures. This paper presents a failure diagnosis approach based on discrete event system theory. In particular, the approach is a hybrid of event-based and state-based ones leading to a simpler failure diagnoser with supervisory control capability. The design procedure is presented along with a pump-valve system as an example.

  • PDF

DES Approach Failure Diagnosis of Pump-valve System (펌프-밸브 시스템의 DES 접근론적 Failure Diagnosis)

  • Son, Hyung-Il;Kim, Ki-Woong;Lee, Seok
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.05a
    • /
    • pp.643-646
    • /
    • 2000
  • As many industrial systems become more complex, it becomes extremely difficult to diagnose the cause of failures. This paper presents a failure diagnosis approach based on discrete event system theory. In particular, the approach is a hybrid of event-based and state-based ones leading to a simpler failure diagnoser with supervisory control capability. The design procedure is presented along with a pump-valve system as an example.

  • PDF

A Study on the Analysis of Validity and Importance of Event Log for the Detection of Insider Threats to Control System (제어시스템의 내부자 위협 탐지를 위한 Event Log 타당성 및 중요도 분석에 관한 연구)

  • Kim, Jongmin;Kim, DongMin;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.77-85
    • /
    • 2018
  • With the convergence of communications network between control system and public network, such threats like information leakage/falsification could be fully shown in control system through diverse routes. Due to the recent diversification of security issues and violation cases of new attack techniques, the security system based on the information database that simply blocks and identifies, is not good enough to cope with the new types of threat. The current control system operates its security system focusing on the outside threats to the inside, and it is insufficient to detect the security threats by insiders with the authority of security access. Thus, this study conducted the importance analysis based on the main event log list of "Spotting the Adversary with Windows Event Log Monitoring" announced by NSA. In the results, the matter of importance of event log for the detection of insider threats to control system was understood, and the results of this study could be contributing to researches in this area.

  • PDF

Design and Specification of a Low-Level Control Software for an FMC Using Supervisory Control Theory

  • Kim, Sang-Kyun;Park, Jong-Hun;Park, Namkyu;Park, Jin-Woo
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.20 no.2
    • /
    • pp.159-178
    • /
    • 1995
  • Supervisory control is an approach based on formal language. it is used to model and control discrete event systems in which each discrete event process is represented as an automation. A supervisor is a generator that switches control patterns in such a way that a given discrete evenet process behaves in obedience to various constraints. A flexible manufacturing cell (FMC) is one of discrete evenet systems. Functions necessary for the operation of an FMC are characterized by operational components and informational compoments. The operational components can be modeled using the finite state machines and the informational components can be modeled using the abstract formalism which describes supporting operations of the cell controller. In this paper, we addressed function required for FMC control specification, software engineering aspects on FMC control based on supervisory control, a concept of event queue for resolving synchronization problem, and complexity reduction. Based on the mathematical model of an FMC. we synthesized the controller by integrating a supervisor for FMC with control specification that specifies event-driven operation of the cell controller. The proposed control scheme is stable mathematically so that the system always behaves on a controlled way even under the existence of uncontrollable events. Furthermore, using an event queue concept, we can solve a synchronization problem caused by the violation of instantaneity assumption of supervisory control theory in real life situation. And also, we can propotype a control software rapidly due to the modularity of the proposed control scheme.

  • PDF

A New Approach for Multiple Object Tracking ? Discrete Event based Multiple Object Tracking (DEMOT)

  • Kim, Chi-Ho;You, Bum-Jae;Kim, Hag-Bae;Oh, Sang-Rok
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1134-1139
    • /
    • 2003
  • Tracking is a fundamental technique which is able to be applied to gesture recognition, visual surveillance, tangible agent and so forth. Especially, multiple object tracking has been extensively studied in recent years in order to perform many and more complicated tasks. In this paper, we propose a new approach of multiple object tracking which is based on discrete event. We call this system the DEMOT (Discrete Event based Multiple Object Tracking). This approach is based on the fact that a multiple object tracking can have just four situations - initiation, continuation, termination, and overlapping. Here, initiation, continuation, termination, and overlapping constitute a primary event set and this is based on the change of the number of extracted objects between a previous frame and a current frame. This system reduces computational costs and holds down the identity of all targets. We make experiments for this system with respect to the number of targets, each event, and processing period. We describe experimental results that show the successful multiple object tracking by using our approach.

  • PDF

Event Based Tele-Operation with Variable Holding Time (가변 지속시간을 갖는 이벤트 기반 원격제어)

  • 박준영;박장현
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.12
    • /
    • pp.70-77
    • /
    • 2002
  • Necessity of the tole-operation has been increased in many fields. Since the Internet is inexpensive and available all over the world, it is a strong candidate for the transmission media of the tole-operation. However, the Internet has random time delays that may cause instability in the system especially if the tole -operation is bilateral. In the past few years many attempts have been made to overcome the random time delay, So far, they are still insufficient in terms of performance. The ‘Variable holding time’ is introduced to improve the performance of the ‘Event based tole-operation’ which controls a system with a non-time action reference. By holding each event for proper time, the system can quickly respond and be stabilized. The proper holding time should be selected based on the characteristics of the task that the system performs. The factors that reflect those characteristics are investigated. The fuzzy logic is employed to obtain the proper holding time for each event while the tole-operation system is in operation. The experimental results presented in this paper verify effectiveness of the proposed method.

Event Log Validity Analysis for Detecting Threats by Insiders in Control System

  • Kim, Jongmin;Kang, Jiwon;Lee, DongHwi
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.16-21
    • /
    • 2020
  • Owing to the convergence of the communication network with the control system and public network, security threats, such as information leakage and falsification, have become possible through various routes. If we examine closely at the security type of the current control system, the operation of the security system focuses on the threats made from outside to inside, so the study on the detection system of the security threats conducted by insiders is inadequate. Thus, this study, based on "Spotting the Adversary with Windows Event Log Monitoring," published by the National Security Agency, found that event logs can be utilized for the detection and maneuver of threats conducted by insiders, by analyzing the validity of detecting insider threats to the control system with the list of important event logs.

A Study on Event Log Correlation Analysis for Control System Threat Analysis (제어시스템 위협분석을 위한 Event Log 상관분석에 관한 연구)

  • Kim, Jongmin;Kim, Minsu;Lee, DongHwi
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.35-40
    • /
    • 2017
  • The control system can have such threats as information leakage and falsification through various routes due to communications network fusion with public network. As the issues about security and the infringe cases by new attack methods are diversified recently, with the security system that makes information data database by simply blocking and checking it is difficult to cope with new types of threats. It is also difficult to respond security threats by insiders who have security access authority with the existing security equipment. To respond the threats by insiders, it is necessary to collect and analyze Event Log occurring in the internal system realtime. Therefore, this study could find out whether there is correlation of the elements among Event Logs through correlation analysis based on Event Logs that occur real time in the control system, and based on the analysis result, the study is expected to contribute to studies in this field.

Dynamic Contention Window based Congestion Control and Fair Event Detection in Wireless Sensor Network

  • Mamun-Or-Rashid, Md.;Hong, Choong-Seon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1288-1290
    • /
    • 2007
  • Congestion in WSN increases energy dissipation rates of sensor nodes as well as loss of packets and thereby hinders fair and reliable event detections. We find that one of the key reasons of congestion in WSN is allowing sensing nodes to transfer as many packets as possible. This is due to the use of CSMA/CA that gives opportunistic media access control. In this paper, we propose an energy efficient congestion avoidance protocol that includes source count based hierarchical and load adaptive medium access control. Our proposed mechanism ensures load adaptive media access to the nodes and thus achieves fairness in event detection. The results of simulation show our scheme exhibits more than 90% delivery ratio with retry limit 1, even under bursty traffic condition which is good enough for reliable event perception.