• Title/Summary/Keyword: Fuzzy Logic Systems

Search Result 1,673, Processing Time 0.027 seconds

A Study on Water Level Control of PWR Steam Generator at Low Power Operation and Transient States (저출력 및 과도상태시 원전 증기발생기 수위제어에 관한 연구)

  • Na, Nan-Ju;Kwon, Kee-Choon;Bien, Zeungnam
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.3 no.2
    • /
    • pp.18-35
    • /
    • 1993
  • The water level control system of the steam generator in a pressurized water reactor and its control problems are analysed. In this work the stable control strategy during the low power operation and transient states is studied. To solve the problem, a fuzzy logic control method is applied as a basic algorithm of the controller. The control algorithm is based on the operator's knowledges and the experiences of manual operation for water level control at the compact nuclear simulator set up in Korea Atomic Energy Research Institute. From a viewpoint of the system realization, the control variables and rules are established considering simpler tuning and the input-output relation. The control strategy includes the dynamic tuning method and employs a substitutional information using the bypass valve opening instead of incorrectly measured signal at the low flow rate as the fuzzy variable of the flow rate during the pressure control mode of the steam generator. It also involves the switching algorithm between the control valves to suppress the perturbation of water level. The simulation results show that both of the fine control action at the small level error and the quick response at the large level error can be obtained and that the performance of the controller is improved.

  • PDF

Optimum design and vibration control of a space structure with the hybrid semi-active control devices

  • Zhan, Meng;Wang, Sheliang;Yang, Tao;Liu, Yang;Yu, Binshan
    • Smart Structures and Systems
    • /
    • v.19 no.4
    • /
    • pp.341-350
    • /
    • 2017
  • Based on the super elastic properties of the shape memory alloy (SMA) and the inverse piezoelectric effect of piezoelectric (PZT) ceramics, a kind of hybrid semi-active control device was designed and made, its mechanical properties test was done under different frequency and different voltage. The local search ability of genetic algorithm is poor, which would fall into the defect of prematurity easily. A kind of adaptive immune memory cloning algorithm(AIMCA) was proposed based on the simulation of clone selection and immune memory process. It can adjust the mutation probability and clone scale adaptively through the way of introducing memory cell and antibody incentive degrees. And performance indicator based on the modal controllable degree was taken as antigen-antibody affinity function, the optimization analysis of damper layout in a space truss structure was done. The structural seismic response was analyzed by applying the neural network prediction model and T-S fuzzy logic. Results show that SMA and PZT friction composite damper has a good energy dissipation capacity and stable performance, the bigger voltage, the better energy dissipation ability. Compared with genetic algorithm, the adaptive immune memory clone algorithm overcomes the problem of prematurity effectively. Besides, it has stronger global searching ability, better population diversity and faster convergence speed, makes the damper has a better arrangement position in structural dampers optimization leading to the better damping effect.

Design and Evaluation of an Early Intelligent Alert Broadcasting Algorithm for VANETs (차량 네트워크를 위한 조기 지능형 경보 방송 알고리즘의 설계 및 평가)

  • Lee, Young-Ha;Kim, Sung-Tae;Kim, Guk-Boh
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.95-102
    • /
    • 2012
  • The development of applications for vehicular ad hoc networks (VANETs) has very specific and clear goals such as providing intellectual safe transport systems. An emergency warning technic for public safety is one of the applications which requires an intelligent broadcast mechanism to transmit warning messages quickly and efficiently against the time restriction. The broadcast storm problem causing several packet collisions and extra delay has to be considered to design a broadcast protocol for VANETs, when multiple nodes attempt transmission simultaneously at the access control layer. In this paper, we propose an early intelligent alert broadcasting (EI-CAST) algorithm to resolve effectively the broadcast storm problem and meet time-critical requirement. The proposed algorithm uses not only the early alert technic on the basis of time to collision (TTC) but also the intelligent broadcasting technic on the basis of fuzzy logic, and the performance of the proposed algorithm was compared and evaluated through simulation with the existing broadcasting algorithms. It was demonstrated that the proposed algorithm shows a vehicle can receive the alert message before a collision and have no packet collision when the distance of alert region is less than 4 km.

A Modified E-LEACH Routing Protocol for Improving the Lifetime of a Wireless Sensor Network

  • Abdurohman, Maman;Supriadi, Yadi;Fahmi, Fitra Zul
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.845-858
    • /
    • 2020
  • This paper proposes a modified end-to-end secure low energy adaptive clustering hierarchy (ME-LEACH) algorithm for enhancing the lifetime of a wireless sensor network (WSN). Energy limitations are a major constraint in WSNs, hence every activity in a WSN must efficiently utilize energy. Several protocols have been introduced to modulate the way a WSN sends and receives information. The end-to-end secure low energy adaptive clustering hierarchy (E-LEACH) protocol is a hierarchical routing protocol algorithm proposed to solve high-energy dissipation problems. Other methods that explore the presence of the most powerful nodes on each cluster as cluster heads (CHs) are the sparsity-aware energy efficient clustering (SEEC) protocol and an energy efficient clustering-based routing protocol that uses an enhanced cluster formation technique accompanied by the fuzzy logic (EERRCUF) method. However, each CH in the E-LEACH method sends data directly to the base station causing high energy consumption. SEEC uses a lot of energy to identify the most powerful sensor nodes, while EERRCUF spends high amounts of energy to determine the super cluster head (SCH). In the proposed method, a CH will search for the nearest CH and use it as the next hop. The formation of CH chains serves as a path to the base station. Experiments were conducted to determine the performance of the ME-LEACH algorithm. The results show that ME-LEACH has a more stable and higher throughput than SEEC and EERRCUF and has a 35.2% better network lifetime than the E-LEACH algorithm.

On Mathematical Representation and Integration Theory for GIS Application of Remote Sensing and Geological Data

  • Moon, Woo-Il M.
    • Korean Journal of Remote Sensing
    • /
    • v.10 no.2
    • /
    • pp.37-48
    • /
    • 1994
  • In spatial information processing, particularly in non-renewable resource exploration, the spatial data sets, including remote sensing, geophysical and geochemical data, have to be geocoded onto a reference map and integrated for the final analysis and interpretation. Application of a computer based GIS(Geographical Information System of Geological Information System) at some point of the spatial data integration/fusion processing is now a logical and essential step. It should, however, be pointed out that the basic concepts of the GIS based spatial data fusion were developed with insufficient mathematical understanding of spatial characteristics or quantitative modeling framwork of the data. Furthermore many remote sensing and geological data sets, available for many exploration projects, are spatially incomplete in coverage and interduce spatially uneven information distribution. In addition, spectral information of many spatial data sets is often imprecise due to digital rescaling. Direct applications of GIS systems to spatial data fusion can therefore result in seriously erroneous final results. To resolve this problem, some of the important mathematical information representation techniques are briefly reviewed and discussed in this paper with condideration of spatial and spectral characteristics of the common remote sensing and exploration data. They include the basic probabilistic approach, the evidential belief function approach (Dempster-Shafer method) and the fuzzy logic approach. Even though the basic concepts of these three approaches are different, proper application of the techniques and careful interpretation of the final results are expected to yield acceptable conclusions in cach case. Actual tests with real data (Moon, 1990a; An etal., 1991, 1992, 1993) have shown that implementation and application of the methods discussed in this paper consistently provide more accurate final results than most direct applications of GIS techniques.

Performance Evaluation for Several Control Algorithms of the Actuating System Using G/C HILS Technique (비행 전구간 유도제어 HILS 기법을 적용한 구동제어 알고리즘 성능 평가 연구)

  • Jeon, Wan Soo;Cho, Hyeon Jin;Lee, Man Hyung
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.9
    • /
    • pp.114-129
    • /
    • 1996
  • This paper describes the whole development phase for the underwater vehicle actuating system with high hydroload torque disturbance. This includes requirement analysis, system modeling, control algorithm design, real time implementation, test and performance evaluations. As for driving control algorithms, fuzzy logic, variable structure and PD(Proportional-Differential) algorithm were designed and implemented on board controller using a single chip microprocessor. Intel 8797. And test and performance evaluation is carried out both single test and wystem integration test. We could confirm the basic performance of actuating system through the single test and gereral developing work of any actuating systems was finished with a single performance test of actuating system without system integration test. But, we suggested that system integration test be needed. System integration test is carried out using G/C HILS(Guidance and Control Hardware-In-the -Loop Simulation) which is constituted flight motion simulator, load simulator, real time host computer and the related subsystems such as inertial navigation system, power supply system and Guidance and Control Computer etc.. The most important practical contribution of this paper is that full system characteristics such as minimal control effort, enhancement of guidance and autopilot performance by the actuating system using G/C HILS technique are investigated. Through full running G/C HILS, in spite of the passing to single tests, some control algorithm resulted in failure as to stability of full system and system time frame.

  • PDF

An Efficient and Secure Authentication Scheme with Session Key Negotiation for Timely Application of WSNs

  • Jiping Li;Yuanyuan Zhang;Lixiang Shen;Jing Cao;Wenwu Xie;Yi Zheng;Shouyin Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.3
    • /
    • pp.801-825
    • /
    • 2024
  • For Internet of Things, it is more preferred to have immediate access to environment information from sensor nodes (SNs) rather than from gateway nodes (GWNs). To fulfill the goal, mutual authentication scheme between user and SNs with session key (SK) negotiation is more suitable. However, this is a challenging task due to the constrained power, computation, communication and storage resources of SNs. Though lots of authentication schemes with SK negotiation have been designed to deal with it, they are still insufficiently secure and/or efficient, and some even have serious vulnerabilities. Therefore, we design an efficient secure authentication scheme with session key negotiation (eSAS2KN) for wireless sensor networks (WSNs) utilizing fuzzy extractor technique, hash function and bitwise exclusive-or lightweight operations. In the eSAS2KN, user and SNs are mutually authenticated with anonymity, and an SK is negotiated for their direct and instant communications subsequently. To prove the security of eSAS2KN, we give detailed informal security analysis, carry out logical verification by applying BAN logic, present formal security proof by employing Real-Or-Random (ROR) model, and implement formal security verification by using AVISPA tool. Finally, computation and communication costs comparison show the eSAS2kN is more efficient and secure for practical application.

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

A Study on 3D RTLS at Port Container Yards Using the Extended Kalman Filter

  • Kim, Joeng-Hoon;Lee, Hyun-Woo;Kwon, Soon-Ryang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.7 no.4
    • /
    • pp.228-235
    • /
    • 2007
  • The main purpose of this paper is to manage the container property effectively at the container yard by applying the RTLS technology to the field of port logistics. Yet, many kinds of noises happen to be inputted with the distance value(between the reader and the tag) which is to be inputted into the location identification algorithm, which makes the distance value jumped due to the system noise of the ultrasonic sensor module and the measurement noise. The Kalman Filter is widely used to prevent this jump occurrence; the noises are eliminated by using the EKF(Extended Kalman Filter) while considering that the distance information of the ultrasonic sensor is non-linear. Also, the 3D RTLS system at the port container yard suggested in this research is designed not to be interrupted for its ultrasonic transmission by positioning the antenna at the front of each sector of the container where the active tags are installed. We positioned the readers, which function as antennas for location identification, to four places randomly in the absolute coordinate and let the positions of the active tags identified by using the distance data delivered from the active tags. For the location identification algorithm used in this paper, the triangulation measurement that is most used in general is applied and newly reorganized to calculate the position of the container. In the first experiment, we dealt with the error resulting in the angle and the distance of the ultrasonic sensor module, which is the most important in the hardware performance; in the second, we evaluated the performance of the location identification algorithm, which is the most important in the software performance, and tested the noise cancellation effects for the EKF. According to the experiment result, the ultrasonic sensor showed an average of 3 to 5cm error up to $45^{\circ}$ in case of $60^{\circ}$ or more, non-reliable linear distances were obtained. In addition, the evaluation of the algorithm performance showed an average of $4^{\circ}{\sim}5^{\circ}$ error due to the error of the linear distance-this error is negligible for most container location identifications. Lastly, the experiment results of noise cancellation and jump preservation by using the EKF showed that noises were removed in the distance information which was entered from the input of the ultrasonic sensor and as a result, only signal was extracted; thus, jumps were able to be removed and the exact distance information between the ultrasonic sensors could be obtained.

Study on Interaction of Planar Redundant Manipulator with Environment based on Intelligent Control (지능제어를 이용한 평면 여자유도 매니퓰레이터와 환경과의 상호작용에 관한 연구)

  • Yoo, Bong-Soo;Kim, Sin-Ho;Joh, Joong-Seon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.3
    • /
    • pp.388-397
    • /
    • 2009
  • There are many tasks which require robotic manipulators interaction with environment. It consists of three control problems, i.e., position control, impact control and force control. The position control means the way of reaching to the environment. The moment of touching to the environment yields the impact control problem and the force control is to maintain the desired force trajectory after the impact with the environment. These three control problems occur in sequence, so each control algorithm can be developed independently. Especially for redundant manipulators, each of these three control problems has been important independent research topic. For example, joint torque minimization and impulse minimization are typical techniques for such control problems. The three control problems are considered as a single task in this paper. The position control strategy is developed to improve the performance of the task, i.e., minimization of the individual joint torques and impulse. Therefore, initial conditions of the impact control problem are optimized at the previous position control algorithm. Such a control strategy yields improved result of the impact control. Similarly, the initial conditions for the force control problem are indirectly optimized by the previous position control and impact control strategies. The force control algorithm uses the individual joint torque minimization concept. It also minimizes the force disturbances. The simulation results show the proposed control strategy works well.