• Title/Summary/Keyword: Host system model

Search Result 204, Processing Time 0.025 seconds

Online Dynamic Modeling of Ubiquitous Sensor based Embedded Robot Systems using Kalman Filter Algorithm (칼만 필터 알고리즘을 이용한 유비쿼터스 센서 기반 임베디드 로봇시스템의 온라인 동적 모델링)

  • Cho, Hyun-Cheol;Lee, Jin-Woo;Lee, Young-Jin;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.8
    • /
    • pp.779-784
    • /
    • 2008
  • This paper presents Kalman filter based system modeling algorithm for autonomous robot systems. State of the robot system is measured using embedded sensor systems and then carried to a host computer via ubiquitous sensor network (USN). We settle a linear state-space motion equation for unknown robot system dynamics and modify a popular Kalman filter algorithm in deriving suitable parameter estimation mechanism. To represent time-delay nature due to network media in system modeling, we construct an augmented state-space model which is mainly composed of original state and estimated parameter vectors. We conduct real-time experiment to test our proposed estimation algorithm where speed state of the constructed robot is used as system observation.

A Reactive Planner-Based Mobile Agent System

  • Seok, Whang-Hee;Kim, In-Cheol
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.179-185
    • /
    • 2001
  • Mobile agents have the unique ability to transport themselves from one system in a network to another. The ability to travel allows mobile agents to move to a system that contains services with which they want to interact and then to take advantage of being in the same host or network as the service. But most of conventional mobile agent systems require that the users or the programmer should give the mobile agent its detail behavioral script for accomplishing the given task. And during its runtime, such mobile agents just behave according to the fixed script given by its user. Therefore it is impossible that conventional mobile agents autonomously build their own plants and execute them in considering their ultimate goals and the dynamic world states. One way to overcome such limitations of conventional mobile agent systems is to develop an intelligent mobile agent system embedding a reactive planner. In this paper, we design both a model of agent mobility and a model of inter-agent communication based upon the representative reactive planning agent architecture called JAM. An then we develop an intelligent mobile agent system with reactive planning capability, IMAS, by implementing additional basic actions for agent moves and inter-agent communication within JAM according to the predefined models. Unlike conventional mobile agents. IMAS agents can be able to adapt their behaviors to the dynamic changes of their environments as well as build their own plans autonomously. Thus IMAS agents can show higher flexibility and robustness than the conventional ones.

  • PDF

Gene silencing assessment for genes from recalcitrant or poorly studied plant species

  • Kamoi, Takahiro;Eady, Colin Charles;Imai, Shinsuke
    • Plant Biotechnology Reports
    • /
    • v.2 no.3
    • /
    • pp.199-206
    • /
    • 2008
  • We have developed an efficient system of assessing the ability of a gene silencing cassette to silence transcripts from recalcitrant or poorly studied plant species by using a model plant as a host for the gene of interest. Tobacco plants transgenic for Lachrymatory Factor Synthase (LFS) enzyme activity from onion were first produced by introducing a CaMV 35S-onion-lfs gene construct. These plants were then subjected to a second transformation with an RNAi construct directed against the lfs gene sequence. LFS enzyme activity assay showed that the transgenic plants, containing both the lfs gene and the RNAi construct, had significantly reduced LFS activity. This observation was supported by Western analysis for the LFS protein and further validated by quantitative RT-PCR analysis that demonstrated a significant reduction in the lfs transcript level in the dual transformants. In this work, we have demonstrated that the RNAi construct is a suitable candidate for the development of a non-lachrymatory onion. Our model plant RNAi system has wide-reaching applications for assessment and targeting of plant secondary pathway genes, from poorly studied or recalcitrant plant species, that are important in the pharmacological, food and process industries.

A Comparative Study of Machine Learning Algorithms Using LID-DS DataSet (LID-DS 데이터 세트를 사용한 기계학습 알고리즘 비교 연구)

  • Park, DaeKyeong;Ryu, KyungJoon;Shin, DongIl;Shin, DongKyoo;Park, JeongChan;Kim, JinGoog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.3
    • /
    • pp.91-98
    • /
    • 2021
  • Today's information and communication technology is rapidly developing, the security of IT infrastructure is becoming more important, and at the same time, cyber attacks of various forms are becoming more advanced and sophisticated like intelligent persistent attacks (Advanced Persistent Threat). Early defense or prediction of increasingly sophisticated cyber attacks is extremely important, and in many cases, the analysis of network-based intrusion detection systems (NIDS) related data alone cannot prevent rapidly changing cyber attacks. Therefore, we are currently using data generated by intrusion detection systems to protect against cyber attacks described above through Host-based Intrusion Detection System (HIDS) data analysis. In this paper, we conducted a comparative study on machine learning algorithms using LID-DS (Leipzig Intrusion Detection-Data Set) host-based intrusion detection data including thread information, metadata, and buffer data missing from previously used data sets. The algorithms used were Decision Tree, Naive Bayes, MLP (Multi-Layer Perceptron), Logistic Regression, LSTM (Long Short-Term Memory model), and RNN (Recurrent Neural Network). Accuracy, accuracy, recall, F1-Score indicators and error rates were measured for evaluation. As a result, the LSTM algorithm had the highest accuracy.

A Semi-Autonomous Tele-Weeding System (반 자율기능을 갖는 원격 제초 시스템)

  • Bae, Jong-Min;Kim, Jong-Man;Kim, Hyong-Suk
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.349-351
    • /
    • 2007
  • A concept of the semi-autonomous tele-weeding-system which performs weeding tasks through co-operation of human and machine intelligence is proposed. The tele-weeding system consists of weeding robot, communication networks and operating server. The images of plants taken by the weeding robot are transferred through the communication networks to the human operator. Positions of the weeds are indicated at the operating host by the operator and transferred back to the weeding robot. Such position informations are converted to the world space and the weeding is done based on the robot intelligence. Feasibility of such concept has been tested through development of a laboratory model of the system.

  • PDF

Backbone assignment and structural analysis of anti-CRISPR AcrIF7 from Pseudomonas aeruginosa prophages

  • Kim, Iktae;Suh, Jeong-Yong
    • Journal of the Korean Magnetic Resonance Society
    • /
    • v.25 no.3
    • /
    • pp.39-44
    • /
    • 2021
  • The CRISPR-Cas system provides adaptive immunity for bacteria and archaea against invading phages and foreign plasmids. In the Class 1 CRISPR-Cas system, multi-subunit Cas proteins assemble with crRNA to bind to DNA targets. To disarm the bacterial defense system, bacteriophages evolved anti-CRISPR (Acr) proteins that actively inhibit the host CRISPR-Cas function. Here we report the backbone resonance assignments of AcrIF7 protein that inhibits the type I-F CRISPR-Cas system of Pseudomonas aeruginosa using triple-resonance nuclear magnetic resonance spectroscopy. We employed various computational methods to predict the structure and binding interface of AcrIF7, and assessed the model with experimental data. AcrIF7 binds to Cas8f protein via flexible loop regions to inhibit target DNA binding, suggesting that conformational heterogeneity is important for the Cas-Acr interaction.

Numerical and experimental investigation on the global performance of a novel design of a Low Motion FPSO

  • Peng, Cheng;Mansour, Alaa M.;Wu, Chunfa;Zuccolo, Ricardo;Ji, Chunqun;Greiner, Bill;Sung, Hong Gun
    • Ocean Systems Engineering
    • /
    • v.8 no.4
    • /
    • pp.427-439
    • /
    • 2018
  • Floating Production Storage and Offloading (FPSO) units have the advantages of their ability to provide storage and offloading capabilities which are not available in other types of floating production systems. In addition, FPSOs also provide a large deck area and substantial topsides payload capacity. They are in use in a variety of water depths and environments around the world. It is a good solution for offshore oil and gas development in fields where there is lack of an export pipeline system to shore. However due to their inherently high motions in waves, they are limited in the types of risers they can host. The Low Motion FPSO (LM-FPSO) is a novel design that is developed to maintain the advantages of the conventional FPSOs while offering significantly lower motion responses. The LM-FPSO design generally consists of a box-shape hull with large storage capacity, a free-hanging solid ballast tank (SBT) located certain distance below the hull keel, a few groups of tendons arranged to connect the SBT to the hull, a mooring system for station keeping, and a riser system. The addition of SBT to the floater results in a significant increase in heave, roll and pitch natural periods, mainly through the mass and added mass of the SBT, which significantly reduces motions in the wave frequency range. Model tests were performed at the Korea Research Institute of Ships & Ocean Engineering (KRISO) in the fall of 2016. An analytical model of the basin model (MOM) was created in Orcaflex and calibrated against the basin-model. Good agreement is achieved between global performance results from MOM's predictions and basin model measurements. The model test measurements have further verified the superior motion response of LM-FPSO. In this paper, numerical results are presented to demonstrate the comparison and correlation of the MOM results with model test measurements. The verification of the superior motion response through model test measurements is also presented in this paper.

Design and Performance Evaluation of Attributed Intrusion Detection System Model using Pattern Extracting Agent (패턴 추출 에이전트를 이용한 분산 침입 탐지 시스템 모델 설계 및 성능 평가)

  • 정종근;편석범;이윤배
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.117-124
    • /
    • 2000
  • As network security is coming up with significant problem after the major Internet sites were hacked nowadays, IDS (Intrusion Detection System) is considered as a next generation security solution for more trusted network and system security We propose the new IDS model which can detect intrusion in the expanded distribute environment in host level, drawback of existing IDS, and implement prototype. We used pattern extraction agent so that we extract automatically audit file needed in intrusion detection even in other Platforms.

  • PDF

Design and Implementation of CORBA Inter-ORB Protocol Based on Shared Memory for Communication Systems (통신 시스템을 위한 공유 메모리 기반 CORBA 연동 프로토콜 설계 및 구현)

  • Jang, Jong-Hyun;Lee, Dong-Gil;Choi, Wan;Han, Chi-Moon;Jang, Ik-Hyun
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.231-238
    • /
    • 2003
  • Distributed systems present new system architecture for solving interoperability problem in heterogeneous system. This paper presents CORBA Inter-ORB protocol model based on shared memory to support communication software through analysis of existing CORBA IIOP protocol performance and Inter-Process Communication techniques. In the same host environment, proposed model applied standard CORBA mechanism to minimize message transfer overhead can develop software independently to hardware architecture of target communication system. This communication software that has flexibility and extensibility can improve productivity, duality and reusability of software.

Security Assessment Technique of a Container Runtime Using System Call Weights

  • Yang, Jihyeok;Tak, Byungchul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.9
    • /
    • pp.21-29
    • /
    • 2020
  • In this paper, we propose quantitative evaluation method that enable security comparison between Security Container Runtimes. security container runtime technologies have been developed to address security issues such as Container escape caused by containers sharing the host kernel. However, most literature provides only a analysis of the security of container technologies using rough metrics such as the number of available system calls, making it difficult to compare the secureness of container runtimes quantitatively. While the proposed model uses a new method of combining the degree of exposure of host system calls with various external vulnerability metrics. With the proposed technique, we measure and compare the security of runC (Docker default Runtime) and two representative Security Container Runtimes, gVisor, and Kata container.