• Title/Summary/Keyword: Intelligent guide system

Search Result 98, Processing Time 0.029 seconds

Development of machining system for ultra-precision aspheric lens mold (초정밀 비구면 렌즈 금형가공시스템 개발)

  • Baek, Seung-Yub;Lee, Ha-Sung;Kang, Dong-Myeong
    • Design & Manufacturing
    • /
    • v.2 no.1
    • /
    • pp.33-38
    • /
    • 2008
  • As consumer in optics, electronics, aerospace and electronics industry grow, the demand for ultra precision aspherical surface lens increases higher. Precision turning with single-diamond tools has a long history of development for fabrication of optical quality surfaces since the advent of aerostatic rotary spindles and precise linear motion guide ways. To enhance the precision and productivity of ultra precision aspherical surface micro lens, the following specification of ultra precision grinding system is required: the highest rotational speed of the grinder is 100,000rpm and its turning accuracy is $0.1{\mu}m$, positioning accuracy is $0.1{\mu}m$. The development process of the grinding system for the ultra precision aspherical surface micro lens for optoelectronics industry is introduced. In the work reported in this paper, an intelligent grinding system for ultra precision aspherical surface machining was designed by considering the factors affecting the surface roughness and profiles accuracy. An aerostatic form was adopted to build the spindle of the workpiece and the spindle of grinder and ultra precision LM guide way was adopted in this system. And this paper deals with mirror grinding of an aspheric surface micro lens by resin bonded diamond wheel and spherical lens of BK7. It results was that a form accuracy of $0.6{\mu}m$ P-V and a surface roughness of $0.006{\mu}m$ Rmax.

  • PDF

Detection of Calibration Patterns for Camera Calibration with Irregular Lighting and Complicated Backgrounds

  • Kang, Dong-Joong;Ha, Jong-Eun;Jeong, Mun-Ho
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.5
    • /
    • pp.746-754
    • /
    • 2008
  • This paper proposes a method to detect calibration patterns for accurate camera calibration under complicated backgrounds and uneven lighting conditions of industrial fields. Required to measure object dimensions, the preprocessing of camera calibration must be able to extract calibration points from a calibration pattern. However, industrial fields for visual inspection rarely provide the proper lighting conditions for camera calibration of a measurement system. In this paper, a probabilistic criterion is proposed to detect a local set of calibration points, which would guide the extraction of other calibration points in a cluttered background under irregular lighting conditions. If only a local part of the calibration pattern can be seen, input data can be extracted for camera calibration. In an experiment using real images, we verified that the method can be applied to camera calibration for poor quality images obtained under uneven illumination and cluttered background.

Application of Real-time embedded linux as an operating system for intelligence robots (지능형 로봇 운영체제로서의 실시간 임베디드 리눅스 적용 방법)

  • Choi, Byoung-Wook;Park, Jeong-Ho;Yi, Soo-Yeong
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.184-186
    • /
    • 2007
  • Currently many sensors and processing data in a robot based on USN environments need to real-time features. In this paper, we examine recent research trends on real-time operating systems, especially on real-time embedded Linux, RTAI and Xenomai, for intelligent robots. Xenomai is a real-time development framework and have special feature supporting RTAI, VxWorks, pSOS+ etc. through the "skin". This research gives a guide to researcher in using real-time embedded Linux in the sense of architecture, supporting real-time mechanisms, kinds of real-time device driver, performances.

  • PDF

design and Implementation of the Client/Server-based Alarm Monitoring System for Nuclear Power Plant Simulator (원전 시뮬레이터를 위한 클라이언트/서버 개념의 경보감시계통 설계 및 구현)

  • 홍진혁
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.04a
    • /
    • pp.161-167
    • /
    • 2000
  • 주제어실의 경보계통은 중요한 발전소 변수의 비정상 상태 발생과 운전원의 관심을 요하는 기기상태의 변화에 대해 가시적/가정적 신호로 운전원에게 경고하는 역할을 담당하는 역할을 한다. 본 논문에서는 전력연구원에서 수행중인 '원자력 교육원 시뮬레이터 성능개선' 과제의 일부로 원자력교육원 2호기의 기준발전소인 영광 1호기의 디지털 경보설비 (IAS : Intelligent Annunciator System)의 구조와 이를 시뮬레이터 주컴퓨터 (Host Computer)상의 다이나믹 모델과 연동시켜 구현하는 방법론 및 구현된 경보감시계통에 대해 다루고 있다. 원자력교육원 2호기 경비감시계통은 Trend 모드, 그룹모드, 윈도우 모드, 조치사항 모드 및 조치사항 등록 모드 등 총 5개의 모드로 구성되어 있으며, 발생된 경보의 시간별/그룹별 출력, 경보창 에뮬레이션과 임의의 창에 대한 조치사항 출력, 새로운 경보에 대한 등록 및 삭제 등의 기능 구현이 가능하다. 또한 시뮬레이터에 대한 규제기관의 인허가가 중요한 현안으로 대두될 전망임에 따라 ANSI/ANS-3.5, Regulatory Guide 1.149 등 규제요건에서 제시하는 성능기준 및 검사기준을 만족하도록 설계함으로 향후 규제기관에 대한 인허가 획득을 대비하였다.

  • PDF

Development of the Alarm Monitoring System for KNPEC-2 (원자력교육원 2호기 시뮬레이터 경보감시계통 개발)

  • 홍진혁
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 1999.10a
    • /
    • pp.156-162
    • /
    • 1999
  • 원자력교육원 2회기 기준발전소인 영광 1호기 발전소의 디지털 경보설비 (IAS : Intelligent Annunciator System) 는 MPU, SSU, ACU 및 ADU로 구성되어 있으며, 특히 MPU에서는 SSU 로부터 수신된 Scan Data를 해석하고 경보를 저장하고, 경보의 내용을 프린터 및 CRT를 비롯하여 다양한 형태로 병렬출력이 가능하도록 하고 있다. 본 논문에서는 전력연구원에서 수행중인 '원자력 교육원 시뮬레이터 성능개선' 과제의 일부로 IAS의 구조와 이를 시뮬레이터 주컴퓨터 (Host Computer)상의 다이나믹 모델과 연동시켜 구현하는 방법론을 다루고 있다. 특히, 시뮬레이터에 대한 규제기관의 인허가가 중요한 현안으로 대두될 전망임에 따라 ANSI/ANS-3.5, Regulatory Guide 1.149 등 규제요건에서 제시하는 성능기준 및 검사기준을 만족하도록 설계함으로 향후 규제기관에 대한 인허가 획득에서 대비할 예정이다.

  • PDF

A Design and Implementation of Intelligent Tutoring System for particular supplemented Process - The main theme is Fractional Computation - (특별 보충 과정을 위한 지능형 교육 시스템의 설계 및 구현 - 분수의 연산을 중심으로 -)

  • Kim, Jung-Tae;Han, Kyu-Jung
    • Journal of The Korean Association of Information Education
    • /
    • v.7 no.2
    • /
    • pp.227-237
    • /
    • 2003
  • Conventional studies of Computer Assisted Instruction(CAI) and Intelligent Tutoring System(ITS) have been general patterns to solve problems, so to solve specialized problems, the learner which has the attitude of passiveness should to solve problems including unnecessary processing to the need of the system. Consequently, those are not support the process of creativity and individual problems for the learner to solve the fractional number operations as this study. This study is the design and implementation of ITS on the fractional number addition and subtraction for the supplementary student. Our system can diagnosis mistakes of learning and guide the student to know their errors of learning process automatically And our system assist the learners to study with self-initiative learning, replacement their lacking of learning and control the process of fractional addition and subtraction operation with creativity according to their level. We showed that this system had improved problems of lacking care to supplementary student result in are not enough teachers involved their school and that the learner had achieved the higher learning effect according to the improved self-initiative learning causing this system.

  • PDF

Survey on Obstacle Detection Features of Smart Technologies to Help Visually Impaired People Walk (시각장애인을 위한 이동보조시스템의 장애물 감지 특징 조사)

  • Min, Seonghee;Oh, Yoosoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.3
    • /
    • pp.31-38
    • /
    • 2020
  • In this paper, we compare and analyze smart technologies and present six obstacle detection features to help visually impaired people walk. Traditionally, visually impaired people walk with the white cane or a guide dog. With the development of IoT technology, various smart walking aids systems have been developed. Those intelligent walking aids systems have obstacle-detecting systems and route-guidance systems. Many researchers are developing the walking aids system, which detects an obstacle and provides the obstacle information by haptic feedback. Also, they are designing the database server system to share the obstacle information. Particularly the composed system can quickly give an obstacle-avoidance route using shared obstacle information. Smart walking aids systems for visually impaired people will advance more rapidly by applying machine learning and intelligent systems.

A Case Based e-Mail Response System for Customer Support

  • Yoon, Young-Suk;Lee, Jae-Kwang;Han, Chang-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.2
    • /
    • pp.121-133
    • /
    • 2003
  • Due to the rapid growth of Internet, means of communication with customers in a traditional customer support environment such as telephone calls are being replaced by mainly e-mail in a Web-based customer support system. Although such a Web-based support is efficient and promises potential benefits for firms, including reduced transaction costs, reduced time, and high quality of support, there are some difficulties associated with responding to many types of customer's inbound e-mails appropriately. As many types of e-mail are received, considerable attention is being paid to methods for increasing the efficiency of managing and responding e-mails. This research proposes an intelligent system for managing customer's inbound e-mails in organizations by applying case based reasoning technique for responding to various customers' inbound e-mails more effectively. In this approach, a case is represented as a frame-typed data structure corresponding to an inbound e-mail, keywords, and its reply e-mail. In the retrieval procedure, keywords and affinity set is developed to index a case, and then the case is represented as a vector, a case vector. Also, cosines value is calculated to measure the similarity between a new inbound e-mail and the cases in the case base. In the adaptation procedure, we provide several adaptation strategies to adapt and modify the retrieved case. The strategies guide to make an outbound e-mail using product databases, databases for customer support, etc. Additionally, the Web-based system architecture is proposed to implement our methodology. The proposed methodology and system will be helpful for developing more efficient Web-based customer support.

  • PDF

Fuzzy Logic Based Navigation for Multiple Mobile Robots in Indoor Environments

  • Zhao, Ran;Lee, Dong Hwan;Lee, Hong Kyu
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.15 no.4
    • /
    • pp.305-314
    • /
    • 2015
  • The work presented in this paper deals with a navigation problem for multiple mobile robot system in unknown indoor environments. The environment is completely unknown for all the robots and the surrounding information should be detected by the proximity sensors installed on the robots' bodies. In order to guide all the robots to move along collision-free paths and reach the goal positions, a navigation method based on the combination of a set of primary strategies has been developed. The indoor environments usually contain convex and concave obstacles. In this work, a danger judgment strategy in accordance with the sensors' data is used for avoiding small convex obstacles or moving objects which include both dynamic obstacles and other robots. For big convex obstacles or concave ones, a wall following strategy is designed for dealing with these special situations. In this paper, a state memorizing strategy is also proposed for the "infinite repetition" or "dead cycle" situations. Finally, when there is no collision risk, the robots will be guided towards the targets according to a target positioning strategy. Most of these strategies are achieved by the means of fuzzy logic controllers and uniformly applied for every robot. The simulation experiments verified that the proposed method has a positive effectiveness for the navigation problem.

A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks

  • Al-Mekhlafi, Zeyad Ghaleb;Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.105-110
    • /
    • 2021
  • Contact between Vehicle-to-vehicle and vehicle-to-infrastructural is becoming increasingly popular in recent years due to their crucial role in the field of intelligent transportation. Vehicular Ad-hoc networks (VANETs) security and privacy are of the highest value since a transparent wireless communication tool allows an intruder to intercept, tamper, reply and erase messages in plain text. The security of a VANET based intelligent transport system may therefore be compromised. There is a strong likelihood. Securing and maintaining message exchange in VANETs is currently the focal point of several security testing teams, as it is reflected in the number of authentication schemes. However, these systems have not fulfilled all aspects of security and privacy criteria. This study is an attempt to provide a detailed history of VANETs and their components; different kinds of attacks and all protection and privacy criteria for VANETs. This paper contributed to the existing literature by systematically analyzes and compares existing authentication and confidentiality systems based on all security needs, the cost of information and communication as well as the level of resistance to different types of attacks. This paper may be used as a guide and reference for any new VANET protection and privacy technologies in the design and development.