• Title/Summary/Keyword: Physical constraints

Search Result 344, Processing Time 0.028 seconds

Study of Educational Insect Robot that Utilizes Mobile Augmented Reality Digilog Book (모바일 증강현실 Digilog Book을 활용한 교육용 곤충로봇 콘텐츠)

  • Park, Young-Sook;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1355-1360
    • /
    • 2014
  • In this paper, we apply the learning of the mobile robot insect augmented reality Digilog Book. In the era of electronic, book written in paper space just have moved to virtual reality space. The virtual reality, constraints spatial and physical, in the real world, it is a technique that enables to experience indirectly situation not experienced directly as user immersive experience type interface. Applied to the learning robot Digilog Book that allows the fusion of paper analog and digital content, using the augmented reality technology, to experience various interactions. Apply critical elements moving, three-dimensional images and animation to enrich the learning, for easier block assembly, designed to grasp more easily rank order between the blocks. Anywhere at any time, is capable of learning of the robot in Digilog Book to be executed by the mobile phone in particular.

A study of the train traffic optimal control system in a circular metro line (도시형 순환 열차에서 운전 최적제어 시스템에 관한 연구)

  • Hong, Hyo-Sik;Ryu, Kwang-Gyun;Song, Noon-Suck
    • Proceedings of the KSR Conference
    • /
    • 2003.10c
    • /
    • pp.236-246
    • /
    • 2003
  • This paper is implemented a control algorithm in order to be stable and minimized to entire train traffic system at delayed case. Signal ing system is described wi th algebraic equations given for train headway, Discrete-event simulation principles are reviewed and a demonstration block signaling model using the technique is implemented. Train congestion at station entrance for short headway operation is demonstrated and the propagation of delays along a platform of trains from any imposed delay to the leading train is also shown. A rail way signaling system is by nature a distributed operation with event triggered at discrete intervals. Although the train kinematic variables of position, velocity, and acceleration are continually changing, the changes are triggered when the trains pass over section boundaries and arrive at signals and route switches. This paper deals with linear-mode1ing, stability and optimal control for the traffic on such metro line of the model is reconstructed in order to adapt the circuits. This paper propose optimal control laws wi th state feedback ensuring the stability of the modeled system for circuits. Simulation results show the benefit to be expected from an efficient traffic control. The main results are summarized as follows: 1. In this paper we develop a linear model describing the traffic for both loop lines, two state space equations have been analyzed. The first one is adapted to the situation where a complete nominal time schedule is available while second one is adapted when only the nominal time interval between trains is known, in both cases we show the unstability of the traffic when the proceeding train is delayed following properties, - They are easily implemented at law cost on existing lines. - They ensure the exponetial stability of loop system. 2. These control laws have been tested on a traffic simulation software taking into the non-linearites and the physical constraints on a metro line. By means of simulation, the efficiency of the proposed optimal control laws are shown.

  • PDF

Hierarchical Power Management Architecture and Optimal Local Control Policy for Energy Efficient Networks

  • Wei, Yifei;Wang, Xiaojun;Fialho, Leonardo;Bruschi, Roberto;Ormond, Olga;Collier, Martin
    • Journal of Communications and Networks
    • /
    • v.18 no.4
    • /
    • pp.540-550
    • /
    • 2016
  • Since energy efficiency has become a significant concern for network infrastructure, next-generation network devices are expected to have embedded advanced power management capabilities. However, how to effectively exploit the green capabilities is still a big challenge, especially given the high heterogeneity of devices and their internal architectures. In this paper, we introduce a hierarchical power management architecture (HPMA) which represents physical components whose power can be monitored and controlled at various levels of a device as entities. We use energy aware state (EAS) as the power management setting mode of each device entity. The power policy controller is capable of getting information on how many EASes of the entity are manageable inside a device, and setting a certain EAS configuration for the entity. We propose the optimal local control policy which aims to minimize the router power consumption while meeting the performance constraints. A first-order Markov chain is used to model the statistical features of the network traffic load. The dynamic EAS configuration problem is formulated as a Markov decision process and solved using a dynamic programming algorithm. In addition, we demonstrate a reference implementation of the HPMA and EAS concept in a NetFPGA frequency scaled router which has the ability of toggling among five operating frequency options and/or turning off unused Ethernet ports.

An Efficient Implementation of Mobile Raspberry Pi Hadoop Clusters for Robust and Augmented Computing Performance

  • Srinivasan, Kathiravan;Chang, Chuan-Yu;Huang, Chao-Hsi;Chang, Min-Hao;Sharma, Anant;Ankur, Avinash
    • Journal of Information Processing Systems
    • /
    • v.14 no.4
    • /
    • pp.989-1009
    • /
    • 2018
  • Rapid advances in science and technology with exponential development of smart mobile devices, workstations, supercomputers, smart gadgets and network servers has been witnessed over the past few years. The sudden increase in the Internet population and manifold growth in internet speeds has occasioned the generation of an enormous amount of data, now termed 'big data'. Given this scenario, storage of data on local servers or a personal computer is an issue, which can be resolved by utilizing cloud computing. At present, there are several cloud computing service providers available to resolve the big data issues. This paper establishes a framework that builds Hadoop clusters on the new single-board computer (SBC) Mobile Raspberry Pi. Moreover, these clusters offer facilities for storage as well as computing. Besides the fact that the regular data centers require large amounts of energy for operation, they also need cooling equipment and occupy prime real estate. However, this energy consumption scenario and the physical space constraints can be solved by employing a Mobile Raspberry Pi with Hadoop clusters that provides a cost-effective, low-power, high-speed solution along with micro-data center support for big data. Hadoop provides the required modules for the distributed processing of big data by deploying map-reduce programming approaches. In this work, the performance of SBC clusters and a single computer were compared. It can be observed from the experimental data that the SBC clusters exemplify superior performance to a single computer, by around 20%. Furthermore, the cluster processing speed for large volumes of data can be enhanced by escalating the number of SBC nodes. Data storage is accomplished by using a Hadoop Distributed File System (HDFS), which offers more flexibility and greater scalability than a single computer system.

Impact Angle Control with Time Varying Continuous Biased PNG for Non-maneuvering Target (시변 연속적 편향 비례항법 유도법칙을 이용한 이동표적의 충돌각 제어)

  • Park, Jang-Seong;Kwon, Hyuck-Hoon;Park, Sang-Hyuck;Kim, Yoon-Young;Park, Bong-Gyun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.46 no.9
    • /
    • pp.742-751
    • /
    • 2018
  • In this paper, we propose a time varying biased proportional navigation guidance law that controls the impact angle under Field-of-View(FOV) and the acceleration limit of the missile. The proposed law is composed of three stages in consideration of the FOV limitation. Since the bias directly affects the acceleration at each stage, the final bias value of the previous stage becomes the initial bias value of the next stage when the stage is switched. In addition, the impact angles were controlled by judging whether impact angles were reached in consideration of engagement conditions and physical constraints.

A Design and Implementation of a Timing Analysis Simulator for a Design Space Exploration on a Hybrid Embedded System (Hybrid 내장형 시스템의 설계공간탐색을 위한 시간분석 시뮬레이터의 설계 및 구현)

  • Ahn, Seong-Yong;Shim, Jea-Hong;Lee, Jeong-A
    • The KIPS Transactions:PartA
    • /
    • v.9A no.4
    • /
    • pp.459-466
    • /
    • 2002
  • Modern embedded system employs a hybrid architecture which contains a general micro processor and reconfigurable devices such as FPGAS to retain flexibility and to meet timing constraints. It is a hard and important problem for embedded system designers to explore and find a right system configuration, which is known as design space exploration (DSE). With DES, it is possible to predict a final system configuration during the design phase before physical implementation. In this paper, we implement a timing analysis simulator for a DSE on a hybrid embedded system. The simulator, integrating exiting timing analysis tools for hardware and software, is designed by extending Y-chart approach, which allows quantitative performance analysis by varying design parameters. This timing analysis simulator is expected to reduce design time and costs and be used as a core module of a DSE for a hybrid embedded system.

Analysis of Land-cover Types Using Multistage Hierarchical flustering Image Classification (다단계 계층군집 영상분류법을 이용한 토지 피복 분석)

  • 이상훈
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.2
    • /
    • pp.135-147
    • /
    • 2003
  • This study used the multistage hierarchical clustering image classification to analyze the satellite images for the land-cover types of an area in the Korean peninsula. The multistage algorithm consists of two stages. The first stage performs region-growing segmentation by employing a hierarchical clustering procedure with the restriction that pixels in a cluster must be spatially contiguous, and finally the whole image space is segmented into sub-regions where adjacent regions have different physical properties. Without spatial constraints for merging, the second stage clusters the segments resulting from the previous stage. The image classification of hierarchical clustering, which merges step-by step two small groups into one large one based on the hierarchical structure of digital imagery, generates a hierarchical tree of the relation between the classified regions. The experimental results show that the hierarchical tree has the detailed information on the hierarchical structure of land-use and more detailed spectral information is required for the correct analysis of land-cover types.

Proposal of Network Security Solution based on Software Definition Perimeter for Secure Cloud Environment (안전한 클라우드 환경을 위한 소프트웨어 정의 경계 기반의 네트워크 보안 솔루션 제안)

  • Cha, Wuk-Jae;Shin, Jae-In;Lee, Dong-Bum;Kim, Hyeob;Lee, Dae-Hyo
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.61-68
    • /
    • 2018
  • As the smartphone and mobile environment develop, the time and space constraints for individual work performance are disappearing. Companies can reduce costs and expand their business quickly through cloud computing. As the use of various cloud expands, the boundaries of users, data, and applications are disappearing. Traditional security approaches based on boundaries (Perimeter) are losing their utility in the cloud environment. This paper describes the limitations of existing network access control (NAC) in a cloud environment and suggests network security technology that complements it. The study explains the SDP and combines SDP(Software Defined Perimeter) to overcome the limitations of NAC, while at the same time explaining its role as a new framework for supporting the cloud environment. The new framework proposed in this paper suggests a software-based network security solution that supports physical and software parts, providing identity-based access control, encrypted segment management, and dynamic policy management, not IP-based.

Study of Educational Insect Robot that Utilizes Mobile Augmented Reality Digilog Book (모바일 증강현실 Digilog Book을 활용한 교육용 곤충로봇 콘텐츠)

  • Park, Young-sook;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.241-244
    • /
    • 2014
  • In this paper, we apply the learning of the mobile robot insect augmented reality Digilog Book. In the era of electronic, book written in paper space just have moved to virtual reality space. The virtual reality, constraints spatial and physical, in the real world, it is a technique that enables to experience indirectly situation not experienced directly as user immersive experience type interface. Applied to the learning robot Digilog Book that allows the fusion of paper analog and digital content, using the augmented reality technology, to experience various interactions. Apply critical elements moving, three-dimensional images and animation to enrich the learning, for easier block assembly, designed to grasp more easily rank order between the blocks. Anywhere at any time, is capable of learning of the robot in Digilog Book to be executed by the mobile phone in particular.

  • PDF

Cyber-attack and Cybersecurity Design for a Smart Work System (스마트워크 시스템을 위한 사이버 공격 및 사이버 보안 설계)

  • Cheon, Jae-Hong;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.2
    • /
    • pp.207-214
    • /
    • 2019
  • The speed of technological development is increasing, and high-performance digital devices are spreading. Wired digital devices such as PCs have been optimized for existing wired environments, but needs are shifting away from the constraints of space and space to smart work that enables efficient work anywhere and anytime. The Smart Work System security design is needed to secure integrity and availability in the face of various security threats including physical threats (lost, stolen, and damaged terminals), technical threats (data theft, DoS: denial of service), and unauthorized access outside the wired environment. In this study, we analyzed smart work network systems, wired / wireless link systems, and digital smart devices. We also studied cyber-attack analysis and cybersecurity design methods for a Smart Work wired system and a future wireless system. This study will be used as basic data for building a secure Smart Work system.