• Title/Summary/Keyword: Real-time execution

Search Result 541, Processing Time 0.025 seconds

Implementation and Comparison of Controllers for Planar Robots

  • Kern, John;Urrea, Claudio;Torres, Hugo
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.926-936
    • /
    • 2017
  • The nonlinear behavior and the high performance requirement are the main problems that appear in the design of manipulator robots and their controllers. For that reason, the simulation, real-time execution and comparison of the performance of controllers applied to a robot with three degrees of freedom are presented. Five controllers are prepared to test the robot's dynamic model: predictive; hyperbolic sine-cosine; sliding mode; hybrid composed of a predictive + hyperbolic sine-cosine controller; and adaptive controller. A redundant robot, a communication and signal conditioning interface, and a simulator are developed by means of the MatLab/Simulink software, which allows analyzing the dynamic performance of the robot and of the designed controllers. The manipulator robot is made to follow a test trajectory which, thanks to the proposed controllers, it can do. The results of the performance of this manipulator and of its controllers, for each of the three joints, are compared by means of RMS indices, considering joint errors according to the imposed trajectory and to the controller used.

A Study on the Design of Digital Controllers with Automatic Calibration (자동 보정형 디지털 제어기 설계에 관한 연구)

  • 나승유;박민상
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.413-416
    • /
    • 1998
  • Sensitivity and calibration considerations are most important in the design and implementation of real control systems. Ideally parameter changes due to various causes should not appreciably affect the system's performances. But all the values of physical components of the plants and controllers as well as the relevant environmental conditions change in time, thus the output performance can be deteriorated during the operating span of the system. Naturally the duty of calibration or the prevention of performance deterioration due to excessive component sensitivity should be provided to the control system. In this paper, we propose a digital controller which has the capability of calibration and gain adjustment as well as the execution of control law. Specifically the problems of gain adjustment and offset calibration in the light source and CdS sensor module for position measurement in a flexible link system are considerably resolved. The parameters of measurement module are prone to change due to environmental brightness conditions resulting in poor steady state performance of the overall control system. Thus a proper method is necessary to provide correction to the changed values of gain and offset in the position measurement module. The proposed controller, whenever necessary, measures the open-loop characteristics, andthen calculates the offset and sensor gain correction values based on the prepared standard measurements. It is applied to the control of a flexible link system with the gain and offset calibration porblems in the light sensor module for position to show the applicability.

  • PDF

Analyzing Operation Deviation in the Deasphalting Process Using Multivariate Statistics Analysis Method

  • Park, Joo-Hwang;Kim, Jong-Soo;Kim, Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.7
    • /
    • pp.858-865
    • /
    • 2014
  • In the case of system like MES, various sensors collect the data in real time and save it as a big data to monitor the process. However, if there is big data mining in distributed computing system, whole processing process can be improved. In this paper, system to analyze the cause of operation deviation was built using the big data which has been collected from deasphalting process at the two different plants. By applying multivariate statistical analysis to the big data which has been collected through MES(Manufacturing Execution System), main cause of operation deviation was analyzed. We present the example of analyzing the operation deviation of deasphalting process using the big data which collected from MES by using multivariate statistics analysis method. As a result of regression analysis of the forward stepwise method, regression equation has been found which can explain 52% increase of performance compare to existing model. Through this suggested method, the existing petrochemical process can be replaced which is manual analysis method and has the risk of being subjective according to the tester. The new method can provide the objective analysis method based on numbers and statistic.

LVQ_Merge Clustering Algorithm for Cell Image Extraction (세포 영상 추출을 위한 LVQ_Merge 군집화 알고리즘)

  • Kwon, Hee Yong;Kim, Min Su;Choi, Kyung Wan;Kwack, Ho Jic;Yu, Suk Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.845-852
    • /
    • 2017
  • In this paper, we propose a binarization algorithm using LVQ-Merge clustering method for fast and accurate extraction of cells from cell images. The proposed method clusters pixel data of a given image by using LVQ to remove noise and divides the result into two clusters by applying a hierarchical clustering algorithm to improve the accuracy of binarization. As a result, the execution speed is somewhat slower than that of the conventional LVQ or Otsu algorithm. However, the results of the binarization have very good quality and are almost identical to those judged by the human eye. Especially, the bigger and the more complex the image, the better the binarization quality. This suggests that the proposed method is a useful method for medical image processing field where high-resolution and huge medical images must be processed in real time. In addition, this method is possible to have many clusters instead of two cluster, so it can be used as a method to complement a hierarchical clustering algorithm.

Quadtree-based Terrain Visualization Using Vertex Multiplication (정점증식을 이용한 사진트리 기반 지형 시각화 기법)

  • Lee, Eun-Seok;Shin, Byeong-Seok
    • Journal of the Korea Computer Graphics Society
    • /
    • v.15 no.3
    • /
    • pp.27-33
    • /
    • 2009
  • In terrain visualization, the quadtree is the most frequently used data structure for progressive mesh generation. The quadtree provides an efficient level-of-detail selection and view frustum culling. However, most applications using quadtrees are performed by the CPU, since the hierarchical data structure cannot be manipulated in a programmable rendering pipeline. For this reason, quadtree-based methods show lower performance and higher dependancy of CPU in comparison to GPU-based methods. We present a quadtree-based terrain-rendering method for GPU execution that uses vertex multiplication. It offers higher performance than previous CPU-based quadtree methods, without loss of image quality.

  • PDF

CMFston : Synthetic User Programming Benchmark Based on UNIX (CMFston:유닉스 기반의 합성 사용자 프로그래밍 벤치마크)

  • Lee, Si-Jin;Park, Sung-Uk;Kwon, Hyeog-In
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1215-1228
    • /
    • 1996
  • The purpose of benchmark program is to measure the performance of a computer system. The performance of a computer system is determined by the amount of execution time of user application programs. Thus, it is assumed that a benchmark program must have the same features with user application programs to test. In this paper, we have designed and implemented CMFstone which is consisted of Chaustone, Mchaustone and Fhsstone. After applied the CMFstone, designed and implemented in this paper, to the real situations, the results of comparison show that CMFstone is similar to geometric mean of other benchmarks results. Thus, we have concluded that CMFstone is good enough to measure the performance of a computer system.

  • PDF

Separation of Kernel Space and User Space in Zephyr Kernel (Zephyr 커널에서 커널 공간과 사용자 공간의 분리 구현)

  • Kim, Eunyoung;Shin, Dongha
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.13 no.4
    • /
    • pp.187-194
    • /
    • 2018
  • The operating system for IoT should have a small memory footprint and provide low power state, real-time, multitasking, various network protocols, and security. Although the Zephyr kernel, an operating system for IoT, released by the Linux Foundation in February 2016, has these features but errors generated by the user code can generate fatal problems in the system because the Zephyr kernel adopts a single-space method that both the user code and kernel code execute in the same space. In this research, we propose a space separation method, which separates kernel space and user space, to solve this problem. The space separation that we propose consists of three modifications in Zephyr kernel. The first is the code separation that kernel code and user code execute in each space while using different stacks. The second is the kernel space protection that generates an exception by using the MPU (Memory Protection Unit) when the user code accesses the kernel space. The third is the SVC based system call that executes the system call using the SVC instruction that generates the exception. In this research, we implemented the space separation in Zephyr v1.8.0 and evaluated safety through abnormal execution of the user code. As the result, the kernel was not crashed by the errors generated by the user code and was normally executed.

A Study on the Application of Under Voltage Load Shedding Scheme in Line Contingency considering Motor Load (모터부하를 고려한 상정사고 발생 시 저전압 부하차단 적용 방안에 대한 연구)

  • Lee, Yun-Hwan
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.66 no.1
    • /
    • pp.21-26
    • /
    • 2017
  • Failure of high-voltage transmission line, which is responsible for large-scale power transmission, can be reason for system voltage instability. There are many methods to prevent voltage instability like adjustment of equipment, the generator voltage setting, and load shedding. Among them, the load shedding, have a problem of economic loss and cascading effect to power system. Therefore, the execution of load shedding, amount and timing is very important. Conventionally, the load shedding setting is decided by the preformed simulation. Now, it is possible to monitor the power system in real time by the appearance of PMU(Phasor Measurement Unit). By this reason, some of research is performed about decentralized load shedding. The characteristics of the load can impact to amount and timing of decentralized load shedding. Especially, it is necessary to consider the influence of the induction motor loads. This paper review recent topic about under voltage load shedding and compare with decentralized load shedding scheme with conventional load shedding scheme. And simulations show the effectiveness of proposed method in resolving the delayed voltage recovery in the Korean Power System.

A Study on the Memory Saturation Prevention of the Entropy Encoder for He HDTV (HDTV용 엔트로피 부호화기의 메모리 포화 방지에 관한 연구)

  • 이선근;임순자;김환용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5A
    • /
    • pp.545-553
    • /
    • 2004
  • Expansion of network environment and multimedia demand universality of application service as HDTV, etc. During these processes, it is essential to process multimedia in real time in the wireless communication system based on mobile phone network and in the wire communication system due to fiber cable and xDSL. So, in this Paper the optimal memory allocation algorithm combines the merit of huffman encoding which is superior in simultaneous decoding ability and lempel-ziv that is distinguished in execution of compress is proposed to improve the channel transmission rate and processing speed in the compressing procedure and is verified in the entropy encoder of HDTV. Because the entropy encoder system using proposed optimal memory allocation algorithm has memory saturation prevention we confirms that the compressing ratio for moving pictures is superior than Huffman encoding and LZW.

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.