• Title/Summary/Keyword: Research Information Systems

Search Result 12,228, Processing Time 0.034 seconds

Simulator of Underwater Navigation

  • Waz, Mariusz
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.333-335
    • /
    • 2006
  • Position of surface objects can be fixed in many ways. The most popular radionavigational systems, including satellite systems, make possible obtaining nearly continuous and very precise ship's position. However, under the water application of radionavigational systems is impossible. Underwater navigation requires other tools and solutions then these encountered in surface and air navigation. In underwater environment vehicles and submarines, operate that have to possess alternative navigational systems. Underwater vehicles, in order to perform their tasks require accurate information about their own, current position. At present, they are equipped with inertial navigational systems (INS). Accuracy of INS is very high but in relatively short periods. Position error is directly proportional to time of working of the system. The basic feature of INS is its autonomy and passivity. This characteristic mainly decides that INS is broadly used on submarines and other underwater vehicles. However, due to previously mentioned shortcoming i.e. gradually increasing position error, periodical calibration of the system is necessary. The simplest calibration method is surface or nearly surface application of GPS system. Another solution, which does not require interruption of performed task and emergence on the surface, is application of comparative navigation technique. Information about surrounding environment of the ship, obtained e.g. by means sonic depth finder or board sonar, and comparing it with accessible pattern can be used in order to fix ship's position. The article presents a structure and a description of working of underwater vehicle navigation system simulator. The simulator works on the basis of comparative navigation methods which exploit in turn digital images of echograms and sonograms. The additional option of the simulator is ability to robust estimation of measurements. One can do it in order to increase accuracy of position fixed with comparative navigation methods application. The simulator can be a basis to build future underwater navigation system.

  • PDF

A Vector-based Azimuth Algorithm using Indoor-Positioning Systems for Mobile Nodes (이동노드의 실내위치파악 시스템을 통한 벡터기반 상대방위각 알고리즘)

  • Son, Joo-Young
    • Journal of Navigation and Port Research
    • /
    • v.38 no.5
    • /
    • pp.457-462
    • /
    • 2014
  • Indoor-positioning systems are useful to various applications. Navigation system is one of the most popular applications, which needs the information of directions of nodes' movements. Specifically the applications should get the information in real-time to properly show the current moving position of a node. In this paper, simple vector-based algorithms are proposed to compute amount and direction of changes of azimuth of mobile nodes' heading directions using existing indoor positioning systems in indoor environments where azimuth sensors do not work properly. Previous algorithms calculate the azimuth changes by too many steps of topology-based formula. The algorithms proposed in this paper get the amount of changes of azimuth by simple formula based on vector, and determine the direction of changes by the sign of value of simple formula based on the previous movement of nodes. The algorithms are much simpler and less error-prone than previous ones, and then they can detect changes in many location-based applications as well. The performance of the algorithms is proved logically and mathematically.

A Study on the Convergence of Monitoring and Control System with Geographic Information System (지리정보시스템과 관제시스템의 융합에 관한 연구)

  • Seo, Tae-Woong;Kim, Chang-Soo;Lee, Jae-Sung;Lee, Cheol-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.5
    • /
    • pp.703-709
    • /
    • 2011
  • State-based infrastructure on IT-based network are prone to numerous cyber attack including subsequent hacking and internet infringement. These acts of terrorism are increasing because of the expanding IT convergence technology. Recently, the trend on cyber security monitoring and control researches focus on combining the general idea of security monitoring and control along with IT field and other control systems. This convergence trend has been increasing in both the use and importance. This research analyzes the state-based infrastructure monitoring and control system, its vulnerability as well as its improvement by incorporating the cyber convergence systems to existing systems. The subject of this research is for extensive use of CCTV systems which is expanded for 'CCTV Monitoring and Control Field' as well as 'Traffic Monitoring and Control Field' operated by 'Intelligent Traffic Information System' and Disaster Management Area which is studied in various fields. Eventually, the objective of the paper is to solve these issues, to apply related systems and to suggest improvement on the convergence system.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.4
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

A Study on a Standard Strategy of EMU Control and Monitoring System for Improved Maintenance Efficiency (유지보수 효율향상을 위한 전동차 제어 및 감시시스템 표준화 방안 연구)

  • Lee, Woo-Dong;Chung, Jong-Duk
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.4
    • /
    • pp.241-245
    • /
    • 2013
  • In the case of the existing train control system, the driver monitors the condition of the vehicle through a composite controller device that displays various information on a screen in the vehicle. However, when problems arise such as car trouble, it is difficult for the drivers to take action immediately. In addition, maintenance personnel have to manually save data one by one after storing the vehicle to analyze control information of the main devices such as the brake controller and auxiliary power. To improve these points, a system that sends and receives all information in real time should be established by installing a sensor communication network and a surveillance system. This study attempts to improve the safety and maintenance of rail vehicles by suggesting a standardized method for train control and surveillance system.

A Study on the Path Loss of Underwater Acoustic Channel Based on At-sea Experiment at the South Sea of Korea (남해 실해역 시험 기반 수중음향채널 경로손실에 관한 연구)

  • Kim, Min-Sang;Lee, Tae-Seok;Cho, Yong-Ho;Im, Tae-Ho;Ko, Hak-Lim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.405-411
    • /
    • 2020
  • Recently, studies on underwater communication, related to the development of underwater resources, disaster monitoring and defense, have been actively carried out. In the design of wireless communication systems, path loss is the most important information to derive a link budget that is required to guarantee communication reliability by calculating received power level for the given communication link. The underwater acoustic channel have different characteristics according to geographical location and relevant environmental factors such as water temperature, depth, wave height, algae, and turbidity. Subsequently, many research institutes aiming to develop underwater acoustic communication systems are researching actively on the underwater acoustic channels in various sea areas. In Korea, however, studies on the path loss of the acoustic channel are still insufficient. Therefore, in this study, the path loss of the acoustic channel are studied based on measurement data of the at-sea experiment conducted at Geohae-do, southern sea of Korea.

Kalman Filtering for Linear Time-Delayed Continuous-Time Systems with Stochastic Multiplicative Noises

  • Zhang, Huanshui;Lu, Xiao;Zhang, Weihai;Wang, Wei
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.4
    • /
    • pp.355-363
    • /
    • 2007
  • The paper deals with the Kalman stochastic filtering problem for linear continuous-time systems with both instantaneous and time-delayed measurements. Different from the standard linear system, the system state is corrupted by multiplicative white noise, and the instantaneous measurement and the delayed measurement are also corrupted by multiplicative white noise. A new approach to the problem is presented by using projection formulation and reorganized innovation analysis. More importantly, the proposed approach in the paper can be applied to solve many complicated problems such as stochastic $H_{\infty}$ estimation, $H_{\infty}$ control stochastic system with preview and so on.

Combined ML and QR Detection Algorithm for MIMO-OFDM Systems with Perfect ChanneI State Information

  • You, Weizhi;Yi, Lilin;Hu, Weisheng
    • ETRI Journal
    • /
    • v.35 no.3
    • /
    • pp.371-377
    • /
    • 2013
  • An effective signal detection algorithm with low complexity is presented for multiple-input multiple-output orthogonal frequency division multiplexing systems. The proposed technique, QR-MLD, combines the conventional maximum likelihood detection (MLD) algorithm and the QR algorithm, resulting in much lower complexity compared to MLD. The proposed technique is compared with a similar algorithm, showing that the complexity of the proposed technique with T=1 is a 95% improvement over that of MLD, at the expense of about a 2-dB signal-to-noise-ratio (SNR) degradation for a bit error rate (BER) of $10^{-3}$. Additionally, with T=2, the proposed technique reduces the complexity by 73% for multiplications and 80% for additions and enhances the SNR performance about 1 dB for a BER of $10^{-3}$.

A Research on Designing an Autonomic Control System Towards High-Reliable Cyber-Physical Systems (고신뢰 CPS를 위한 자율제어 시스템에 관한 연구)

  • Park, Jeongmin;Kang, Sungjoo;Chun, Ingeol;Kim, Wontae
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.8 no.6
    • /
    • pp.347-357
    • /
    • 2013
  • Cyber-Physical system(CPS) is characterized by collaborating computational elements controlling physical entities. In CPS, human desire to acquire useful information and control devices anytime and anywhere automatically has increased the necessity of a high reliable system. However, the physical world where CPS is deployed has management complexity and maintenance cost of 'CPS', so that it is impossible to make reliable systems. Thus, this paper presents an 'Autonomic Control System towards High-reliable Cyber-Physical Systems' that comprise 8-steps including 'fault analysis', 'fault event analysis', 'fault modeling', 'fault state interpretation', 'fault strategy decision', 'fault detection', 'diagnosis&reasoning' and 'maneuver execution'. Through these activities, we fascinate to design and implement 'Autonomic control system' than before. As a proof of the approach, we used a ISR(Intelligent Service Robot) for case study. The experimental results show that it achieves to detect a fault event for autonomic control of 'CPS'.

System of Systems Approach to Formal Modeling of CPS for Simulation-Based Analysis

  • Lee, Kyou Ho;Hong, Jeong Hee;Kim, Tag Gon
    • ETRI Journal
    • /
    • v.37 no.1
    • /
    • pp.175-185
    • /
    • 2015
  • This paper presents a system-of-systems (SoS) approach to the formal modeling of a cyber-physical system (CPS) for simulation-based analysis. The approach is based on a convergence technology for modeling and simulation of a highly complex system in which SoS modeling methodology, hybrid systems modeling theory, and simulation interoperation technology are merged. The methodology maps each constituent system of a CPS to a disparate model of either continuous or discrete types. The theory employs two formalisms for modeling of the two model types with formal specification of interfaces between them. Finally, the technology adapts a simulation bus called DEVS BUS whose protocol synchronizes time and exchange messages between subsystems simulation. Benefits of the approach include reusability of simulation models and environments, and simulation-based analysis of subsystems of a CPS in an inter-relational manner.