• Title/Summary/Keyword: algorithm

Search Result 62,996, Processing Time 0.086 seconds

A Study on the Haptic Control Technology for Unmanned Military Vehicle Driving Control (무인차량 원격주행제어를 위한 힘반향 햅틱제어 기술에 관한 연구)

  • Kang, Tae-Wan;Park, Ki-Hong;Kim, Joon-Won;Kang, Seok-Won;Kim, Jae-Gwan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.910-917
    • /
    • 2018
  • This paper describes the developments to improve the feeling and safety of the remote control system of unmanned vehicles. Generally, in the case of the remote control systems, a joystick-type device or a simple steering-wheel are used. There are many cases, in which there are operations without considering the feedback to users and driving feel. Recently, as the application area of the unmanned vehicles has been extended, the problems caused by not considering the feedback are emphasized. Therefore, the need for a force feedback-haptic control arises to solve these problems. In this study, the force feedback-haptic control algorithm considering the vehicle parameters is proposed. The vehicle parameters include first the state variables of dynamics, such as the body side-slip angle (${\beta}$) and yawrate (${\gamma}$), and second, the parameters representing the driving situations. Force feedback-haptic control technology consists of the algorithms for general and specific situations, and considers the situation transition process. To verify the algorithms, a simulator was constructed using the vehicle dynamics simulation tool with CAN communication environment. Using the simulator, the feasibility of the algorithms was verified in various scenarios.

An Inventory Model for Deteriorating Products with Ordering Cost inclusive of a Freight Cost under Trade Credit (신용거래 하에 운송비용이 포함된 주문 비용을 고려한 퇴화성 제품의 재고 모형)

  • Shinn, Seong-Whan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.1
    • /
    • pp.353-360
    • /
    • 2019
  • Trade credit is being used as a price discrimination strategy by the suppliers in order to increase the customer's demand. From the viewpoint of the customer, if delayed payment is allowed for a certain period of time from the supplier, the effect of reducing the inventory carrying cost will positively affect the customer's order quantity. Also, in deriving the economic order quantity(EOQ) formula, it is tacitly assumed that the customer's ordering cost is a fixed cost. However in many business transactions, the customer pays the freight cost for the transportation of his order and so, the customer's ordering cost contains not only a fixed cost but also a freight cost which is a function of the order size. Therefore, in this study, we analyzed the inventory model which considers that the customer's ordering cost contains not only a fixed cost but also a freight cost which is a function of the customer's order size when the supplier permits a delay in payments. For the analysis, it is also assumed that inventory is exhausted not only by customer's demand but also by deterioration. Investigation of the properties of an optimal solution allows us to develop an algorithm whose validity is illustrated using an example problem.

A Security Nonce Generation Algorithm Scheme Research for Improving Data Reliability and Anomaly Pattern Detection of Smart City Platform Data Management (스마트시티 플랫폼 데이터 운영의 이상패턴 탐지 및 데이터 신뢰성 향상을 위한 보안 난수 생성 알고리즘 방안 연구)

  • Lee, Jaekwan;Shin, Jinho;Joo, Yongjae;Noh, Jaekoo;Kim, Jae Do;Kim, Yongjoon;Jung, Namjoon
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.4 no.2
    • /
    • pp.75-80
    • /
    • 2018
  • The smart city is developing an energy system efficiently through a common management of the city resource for the growth and a low carbon social. However, the smart city doesn't counter a verification effectively about a anomaly pattern detection when existing security technology (authentication, integrity, confidentiality) is used by fixed security key and key deodorization according to generated big data. This paper is proposed the "security nonce generation based on security nonce generation" for anomaly pattern detection of the adversary and a safety of the key is high through the key generation of the KDC (Key Distribution Center; KDC) for improvement. The proposed scheme distributes the generated security nonce and authentication keys to each facilities system by the KDC. This proposed scheme can be enhanced to the security by doing the external pattern detection and changed new security key through distributed security nonce with keys. Therefore, this paper can do improving the security and a responsibility of the smart city platform management data through the anomaly pattern detection and the safety of the keys.

Three Dimensional Measurement of Ideal Trajectory of Pedicle Screws of Subaxial Cervical Spine Using the Algorithm Could Be Applied for Robotic Screw Insertion

  • Huh, Jisoon;Hyun, Jae Hwan;Park, Hyeong Geon;Kwak, Ho-Young
    • Journal of Korean Neurosurgical Society
    • /
    • v.62 no.4
    • /
    • pp.376-381
    • /
    • 2019
  • Objective : To define optimal method that calculate the safe direction of cervical pedicle screw placement using computed tomography (CT) image based three dimensional (3D) cortical shell model of human cervical spine. Methods : Cortical shell model of cervical spine from C3 to C6 was made after segmentation of in vivo CT image data of 44 volunteers. Three dimensional Cartesian coordinate of all points constituting surface of whole vertebra, bilateral pedicle and posterior wall were acquired. The ideal trajectory of pedicle screw insertion was defined as viewing direction at which the inner area of pedicle become largest when we see through the biconcave tubular pedicle. The ideal trajectory of 352 pedicles (eight pedicles for each of 44 subjects) were calculated using custom made program and were changed from global coordinate to local coordinate according to the three dimensional position of posterior wall of each vertebral body. The transverse and sagittal angle of trajectory were defined as the angle between ideal trajectory line and perpendicular line of posterior wall in the horizontal and sagittal plane. The averages and standard deviations of all measurements were calculated. Results : The average transverse angles were $50.60^{\circ}{\pm}6.22^{\circ}$ at C3, $51.42^{\circ}{\pm}7.44^{\circ}$ at C4, $47.79^{\circ}{\pm}7.61^{\circ}$ at C5, and $41.24^{\circ}{\pm}7.76^{\circ}$ at C6. The transverse angle becomes more steep from C3 to C6. The mean sagittal angles were $9.72^{\circ}{\pm}6.73^{\circ}$ downward at C3, $5.09^{\circ}{\pm}6.39^{\circ}$ downward at C4, $0.08^{\circ}{\pm}6.06^{\circ}$ downward at C5, and $1.67^{\circ}{\pm}6.06^{\circ}$ upward at C6. The sagittal angle changes from caudad to cephalad from C3 to C6. Conclusion : The absolute values of transverse and sagittal angle in our study were not same but the trend of changes were similar to previous studies. Because we know 3D address of all points constituting cortical shell of cervical vertebrae. we can easily reconstruct 3D model and manage it freely using computer program. More creative measurement of morphological characteristics could be carried out than direct inspection of raw bone. Furthermore this concept of measurement could be used for the computing program of automated robotic screw insertion.

A Study on the Method for Converting the Unit Database from Training-model into Analysis-model : Focused on the 'Chang-Jo21' and 'Vision21' model (훈련용 워게임 모델의 부대 DB를 분석용 워게임 모델에 재사용하기 위한 변환방법 연구 : 창조21모델과 비전21모델을 중심으로)

  • Lee, Yong-Bok;Park, Min-Hyoung;Kim, Yeek-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.28 no.2
    • /
    • pp.159-167
    • /
    • 2019
  • In the field of defense M&S, we are actively pursuing researches that interoperable multiple war game models to simulate various combat environments at the same time. Although the 'unit DB(Database)' for operating the war game models is originated from the identical data, it has been recognized that the method of expressing the attribute of the data is different and the cross reference is impossible. As a result, it makes unnecessary time and effort in establishing the same unit DB in the organizations that operate the war game model. In this study, a method of reusing the unit DB of the training war game model to the analysis war game model with similar resolution and simulated logic was applied to the actual field. For this purpose, we defined the procedure for converting the unit DB by analyzing metadata of the 'Chang-Jo21', a combat training model for corps and division, and the 'Vision21', an analysis model for corps and division operation plan. And we introduced an algorithm that can map different metadata of two unit DBs. This study was meaningful as the first attempt to map and integrate heterogeneous metadata semantically for the reuse of unit DB between different war game models in defense M&S field. Also, it provided implications for the necessity of paradigm shift that reuse of the unit DB between two different war game models is possible and the need for standardization of the unit DB metadata in the defense M&S filed.

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

Enhanced Sound Signal Based Sound-Event Classification (향상된 음향 신호 기반의 음향 이벤트 분류)

  • Choi, Yongju;Lee, Jonguk;Park, Daihee;Chung, Yongwha
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.5
    • /
    • pp.193-204
    • /
    • 2019
  • The explosion of data due to the improvement of sensor technology and computing performance has become the basis for analyzing the situation in the industrial fields, and various attempts to detect events based on such data are increasing recently. In particular, sound signals collected from sensors are used as important information to classify events in various application fields as an advantage of efficiently collecting field information at a relatively low cost. However, the performance of sound-event classification in the field cannot be guaranteed if noise can not be removed. That is, in order to implement a system that can be practically applied, robust performance should be guaranteed even in various noise conditions. In this study, we propose a system that can classify the sound event after generating the enhanced sound signal based on the deep learning algorithm. Especially, to remove noise from the sound signal itself, the enhanced sound data against the noise is generated using SEGAN applied to the GAN with a VAE technique. Then, an end-to-end based sound-event classification system is designed to classify the sound events using the enhanced sound signal as input data of CNN structure without a data conversion process. The performance of the proposed method was verified experimentally using sound data obtained from the industrial field, and the f1 score of 99.29% (railway industry) and 97.80% (livestock industry) was confirmed.

Experimental Test Results of Nine Scheduling Operational Modes of PV and Battery Hybrid System for the Development of Automatic Control Algorithm for Continual Operation without being shut-downed (태양광 배터리 Hybrid 전력공급시스템 9가지 운전 모드 시험결과 및 무고장 연속 운전을 위한 자동제어 알고리즘 개발)

  • Song, Taek Ho;Yang, Seung Kwon;Kim, Minjeong
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.5 no.1
    • /
    • pp.25-32
    • /
    • 2019
  • K-BEMS System was introduced to reduce peak load and to save total energy of the 200 buildings that KEPCO headquarter and branch offices use. And K-BEMS system is composed of PV, battery, and hybrid PCS. KEPCO research institute has carried out this K-BEMS research project for 3 years since January 2016. In this paper, the results of the project are shown. 9 modes of test results of K-BEMS system and are operational problems were analyzed. And measures to cure the trouble are also suggested. Batteries are operated more than 20% of SOC, and less than 20% of SOC battery protection switches are automatically shutting down the system and the system no longer respond to EMS, ending the supply of PV, and so therefore to continue the PV power supply it was turn out to be necessary that the EMS should automatically change its policy to change PV only supply mode automatically when the Battery Switch automatically operated. To operate the system continuously and automatically, it is necessary to modify the minimum operational SOC value, and in addition to that the EMS computer must remember the last shut-down SOC and Voltage which interrupted the system and add some margin to reflect the measurement error in the system.

A Topic Analysis of Abstracts in Journal of Korean Data Analysis Society (한국자료분석학회지에 대한 토픽분석)

  • Kang, Changwan;Kim, Kyu Kon;Choi, Seungbae
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.2907-2915
    • /
    • 2018
  • Journal of the Korean Data Analysis Society founded in 1998 has played the role of a major application journal. In this study, we checked the objective of this journal by checking the abstracts for 10 years. Abstract data was crawled from the online journal site (kdas.jems.or.kr) and analyzed by topic model. As a result, we found 18 topics from 2680 abstracts that had several contents, for example, nursing, marketing, economics, regression, factor analysis, data mining and statistical inferences. Topic1 (regression) is most frequent with 460 documents and we found the usefulness of regression in the applied science area. We confirmed the significant 10 association rules using by Fisher's exact test. Also, for exploring the trend of topics, we conducted the topic analysis for two periods which are 2006-2011 period and 2012-2016 period. We found that the control study was more frequent than survey study over time and regression and factor analysis were frequent regardless of time.

Apriori Based Big Data Processing System for Improve Sensor Data Throughput in IoT Environments (IoT 환경에서 센서 데이터 처리율 향상을 위한 Apriori 기반 빅데이터 처리 시스템)

  • Song, Jin Su;Kim, Soo Jin;Shin, Young Tae
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.277-284
    • /
    • 2021
  • Recently, the smart home environment is expected to be a platform that collects, integrates, and utilizes various data through convergence with wireless information and communication technology. In fact, the number of smart devices with various sensors is increasing inside smart homes. The amount of data that needs to be processed by the increased number of smart devices is also increasing, and big data processing systems are actively being introduced to handle it effectively. However, traditional big data processing systems have all requests directed to cluster drivers before they are allocated to distributed nodes, leading to reduced cluster-wide performance sharing as cluster drivers managing segmentation tasks become bottlenecks. In particular, there is a greater delay rate on smart home devices that constantly request small data processing. Thus, in this paper, we design a Apriori-based big data system for effective data processing in smart home environments where frequent requests occur at the same time. According to the performance evaluation results of the proposed system, the data processing time was reduced by up to 38.6% from at least 19.2% compared to the existing system. The reason for this result is related to the type of data being measured. Because the amount of data collected in a smart home environment is large, the use of cache servers plays a major role in data processing, and association analysis with Apriori algorithms stores highly relevant sensor data in the cache.