• Title/Summary/Keyword: avoidance of collision

Search Result 833, Processing Time 0.027 seconds

Survey of Acoustic Frequency Use for Underwater Acoustic Cognitive Technology

  • Cho, A-ra;Choi, Youngchol;Yun, Changho
    • Journal of Ocean Engineering and Technology
    • /
    • v.36 no.1
    • /
    • pp.61-81
    • /
    • 2022
  • The available underwater acoustic spectrum is limited. Therefore, it is imperative to avoid frequency interference from overlapping frequencies of underwater acoustic equipment (UAE) for the co-existence of the UAE. Cognitive technology that senses idle spectrum and actively avoids frequency interference is an efficient method to facilitate the collision-free operation of multiple UAE with overlapping frequencies. Cognitive technology is adopted to identify the frequency usage of UAE to apply cognitive technology. To this end, we investigated two principle underwater acoustic sources: UAE and marine animals. The UAE is classified into five types: underwater acoustic modem, acoustic positioning system, multi-beam echo-sounder, side-scan sonar, and sub-bottom profiler. We analyzed the parameters of the frequency band, directivity, range, and depth, which play a critical role in the design of underwater acoustic cognitive technology. Moreover, the frequency band of several marine species was also examined. The mid-frequency band from 10 - 40 kHz was found to be the busiest. Lastly, this study provides useful insights into the design of underwater acoustic cognitive technologies, where it is essential to avoid interference among the UAE in this mid-frequency band.

Mathematical modeling for flocking flight of autonomous multi-UAV system, including environmental factors

  • Kwon, Youngho;Hwang, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.595-609
    • /
    • 2020
  • In this study, we propose a decentralized mathematical model for predictive control of a system of multi-autonomous unmanned aerial vehicles (UAVs), also known as drones. Being decentralized and autonomous implies that all members make their own decisions and fly depending on the dynamic information received from other unmanned aircraft in the area. We consider a variety of realistic characteristics, including time delay and communication locality. For this flocking flight, we do not possess control for central data processing or control over each UAV, as each UAV runs its collision avoidance algorithm by itself. The main contribution of this work is a mathematical model for stable group flight even in adverse weather conditions (e.g., heavy wind, rain, etc.) by adding Gaussian noise. Two of our proposed variance control algorithms are presented in this work. One is based on a simple biological imitation from statistical physical modeling, which mimics animal group behavior; the other is an algorithm for cooperatively tracking an object, which aligns the velocities of neighboring agents corresponding to each other. We demonstrate the stability of the control algorithm and its applicability in autonomous multi-drone systems using numerical simulations.

Range-Doppler Clustering of Radar Data for Detecting Moving Objects (이동물체 탐지를 위한 레이다 데이터의 거리-도플러 클러스터링 기법)

  • Kim, Seongjoon;Yang, Dongwon;Jung, Younghun;Kim, Sujin;Yoon, Joohong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.6
    • /
    • pp.810-820
    • /
    • 2014
  • Recently many studies of Radar systems mounted on ground vehicles for autonomous driving, SLAM (Simultaneous localization and mapping) and collision avoidance are reported. In near field, several hits per an object are generated after signal processing of Radar data. Hence, clustering is an essential technique to estimate their shapes and positions precisely. This paper proposes a method of grouping hits in range-doppler domains into clusters which represent each object, according to the pre-defined rules. The rules are based on the perceptual cues to separate hits by object. The morphological connectedness between hits and the characteristics of SNR distribution of hits are adopted as the perceptual cues for clustering. In various simulations for the performance assessment, the proposed method yielded more effective performance than other techniques.

Simulation of KM Plume Density Field by Residual Thrust Using DSMC Method (DSMC 방법을 사용한 KM 잔류추력 밀도장 시뮬레이션)

  • Choi, Young-In;Ok, Ho-Nam;Hong, Il-Hee
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2011.11a
    • /
    • pp.769-771
    • /
    • 2011
  • The satellite payloaded on the 2nd stage of KSLV-I is planned to perform CCAM(Contamination and Collision Avoidance Maneuver) not to collide with KM(Kick Motor). At the moment, the satellite should pass through low density environment not to be contaminated by KM plume due to residual thrust. Therefore, it is necessary to predict the flow field of KM plume by residual thrust. In this paper, DSMC (Direct Simulation Monte-Carlo) method, which is widely accepted to simulate in rarefied regime, is used to compute the density field of KM plume by residual thrust and the result of DSMC simulation was compared with that of FLUENT to validate it.

  • PDF

Motion Planning for Mobile Robots Using a Spline Surface

  • Kato, Kiyotaka;Tanaka, Jyunichi;Tokunaga, Hironori
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1054-1059
    • /
    • 2005
  • The artificial potential method uses a potential field to guide a robot from a start to a goal configuration respectively. The potential field consists of attractive potential used to pull a robot toward a goal and repulsive potential to keep it away from obstacles. However, there are two problems concerning local minimum and computational cost to be resolved in conventional artificial potential methods. This study proposes a method utilizing a spline surface that interpolates arbitrary boundaries and a domain reduction method that reduces the unnecessary area. The proposed spline surface interpolates arbitrary shaped boundaries and is used as an artificial potential to guide a robot for global motion planning of a mobile robot. A reduced domain process reduces the unnecessary domain. We apply a distance-weighted function as such a function, which blends distances from each boundary with a reduction in computational time compared with other analytical methods. As a result, this paper shows that an arbitrary boundary spline surface provides global planning and a domain reduction method reduces local minimum with quick operation.

  • PDF

Neuro-Fuzzy Controller Based on Reinforcement Learning (강화 학습에 기반한 뉴로-퍼지 제어기)

  • 박영철;심귀보
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.395-400
    • /
    • 2000
  • In this paper, we propose a new neuro-fuzzy controller based on reinforcement learning. The proposed system is composed of neuro-fuzzy controller which decides the behaviors of an agent, and dynamic recurrent neural networks(DRNNs) which criticise the result of the behaviors. Neuro-fuzzy controller is learned by reinforcement learning. Also, DRNNs are evolved by genetic algorithms and make internal reinforcement signal based on external reinforcement signal from environments and internal states. This output(internal reinforcement signal) is used as a teaching signal of neuro-fuzzy controller and keeps the controller on learning. The proposed system will be applied to controller optimization and adaptation with unknown environment. In order to verifY the effectiveness of the proposed system, it is applied to collision avoidance of an autonomous mobile robot on computer simulation.

  • PDF

The Development of Ecobot Robot for Friendly Environment Smart Home Appliance Application System (친환경 스마트 가전 응용 시스템용 Ecobot 로봇 플랫폼 개발)

  • Moon, Yong-Seon;Bae, Young-Chul;Cha, Hyun-Rok;Roh, Sang-Hyun;Park, Jong-Kyu
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.480-485
    • /
    • 2010
  • In this paper, we developed mobile robot platform called Ecobot for the application system of friendly environment smart home appliance. Ecobot fulfills the purposes of monitoring of the healthy environment and guidance in the application system of friendly smart environment home appliance, home network formed by Zigbee network. For the healthy environment, the system contains monitoring sensor. Moreover, it continuously keeps the healthy environment by controlling the smart home appliances linkng with Zigbee network. And also using the URG-04LX laser distance sensor, it monitors indoor environment through autonomous moving and collision avoidance.

p-Persistent MAC Protocol for WDM Ring Networks

  • So, Won-Ho;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.9B
    • /
    • pp.589-597
    • /
    • 2007
  • In this paper, a WDM metro ring consisting of access nodes with $FT-FR^n$ (Fixed Transmitter - n Fixed Receivers) is considered. A trade-off exists between node throughput and transmission fairness because the access nodes share wavelength channels. In order to eliminate the transmission unfairness and to increase throughput, the p-persistent medium access control (MAC) protocol is proposed: each node uses an empty optical slot to transmit a packet and make it available with the extraction of a transferred packet at the source access node, called source-stripping. The local empty slot can be used to transfer a head-of-line packet in the local buffer with probability p or it is used for the next downstream nodes with 1-p. The proposed MAC protocol provides better node throughput than the non-persistent protocol and exhibits better fairness index than the 1-persistent protocol in WDM ring networks. In addition, numerical analysis shows that the proposed MAC protocol maximizes the node throughput under uniform traffic conditions. For more detailed results, we use the network simulation under Poisson and self-similar traffic. Furthermore, unpredictable traffic constructed by the combination of the former and the latter is also considered. The reasonable probability of the p-persistent protocol for a given architecture can be determined through simulation.

Intelligent Internal Stealthy Attack and its Countermeasure for Multicast Routing Protocol in MANET

  • Arthur, Menaka Pushpa;Kannan, Kathiravan
    • ETRI Journal
    • /
    • v.37 no.6
    • /
    • pp.1108-1119
    • /
    • 2015
  • Multicast communication of mobile ad hoc networks is vulnerable to internal attacks due to its routing structure and high scalability of its participants. Though existing intrusion detection systems (IDSs) act smartly to defend against attack strategies, adversaries also accordingly update their attacking plans intelligently so as to intervene in successful defending schemes. In our work, we present a novel indirect internal stealthy attack on a tree-based multicast routing protocol. Such an indirect stealthy attack intelligently makes neighbor nodes drop their routing-layer unicast control packets instead of processing or forwarding them. The adversary targets the collision avoidance mechanism of the Medium Access Control (MAC) protocol to indirectly affect the routing layer process. Simulation results show the success of this attacking strategy over the existing "stealthy attack in wireless ad hoc networks: detection and countermeasure (SADEC)" detection system. We design a cross-layer automata-based stealthy attack on multicast routing protocols (SAMRP) attacker detection system to identify and isolate the proposed attacker. NS-2 simulation and analytical results show the efficient performance, against an indirect internal stealthy attack, of SAMRP over the existing SADEC and BLM attacker detection systems.

Performance Analysis of Directional CSMA/CA for IEEE 802.15.3c under Saturation Environments

  • Kim, Mee-Joung;Kim, Yong-Sang;Lee, Woo-Yong
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.24-34
    • /
    • 2012
  • In this paper, the directional carrier sense multiple access/collision avoidance (CSMA/CA) protocol in the immediate acknowledgement mode for IEEE 802.15.3c is analyzed under saturation environments. For the analysis, a sensing region and an exclusive region with a directional antenna are computed probabilistically and a Markov chain model in which the features of IEEE 802.15.3c and the effects of using directional antennas are incorporated is analyzed. An algorithm to find the maximal number of concurrently transmittable frames is proposed. The system throughput and the average transmission delay are obtained in closed forms. The numerical results show the impact of directional antennas on the CSMA/CA media access control (MAC) protocol. For instance, the throughput with a small beamwidth of antenna is more than ten times larger than that for an omnidirectional antenna. The overall analysis is verified by a simulation. The obtained results will be helpful in developing an MAC protocol for enhancing the performance of mmWave wireless personal area networks.