• 제목/요약/키워드: decentralized and centralized control

검색결과 61건 처리시간 0.023초

협업 유도탄 간 상대 충돌 각 제어 임무에서 통신 구조에 따른 유도기법의 영향 분석 (Analysis of Guidance Laws for Impact Angle Control Mission of Cooperative Missiles Based on Communication Structure)

  • 고효상;이단일;이명화;최한림
    • 항공우주시스템공학회지
    • /
    • 제18권2호
    • /
    • pp.1-11
    • /
    • 2024
  • 정보공유 기반의 네트워크 협업 유도탄에 대한 상대 충돌 각 유도기법을 불확실성과 외란이 존재하는 시스템에 적용했다. 협업 유도탄 시스템은 전이 축소 방향성 비순환 그래프로 표현되며, 그 구조에 따라 유도된 중앙집권형 및 분산형 유도기법을 소개했다. 또한, 소개된 유도기법을 유도탄의 통신 구조와 시스템 잡음 유무에 따라 비교하여 그 관계를 분석했다. 상대 충돌 각 제어 임무에서 분산형 정보공유 유도기법의 효과를 분석하기 위해 시스템 동역학에 잡음이 포함된 다수의 유도탄이 불확실성이 포함된 예상 요격 위치에 유도되는 상황을 가정하였다. 다양한 임무 환경에 대해 몬테카를로 시뮬레이션을 수행하였으며, 이를 통해 정보공유의 유무와 구조가 시스템에 미치는 영향을 분석했다.

분산 ID 보관 및 연계 서비스 모델 제안 (Proposal for a Custody and Federated Service Model for the Decentralized Identity)

  • 여기호;박근덕;염흥열
    • 정보보호학회논문지
    • /
    • 제30권3호
    • /
    • pp.513-525
    • /
    • 2020
  • 오늘날까지 정보주체의 개인정보들은 많은 기업이나 기관에 중앙 집중화되어 있는 구조였다. 하지만, 최근에는 점차적으로 정보주체가 자신의 개인정보를 통제하고 소유권을 찾는 방향으로 패러다임이 변화하고 있다. 해외는 일찍부터 EU의 일반 개인정보보호법(General Data Protection Regulation)이나 미국의 소비자 프라이버시 권리장전(California Consumer Privacy Act) 등으로 개인의 데이터 소유권을 강화하고 있다. 국내도 여러 기업들이 모인 연합체들에 의해 분산 ID 서비스 모델에 대한 기술 연구와 서비스 적용 사례들을 만들어 가고 있다. 본 논문에서는 현재 연구되고 있는 분산 ID 서비스 모델과 그 한계점에 대해 알아보고 해결할 수 있는 보다 개선된 분산 ID 서비스 모델을 제안하고자 한다. 제안 모델은 분산 ID를 제3의 기관인 보관자에게 안전하게 수탁하는 기능과 서로 다른 분산 ID 서비스가 생기더라도 상호 연동될 수 있는 연계 기능을 가진다. 아울러, 제안 모델의 보안 위협을 식별하고 보안 요구사항을 도출하여 보다 안전하고 편리한 모델을 제시한다. 분산 ID 기술은 사람에 대한 증명뿐아니라 향후 사물인터넷의 디바이스 ID 인증 관리에도 확장되어 적용될 것으로 기대된다.

분산 IoT센서 기반 실험실 안전관리 시스템 (Distributed IoT Sensor based Laboratory Safety Management System)

  • 정대진;김재윤;배상중;정회경
    • 한국정보통신학회논문지
    • /
    • 제23권1호
    • /
    • pp.90-96
    • /
    • 2019
  • 최근 실험실에서 사용하는 시약장은 IoT 기반 다양한 센서들을 활용하여 내부 환경을 실시간으로 측정하고 사용자들에게 서비스를 제공한다. 센서 데이터를 수집한 후 서버 내에서 위험상황을 식별하고 기기들에게 동작 명령을 전송하게 된다. 이와 같은 중앙 집중형 관리시스템은 여러 대의 시약장에서 측정되는 센서 데이터들을 전송받고 처리하게 될 경우 시약장의 수가 증가할 때마다 데이터 처리 속도가 점차 증가하게 되는 문제가 발생할 수 있다. 이를 해결하기 위해 본 논문에서는 중앙 집중형이 아닌 분산 환경에서 시약장 내부 환경을 분석하여 위험상황의 식별 및 기기 제어를 수행할 수 있는 분산 제어가 가능한 분산 IoT 센서 기반 실험실 안전관리 시스템에 대해 연구한다. 이와 같이 분산형 제어가 가능한 센서 모듈을 이용한 시약장 내부 환경 제어 통해 위험상황에 대한 식별 및 대처를 자동으로 진행함으로써 기존의 시약장과 실험실을 관리하는 시스템들보다 신속한 대처 및 안전관리가 이루어졌음을 확인하였다.

A decentralized approach to damage localization through smart wireless sensors

  • Jeong, Min-Joong;Koh, Bong-Hwan
    • Smart Structures and Systems
    • /
    • 제5권1호
    • /
    • pp.43-54
    • /
    • 2009
  • This study introduces a novel approach for locating damage in a structure using wireless sensor system with local level computational capability to alleviate data traffic load on the centralized computation. Smart wireless sensor systems, capable of iterative damage-searching, mimic an optimization process in a decentralized way. The proposed algorithm tries to detect damage in a structure by monitoring abnormal increases in strain measurements from a group of wireless sensors. Initially, this clustering technique provides a reasonably effective sensor placement within a structure. Sensor clustering also assigns a certain number of master sensors in each cluster so that they can constantly monitor the structural health of a structure. By adopting a voting system, a group of wireless sensors iteratively forages for a damage location as they can be activated as needed. Since all of the damage searching process occurs within a small group of wireless sensors, no global control or data traffic to a central system is required. Numerical simulation demonstrates that the newly developed searching algorithm implemented on wireless sensors successfully localizes stiffness damage in a plate through the local level reconfigurable function of smart sensors.

초고층 공동주택 외기전담 시스템 기반 중앙 공급식 환기시스템의 적정 급기조건 설정 (Acceptable Supply Air Conditions of Dedicated Outdoor Air System for a High-rise Apartment Building)

  • 김민휘;김진효;권오현;정재원
    • 한국태양에너지학회:학술대회논문집
    • /
    • 한국태양에너지학회 2009년도 추계학술발표대회 논문집
    • /
    • pp.285-290
    • /
    • 2009
  • The main thrust of this paper is to investigate acceptable supply air conditions of a dedicated outdoor air system (DOAS) for highrise apartment buildings. As for a typical $132-m^2$ apartment unit, it was assumed that centralized DOAS-Ceiling Radiant Cooling Panel was installed. Transient behavior and control characteristics of each system were modeled numerically using a commercial equation solver program. The optimized dew point temperature of the DOAS was discussed on the basis of the ASHRAE standard 62.1-2007 and the current Korean ventilation standard for apartments. It was found that the optimized dew point temperature of the DOAS supply air accommodating total latent load of a space is $11-12^{\circ}C$ and the appropriate supply air temperature of the DOAS is $11-12^{\circ}C$ in cooling period and neutral temperature of $18-20^{\circ}C$ in intermediate period.

  • PDF

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Multi-system vehicle formation control based on nearest neighbor trajectory optimization

  • Mingxia, Huang;Yangyong, Liu;Ning, Gao;Tao, Yang
    • Advances in nano research
    • /
    • 제13권6호
    • /
    • pp.587-597
    • /
    • 2022
  • In the present study, a novel optimization method in formation control of multi -system vehicles based on the trajectory of the nearest neighbor trajectory is presented. In this regard, the state equations of each vehicle and multisystem is derived and the optimization scheme based on minimizing the differences between actual positions and desired positions of the vehicles are conducted. This formation control is a position-based decentralized model. The trajectory of the nearest neighbor are optimized based on the current position and state of the vehicle. This approach aids the whole multi-agent system to be optimized on their trajectory. Furthermore, to overcome the cumulative errors and maintain stability in the network a semi-centralized scheme is designed for the purpose of checking vehicle position to its predefined trajectory. The model is implemented in Matlab software and the results for different initial state and different trajectory definition are presented. In addition, to avoid collision avoidance and maintain the distances between vehicles agents at a predefined desired distances. In this regard, a neural fuzzy network is defined to be utilized in conjunction with the control system to avoid collision between vehicles. The outcome reveals that the model has acceptable stability and accuracy.

Agent Mobility in Human Robot Interaction

  • Nguyen, To Dong;Oh, Sang-Rok;You, Bum-Jae
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 D
    • /
    • pp.2771-2773
    • /
    • 2005
  • In network human-robot interaction, human can access services of a robot system through the network The communication is done by interacting with the distributed sensors via voice, gestures or by using user network access device such as computer, PDA. The service organization and exploration is very important for this distributed system. In this paper we propose a new agent-based framework to integrate partners of this distributed system together and help users to explore the service effectively without complicated configuration. Our system consists of several robots. users and distributed sensors. These partners are connected in a decentralized but centralized control system using agent-based technology. Several experiments are conducted successfully using our framework The experiments show that this framework is good in term of increasing the availability of the system, reducing the time users and robots needs to connect to the network at the same time. The framework also provides some coordination methods for the human robot interaction system.

  • PDF

A Survey of Self-optimization Approaches for HetNets

  • Chai, Xiaomeng;Xu, Xu;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권6호
    • /
    • pp.1979-1995
    • /
    • 2015
  • Network convergence is regarded as the development tendency of the future wireless networks, for which self-organization paradigms provide a promising solution to alleviate the upgrading capital expenditures (CAPEX) and operating expenditures (OPEX). Self-optimization, as a critical functionality of self-organization, employs a decentralized paradigm to dynamically adapt the varying environmental circumstances while without relying on centralized control or human intervention. In this paper, we present comprehensive surveys of heterogeneous networks (HetNets) and investigate the enhanced self-optimization models. Self-optimization approaches such as dynamic mobile access network selection, spectrum resource allocation and power control for HetNets, etc., are surveyed and compared, with possible methodologies to achieve self-optimization summarized. We hope this survey paper can provide the insight and the roadmap for future research efforts in the self-optimization of convergence networks.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권2호
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.