• Title/Summary/Keyword: identification schemes of environment

Search Result 8, Processing Time 0.02 seconds

A proposal of switching control system based on speculative control and its application to antiskid braking system

  • Masaaki Inaba;Ikuo Yoshinhara;Hai-jiao Guo;Kazuo Nakao;Kenichi Abe
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.585-588
    • /
    • 1997
  • This paper presents a construction method of logic-based switching control system which operates in widely changing environments. The logic-based switching controller is composed of a family of candidate controllers together with a supervisor. The system does not require any identification schemes of environments. Switching from one candidate controller to another is carried out based on monitoring the output of the system. The basic ideas of adaptation are as follows: (1)each candidate controller is prepared for each environment in advance; (2)the supervisor applies a sequence of speculative controls to a plant with candidate controllers just after the control has started and just after the change of the environment has been detected. It is important that each candidate controller can keep the system stable during a sequence of speculative controls, and the most appropriate candidate controller for the environment to which the system is exposed can be selected before the last speculative control is ended. An application to an antiskid braking system clarifies the effectiveness of the proposed method.

  • PDF

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Novel Schemes to Optimize Sampling Rate for Compressed Sensing

  • Zhang, Yifan;Fu, Xuan;Zhang, Qixun;Feng, Zhiyong;Liu, Xiaomin
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.517-524
    • /
    • 2015
  • The fast and accurate spectrum sensing over an ultra-wide bandwidth is a big challenge for the radio environment cognition. Considering sparse signal feature, two novel compressed sensing schemes are proposed, which can reduce compressed sampling rate in contrast to the traditional scheme. One algorithm is dynamically adjusting compression ratio based on modulation recognition and identification of symbol rate, which can reduce compression ratio. Furthermore, without priori information of the modulation and symbol rate, another improved algorithm is proposed with the application potential in practice, which does not need to reconstruct the signals. The improved algorithm is divided into two stages, which are the approaching stage and the monitoring stage. The overall sampling rate can be dramatically reduced without the performance deterioration of the spectrum detection compared to the conventional static compressed sampling rate algorithm. Numerous results show that the proposed compressed sensing technique can reduce sampling rate by 35%, with an acceptable detection probability over 0.9.

Control of Mobile Robot Navigation Using Vision Sensor Data Fusion by Nonlinear Transformation (비선형 변환의 비젼센서 데이터융합을 이용한 이동로봇 주행제어)

  • Jin Tae-Seok;Lee Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.4
    • /
    • pp.304-313
    • /
    • 2005
  • The robots that will be needed in the near future are human-friendly robots that are able to coexist with humans and support humans effectively. To realize this, robot need to recognize his position and direction for intelligent performance in an unknown environment. And the mobile robots may navigate by means of a number of monitoring systems such as the sonar-sensing system or the visual-sensing system. Notice that in the conventional fusion schemes, the measurement is dependent on the current data sets only. Therefore, more of sensors are required to measure a certain physical parameter or to improve the accuracy of the measurement. However, in this research, instead of adding more sensors to the system, the temporal sequence of the data sets are stored and utilized for the accurate measurement. As a general approach of sensor fusion, a UT -Based Sensor Fusion(UTSF) scheme using Unscented Transformation(UT) is proposed for either joint or disjoint data structure and applied to the landmark identification for mobile robot navigation. Theoretical basis is illustrated by examples and the effectiveness is proved through the simulations and experiments. The newly proposed, UT-Based UTSF scheme is applied to the navigation of a mobile robot in an unstructured environment as well as structured environment, and its performance is verified by the computer simulation and the experiment.

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Jung, Jaewook;Moon, Jongho;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3720-3746
    • /
    • 2017
  • At present, numerous hospitals and medical institutes have implemented Telecare Medicine Information Systems (TMIS) with authentication protocols to enable secure, efficient electronic transactions for e-medicine. Numerous studies have investigated the use of authentication protocols to construct efficient, robust health care services, and recently, Liu et al. presented an authenticated key agreement mechanism for TMIS. They argued that their mechanism can prevent various types of attacks and preserve a secure environment. However, we discovered that Liu et al.'s mechanism presents some vulnerabilities. First, their mechanism uses an improper identification process for user biometrics; second, the mechanism is not guaranteed to protect against server spoofing attacks; third, there is no session key verification process in the authentication process. As such, we describe how the above-mentioned attacks operate and suggest an upgraded security mechanism for TMIS. We analyze the security and performance of our method to show that it improves security relative to comparable schemes and also operates in an efficient manner.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • v.7 no.1
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

The Outline of Han River Basin Environmental master Plan Project (한강유역 환경보전 종합계획 사업의 개요)

  • 이선환
    • Journal of the Korean Professional Engineers Association
    • /
    • v.15 no.1
    • /
    • pp.46-50
    • /
    • 1982
  • Following rapid industrial development and urbanization in Korea, there is a need for the Government to implement effective control of pollution and to undertake specific schemes in areas where pollution of the environment is severe. In response to this need, Government of Korea prepare Han River Basin Environmental Master Plan Project for water, air, solid waste to cover environmental protection of the Han River Basin. The Project area is approximately 27,000 sq. Km extending over Seoul, Kyunggi, Kwangwon, Chungbuk Province. The total population of Master Plan Project area is approximately 11.6 million, or one-third of the total population of Korea. There are about 8,000 industries, including those located in 16 industrial complexes, in the project area. The scope of work and terms of reference are the following: (1) A Summary of existing land use and forecasts for changes in land use by the year 2,000. (2) Emission inventories for air, waste water, and solid wastes. (3) Forecasts of future population growth patterns and pollution loadings. (4) Identification of specific projects needs to reduce pollution levels and satisfy the environmental quality standards. (5) A Program of enforcement to include (i) self monitoring, and (ii) governmental inspections and surveillance. (6) A program for quality improvement and quality assurance of environmental measurements. (7) Reports summarizing all data collected analyzed during the study. (8) Conceptual design and feasibility studies, including cost estimates, for needed pollution control projects. (9) A financial plan for future detailed design and construction of public facilities, for financial incentives to industry, and for user charges for industrial use of public treatment of disposal works.

  • PDF

Prioritizing Noxious Liquid Substances (NLS) for Preparedness Against Potential Spill Incidents in Korean Coastal Waters (해상 유해액체물질(NLS) 유출사고대비 물질군 선정에 관한 연구)

  • Kim, Young-Ryun;Choi, Jeong-Yun;Son, Min-Ho;Oh, Sangwoo;Lee, Moonjin;Lee, Sangjin
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.22 no.7
    • /
    • pp.846-853
    • /
    • 2016
  • This study prioritizes Noxious Liquid Substances (NLS) transported by sea via a risk-based database containing 596 chemicals to prepare against NLS incidents. There were 158 chemicals transported in Korean waters during 2014 and 2015, which were prioritized, and then chemicals were grouped into four categories (with rankings of 0-3) based on measures for preparedness against incident. In order to establish an effective preparedness system against NLS spill incidents on a national scale, a compiling process for NLS chemicals ranked 2~3 should be carried out and managed together with an initiative for NLS chemicals ranked 0-1. Also, it is advisable to manage NLS chemicals ranked 0-1 after considering the characteristics of NLS specifically transported through a given port since the types and characteristics of NLS chemicals relevant differ depending on the port. In addition, three designated regions are suggested: 1) the southern sector of the East Sea (Ulsan and Busan); 2) the central sector of the South Sea (Gwangyang and Yeosu); and 3) the northern sector of the West Sea (Pyeongtaek, Daesan and Incheon). These regions should be considered special management sectors, with strengthened surveillance and the equipment, materials and chemicals used for pollution response management schemes prepared in advance at NLS spill incident response facilities. In the near future, the risk database should be supplemented with specific information on chronic toxicity and updated on a regular basis. Furthermore, scientific ecotoxicological data for marine organisms should be collated and expanded in a systematic way. A system allowing for the identification Hazardous and Noxious Substances (HNS) should also be established, noting the relevant volumes transported in Korean waters as soon as possible to allow for better management of HNS spill incidents at sea.