• 제목/요약/키워드: identification schemes of environment

검색결과 8건 처리시간 0.026초

A proposal of switching control system based on speculative control and its application to antiskid braking system

  • Masaaki Inaba;Ikuo Yoshinhara;Hai-jiao Guo;Kazuo Nakao;Kenichi Abe
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1997년도 한국자동제어학술회의논문집; 한국전력공사 서울연수원; 17-18 Oct. 1997
    • /
    • pp.585-588
    • /
    • 1997
  • This paper presents a construction method of logic-based switching control system which operates in widely changing environments. The logic-based switching controller is composed of a family of candidate controllers together with a supervisor. The system does not require any identification schemes of environments. Switching from one candidate controller to another is carried out based on monitoring the output of the system. The basic ideas of adaptation are as follows: (1)each candidate controller is prepared for each environment in advance; (2)the supervisor applies a sequence of speculative controls to a plant with candidate controllers just after the control has started and just after the change of the environment has been detected. It is important that each candidate controller can keep the system stable during a sequence of speculative controls, and the most appropriate candidate controller for the environment to which the system is exposed can be selected before the last speculative control is ended. An application to an antiskid braking system clarifies the effectiveness of the proposed method.

  • PDF

다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로 (Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System -)

  • 홍승필;김재현
    • 인터넷정보학회논문지
    • /
    • 제7권2호
    • /
    • pp.161-172
    • /
    • 2006
  • 최근 유비쿼터스 컴퓨팅에 대한 관련 기술이 빠르게 발전되면서, 그와 관련 된 정보시스템 역기능(개인정보 오남용, 정보의 위험, 위협, 취약점등)의 우려 또한 증가되고 있는 추세이다. 본 논문에서는 강력한 다단계 사용자 신분확인(Multiple schemes for Strong authentication)메커니즘을 소개하고, 실제 시스템 환경에서 안정적으로 구현할 수 있는 설계 방안과 응용 방안을 제시하였다. 또한, 플랫폼에 독립적이고 다양한 응용 프로그램을 탑재할 수 있는 스마트카드(자바 카드) 기반에 암호화와 생체인식(지문)기술을 접목한 통합 사용자 인증 메커니즘을 제안함으로써, 최근 들어 중요시 되고 있는 사용자 개인정보 보호 및 공공.금융기관에서 발생될 수 있는 금융카드 도용 및 불법 복제등과 같은 위험에 대하여 체계적이고 안정적인 대안 기술을 소개하였다. 마지막으로, 스마트카드 환경 내에서 실제 시스템 개발자가 구현이 용이하고 응용이 쉬운 "스마트카드 클래스 라이브러리"를 개발하고 구체적인 자바카드기반의 생체인식 적용 방향을 제안함으로써 향후 활용방안에 대하여서도 그 방향성을 제안하였다.

  • PDF

Novel Schemes to Optimize Sampling Rate for Compressed Sensing

  • Zhang, Yifan;Fu, Xuan;Zhang, Qixun;Feng, Zhiyong;Liu, Xiaomin
    • Journal of Communications and Networks
    • /
    • 제17권5호
    • /
    • pp.517-524
    • /
    • 2015
  • The fast and accurate spectrum sensing over an ultra-wide bandwidth is a big challenge for the radio environment cognition. Considering sparse signal feature, two novel compressed sensing schemes are proposed, which can reduce compressed sampling rate in contrast to the traditional scheme. One algorithm is dynamically adjusting compression ratio based on modulation recognition and identification of symbol rate, which can reduce compression ratio. Furthermore, without priori information of the modulation and symbol rate, another improved algorithm is proposed with the application potential in practice, which does not need to reconstruct the signals. The improved algorithm is divided into two stages, which are the approaching stage and the monitoring stage. The overall sampling rate can be dramatically reduced without the performance deterioration of the spectrum detection compared to the conventional static compressed sampling rate algorithm. Numerous results show that the proposed compressed sensing technique can reduce sampling rate by 35%, with an acceptable detection probability over 0.9.

비선형 변환의 비젼센서 데이터융합을 이용한 이동로봇 주행제어 (Control of Mobile Robot Navigation Using Vision Sensor Data Fusion by Nonlinear Transformation)

  • 진태석;이장명
    • 제어로봇시스템학회논문지
    • /
    • 제11권4호
    • /
    • pp.304-313
    • /
    • 2005
  • The robots that will be needed in the near future are human-friendly robots that are able to coexist with humans and support humans effectively. To realize this, robot need to recognize his position and direction for intelligent performance in an unknown environment. And the mobile robots may navigate by means of a number of monitoring systems such as the sonar-sensing system or the visual-sensing system. Notice that in the conventional fusion schemes, the measurement is dependent on the current data sets only. Therefore, more of sensors are required to measure a certain physical parameter or to improve the accuracy of the measurement. However, in this research, instead of adding more sensors to the system, the temporal sequence of the data sets are stored and utilized for the accurate measurement. As a general approach of sensor fusion, a UT -Based Sensor Fusion(UTSF) scheme using Unscented Transformation(UT) is proposed for either joint or disjoint data structure and applied to the landmark identification for mobile robot navigation. Theoretical basis is illustrated by examples and the effectiveness is proved through the simulations and experiments. The newly proposed, UT-Based UTSF scheme is applied to the navigation of a mobile robot in an unstructured environment as well as structured environment, and its performance is verified by the computer simulation and the experiment.

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Jung, Jaewook;Moon, Jongho;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3720-3746
    • /
    • 2017
  • At present, numerous hospitals and medical institutes have implemented Telecare Medicine Information Systems (TMIS) with authentication protocols to enable secure, efficient electronic transactions for e-medicine. Numerous studies have investigated the use of authentication protocols to construct efficient, robust health care services, and recently, Liu et al. presented an authenticated key agreement mechanism for TMIS. They argued that their mechanism can prevent various types of attacks and preserve a secure environment. However, we discovered that Liu et al.'s mechanism presents some vulnerabilities. First, their mechanism uses an improper identification process for user biometrics; second, the mechanism is not guaranteed to protect against server spoofing attacks; third, there is no session key verification process in the authentication process. As such, we describe how the above-mentioned attacks operate and suggest an upgraded security mechanism for TMIS. We analyze the security and performance of our method to show that it improves security relative to comparable schemes and also operates in an efficient manner.

Security Framework for RFID-based Applications in Smart Home Environment

  • Konidala, Divyan M.;Kim, Dae-Young;Yeun, Chan-Yeob;Lee, Byoung-Cheon
    • Journal of Information Processing Systems
    • /
    • 제7권1호
    • /
    • pp.111-120
    • /
    • 2011
  • The concept of Smart-Homes is becoming more and more popular. It is anticipated that Radio Frequency IDentification (RFID) technology will play a major role in such environments. We can find many previously proposed schemes that focus solely on: authentication between the RFID tags and readers, and user privacy protection from malicious readers. There has also been much talk of a very popular RFID application: a refrigerator/bookshelf that can scan and list out the details of its items on its display screen. Realizing such an application is not as straight forward as it seems to be, especially in securely deploying such RFID-based applications in a smart home environment. Therefore this paper describes some of the RFID-based applications that are applicable to smart home environments. We then identify their related privacy and security threats and security requirements and also propose a secure approach, where RFID-tagged consumer items, RFID-reader enabled appliances (e.g., refrigerators), and RFID-based applications would securely interact among one another. At the moment our approach is just a conceptual idea, but it sheds light on very important security issues related to RFID-based applications that are beneficial for consumers.

한강유역 환경보전 종합계획 사업의 개요 (The Outline of Han River Basin Environmental master Plan Project)

  • 이선환
    • 기술사
    • /
    • 제15권1호
    • /
    • pp.46-50
    • /
    • 1982
  • Following rapid industrial development and urbanization in Korea, there is a need for the Government to implement effective control of pollution and to undertake specific schemes in areas where pollution of the environment is severe. In response to this need, Government of Korea prepare Han River Basin Environmental Master Plan Project for water, air, solid waste to cover environmental protection of the Han River Basin. The Project area is approximately 27,000 sq. Km extending over Seoul, Kyunggi, Kwangwon, Chungbuk Province. The total population of Master Plan Project area is approximately 11.6 million, or one-third of the total population of Korea. There are about 8,000 industries, including those located in 16 industrial complexes, in the project area. The scope of work and terms of reference are the following: (1) A Summary of existing land use and forecasts for changes in land use by the year 2,000. (2) Emission inventories for air, waste water, and solid wastes. (3) Forecasts of future population growth patterns and pollution loadings. (4) Identification of specific projects needs to reduce pollution levels and satisfy the environmental quality standards. (5) A Program of enforcement to include (i) self monitoring, and (ii) governmental inspections and surveillance. (6) A program for quality improvement and quality assurance of environmental measurements. (7) Reports summarizing all data collected analyzed during the study. (8) Conceptual design and feasibility studies, including cost estimates, for needed pollution control projects. (9) A financial plan for future detailed design and construction of public facilities, for financial incentives to industry, and for user charges for industrial use of public treatment of disposal works.

  • PDF

해상 유해액체물질(NLS) 유출사고대비 물질군 선정에 관한 연구 (Prioritizing Noxious Liquid Substances (NLS) for Preparedness Against Potential Spill Incidents in Korean Coastal Waters)

  • 김영윤;최정윤;손민호;오상우;이문진;이상진
    • 해양환경안전학회지
    • /
    • 제22권7호
    • /
    • pp.846-853
    • /
    • 2016
  • 해상 유통되는 유해액체물질(NLS)의 유출사고대비 물질군 선정을 위해 596종의 NLS를 대상으로 위해성 DB를 구축하고 우선 순위 선정시스템을 통해 전체 우선순위를 선정하였다. 우선순위 목록을 바탕으로 2014-2015년 해상유통물질 158종을 추출한 뒤 물질군 구분 기준을 적용하여 0~3순위의 4개 물질군을 제시하였다. 국가차원의 NLS 유출사고대비를 위해서는 물동량 및 유해성이 높은 0~1순위 물질군의 집중관리와 함께 2~3순위 물질군의 정보 구축작업이 지속되어야 한다. 항만별로는 NLS 유통 유형이 다르므로 각 항만의 물질별 유통특성을 파악한 뒤 0~1순위 물질군 위주로 관리하는 것이 효율적일 것으로 판단된다. 또한, 동해남부권역(울산, 부산), 남해중부권역(광양, 여수), 서해중부권역(평택, 대산, 인천)을 NLS 사고대비를 위한 특별관리구역으로 지정하여 해상유통되는 NLS 의 감시 감독을 강화하고 방제 장비, 자재 및 약제를 집중 배치해야 할 것으로 판단된다. 향후, 위해성 DB의 구축과정에서 나타난 위해성 정보 부재 물질들의(만성독성) 지속적인 생산 및 보완이 필요하며, 특히 수생태 독성의 경우 해양생물종을 대상으로 한 자료 생산 및 확보가 지속되어야 할 것이다. 또한, 해상 HNS 사고 관리를 위해서는 HNS 해상유통에 대한 정보를 확인할 수 있는 시스템이 조속히 구축되어야 한다.