• Title/Summary/Keyword: optimization problem

Search Result 4,342, Processing Time 0.028 seconds

An Experimental Research for the Optimization of the Gear Grinding Machine's Operating Condition (기어 그라인딩 장비 가공조건 최적화에 대한 실험적 연구)

  • Lee, Hyun-Ku;Kim, Moo-Suk;Kang, Koo-Tae
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.20 no.7
    • /
    • pp.665-671
    • /
    • 2010
  • To improve the gear noise quality, gear tooth grinding machine are widely used in automotive industry. While using the gear profile grinding machine to improve the gear tooth quality of the transmission, several defects such as chattering, tooth waves that cause the gear noise occasionally happened. But it is very difficult to solve that problem, because there is no one who knows the setting up the optimal grinding condition appropriately. The abnormal manufacturing conditions which make the gear noise make the engineer to spend a lot of time, effort, and money. Due to demands for solving the serious abnormal gear noise happened in the automatic transmission in the mass product stage, the vibration checking process in the worm wheel axis, work rotation and fixed axis of the grinding machine were adapted to find the root causes. As a result, gear profile wave are affected by the work rotation axis's unbalance which is caused by worm wheel feeding speed. And a primary and the secondary grinding feeding speed, cutting oil, work fixed forces are also proved as the important factors. After setting up the grinding condition reported in this paper, it was adapted successfully to the grinding machine to manufacture the new automatic transmissions' gear. The gear noise was dramatically disappeared and the process and the results will offer good guides to the engineers who manufacture the gear with the grinding machine.

Coalition based Optimization of Resource Allocation with Malicious User Detection in Cognitive Radio Networks

  • Huang, Xiaoge;Chen, Liping;Chen, Qianbin;Shen, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4661-4680
    • /
    • 2016
  • Cognitive radio (CR) technology is an effective solution to the spectrum scarcity issue. Collaborative spectrum sensing is known as a promising technique to improve the performance of spectrum sensing in cognitive radio networks (CRNs). However, collaborative spectrum sensing is vulnerable to spectrum data falsification (SSDF) attack, where malicious users (MUs) may send false sensing data to mislead other secondary users (SUs) to make an incorrect decision about primary user (PUs) activity, which is one of the key adversaries to the performance of CRNs. In this paper, we propose a coalition based malicious users detection (CMD) algorithm to detect the malicious user in CRNs. The proposed CMD algorithm can efficiently detect MUs base on the Geary'C theory and be modeled as a coalition formation game. Specifically, SSDF attack is one of the key issues to affect the resource allocation process. Focusing on the security issues, in this paper, we analyze the power allocation problem with MUs, and propose MUs detection based power allocation (MPA) algorithm. The MPA algorithm is divided into two steps: the MUs detection step and the optimal power allocation step. Firstly, in the MUs detection step, by the CMD algorithm we can obtain the MUs detection probability and the energy consumption of MUs detection. Secondly, in the optimal power allocation step, we use the Lagrange dual decomposition method to obtain the optimal transmission power of each SU and achieve the maximum utility of the whole CRN. Numerical simulation results show that the proposed CMD and MPA scheme can achieve a considerable performance improvement in MUs detection and power allocation.

A Study on Implementation of Special-Purpose Manipulator for Home Service Robot (홈 서비스 로봇을 위한 전용 머니퓰레이터의 구현에 관한 연구)

  • Kim, Seung-Woo;Kim, Hi-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.11
    • /
    • pp.5219-5226
    • /
    • 2011
  • A specialized anthropomorphic robot manipulator which can be attached to the housemaid robot McBot II, is developed In this paper. This built-in type manipulator consists of both arms with 3 DOF (Degree of Freedom) each and both hands with 3 DOF each. The robotic arm is optimally designed to satisfy both the minimum mechanical size and the maximum workspace. Minimum mass and length are required for the built-in cooperated-arms system. But that makes the workspace so small. This paper proposes optimal design method to overcome the problem by using neck joint to move the arms horizontally forward/backward and waist joint to move them vertically up/down. The robotic hand, which has two fingers and a thumb, is also optimally designed in task-based concept. Finally, the good performance of the developed manipulator is confirmed through live test of tasks.

Cost-Based Directed Scheduling : Part I, An Intra-Job Cost Propagation Algorithm (비용기반 스케쥴링 : Part I, 작업내 비용 전파알고리즘)

  • Kim, Jae-Kyeong;Suh, Min-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.4
    • /
    • pp.121-135
    • /
    • 2007
  • Constraint directed scheduling techniques, representing problem constraints explicitly and constructing schedules by constrained heuristic search, have been successfully applied to real world scheduling problems that require satisfying a wide variety of constraints. However, there has been little basic research on the representation and optimization of the objective value of a schedule in the constraint directed scheduling literature. In particular, the cost objective is very crucial for enterprise decision making to analyze the effects of alternative business plans not only from operational shop floor scheduling but also through strategic resource planning. This paper aims to explicitly represent and optimize the total cost of a schedule including the tardiness and inventory costs while satisfying non-relaxable constraints such as resource capacity and temporal constraints. Within the cost based scheduling framework, a cost propagation algorithm is presented to update cost information throughout temporal constraints within the same job.

  • PDF

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

Rainfall-Runoff Analysis Utilizing Multiple Impulse Responses (복수의 임펄스 응답을 이용한 강우-유출 해석)

  • Yoo, Chul-Sang;Park, Joo-Young
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.5
    • /
    • pp.537-543
    • /
    • 2006
  • There have been many recent studies on the nonlinear rainfall-runoff modeling, where the use of neural networks is shown to be quite successful. Due to fundamental limitation of linear structures, employing linear models has often been considered inferior to the neural network approaches in this area. However, we believe that with an appropriate extension, the concept of linear impulse responses can be a viable tool since it enables us to understand underlying dynamics principles better. In this paper, we propose the use of multiple impulse responses for the problem of rainfall-runoff analysis. The proposed method is based on a simple and fixed strategy for switching among multiple linear impulse-response models, each of which satisfies the constraints of non-negativity and uni-modality. The computational analysis performed for a certain Korean hydrometeorologic data set showed that the proposed method can yield very meaningful results.

Performance Improvement of the Macro Handover using the Address Insurance Policy in HMIPv6 (HMIPv6에서 주소보장 정책을 이용한 매크로 핸드오버의 성능 향상)

  • Ahn, Chi-Hyun;Woo, Jong-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.9
    • /
    • pp.1764-1770
    • /
    • 2007
  • The binding update of MIPv6 which basically makes a route optimization lets MN bring about high signaling traffic, packet loss and delay. HMIPv6, which introduces the MAP protocol, makes the signaling traffic low, thereby reducing the packet losses and delay. However, it still has the same problem in MIPv6 in the case of macro mobility. This paper proposes HMIPv6 with the address insurance policy. It makes MAP prepare LCoA and RCoA before the macro handover happens. When it happens, MN is able to use them after the registration is done in the foreign network. The perormance can be improved because MAP is composed to assure the address in advance. In addition the MAP sends the BU message during the handover, thereby making the proposed scheme better. The simulation shows that the proposed scheme is about 33% shorter than HMIPv6 in the handover delay and about 22% less than FMIPv6 in the packet loss.

Digital signal change through artificial intelligence machine learning method comparison and learning (인공지능 기계학습 방법 비교와 학습을 통한 디지털 신호변화)

  • Yi, Dokkyun;Park, Jieun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.251-258
    • /
    • 2019
  • In the future, various products are created in various fields using artificial intelligence. In this age, it is a very important problem to know the operation principle of artificial intelligence learning method and to use it correctly. This paper introduces artificial intelligence learning methods that have been known so far. Learning of artificial intelligence is based on the fixed point iteration method of mathematics. The GD(Gradient Descent) method, which adjusts the convergence speed based on the fixed point iteration method, the Momentum method to summate the amount of gradient, and finally, the Adam method that mixed these methods. This paper describes the advantages and disadvantages of each method. In particularly, the Adam method having adaptivity controls learning ability of machine learning. And we analyze how these methods affect digital signals. The changes in the learning process of digital signals are the basis of accurate application and accurate judgment in the future work and research using artificial intelligence.

Design, calibration and application of wireless sensors for structural global and local monitoring of civil infrastructures

  • Yu, Yan;Ou, Jinping;Li, Hui
    • Smart Structures and Systems
    • /
    • v.6 no.5_6
    • /
    • pp.641-659
    • /
    • 2010
  • Structural Health Monitoring (SHM) gradually becomes a technique for ensuring the health and safety of civil infrastructures and is also an important approach for the research of the damage accumulation and disaster evolving characteristics of civil infrastructures. It is attracting prodigious research interests and the active development interests of scientists and engineers because a great number of civil infrastructures are planned and built every year in mainland China. In a SHM system the sheer number of accompanying wires, fiber optic cables, and other physical transmission medium is usually prohibitive, particularly for such structures as offshore platforms and long-span structures. Fortunately, with recent advances in technologies in sensing, wireless communication, and micro electro mechanical systems (MEMS), wireless sensor technique has been developing rapidly and is being used gradually in the SHM of civil engineering structures. In this paper, some recent advances in the research, development, and implementation of wireless sensors for the SHM of civil infrastructures in mainland China, especially in Dalian University of Technology (DUT) and Harbin Institute of Technology (HIT), are introduced. Firstly, a kind of wireless digital acceleration sensors for structural global monitoring is designed and validated in an offshore structure model. Secondly, wireless inclination sensor systems based on Frequency-hopping techniques are developed and applied successfully to swing monitoring of large-scale hook structures. Thirdly, wireless acquisition systems integrating with different sensing materials, such as Polyvinylidene Fluoride(PVDF), strain gauge, piezoresistive stress/strain sensors fabricated by using the nickel powder-filled cement-based composite, are proposed for structural local monitoring, and validating the characteristics of the above materials. Finally, solutions to the key problem of finite energy for wireless sensors networks are discussed, with future works also being introduced, for example, the wireless sensor networks powered by corrosion signal for corrosion monitoring and rapid diagnosis for large structures.

Static Type Inference Based on Static Single Assignment for Bytecode (바이트코드를 위한 정적 단일 배정문 기반의 정적 타입 추론)

  • Kim Ji-Min;Kim Ki-Tea;Kim Je-Min;Yoo Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.4 s.42
    • /
    • pp.87-96
    • /
    • 2006
  • Although bytecode has many good features, it has slow execution speed and it is not an ideal representation for program analysis or optimization. For analysises and optimizations. bytecode must be translated to a Static Single Assignment Form(SSA Form) But when bytecode is translated a SSA Form it has lost type informations of son variables. For resolving these problem in this paper, we create extended control flow graph on bytecode. Also we convert the control flow graph to SSA Form for static analysis. Calculation about many informations such as dominator, immediate dominator. dominance frontier. ${\phi}$-Function. renaming are required to convert to SSA Form. To obtain appropriate type for generated SSA Form, we proceed the followings. First. we construct call graph and derivation graph of classes. And the we collect information associated with each node. After finding equivalence nodes and constructing Strongly Connected Component based on the collected informations. we assign type to each node.

  • PDF