• Title/Summary/Keyword: real-time mechanism

Search Result 1,052, Processing Time 0.035 seconds

Development of an Algorithm for Predictable Navigation and Collision Avoidance Using Pattern Recognition of an Obstacle in Autonomous Mobile Robot (장애물 패턴을 이용한 자율이동로봇의 예측주행 및 충돌회피 알고리즘 개발)

  • Lee, Min-Chul;Kim, Bum-Jae;Lee, Seok
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.7
    • /
    • pp.113-123
    • /
    • 2000
  • In the navigation for a mobile robot, the collision avoidance with unexpected obstacles is essential for the safe navigation and it is independent of the technique used to control the mobile robot. This paper presents a new collision avoidance algorithm using neural network for the safe navigation of the autonomous mobile robot equipped with CAN and ultrasonic sensors. A tracked wheeled mobile robot has a stability and an efficiency to move on a rough ground. And its mechanism is simple. However it has difficulties to recognize its surroundings. Because the shape of the tracked wheeled mobile robot is a square type, sensor modules are generally located on the each plane surface of 4 sides only. In this paper, the algorithm using neural network is proposed in order to avoid unexpected obstacles. The important character of the proposed algorithm is to be able to detect the distance and the angle of inclination of obstacles. Only using datum of the distance and the angle, informations about the location and shape of obstacles are obtained, and then the driving direction is changed. Consequently, this algorithm is capable of real time processing and available for a mobile robot which has few sensor modules or the limited sensing range such as a tracked wheeled mobile robot. Effectiveness of the proposed algorithm is illustrated through a computer simulation and an experiment using a real robot.

  • PDF

A study on implementation of software development environment for SDL (통신 프로토콜 명세 언어 SDL을 위한 소프트웨어 개발 환경 구현)

  • Choe, Yeong-Han;Kim, Seong-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1522-1533
    • /
    • 1996
  • This paper presents a programming environment for the edition and verification of specification language SDL. It is implemented in the Concerto software factory, which has been as a support for the development of real size software. Concerto is a software factory designed for application development in the fields of computer communication protocols or real time system. It offers various kinds of tools to produce software, organize this production and automate it. Concerto allows a smooth integration of various formalism such as the C and $C^{++}$, languages, structured documentation, HOOD methodology (Hierarchical Object Orient Design). In this paper, as an important tools in the process of communication protocol software development, we describe fist describe the principles of this environment, then we illustrate its application by means of a simple example, the Inres protocol. Moreover, we study how hypertext mechanism of Concert to create logical links between a protocol and its asscoiated service.

  • PDF

A Study of Modeling and Utilization for Software Enhancement Process Based on Business scenarios (업무 시나리오를 기반으로 한 소프트웨어 개선 프로세스의 모델링 및 활용에 관한 연구)

  • Kim, Hyung-Mok;Rhew, Sung-Yul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.8
    • /
    • pp.121-129
    • /
    • 2013
  • As more than 80 percent of tasks within corporations are performed through information systems, they have become large in scale and complicated, which make the range of the system users diverse and specialized. and as recent corporate strategies focus on the real-time environment in businesses, the organizational structure within companies tend to show frequent changes. In order to ensure the business continuity in this environment, the most important aspect is to prevent incompleteness of business by narrowing the gap of understanding of business process between the system users and the maintenance managers. In order to address this problem, this study suggests a modeling method that utilizes business scenarios reflecting actual business rules and procedures which ultimately transforms the optimized and standardized form of business scenarios into the actual software maintenance activities. This modeling method improves reusability and usability through the repeated feedback mechanism for modified software by leading to gradual fine-grained process. The feasibility of this is to be proven by applying the modeling method to the real business environment.

Implementation of Absolute Delay Differentiation Scheme in Next-Generation Networks (차세대 네트워크에서의 절대적 지연 차별화 기능 구현)

  • Paik, Jung-Hoon;Kim, Dae-Ub;Joo, Bheom-Soon
    • 전자공학회논문지 IE
    • /
    • v.45 no.1
    • /
    • pp.15-23
    • /
    • 2008
  • In this paper, an algorithm, that provisions absolute differentiation of packet delays is proposed, simulated, and implemented with VHDL on XPC 860 CPU based test board with an objective for enhancing quality of service (QoS) in future packet networks. It features a scheme that compensates the deviation for prediction on the traffic to be arrived continuously. It predicts the traffic to be arrived at the beginning of a time slot and measures the actual arrived traffic at the end of the time slot and derives the difference between them. The deviation is utilized to the delay control operation for the next time slot to offset it. As it compensates the prediction error continuously, it shows superior adaptability to the bursty traffic as well as the exponential traffic. It is demonstrated through both simulation and the real traffic test on the board that the algorithm meets the quantitative delay bounds and shows superiority to the traffic fluctuation in comparison with the conventional non-adaptive mechanism.

A Remote SNMP Connection Request Mechanism for NATed Devices using UDP Hole Punching and Heuristic Hole Binding Time Search (UDP 홀 펀칭과 경험적 홀 유지시간 탐색을 이용한 NAT 환경단말의 SNMP 원격 접속요청 메커니즘)

  • Park, Choon-Gul;Kim, Seong-Il;Jeong, Ki-Tae;Lee, Young-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.5
    • /
    • pp.367-373
    • /
    • 2008
  • Recently, the NAT middlebox widely deployed in the home network environment prohibits DM operations from reaching user devices behind NAT. In this article, we focus on NAT issues to manage home network devices. Particularly, we discuss standardization efforts, and present our proposal to deploy DM services for VoIP and IPTV devices under NAT. By slightly changing behaviors of Simple Network Management Protocol (SNMP) Manager and Agent, and defining additional Management Objects (MOs) to gather NAT binding information, we could solve the NAT traversal problem under symmetric NAT. Moreover, we propose an enhanced method to search the UDP hole binding time of the NAT box. We applied our method to randomly selected 22 VoIP devices out of 194 NATed hosts in the real broadband network and have achieved 99% of the success ratio for exchanging SNMP request messages and 26% of enhancement for searching the UDP hole binding time.

A Dynamic Sweep Scheme Enabling Scheduling Period Expansions for Continuous Media Playback (연속매체 재연에 적합한 스케줄링 주기 확장을 허용하는 동적 Sweep 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.12A no.5 s.95
    • /
    • pp.355-364
    • /
    • 2005
  • With fast advances in computing power and network technologies, online streaming services of continuous media (CM) have been popularly implemented on the Web. To implement such services, a variety of CM streams need to be processed efficiently, so that the Sweep scheme was proposed. This scheme has several advantages such as hiccup-free playbacks and seek-time optimization. In this scheme, however, the entire CM streams are scheduled with a single scheduling period, called a cycle. Since only one scheduling period is allowed in this scheme, a significant amount of disk time is usually wasted because of its inflexible disk schedules. To solve this, we propose a new dynamic Sweep scheme. For this, we devise an algorithm that is able to expand scheduling periods of serviced CM streams and propose a new admission control mechanism guaranteeing hiccup-free playbacks. To show performance gains, we execute various simulation experiments. From the experimental results, we can see that the proposed scheme outperforms the Sweep scheme in terms of disk utilization and scheduling flexibility.

Incremental Channel Scan Scheme based on Neighbor Channel Information in IEEE 802.11 Wireless LANs (IEEE 802.11 무선 랜에서 이웃 채널 정보에 기반한 점진적 채널 스캔 방법)

  • Huh, Nam Chul;Kim, Sunmyeng
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.5
    • /
    • pp.25-35
    • /
    • 2015
  • Handoff is a critical issue for seamless roaming in IEEE 802.11-based wireless networks. In order to provide real-time services, handoff mechanism must be provided. However, the IEEE 802.11 standard handoff is not appropriate to provide the services, because it is based on the full-scanning approach which spends too much time searching Access Point (AP). In this paper, we propose a new scheme, which can reduce the scanning latency. A station performs full-scanning operation for finding APs when it enters wireless networks for the first time. The station sends the scanned channel information to AP. AP maintains the neighbor channel table based on the information received from stations. A station performs the partial-scanning by using the table. Therefore, the proposed scheme can reduce the scanning latency.

Signature-based Broadcast Authentication for Wireless Sensor Networks (무선센서네트워크 환경에서 서명 기반 브로드캐스트 인증)

  • Koo, Woo-Kwon;Lee, Hwa-Seong;Kim, Yong-Ho;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.139-144
    • /
    • 2007
  • A broadcast authentication is important and fundamental consideration for security in wireless sensor networks. Perigg et al suggests ${\mu}-TESLA$ used a key chain. But it is unavoidable the delay of time to authenticate packets. so it is hard to meet the property that most application of sensor are performed in real-time. To cope with these problems we propose an efficient broadcast authentication scheme which has no delay of time and provides re-keying mechanism. we also describe an analysis of security and efficiency for this scheme.

Anomaly detection in blade pitch systems of floating wind turbines using LSTM-Autoencoder (LSTM-Autoencoder를 이용한 부유식 풍력터빈 블레이드 피치 시스템의 이상징후 감지)

  • Seongpil Cho
    • Journal of Aerospace System Engineering
    • /
    • v.18 no.4
    • /
    • pp.43-52
    • /
    • 2024
  • This paper presents an anomaly detection system that uses an LSTM-Autoencoder model to identify early-stage anomalies in the blade pitch system of floating wind turbines. The sensor data used in power plant monitoring systems is primarily composed of multivariate time-series data for each component. Comprising two unidirectional LSTM networks, the system skillfully uncovers long-term dependencies hidden within sequential time-series data. The autoencoder mechanism, learning solely from normal state data, effectively classifies abnormal states. Thus, by integrating these two networks, the system can proficiently detect anomalies. To confirm the effectiveness of the proposed framework, a real multivariate time-series dataset collected from a wind turbine model was employed. The LSTM-autoencoder model showed robust performance, achieving high classification accuracy.

Statistical analyses on the relationships between red tide formation and meteorological factors in the Korean Coastal Waters and Satellite monitoring for red tide (한국 연안의 적조형성과 기상용인간의 상관성에 대한 통계학적 해석 및 위성에 의한 적조모니터링)

  • Yoon Hong-Joo;Lee Moon-Ok;Ryu Cheong-Ro
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2004.05a
    • /
    • pp.279-284
    • /
    • 2004
  • Red tide(harmful algae) in the Korean Coastal Waters has a given a great damage to the fishery every year. However, the aim of our study understands the influence of meteorological factors (air and water tempaerature, precipitation, sunshine, solar radiation, winds) relating to the mechanism of red tide occurrence and monitors red tide by satellite remote sensing, and analyzes the potential area for red tide occurrence by GIS. The meteorological factors have directly influenced on red tide formation. Thus, We want to predict and apply to red tide formation from statistical analyses on the relationships between red tide formation and meteorological factors. In future, it should be realized the near real time monitoring for red tide by the development of remote sensing technique and the construction of integrated model by the red tide information management system (the data base of red tide - meteorological informations).

  • PDF