• Title/Summary/Keyword: time variant problems

Search Result 39, Processing Time 0.023 seconds

A study of Self-Tuning PI Speed Controller Based on Fuzzy for Permanent Magnet Linear Synchronous Motor (선형 영구자석형 동기 전동기의 Fuzzy 기반 Self-Tuning PI 속도 제어기에 관한 연구)

  • Lee Chin-Ha;Choi Cheol;Kim Cheul-U
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.9 no.6
    • /
    • pp.602-611
    • /
    • 2004
  • Servo system has commonly adapted PI controller with fixed gains, because of its simplicity and determinative relationship among the parameters. The fixed gains PI system may be applied well to some operation conditions, but not non-linearities, complex and time variant operation conditions. For solving these problems, another conventional method, 'variable gun schedule according to speed', is published. The value of gain is determined according to the absolute value of the mover real speed. In this paper, FSTPIC(Fuzzy Self-Tuning PI Controller) is proposed based on various experiences to rapidly reduce speed error and to secure a good speed response characteristics. The effectiveness of proposed algorithms is demonstrated by comparing to two conventional gain systems via 4-quadrant operation.

Development of a Storage-Reliability Estimation Method Using Quantal Response Data for One-Shot Systems with Low Reliability-Decreasing Rates (미소한 신뢰도 감소율을 가지는 원샷 시스템의 가부반응 데이터를 이용한 저장 신뢰도 추정방법 개발)

  • Jang, Hyun-Jeung;Son, Young-Kap
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.35 no.10
    • /
    • pp.1291-1298
    • /
    • 2011
  • This paper proposes a new reliability estimation method for one-shot systems using quantal response data, which is based on a parametric estimation method. The proposed method considers the time-variant failure ratio of the quantal response data and it can overcome the problems in parametric estimation methods. Seven reliability estimation methods in the literature were compared with the proposed method in terms of the accuracy of reliability estimation in order to verify the proposed method. To compare the accuracy of reliability estimation, the SSEs (Sum of Squared Error) of the reliability estimation results for the different estimation methods were evaluated according to the various numbers of samples tested. The proposed method provided more accurate reliability estimation results than any of the other methods from the results of the accuracy comparison.

Bioprocess Control for Continuous Culture of Dunaliella Salina in Flat Panel Photobioreactor (평판형 광생물반응기의 Dunaliella Salina 연속배양을 위한 생물공정 제어)

  • Kim, Gwang Ho;Ahn, Dong-Gyu;Park, Jong Rak;Choi, Gang Hun;Kim, Jong Tye;Kim, Ki Won;Jeong, Sang Hwa
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.30 no.2
    • /
    • pp.137-142
    • /
    • 2013
  • The indiscriminate use of the fossil fuel has caused serious environmental pollutions such as the shortage of energy and global warming. Microalgae have being emphasized as $3^{rd}$ generation biomass which makes the carbon dioxide reduce effectively as well as produces the biofuel. Large scale production of microbial biomass by continuous culture is a quite challenging issue, because off-line optimization strategies of a microbial process utilizing a model-based scheme give rise to many difficult problems. In this paper, the static and simple control method which was able to be applied in time-variant growth environment and large scale of algae culture was studied. The significant disturbances in on-line measurement of cell density were reduced by Savitzky-Golay FIR smoothing filter. Dunaliella salina was cultivated continuously in a flat panel photobioreactor by the on-off control of the turbidostat process.

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.

A Study on MQTT based on Priority Topic for IIoT (IIoT용 우선순위 토픽 기반 MQTT에 관련한 연구)

  • Oh, Se-Chun;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.63-71
    • /
    • 2019
  • Recently, there has been a lot of research on the construction of smart factory in the 4th Industrial Revolution era. Among the various technologies involved in the deployment of smart factory, one of the key technologies is the IoT protocol sector that handles the transmission and reception of data. In this regard, the MQTT protocol is generally used most commonly, but the existing MQTT technology lacks the concept of priorities of messages, so it is somewhat insufficient to be applied to an industrial field requiring real-time property. Priority handling of urgent messages is critical, especially in emergency situations, such as the emergency shutdown of the entire relevant facility following the failure of a particular facility. To improve this, research on priority-based MQTT is being conducted somewhat, but these studies have problems with actual field use because they are a variant of the MQTT standard. Therefore, this study conducts and verifies studies related to MQTT, which can prioritize messages while adhering to existing MQTT standards.

A Countermeasure against a Whitelist-based Access Control Bypass Attack Using Dynamic DLL Injection Scheme (동적 DLL 삽입 기술을 이용한 화이트리스트 기반 접근통제 우회공격 대응 방안 연구)

  • Kim, Dae-Youb
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.380-388
    • /
    • 2022
  • The traditional malware detection technologies collect known malicious programs and analyze their characteristics. Then such a detection technology makes a blacklist based on the analyzed malicious characteristics and checks programs in the user's system based on the blacklist to determine whether each program is malware. However, such an approach can detect known malicious programs, but responding to unknown or variant malware is challenging. In addition, since such detection technologies generally monitor all programs in the system in real-time, there is a disadvantage that they can degrade the system performance. In order to solve such problems, various methods have been proposed to analyze major behaviors of malicious programs and to respond to them. The main characteristic of ransomware is to access and encrypt the user's file. So, a new approach is to produce the whitelist of programs installed in the user's system and allow the only programs listed on the whitelist to access the user's files. However, although it applies such an approach, attackers can still perform malicious behavior by performing a DLL(Dynamic-Link Library) injection attack on a regular program registered on the whitelist. This paper proposes a method to respond effectively to attacks using DLL injection.

A Heuristic Algorithm for the Two-Dimensional Bin Packing Problem Using a Fitness Function (적합성 함수를 이용한 2차원 저장소 적재 문제의 휴리스틱 알고리즘)

  • Yon, Yong-Ho;Lee, Sun-Young;Lee, Jong-Yun
    • The KIPS Transactions:PartB
    • /
    • v.16B no.5
    • /
    • pp.403-410
    • /
    • 2009
  • The two-dimensional bin packing problem(2D-BPP) has been known to be NP-hard, and it is difficult to solve the problem exactly. Many approximation methods, such as genetic algorithm, simulated annealing and tabu search etc, have been also proposed to gain better solutions. However, the existing approximation algorithms, such as branch-and-bound and tabu search, have shown the low efficiency and the long execution time due to a large of iterations. To solve these problems, we first define the fitness function to simplify and increase the utility of algorithm. The function decides whether an item is packed into a given area, and as an important information for a packing strategy, the number of subarea that can accommodate a given item is obtained from the variant of the fitness function. Then we present a heuristic algorithm BF for 2D bin packing, constructed by the fitness function and subarea. Finally, the effectiveness of the proposed algorithm will be expressed by the comparison experiments with the heuristic and the metaheuristic of the literatures. As comparing with existing heuristic algorithms and metaheuristic algorithms, it has been found that the packing rate of algorithm BP is the same as 97% as existing heuristic algorithms, FFF and FBS, or better than them. Also, it has been shown the same as 86% as tabu search algorithm or better.

A Study on the optimized Performance Designing of the Window of the Apartment based on the Annual Energy Demand Analysis according to the Azimuth Angle applying the Solar Heat Gain Coefficient of the Window (창호에 SHGC를 반영한 공동주택의 방위각별 에너지 효율성 평가를 통한 합리적인 창호 계획 방안 연구)

  • Lee, Jang-bum
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.11
    • /
    • pp.25-34
    • /
    • 2019
  • It is important to design windows in a reasonable way considering the performance characteristics of the elements of the window rather than just to increase the thermal energy performance of the window. In this study, the Heat-transfer Coefficient as insulation performance of the windows and together with the grade of the glass's SHGC (Solar Heat Gain Coefficient) were analyzed to relate to the energy efficiency performance of the building by azimuth angle. Based on this basic study, the Heat-transfer Coefficient of windows and the SHGC rating of glass were applied to the unit plan of apartment building, and the Heating and Cooling Demand were analyzed by azimuth angle. Apartment plan types were divided into 2 types of Non-extension and extension of balcony. The designPH analysis data derived from the variant of the Heat-transfer Coefficient and SHGC, were put into PHPP(Passive House Planning Package) to analyze precisely the energy efficiency(Heating and Cooling Demands) of the building by azimuth angle. In addition, assuming the 'ㅁ' shape layout, energy efficiency performance and potential of PV Panel installation also were analyzed by floors and azimuth angle, reflecting the shading effects by surrounding buildings. As the results of the study, the effect of Heat Gain by SHGC was greater than Heat Loss due to the Heat-transfer Coefficient. So it is more effective to increase SHGC to satisfy the same Heating Demand, and increasing SHGC made possible to design windows with low Heat-transfer Coefficient. It was also revealed that the difference in annual Heating and Cooling Demands between the low, mid and high floor households is significantly high. In addition to it, the installation of PV Panel in the form of a shading canopy over the window reduces the Cooling Load while at the same time producing electricity, and also confirmed that absolute thermal energy efficiency could not be maximized without controlling the thermal bridge and ventilation problems as important heat loss factors.

Tunnel-lining Back Analysis Based on Artificial Neural Network for Characterizing Seepage and Rock Mass Load (투수 및 이완하중 파악을 위한 터널 라이닝의 인공신경망 역해석)

  • Kong, Jung-Sik;Choi, Joon-Woo;Park, Hyun-Il;Nam, Seok-Woo;Lee, In-Mo
    • Journal of the Korean Geotechnical Society
    • /
    • v.22 no.8
    • /
    • pp.107-118
    • /
    • 2006
  • Among a variety of influencing components, time-variant seepage and long-term underground motion are important to understand the abnormal behavior of tunnels. Excessiveness of these two components could be the direct cause of severe damage on tunnels, however, it is not easy to quantify the effect of these on the behavior of tunnels. These parameters can be estimated by using inverse methods once the appropriate relationship between inputs and results is clarified. Various inverse methods or parameter estimation techniques such as artificial neural network and least square method can be used depending on the characteristics of given problems. Numerical analyses, experiments, or monitoring results are frequently used to prepare a set of inputs and results to establish the back analysis models. In this study, a back analysis method has been developed to estimate geotechnically hard-to-known parameters such as permeability of tunnel filter, underground water table, long-term rock mass load, size of damaged zone associated with seepage and long-term underground motion. The artificial neural network technique is adopted and the numerical models developed in the first part are used to prepare a set of data for learning process. Tunnel behavior, especially the displacements of the lining, has been exclusively investigated for the back analysis.