• Title/Summary/Keyword: 능동규칙

Search Result 143, Processing Time 0.027 seconds

Frequency Shaped Optimal Control of Semi-active Suspension System Using an MR Damper (자기유변유체를 이용한 반능동형 현가장치의 Frequency shaped 최적 제어)

  • 김기덕;이재형;전도영
    • The Korean Journal of Rheology
    • /
    • v.11 no.2
    • /
    • pp.112-121
    • /
    • 1999
  • An MR(Magneto-Rheological) fluids damper is designed and applied to vibration suppression of a 1/4 car model. The damping constant of MR damper changes according to input current which is controlled in a semi-active way. Several control algorithms are compared in simulations and experiments. The advantage of the proposed Frequency shaped LQ control is that passenger comfort is emphasized in the range of 4~8Hz and driving safety is emphasized around the resonance frequency of unsprung mass.

  • PDF

Stochastic Radar Beam Scheduling Using Simulated Annealing (Simulated Annealing을 이용한 추계적 레이더 빔 스케줄링 알고리즘)

  • Roh, Ji-Eun;Ahn, Chang-Soo;Kim, Seon-Joo;Jang, Dae-Sung;Choi, Han-Lim
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.23 no.2
    • /
    • pp.196-206
    • /
    • 2012
  • AESA radar is able to instantaneously and adaptively position and control the beam, and such adaptive beam pointing of AESA radar enables to remarkably improve the multi-mission capability, compared with mechanically scanned array radar. AESA radar brings a new challenges, radar resource management(RRM), which is a technique efficiently allocating finite resources, such as energy and time to each task in an optimal and intelligent way. Especially radar beam scheduling is the most critical component for the success of RRM. In this paper, we proposed stochastic radar beam scheduling algorithm using simulated annealing(SA), and evaluated the performance on the multi-function radar scenario. As a result, we showed that our proposed algorithm is superior to previous dispatching rule based scheduling algorithm from the viewpoint of beam processing latency and the number of scheduled beams, with real time capability.

A Teaching-Learning Model for Cultivating Consciousness of Information and Communication Ethics by the Establishment of Ego Identity on Cyberspace (사이버 공간상의 자아정체성 확립을 통한 정보통신윤리 의식 함양 교수-학습 모형)

  • Sin, Mi-Jin;Lee, Jae-Woon;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.3
    • /
    • pp.97-107
    • /
    • 2006
  • The deviant behaviors on cyberspace in Korea are increased recently because of the unbalanced development between the social ethics and the technological improvement on information and communication technology. To overcome this, educations on information and communication ethics are executed in school. However most of the educations is to deliver the knowledge on the disfunction of informationization and rules of netiquette without the analysis of the psychological characteristics on the cyberspace. Therefore, educations on information and communication ethics, in which the changes of social behaviors and value attitude are essential, is ineffective by making the students as passive and enervated users. In this research, we developed a teaching-learning model for cultivating consciousness of information and communication ethics by the establishment of ego identity on cyberspace and then proved the effectiveness by the experiment in school. Students can raise their abilities on active dealing with the given situation and context according to this teaching-learning model.

  • PDF

The Generalization of the Area of Internal Triangles for the GSP Use of Mathematically Gifted Students (중등 영재학생들의 GSP를 활용한 내분삼각형 넓이의 일반화)

  • Lee, Heon-Soo;Lee, Kwang-Ho
    • Journal of the Korean School Mathematics Society
    • /
    • v.15 no.3
    • /
    • pp.565-584
    • /
    • 2012
  • This study investigates how the GSP helps gifted and talented students understand geometric principles and concepts during the inquiry process in the generalization of the internal triangle, and how the students logically proceeded to visualize the content during the process of generalization. Four mathematically gifted students were chosen for the study. They investigated the pattern between the area of the original triangle and the area of the internal triangle with the ratio of each sides on m:n respectively. Digital audio, video and written data were collected and analyzed. From the analysis the researcher found four results. First, the visualization used the GSP helps the students to understand the geometric principles and concepts intuitively. Second, the GSP helps the students to develop their inductive reasoning skills by proving the various cases. Third, the lessons used GSP increases interest in apathetic students and improves their mathematical communication and self-efficiency.

  • PDF

A Theoretical Study on the Mechanism of Occurrence of 'FUN' through Form-Giving (조형으로부터의 'Fun' 감성의 발생 메커니즘에 대한 이론적 고찰)

  • 김유진;이동연
    • Archives of design research
    • /
    • v.15 no.4
    • /
    • pp.139-148
    • /
    • 2002
  • This study deals with the occurrence and application of 'Fun' as a linguistic function through form-giving. As a linguistic function, Fun could be defined, in a broad sense, as an emotion of desire when in relation to artifacts, and, in a narrow sense, as a physical or mental response when a person discovers unexpected information or artifacts. Hence, the occurrence of 'Fun' could be an analogy of a removal of a 'mental block' from using (or perceiving) artifacts. As an aspect of cognitive psychology, the context of form-giving, which has meanings in both artifact and design activity, will deal with an important factor of form-giving. From that, the elements of the context and the transformation of the elements are suggestive of 'Fun-oriented form-giving'. Hence, this study will show how to deal with that elements, what is required condition on it, 'Fun' in form-giving, and the Mechanism of Occurrence of 'FUN' based on this study, will be expected to apply them for product-concept effectively and Form-Giving fashionably.

  • PDF

False Alarm Minimization Technology using SVM in Intrusion Prevention System (SVM을 이용한 침입방지시스템 오경보 최소화 기법)

  • Kim Gill-Han;Lee Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.3
    • /
    • pp.119-132
    • /
    • 2006
  • The network based security techniques well-known until now have week points to be passive in attacks and susceptible to roundabout attacks so that the misuse detection based intrusion prevention system which enables positive correspondence to the attacks of inline mode are used widely. But because the Misuse detection based Intrusion prevention system is proportional to the detection rules, it causes excessive false alarm and is linked to wrong correspondence which prevents the regular network flow and is insufficient to detect transformed attacks, This study suggests an Intrusion prevention system which uses Support Vector machines(hereinafter referred to as SVM) as one of rule based Intrusion prevention system and Anomaly System in order to supplement these problems, When this compared with existing intrusion prevention system, show performance result that improve about 20% and could through intrusion prevention system that propose false positive minimize and know that can detect effectively about new variant attack.

  • PDF

Implementation of Analyzer of the Alert Data using Data Mining (데이타마이닝 기법을 이용한 경보데이타 분석기 구현)

  • 신문선;김은희;문호성;류근호;김기영
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.1-12
    • /
    • 2004
  • As network systems are developed rapidly and network architectures are more complex than before, it needs to use PBNM(Policy-Based Network Management) in network system. Generally, architecture of the PBNM consists of two hierarchical layers: management layer and enforcement layer. A security policy server in the management layer should be able to generate new policy, delete, update the existing policy and decide the policy when security policy is requested. And the security policy server should be able to analyze and manage the alert messages received from Policy enforcement system in the enforcement layer for the available information. In this paper, we propose an alert analyzer using data mining. First, in the framework of the policy-based network security management, we design and implement an alert analyzes that analyzes alert data stored in DBMS. The alert analyzer is a helpful system to manage the fault users or hosts. Second, we implement a data mining system for analyzing alert data. The implemented mining system can support alert analyzer and the high level analyzer efficiently for the security policy management. Finally, the proposed system is evaluated with performance parameter, and is able to find out new alert sequences and similar alert patterns.

Hybrid FFT processor design using Parallel PD adder circuit (병렬 PD가산회로를 이용한 Hybrid FFT 연산기 설계)

  • 김성대;최전균;안점영;송홍복
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.499-503
    • /
    • 2000
  • The use of Multiple-Valued FFT(Fast fourier Transform) is extended from binary to multiple-valued logic(MVL) circuits. A multiple-valued FFT circuit can be implemented using current-mode CMOS techniques, reducing the transitor, wires count between devices to half compared to that of a binary implementation. For adder processing in FFT, We give the number representation using such redundant digit sets are called redundant positive-digit number representation and a Redundant set uses the carry-propagation-free addition method. As the designed Multiple-valued FFT internally using PD(positive digit) adder with the digit set 0,1,2,3 has attractive features on speed, regularity of the structure and reduced complexities of active elements and interconnections. for the mutiplier processing, we give Multiple-valued LUT(Look up table)to facilitate simple mathmatical operations on the stored digits. Finally, Multiple-valued 8point FFT operation is used as an example in this paper to illuatrates how a multiple-valued FFT can be beneficial.

  • PDF

275 GHz 이상 전파천문대역과 관련된 APG-11 2차 회의 결과

  • Chung, Hyun-Soo;Je, Do-Heung;Oh, Se-Jin;Roh, Duk-Gyoo;Sohn, Bong-Won;Lee, Sang-Sung;Kim, Hyo-Ryoung
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.46.1-46.1
    • /
    • 2010
  • APT(Asian-Pacific Telecommunity)는 아시아-태평양지역 국가의 공동이익을 도모하기 위하여 결성된 아-태지역 전파협의체 조직으로, WRC(세계전파통신회의)회의에서의 아-태지역 주관청의 공동이익을 얻기 위해 APG(APT Conference Preparatory Group for WRC)회의를 연간 1회의 비율로 개최하고 있다. WRC-12회의에 대비하여 결성된 APG-12 회의가 2010년 3월 태국 방콕에서 개최되었으며, 전파천문업무 보호 및 22 GHz 대역 달탐사, 38 GHz 대역 Space-VLBI운용대역과 관련된 WRC-12 의제 1.6, 1.11, 1.12 등에 대해 활발한 토론이 있었다. WRC-12 의제 1.6은 수동업무(전파천문업무, 지구탐사위성 및 우주연구업무)를 능동업무의 유해혼신으로부터 보호하기 위하여 제정한 전파규칙 각주 5.565조의 개정 검토와 관련된 의제이다. 따라서 한국천문연구원에서는 275 GHz 이상 대역에서의 전파천문업무의 원활한 운용을 위해, WRC회의에서 최종적인 규정개정을 함에 있어서 필요한 아-태지역 국가의 공동의견을 창출하기 위한 APT회의에서 주도적인 역할을 담당하고 있다. 본 발표에서는 APG-12 3차 회의에 제출한 우리나라의 기고서 제출 결과 및 동 회의에서의 최종결과 및 향후 대응책에 대해서도 알아보고자 한다.

  • PDF

A Development of Energy Storage Monitoring System Architecture for Triboelectric Nanogenerator in the Implant Environment (임플란트 환경에서 TENG 소자를 고려한 효율적인 에너지 저장 모니터링 시스템 개발)

  • Park, Hyun-Moon;Hwang, Tae-Ho;Kim, Dong-Sun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.2
    • /
    • pp.473-480
    • /
    • 2018
  • In 2012, a new energy capturing method called TENG was suggested for energy harvesting applications. The TENG which captures electric energy in forms of friction or vibration has been researched as a new energy harvesting generation device. However, TENG works on rather high voltage and yields relatively low current, and this requires additional energy conversion and saving methods with either in semiconductive elements or circuitry for its application. Irregular generation from vibration sources rattle under 5Hz especially requires empirical studies. In this article, we suggest a electricity generation platform with energy storage methods. The platform is mounted on large sized animals, and the generation is actively monitored and controlled via Bluetooth-Low Energy to verify the platform.