• Title/Summary/Keyword: 수행 회피

Search Result 505, Processing Time 0.024 seconds

Development of Small Biped Entertainment Robot Using Embedded System (임베디드 시스템을 이용한 소형 엔터테인먼트 이족 로봇 개발)

  • Sheen, Chang-Hoon;Lee, Dong-Myoung;Guack, Yong-Ook;Lee, Jung-Ho;Ha, Jong-Eun
    • Annual Conference of KIPS
    • /
    • 2005.11a
    • /
    • pp.1433-1436
    • /
    • 2005
  • 임베디드 시스템의 발전으로 현재 진보된 로봇 시스템들은 운영 체제, 비젼 시스템 및 센서 시스템들을 별도의 호스트 PC의 도움 없이 독립적으로 탑재하여 가동 시킬 수 있다. 본 논문에서는 임베디드 시스템을 이용한 SBER (Small Biped Entertainment Robot)에 필요한 로봇의 제어기 구조와 로봇에 최적화된 임베디드 시스템을 구현한다. 또한 주 프로세서와 주 컨트롤러를 탑재한 최적화된 소형 엔터테인먼트 이족 로봇 개발을 목적으로 한다. SBER은 TI사의 DSP인 TMS320LF2407A를 로봇의 주 컨트롤러로 사용하여 로봇의 관절 제어를 통한 기본적인 보행 실험과 음원의 위치를 파악하기 위한 음원 위치 추적 문제를(Sound Localization) 수행한다. 또한 Intel사의 PXA255A를 주 프로세서로 사용하여 연산량이 높은 영상처리 알고리즘과 감정 표현, 장애물 인식 및 장애물 회피를 적용하여 보다 지능적인 로봇 시스템을 구현한다.

  • PDF

Mitigating Hidden Nodes Collision and Performance Enhancement in IEEE 802.15.4 Wireless Sensor Networks (IEEE 802.15.4 기반의 무선 센서네트워크에서 숨은노드 충돌 방지와 성능향상 기법)

  • Ahn, Kwang-Hoon;Kim, Taejoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.7
    • /
    • pp.235-238
    • /
    • 2015
  • IEEE 802.15.4 is the well-established standard enabling wireless connectivities among wireless sensor nodes. However, the wireless sensor networks based on IEEE 802.15.4 are inherently vulnerable to hidden nodes collision because the wireless sensor nodes have very limited communication range and battery life time. In this paper, we propose the advanced method of mitigating hidden nodes collision in IEEE 802.15.4 base wireless sensor networks by clustering sensor nodes according to channel quality information. Moreover, we deal with the problem of resource allocation for each cluster.

A Study on the Spectrum Assignment Method for CR-related Intra Wireless Devices (CR 적용형 실내 무선기기의 주파수혼용기술 연구)

  • Lee, Kwang-Hee;Park, Gye-Kack;Jeon, Tae-Hyen;Choi, Sung-Jin;Cha, Jae-Sang;Lee, Min-Ho;Kim, Ji-Hyung;Lee, Jung-Hoon;Kim, Seong-Kweon
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.351-354
    • /
    • 2008
  • 유비쿼터스 네트워크의 실현을 위하여 다양한 연구가 진행되면, CR (Cognitive Radio) 구성의 연구는 주파수 자원의 효율적인 활용에 관한 연구를 부각시키고 있다. 또한, CR 적용형 소출력 무선기기의 활용에 따른 공유주파수대역의 소요대역폭에 대한 논의와 공통으로 사용하는 주파수 대역 내에서 혼용되는 통신기기들의 user 수를 만족하는 총 소요대역폭 산출은 더불어 중요한 작업이 되었다. 공통으로 사용하는 주파수 대역의 총 소요대역폭 산출은 소출력 무선기기의 간섭 회피 기술로 사용되는 Frequency Hopping (FH) 및 Listen Before Talk (LBT) 방식이 고려되어야 한다. 본 논문에서는 Cognitive Radio (CR) 기반의 LBT 방식을 사용하는 ZigBee와 FH 방식을 사용하는 DCP, RFID, Bluetooth 등의 소출력 무선기기가 공통으로 사용하는 주파수 대역에 공존할 경우를 가정하고, 대기행렬이론 (Queuing Theory)을 적용하여 소요대역폭 산출을 수행했다. 채널수 별 user의 통신시도에 따른 throughput을 분석한 결과, throughput 84% 이상의 조건에서 FH 및 LBT 방식을 사용하는 250mW 소출력 무선기기들이 공존하는 공유주파수대역의 적정 채널수는 35개를 가지며, 총 소요대역폭은 채널수와 채널대역폭의 곱으로 산출이 가능함을 보였다. 이러한 접근방법은 다른 통신시스템의 소요대역폭 산출에도 유용할 것이다.

  • PDF

Optimal Path Planning for UAVs under Multiple Ground Threats (다수 위협에 대한 무인항공기 최적 경로 계획)

  • Kim, Bu-Seong;Bang, Hyo-Chung;Yu, Chang-Gyeong;Jeong, Eul-Ho
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.34 no.1
    • /
    • pp.74-80
    • /
    • 2006
  • This paper addresses the trajectory optimization of Unmanned Aerial Vehicles(UAVs) under multiple ground threats like enemy's anti-air radar sites. The power of radar signal reflected by the vehicle and the flight time are considered in the performance cost to be minimized. The bank angle is regarded as control input for a 1st-order lag vehicle, and input parameter optimization method based on Sequential Quadratic Programming (SQP) is used for trajectory optimization. The proposed path planning method provides more practical trajectories with enhanced survivability than those of Voronoi diagram method.

Doppler Frequency Estimation Robust to Synchronization Error and Noise in FMT Systems (FMT 시스템에서 동기 오차와 잡음에 강인한 도플러 주파수 추정 기법)

  • Yeom, Jae-Heung;Jo, Yeong-Hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6C
    • /
    • pp.572-579
    • /
    • 2010
  • Filtered multi-tone (FMT) is a form of multicarrier modulation utilizing frequency-domain equalization efficient in multi-path fading channels. Doppler frequency information can be employed for channel estimation and link adaptation to improve the performance. However, most previous studies have concentrated on the orthogonal frequency division multiplexing (OFDM) instead of FMT. Moreover, they have not considered the synchronization error that can commonly occur in practical systems. In this paper, we propose Doppler frequency estimation scheme that is effective in FMT systems with residual synchronization error and high noise levels.

Analysis and Design of Dron System for Smart Safety-City Platform Construction (스마트 안전도시 플랫폼 구축을 위한 드론 시스템의 분석 및 설계)

  • Cho, Byung-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.93-99
    • /
    • 2020
  • It seems to be increased rapidly that practical uses of intelligent Dron for public mission performance such as surveillance, prevention of disaster accident, relief etc with Dron technology development. Dron is needed for major technology realization of detection and trace technology of target, flight control and obstacle avoidance during flighting, detection and control of landing point functions to use smart safety-city platform construction. This dron system cause a great ripple effect technically and promote industrialization in the field of new technology. In this paper, an effective analysis and design method of dron system software will be presented by showing user requirement analysis using object-oriented method, flowchart and screen design.

Design and Analysis of Collision Alarm Using Infrared Distance Sensor (적외선 거리 센서를 사용한 충돌 경보기 설계 및 특성 분석)

  • Kim, Byoung-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.6
    • /
    • pp.634-639
    • /
    • 2014
  • This paper specifies a collision alarm using an infrared distance sensor that can identify the dangerousness of collision of active mobile robotic systems to various objects, such as unknown objects or another robots. And we analyse the major operating signals and features of the collision alarm for effective industrial applications. For the purpose, we consider a typical parking situation of a mobile robotic system with the collision alarm designed. As a result, it is shown that the proposed collision alarm is applicable for effective collision avoidance and safe driving of various mobile robots or vehicles.

The Study on Development of Intergrated Ship's Traffic Flow Simulation Model based on Collision Avoidance Function (피항판단평가함수를 고려한 선박교통흐름 통합프로그램의 구축에 관한 연구)

  • Seong, Yu-Chang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.16 no.1
    • /
    • pp.101-106
    • /
    • 2010
  • Marine transportation system plays an important role in maintaining and promoting economic activities among countries. The accurate understanding of marine traffic flows are necessary for the further advancement of marine transportation system. While many existing researches on marine traffic have been conducted mainly on the basis of statistical analysis using traffic data, ship's traffic flow simulation model was developed in this study. A collision avoidance algorithm was conducted with categorizing of traffic factors such as ship's length and speed. The developed model was also verified by a simulation process.

Secure logging system with self-protecting function (자체 보호 기능을 갖는 안전한 로깅 시스템)

  • Kim, Min-Su;No, Bong-Nam
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.9
    • /
    • pp.2442-2450
    • /
    • 1999
  • The audit logging system is to write the details of systems use and access on networks. These details are used for trailing the route, when illegal access or using system resource is occurred on networks. The logging system therefore, might be the first target of intruder. We developed the logging system which writes the information of logging and command execution on UNIX system. And we prepared the self-protecting functions of blocking intruder's attack on the logging system. They are protecting the logging process and the log file. To protect the logging process, we made it keep changing the process ID to avoid the intruder's attack. To protect the log file, we use hard link and mandatory file locking, so it can make it impossible to delete or change log file.

  • PDF

Draft Design of 2-Factor Authentication Technique for NFC-based Security-enriched Electronic Payment System (보안 강화를 위한 NFC 기반 전자결제 시스템의 2 팩터 인증 기술의 초안 설계)

  • Cha, ByungRae;Choi, MyeongSoo;Park, Sun;Kim, JongWon
    • Smart Media Journal
    • /
    • v.5 no.2
    • /
    • pp.77-83
    • /
    • 2016
  • Today, the great revolution in all financial industrial such as bank have been progressing through the utilization of IT technology actively, it is called the fintech. In this paper, we draw the draft design of NFC-based electronic payment and coupon system using FIDO framework to apply the 2 factor authentication technique for strength security. In detailed, we will study that the terminal device in front-end will be applied the 2 factor authentication and electric signature, and cloud-based payment gateway in back-end will be applied malicious code detection technique of distributed avoidance type.