• Title/Summary/Keyword: Approach of Network

Search Result 4,527, Processing Time 0.032 seconds

Implementation of Multiple Nonlinearities Control for Stable Walking of a Humanoid Robot (휴머노이드 로봇의 안정적 보행을 위한 다중 비선형 제어기 구현)

  • Kong, Jung-Shik;Kim, Jin-Geol;Lee, Bo-Hee
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.2
    • /
    • pp.215-221
    • /
    • 2006
  • This paper is concerned with the control of multiple nonlinearities included in a humanoid robot system. A humanoid robot has some problems such as the structural instability, which leads to consider the control of multiple nonlinearities caused by driver parts as well as gear reducer. Saturation and backlash are typical examples of nonlinearities in the system. The conventional algorithms of backlash control were fuzzy algorithm, disturbance observer and neural network, etc. However, it is not easy to control the system by employing only single algorithm since the system usually includes multiple nonlinearities. In this paper, a switching Pill is considered for a control of saturation and a dual feedback algorithm is proposed for a backlash control. To implement the above algorithms, the system identification is firstly performed for the minimization of the difference between the results of simulation and experiment, and then the switching Pill gains are determined using genetic algorithm with some heuristic approach. The performance of the switching Pill controller for saturation and the dual feedback for backlash control is investigated through the simulation. Finally, it is shown that the implemented control system has good results and can be applied to the real humanoid robot system ISHURO.

On Software Reliability Engineering Process for Weapon Systems (무기체계를 위한 소프트웨어의 신뢰성 공학 프로세스)

  • Kim, Ghi-Back;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.332-345
    • /
    • 2011
  • As weapon systems are evolving into more advanced and complex ones, the role of the software is becoming heavily significant in their developments. Particularly in the war field of today as represented by the network centric warfare(NCW), the reliability of weapon systems is definitely crucial. In this context, it is inevitable to develop software reliably enough to make the weapon systems operate robustly in the combat field. The reliability engineering activities performed to develop software in the domestic area seem to be limited to the software reliability estimations for some projects. To ensure that the target reliability of software be maintained through the system's development period, a more systematic approach to performing software reliability engineering activities are necessary from the beginning of the development period. In this paper, we consider the software reliability in terms of the development of a weapon system as a whole. Thus, from the systems engineering point of view, we analyze the models and methods that are related to software reliability and a variety of associated activities. As a result, a process is developed, which can be called the software reliability engineering process for weapon systems (SREP-WS), The developed SREP-WS can be used in the development of a weapon system to meet a target reliability throughout its life-cycle. Based on the SREP-WS, the software reliability could also be managed quantitatively.

An Extended Virtual LAM System Deploying Multiple Route Server (다중 라우트 서버를 두는 확장된 가상랜 시스템)

  • Seo, Ju-Yeon;Lee, Mee-Jeong
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.2
    • /
    • pp.117-128
    • /
    • 2002
  • Virtual LAN (VLAN) is an architecture to enable communication between end stations as if they were on the same LAN regardless of their physical locations. VLAN defines a limited broadcast domain to reduce the bandwidth waste. The Newbridge Inc. developed a layer 3 VLAN product called VIVID, which configures a VLAN based on W subnet addresses. In a VIVID system, a single route server is deployed for address resolution, VLAN configuration, and data broadcasting to a VLAN. If the size of the network, over which the VLANS supported by the VIVID system spans, becomes larger, this single route server could become a bottleneck point of the system performance. One possible approach to cope with this problem is to deploy multiple route servers. We propose two architectures, organic and independent, to expand the original VIVID system to deploy multiple route servers. A course of simulations are done to analyze the performance of each architecture that we propose. The simulation results show that the performances of the proposed architectures depend on the lengths of VLAN broadcasting sessions and the number of broadcast data frames generated by a session. It has also been shown that there are tradeoffs between the scalability of the architecture and their efficiency in data transmissions.

A Centralized Deployment Protocol with Sufficient Coverage and Connectivity Guarantee for WSNs (무선 센서 네트워크에서 유효 커버리지 및 접속성 보장을 위한 중앙 집중형 배치 프로토콜)

  • Kim, Hyun-Tae;Zhang, Gui-Ping;Kim, Hyoung-Jin;Joo, Young-Hoon;Ra, In-Ho
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.16 no.6
    • /
    • pp.683-690
    • /
    • 2006
  • Reducing power consumption to extend network lifetime is one of the most important challenges in designing wireless sensor networks. One promising approach to conserving system energy is to keep only a minimal number of sensors active and put others into low-powered sleep mode, while the active sensors can maintain a connected covet set for the target area. The problem of computing such minimum working sensor set is NP-hard. In this paper, a centralized Voronoi tessellation (CVT) based approximate algorithm is proposed to construct the near optimal cover set. When sensor's communication radius is at least twice of its sensing radius, the covet set is connected at the same time; In case of sensor's communication radius is smaller than twice of its sensing radius, a connection scheme is proposed to calculate the assistant nodes needed for constructing the connectivity of the cover set. Finally, the performance of the proposed algorithm is evaluated through theoretical analysis and extensive numerical experiments. Experimental results show that the proposed algorithm outperforms the greedy algorithm in terms of the runtime and the size of the constructed connected cover set.

Development and Application of Two-Dimensional Numerical Tank using Desingularized Indirect Boundary Integral Equation Method (비특이화 간접경계적분방정식방법을 이용한 2차원 수치수조 개발 및 적용)

  • Oh, Seunghoon;Cho, Seok-kyu;Jung, Dongho;Sung, Hong Gun
    • Journal of Ocean Engineering and Technology
    • /
    • v.32 no.6
    • /
    • pp.447-457
    • /
    • 2018
  • In this study, a two-dimensional fully nonlinear transient wave numerical tank was developed using a desingularized indirect boundary integral equation method. The desingularized indirect boundary integral equation method is simpler and faster than the conventional boundary element method because special treatment is not required to compute the boundary integral. Numerical simulations were carried out in the time domain using the fourth order Runge-Kutta method. A mixed Eulerian-Lagrangian approach was adapted to reconstruct the free surface at each time step. A numerical damping zone was used to minimize the reflective wave in the downstream region. The interpolating method of a Gaussian radial basis function-type artificial neural network was used to calculate the gradient of the free surface elevation without element connectivity. The desingularized indirect boundary integral equation using an isolated point source and radial basis function has no need for information about the element connectivity and is a meshless method that is numerically more flexible. In order to validate the accuracy of the numerical wave tank based on the desingularized indirect boundary integral equation method and meshless technique, several numerical simulations were carried out. First, a comparison with numerical results according to the type of desingularized source was carried out and confirmed that continuous line sources can be replaced by simply isolated sources. In addition, a propagation simulation of a $2^{nd}$-order Stokes wave was carried out and compared with an analytical solution. Finally, simulations of propagating waves in shallow water and propagating waves over a submerged bar were also carried and compared with published data.

Voronoi Grain-Based Distinct Element Modeling of Thermally Induced Fracture Slip: DECOVALEX-2023 Task G (Benchmark Simulation) (Voronoi 입자기반 개별요소모델을 이용한 암석 균열의 열에 의한 미끄러짐 해석: 국제공동연구 DECOVALEX-2023 Task G(Benchmark simulation))

  • park, Jung-Wook;Park, Chan-Hee;Lee, Changsoo
    • Tunnel and Underground Space
    • /
    • v.31 no.6
    • /
    • pp.593-609
    • /
    • 2021
  • We proposed a numerical method for the thermo-mechanical behavior of rock fracture using a grain-based distinct element model (GBDEM) and simulated thermally induced fracture slip. The present study is the benchmark simulation performed as part of DECOVALEX-2023 Task G, which aims to develop a numerical method to estimate the coupled thermo-hydro-mechanical processes within the crystalline rock fracture network. We represented the rock sample as an assembly of Voronoi grains and calculated the interaction of the grains (blocks) and their interfaces (contacts) using a distinct element code, 3DEC. Based on an equivalent continuum approach, the micro-parameters of grains and contacts were determined to reproduce rock as an elastic material. Then, the behavior of the fracture embedded in the rock was characterized by the contacts with Coulomb shear strength and tensile strength. In the benchmark simulation, we quantitatively examined the effects of the boundary stress and thermal stress due to heat conduction on fracture behavior, focusing on the mechanism of thermally induced fracture slip. The simulation results showed that the developed numerical model reasonably reproduced the thermal expansion and thermal stress increment, the fracture stress and displacement and the effect of boundary condition. We expect the numerical model to be enhanced by continuing collaboration and interaction with other research teams of DECOVALEX-2023 Task G and validated in further study experiments.

Segmenting Korean Millennial Consumers of Sharing Economy Services on Social Networking: A Psychographic-based Approach (소셜 네트워크 기반 공유경제 서비스에 관한 밀레니얼스 소비자 세분화 연구: 사이코그래픽 관점에서)

  • Lee, Jae Heon;Choi, Jae Won;Kim, Ki Youn
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.109-121
    • /
    • 2015
  • The purpose of this qualitative study is to explore consumer behavioral trends, psychological characteristics and various cognitive types of Millennial Generation consumers, primarily in their 20s, who are familiar with sharing economy services based on the emerging social networking technology. Using Q methodology, this paper theoretically defines four and interprets via a social science perspective four different types of these young consumers who are skilled at state-of-the-art ICT equipment, devices or online networking services. Sharing economy services in Korea's academic and industrial services are influenced by government policy, and related research is relatively new. This study is focused on discovering unique psychographic characteristics called 'schemata' that include personal interest, preference, attitude, and opinion. On the basis of 40 Q-sorted data samples, the analysis examined 180 collected statements from meta-studies and interviews with 35 individuals born between 1997 and 1992. As a result, four consumer groups were identifies: Type 1 'Early majority', Type 2 'Laggard', Type 3 'Opinion leader', and Type 4 'Late majority'. The results of this research can be used to explore to study in greater detail the behavior and psychological aspects of Millennial General consumers'.

Multi-Cell Search Scheme for Heterogeneous Networks (이기종 네트워크를 위한 다중 셀 검출 기법)

  • Cho, Yong-Ho;Ko, Hak-lim;Im, Tae-ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.4
    • /
    • pp.395-403
    • /
    • 2016
  • This paper introduces a multi-cell search method for heterogeneous networks (HetNet), in which user equipments need to search multiple cells in its vicinity simultaneously. Due to the difficulty of acquiring channel informations for multiple cells, a non-coherent approach is preferred. In this paper, a non-coherent single-cell search scheme using a weighted vector is proposed, and the successive interference cancellation based multi-cell search algorithm is devised. In order to improve cell search performance, the weighted vector is designed in a way to exploit the general characteristic of wireless channel. Based on the fact that the performance of the proposed single-cell search scheme deviates slowly from the one using the optimal weighted vector, a universal weighted vector is also proposed, which shows the performance close to the optimal ones for various channel environments and signal-to-noise ratio regimes. Simulation results confirm that the proposed multi-cell search algorithm is capable of identifying cells more accurately with the help of the proposed single-cell search scheme, and can detect the remaining cells more effectively by removing the signals of the identified cells from the received signal.

Political Geography of Ulsan Oil Refinery (울산공업단지의 서막, 정유공장 건설의 정치지리)

  • Gimm, Dong-Wan;Kim, Min-Ho
    • Journal of the Korean Geographical Society
    • /
    • v.49 no.2
    • /
    • pp.139-159
    • /
    • 2014
  • This study problematizes the dominance of developmental state theory and its negative influences in the field of Korean studies, in particular, dealing with the industrialization during the developmental era, 1960s~70s. As is generally known, the theory has been in a position of unchallenged authority on the industrialization experience of East Asian countries, including South Korea. However, at the same time, it has also misled us into overlooking strategic relations that had articulated the state forms at multiple scales. This study aims to reconstruct the historical contexts by the theorizing prompted by recent work on state space. I shed light on the multiscalar strategic relations that had shaped the Ulsan refinery plant as a representative state space of the South Korean industrialization during two decades after liberation. Specifically, the study illustrates the features and roles of Cold War networks and multiscalar agnets such as Nam Goong-Yeon. By identifying the plant as a result of sequential articulations between Ulsan and other scales, this study concludes by suggesting to reframing the strategic relational spaces, beyond the view of methodological nationalism, in the perspective of multiscalar approach.

  • PDF

A proposal on a proactive crawling approach with analysis of state-of-the-art web crawling algorithms (최신 웹 크롤링 알고리즘 분석 및 선제적인 크롤링 기법 제안)

  • Na, Chul-Won;On, Byung-Won
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.43-59
    • /
    • 2019
  • Today, with the spread of smartphones and the development of social networking services, structured and unstructured big data have stored exponentially. If we analyze them well, we will get useful information to be able to predict data for the future. Large amounts of data need to be collected first in order to analyze big data. The web is repository where these data are most stored. However, because the data size is large, there are also many data that have information that is not needed as much as there are data that have useful information. This has made it important to collect data efficiently, where data with unnecessary information is filtered and only collected data with useful information. Web crawlers cannot download all pages due to some constraints such as network bandwidth, operational time, and data storage. This is why we should avoid visiting many pages that are not relevant to what we want and download only important pages as soon as possible. This paper seeks to help resolve the above issues. First, We introduce basic web-crawling algorithms. For each algorithm, the time-complexity and pros and cons are described, and compared and analyzed. Next, we introduce the state-of-the-art web crawling algorithms that have improved the shortcomings of the basic web crawling algorithms. In addition, recent research trends show that the web crawling algorithms with special purposes such as collecting sentiment words are actively studied. We will one of the introduce Sentiment-aware web crawling techniques that is a proactive web crawling technique as a study of web crawling algorithms with special purpose. The result showed that the larger the data are, the higher the performance is and the more space is saved.