• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.032 seconds

An analysis of the component of Human-Robot Interaction for Intelligent room

  • Park, Jong-Chan;Kwon, Dong-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2143-2147
    • /
    • 2005
  • Human-Robot interaction (HRI) has recently become one of the most important issues in the field of robotics. Understanding and predicting the intentions of human users is a major difficulty for robotic programs. In this paper we suggest an interaction method allows the robot to execute the human user's desires in an intelligent room-based domain, even when the user does not give a specific command for the action. To achieve this, we constructed a full system architecture of an intelligent room so that the following were present and sequentially interconnected: decision-making based on the Bayesian belief network, responding to human commands, and generating queries to remove ambiguities. The robot obtained all the necessary information from analyzing the user's condition and the environmental state of the room. This information is then used to evaluate the probabilities of the results coming from the output nodes of the Bayesian belief network, which is composed of the nodes that includes several states, and the causal relationships between them. Our study shows that the suggested system and proposed method would improve a robot's ability to understand human commands, intuit human desires, and predict human intentions resulting in a comfortable intelligent room for the human user.

  • PDF

RF Interference Analysis and Verification in the Synthetic Aperture Radar Satellite System (영상레이더 위성시스템 구조물의 RF 간섭특성 분석 및 검증)

  • Jang, Jae-Woong;Kim, Tae-Yoon;Lim, Seong-Bin
    • Aerospace Engineering and Technology
    • /
    • v.8 no.1
    • /
    • pp.187-196
    • /
    • 2009
  • Synthetic Aperture Radar(SAR) satellite system for broad-area imaging has RF systems including SAR radiating a high power, data link system transmitting the acquired image data from the SAR, TC&R(Telemetry, Command, and Ranging) to communicate with a ground segment to control a satellite. Each system transmits RF signal having various frequencies and radiates a high power, RS(Radiated Susceptibility) specification should be verified at an electronic unit mounted in satellite. RF interference can be happened because of non-linearity of a RF system. Therefore, we manufactured a structure model installed antennas which have a similar pattern with a real antenna, the effect by RF interference is analyzed and verified.

  • PDF

A Study on the Simplex and Distributed Multiplex type System for the Radar Data Processing (레이다 정보처리를 위한 단일형 및 분산다중형 시스템에 관한 연구)

  • 김춘길
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.11
    • /
    • pp.1785-1796
    • /
    • 1993
  • Thanks to the data processing facilities of modern digital computers, the performances of radar has been promoted greatly as one of the main components of command and control systems along with the computer communications. In this study, radar data integrating and processing systems were designed for the data processing of various information from many kinds of radar in a single data processing system. The performance of the data integrating system was analyzed by applying queueing theory. A radar data integrating network was designed for synchronous relational operations among the information processing systems and the transmission characteristics were also analysed by specific models for each system. The designed data integrating systems can be divided into a simplex type and a distributed multiplex type.

  • PDF

Application of Intelligent Wearable Computing (지능형 웨어러블 컴퓨팅의 응용)

  • Kim, Seong-Joo;Jung, Sung-Ho;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.3
    • /
    • pp.304-309
    • /
    • 2004
  • This work proposes the wearable and intelligent system to control mobile vehicle instead of user. The system having the ability of assistance as well as portable can be applied to various controller. It is possible to observe the state of mobile vehicle and have a good command of robot instead of human. In this paper, the wearable system operating the mobile vehicle by deciding the velocity and rotation angle that are demanded for collision avoidance with the obtained driving information from mobile vehicle is implemented. To make the proposed wearable system have an intelligence, the hierarchical fuzzy logic and neural network are used.

Detection and Management of Misbehaving Node in Tactical Ad-Hoc Networks (전술 Ad-hoc 네트워크에서의 비정상행위 노드 탐지 및 관리)

  • Jang, Beom-Geun;Lee, Soo-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.3
    • /
    • pp.333-343
    • /
    • 2009
  • Tactical Information Communication Network(TICN) is a concept-type integrated Military Communication system that enables precise command control and decision making by unifying the diversified military communication network and conveying diverse range of battle field information on real-time, at right place at right time. TICN is designed to advance into high speed, large capacity, long distance wireless relay transmission. To support mobility in battlefield environments, the application of Ad-hoc networking technology to its wireless communication has been examined. Ad-hoc network is consist of mobile nodes and nodes in the network depends on the cooperation of other nodes for forwarding of packets. In this context, some non-cooperating nodes may delay forwarding of packets or drop the packets. This may hamper the network as a whole and disrupt communication between the cooperating nodes. To solve this problem, we present a solution with a Node Weight Management Server(NWMS), which manages each node's weight according to its behavior in local area. When the NWMS detects misbehaving node, it increases the node's weight. If the node's weight exceeds a predefined threshold then the NWMS broadcasts the node's information into network to isolate the misbehaving node from the network. These mechanisms show that they are highly effective and can reliably detect a multitude of misbehaving node.

Two Attribute-based Broadcast Encryption Algorithms based on the Binary Tree (이진트리 기반의 속성기반 암호전송 알고리즘)

  • Lee, Moon Sik;Kim, HongTae;Hong, Jeoung Dae
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.3
    • /
    • pp.358-363
    • /
    • 2014
  • In this paper, we present two constructions of the attribute-based broadcast encryption(ABBE) algorithm. Attribute-based encryption(ABE) algorithm enables an access control mechanism over encrypted data by specifying access policies among private keys and ciphertexts. ABBE algorithm can be used to construct ABE algorithm with revocation mechanism. Revocation has a useful property that revocation can be done without affecting any non-revoked uers. The main difference between our algorithm and the classical ones derived from the complete subtree paradigm which is apt for military hierarchy. Our algorithm improve the efficiency from the previously best ABBE algorithm, in particular, our algorithm allows one to select or revoke users by sending ciphertext of constant size with respect to the number of attributes and by storing logarithm secret key size of the number of users. Therefore, our algorithm can be an option to applications where computation cost is a top priority and can be applied to military technologies in the near future.

A Study On Parameter Compensation Scheme in Vector Controlled Induction Motor Drive (벡터제어 유도전동기 구동의 파라메터 보상에 대한 연구)

  • Park, Min-Ho;Kim, Young-Real;Won, Chung-Yuen;Kim, Tae-Hoon;Kim, Yuen-Jun
    • Proceedings of the KIEE Conference
    • /
    • 1989.11a
    • /
    • pp.20-24
    • /
    • 1989
  • The time optimal position control scheme can be repeatedly taken from the initial state of a dynamic system to a desired one as fast as possible at the industrial drives. In this case, the machine parameters will vary due to temperature, frequency, and saturation effects. In particular, the rotor resistance value changes dramatically with temperature and frequency. These changes affect the command values of the stator current components and slip speed. There is a mismatch between the commanded variables and actual variables of the induction motor drive, and this situation leads to decoupling of the vector controller from the plant, i.e the induction motor. Consequences of such decoupling include the initiation of oscillations of the rotor flux and unsuitable switching of electromagnetic torque of the induction motor servo drive. Therefore, a rotor resistance parameter compensating method for the induction motor is described.

  • PDF

A PC Operated Off-Line Programming System for SCARA Robots (PC에서 운용되는 스카라형 로보트의 오프-라인 프로그래밍 시스템)

  • Park, Min-Jo;Son, Kwon;Ahn, Doo-Sung
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.19 no.2
    • /
    • pp.568-579
    • /
    • 1995
  • An off-line programming (OLP) system was proposed and developed in order to save cost and time in adjusting a robot to new workcells or applying new algorithms to actual trajectory planning. The developed OLP system was especially designed to be operated in a PC level host computer. A SCARA robot with four axes was selected as an objective robot. The OLP system developed in this study consisted of such modules as data base, three-dimensional graphics, kinematics, trajectory planning, dynamics, control, and commands. Each module was constructed to form an independent unit so that it can be easily modified or improved. The OLP system was programmed for a graphic user interface in Borland $C^{++}$ language. Some of system operating commands and an interpreter were devised and used for more convenient programming of robot simulations.s.

Analysis on the In-cylinder Flow of HIMSEN 6H21/32 Engine (HIMSEN 6H21/32 엔진 실린더 내 유동해석)

  • Yoon, Wook-Hyun;Kim, Jin-Won;Ha, Ji-Soo
    • Proceedings of the KSME Conference
    • /
    • 2001.11b
    • /
    • pp.934-939
    • /
    • 2001
  • In computational study of the flow in piston engines and the flow through moving valves, the use of moving vertices is essential for modelling flows with moving boundaries. The positions of cell vertices in such cases must be allowed to vary with time. To simulate 3-dimensional port-valve and piston-cylinder of HIMSEN 6H21/32 engine, a commercially available code, STAR-CD, was used. Changes in mesh geometry was specified by PROSTAR commands.(i.e. the Change Grid operation in the EVENTS command module.) Control of the intake flow is expected to play an important role as designers seek to obtain better fuel spray characteristics, fuel mixing and mixture preparation, combustion performance, and emissions reductions to meet national standards. As a result of analysis, velocity fields indicate the presence of a structured flow comprised of one pair of counter-rotating vortices under the intake valve during the early induction process. These flow structures remain visible for most of the intake process. As the piston moves towards BDC, these vortices develops into a larger tumbling motion that dominates the flow structure.

  • PDF

A Smart Framework for Mobile Botnet Detection Using Static Analysis

  • Anwar, Shahid;Zolkipli, Mohamad Fadli;Mezhuyev, Vitaliy;Inayat, Zakira
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2591-2611
    • /
    • 2020
  • Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.