• Title/Summary/Keyword: Command&Control

Search Result 1,396, Processing Time 0.031 seconds

Predictive Control for a Fin Stabilizer

  • Yoon, Hyeon-Kyu;Lee, Gyeong-Joong;Fang, Tae-Hyun
    • Journal of Navigation and Port Research
    • /
    • v.31 no.7
    • /
    • pp.597-603
    • /
    • 2007
  • A predictive controller can solve a control problem related to a disturbance-dominant system such as roll stabilization of a ship in waves. In this paper, a predictive controller is developed for a fin stabilizer. Future wave-induced moment is modeled simply using two typical regular wave components for which six parameters are identified by the recursive Fourier transform and the least squares method using the past time series of the roll motion. After predicting the future wave-induced moment, optimal control theory is applied to discover the most effective command fin angle that will stabilize the roll motion. In the results, wave prediction performance is investigated, and the effectiveness of the predictive controller is compared to a conventional PD controller.

A Study on the Three-Phase Active Power Filter using Predictive Current Control Method (예측전류제어방식을 이용한 3상 능동전력필터에 관한 연구)

  • Kwon, Byung-Gi;Woo, Myung-Ho;Jeong, Seung-Gi
    • Proceedings of the KIEE Conference
    • /
    • 1994.11a
    • /
    • pp.138-140
    • /
    • 1994
  • In this paper, a three-phase active power filter using voltage- source PWM converter is designed to eliminate the harmonics and compensate the reactive power in the ac side. The predictive current control method is adopted, which provides constant switching frequency and low current ripple but has inherently one sampling error between the command and the actual current. Here we propose the algorithm which corrects this delay time. The converter voltage obtained from this current control can be accomplished by the space vector modulation method at a voltage-type converter. All control sequences of active filter is executed by a DSP which is designed to calculate floating points at very hight speed. Finally, the validity of this filter using the predictive current control method is demonstrated through experimental results.

  • PDF

DC Servo Motor Position Control System Based on Model Following Acceleration Control (모델추종 가속도제어기법을 이용한 직류서보전동기 위치제어계)

  • Park, Young-Jeen;Lee, Kee-Sang;Hong, Soon-Chan
    • Proceedings of the KIEE Conference
    • /
    • 1995.07a
    • /
    • pp.261-264
    • /
    • 1995
  • A scheme of observer-based MFAC(Model Following Acceleration Control) system is proposed for the DC servo position control system. The proposed system is competed of MFAC, feedback controller, and reduced-order state observer. As the servo motor is controlled by the acceleration command, the total servo system becomes the acceleration control system. Simulation results show that the proposed system have robust properties against parameter variations and external disturbances.

  • PDF

DGA-DNS Similarity Analysis and APT Attack Detection Using N-gram (N-gram을 활용한 DGA-DNS 유사도 분석 및 APT 공격 탐지)

  • Kim, Donghyeon;Kim, Kangseok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1141-1151
    • /
    • 2018
  • In an APT attack, the communication stage between infected hosts and C&C(Command and Control) server is the key stage for intrusion into the attack target. Attackers can control multiple infected hosts by the C&C Server and direct intrusion and exploitation. If the C&C Server is exposed at this stage, the attack will fail. Therefore, in recent years, the Domain Generation Algorithm (DGA) has replaced DNS in C&C Server with a short time interval for making detection difficult. In particular, it is very difficult to verify and detect all the newly registered DNS more than 5 million times a day. To solve these problems, this paper proposes a model to judge DGA-DNS detection by the morphological similarity analysis of normal DNS and DGA-DNS, and to determine the sign of APT attack through it, then we verify its validity.

Muliti Digital Data Control System Development for Ultra-Small Satellite using FPGA (FPGA를 이용한 초소형위성용 다중디지털 데이터 처리 시스템 개발)

  • Ryu, Jung-Hwan;Shim, Chang-Hwan;Choi, Young-Hoon;Lee, Byung-Hoon;Chang, Young-Keun
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.35 no.6
    • /
    • pp.556-563
    • /
    • 2007
  • The current trend of low cost ultra-small satellites is to utilize Commercial Off the Shelf (COTS) parts to save cost, and accordingly, Command and Data Handling (C&DH) that operates the satellite and collects/processes the data is also designed and developed around commercial controllers. However, functionalities of commercial controllers are limited according to the specs outlined by the manufacturer. In order for the commercial controllers to be used for satellites where variety of interfaces is required, a separate interface circuit is required. Therefore, a Multi Digital Data Control System (MDDCS) using Field Programmable Gate Array (FPGA) has been developed in order to expand multiple digital interfaces that are not supported by the commercial controller, and also to compensate for SEU. This has been implemented on Actel A3P1000 using Very High Speed Integrated Circuits Hardware Description Language (VHDL).

A Study On Intelligent Robot Control Based On Voice Recognition For Smart FA (스마트 FA를 위한 음성인식 지능로봇제어에 관한 연구)

  • Sim, H.S.;Kim, M.S.;Choi, M.H.;Bae, H.Y.;Kim, H.J.;Kim, D.B.;Han, S.H.
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.21 no.2
    • /
    • pp.87-93
    • /
    • 2018
  • This Study Propose A New Approach To Impliment A Intelligent Robot Control Based on Voice Recognition For Smart Factory Automation Since human usually communicate each other by voices, it is very convenient if voice is used to command humanoid robots or the other type robot system. A lot of researches has been performed about voice recognition systems for this purpose. Hidden Markov Model is a robust statistical methodology for efficient voice recognition in noise environments. It has being tested in a wide range of applications. A prediction approach traditionally applied for the text compression and coding, Prediction by Partial Matching which is a finite-context statistical modeling technique and can predict the next characters based on the context, has shown a great potential in developing novel solutions to several language modeling problems in speech recognition. It was illustrated the reliability of voice recognition by experiments for humanoid robot with 26 joints as the purpose of application to the manufacturing process.

A Suppression of Residual Vibration on the Flexible Structures by Input Shaping (입력설계기법에 의한 유연구조물의 잔류진동제어)

  • Park, Myoungho;Han, Myoungseok;Park, Sungjong
    • 대한공업교육학회지
    • /
    • v.31 no.2
    • /
    • pp.364-380
    • /
    • 2006
  • This paper presents a procedure for designing command to maneuver flexible structure with very little residual vibration, even in the presence of modeling errors. For the open loop maneuver, the various shaped profiles using multiple step inputs delayed in time are considered for robustness and compared with the responses of rigid body and flexible body in virtue of simulations and experiments. Input shaping generates vibration-reducing shaped commands through convolution of an impulse sequence with the desired command. A flexible model with a cylindrical hub and four symmetric appendages is considered to examine the responses to real plant, and to illustrate the effectiveness of the proposed shapers. The appendages are long and flexible, leading to low frequency vibration under any control action. It is shown by a series of simulation that a properly designed feedback controller with input shaper performs well, as compared with open loop controller with input shaper. The control objective is to achieve a fast settling time of residual vibration to flexible structure and robustness (insensitivity)to plant uncertainty, to eliminate residual vibration.

Development of the Data Communication based Future Air Base Defence Operation Model (데이터통신 기반 차세대 기지방어작전 모델 개발)

  • Pyo, Sang-Ho;Kim, Ki-Hyung;Lee, Tae-Gong
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.157-173
    • /
    • 2014
  • As Air Base Defence, Anti-Aircraft Defence and Nuclear-Biological-Chemical Protection model considered as ground operation models in Republic of Korea Air Force are designed as the voice-centered system between participant nodes, there is a problem communicating accurately. In recent years, the military is developing a command and control capability using data communication technology to solve the problem. Therefore, this paper proposes new model to maximize efficiency of performance improvement through the Data Communication-based Future Air Base Defence Model. We refer to a research paper that is related existing and developed new model. and then we really experimented under WiBro Network that is constructed to Air Base for maintenance control. Based on the analysis and the test result of new Air Base Defence Model, we have concluded that the performance improvement effect is reached.

Implementation of cusomized RFID receiver module for In-VIVO wireless transmission (체내심부 무선전송을 위한 맞춤형 RFID 수신 모듈 구현)

  • An, Jinyoung;Sa, Gi-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.55-57
    • /
    • 2022
  • In this study, a customized semi-passive RFID receiver module was implemented for in-VIVO deep tissue photo-therapy. A novel wireless technique is required due to a limitation of RF communication in body environment, as internal body has a complex structure such as, skin, fat, skeleton, water, and so on. Recently, coherently incoherent beamforming (CIB) based on RFID was introduced and it is able to transmit wireless signal with high reliability under the incoherent condition such as in-VIVO deep tissue. The proposed miniature photo capsule based on RFID consists of miniature controller, ultra small LED array and wireless RFID chip. RF Reader can access with standard RFID protocol (ISO 18000-6c) using UHF RFID antenna, a control command is wirelessly writtern on USER Bank memory. With received control command, therapy LED array dims with mulilevel under timer control. The signal process of designed RFID photo therapy capsule is analyzed and evaluated under the various environments in detailed.

  • PDF

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.