• Title/Summary/Keyword: Command

Search Result 2,528, Processing Time 0.031 seconds

Development of Autonomous Mobile Robot with Speech Teaching Command Recognition System Based on Hidden Markov Model (HMM을 기반으로 한 자율이동로봇의 음성명령 인식시스템의 개발)

  • Cho, Hyeon-Soo;Park, Min-Gyu;Lee, Hyun-Jeong;Lee, Min-Cheol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.8
    • /
    • pp.726-734
    • /
    • 2007
  • Generally, a mobile robot is moved by original input programs. However, it is very hard for a non-expert to change the program generating the moving path of a mobile robot, because he doesn't know almost the teaching command and operating method for driving the robot. Therefore, the teaching method with speech command for a handicapped person without hands or a non-expert without an expert knowledge to generate the path is required gradually. In this study, for easily teaching the moving path of the autonomous mobile robot, the autonomous mobile robot with the function of speech recognition is developed. The use of human voice as the teaching method provides more convenient user-interface for mobile robot. To implement the teaching function, the designed robot system is composed of three separated control modules, which are speech preprocessing module, DC servo motor control module, and main control module. In this study, we design and implement a speaker dependent isolated word recognition system for creating moving path of an autonomous mobile robot in the unknown environment. The system uses word-level Hidden Markov Models(HMM) for designated command vocabularies to control a mobile robot, and it has postprocessing by neural network according to the condition based on confidence score. As the spectral analysis method, we use a filter-bank analysis model to extract of features of the voice. The proposed word recognition system is tested using 33 Korean words for control of the mobile robot navigation, and we also evaluate the performance of navigation of a mobile robot using only voice command.

Intensity-modulated Radiotherapy Combined with Endocrine Therapy for Intermediate and Advanced Prostate Cancer: Long-term Outcome of Chinese Patients

  • Luo, Hua-Chun;Cheng, Hui-Hua;Lin, Gui-Shan;Fu, Zhi-Chao;Li, Dong-Shi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.14 no.8
    • /
    • pp.4711-4715
    • /
    • 2013
  • Aim: The aim of this study was to evaluate acute adverse events and efficacy of three-dimensional intensitymodulated radiotherapy (IMRT) combined with endocrine therapy for intermediate and advanced prostate cancer. Methods: Sixty-seven patients were treated with three-dimensional IMRT combined with maximum androgen blockade. The correlation between radiation-induced rectal injury and clinical factors was further analyzed. Results: After treatment, 21 patients had complete remission (CR), 37 had partial remission (PR), and nine had stable disease (SD), with an overall response rate of 86.5%. The follow-up period ranged from 12.5 to 99.6 months. Thirty-nine patients had a follow-up time of ${\geq}$ five years. In this group, three-year and five-year overall survival rates were 89% and 89.5%, respectively; three-year and five-year progression-free survival rates were 72% and 63%. In univariate analyses, gross tumor volume was found to be prognostic for survival ($X^2$ = 5.70, P = 0.037). Rates of leucopenia and anemia were 91.1% and 89.5%, respectively. Two patients developed acute liver injury, and a majority of patients developed acute radiation proctitis and cystitis, mainly grade 1/2. Tumor volume before treatment was the only prognostic factor influencing the severity of acute radiation proctitis (P < 0.05). Conclusions: IMRT combined with endocrine therapy demonstrated promising efficacy and was well tolerated in patients with intermediate and advanced prostate cancer.

Power consumption estimation of active RFID system using simulation (시뮬레이션을 이용한 능동형 RFID 시스템의 소비 전력 예측)

  • Lee, Moon-Hyoung;Lee, Hyun-Kyo;Lim, Kyoung-Hee;Lee, Kang-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1569-1580
    • /
    • 2016
  • For the 2.4 GHz active RFID to be successful in the market, one of the requirements is the increased battery life. However, currently we do not have any accurate power consumption estimation method. In this study we develop a simulation model, which can be used to estimate power consumption of tag accurately. Six different simulation models are proposed depending on collision algorithm and query command method. To improve estimation accuracy, we classify tag operating modes as the wake-up receive, UHF receive, sleep timer, tag response, and sleep modes. Power consumption and operating time are identified according to the tag operating mode. Query command for simplifying collection and ack command procedure and newly developed collision control algorithm are used in the simulation. Other performance measures such as throughput, recognition time for multi-tags, tag recognition rate including power consumption are compared with those from the current standard ISO/IEC 18000-7.

Quantitative Methodology for Analyzing Propriety of Complement and Salary on Military Organization - Concentrating on Army Doctrine Research Institution - (군(軍) 내 민간인력 적정 규모 및 임금 분석을 위한 정량적 방법론 - 육군 교리업무조직을 중심으로 -)

  • Beak, Byungho;Kim, Yeekhyun;Lee, Yong-Bok;Min, Seunghee;Jee, Yonghoon
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.34-41
    • /
    • 2020
  • There has not been any scientific analysis on appropriate size of workforce and salary for civilian workers in military so far. Thus, this paper conducted analysis on propriety in employment size of military doctrine researchers using system dynamic methodology based on annual military doctrine workload. Vensim software was mainly used to measure complement of the research group based on data from job analysis. Secondly, a multiple regression analysis was performed to study an appropriate wage for researchers based on their expertise and working condition. The data from twenty public research institutions and twenty eight job positions that are performing similar duty with military doctrine researchers was obtained and utilized to create a salary-estimation regression equation in the analysis. Finally, with cost-benefit analysis method this paper studied financial effectiveness of hiring military doctrine researchers. Contingent valuation method, which has been recognized as one of the most effective methodologies in cost-benefit analysis on intangible value, was utilized to measure benefit of hiring the researchers. The methodology presented in this paper can be applied to measure and improve the efficiency of military organization not only in military doctrine research area but also in several military functional area (military training, logistics, administration, combat development, and combat support).

An Analysis on the Performance of TRIM Commands on SSDs and its Application to the Ext4 File System (SSD에서의 TRIM 명령어 처리 성능 분석 및 Ext4 파일 시스템으로의 적용)

  • Son, Hyobong;Lee, Youngjae;Kim, Yongserk;Kim, Jin-Soo
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.52-57
    • /
    • 2015
  • In this paper, we analyze the performance of the TRIM commands on various SSDs and, based on our analysis results, we enhance the performance of these TRIM commands in the Ext4 file system. We observed that the performance of the TRIM commands improves as the size of the LBA-range increases, the sector number is aligned and continuous or more LBA-ranges are notified via a single TRIM command. However, although the performance is better when multiple LBA-ranges are informed by a single TRIM command, the Ext4 file system issues a single TRIM command for every LBA-range. In this paper, we modify the Ext4 file system to convey at most 64 LBA-ranges per TRIM command. Evaluations through Filebench show that the performance of file deletion operations is improved by up to 35%.

Development of Stereo Sound Authoring Tool to Modify and Edit 2Channel Stereo Sound Source Using HRTF (HRTF를 이용한 2채널 스테레오 음원을 수정 및 편집 할 수 있는 입체음향 저작도구 개발)

  • Kim, Young-Sik;Kim, Yong-Il;Bae, Myeong-Soo;Jeon, Su-Min;Lee, Dae-Ho
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.909-912
    • /
    • 2017
  • In implementing a computerized virtual training system, the auditory element is responsible for the human cognitive ability following visual elements. Especially, the improvement of hearing ability is closely related to the performance of the training, and it contributes to improvement of the training effect. In this paper, we propose a sound system that is necessary for constructing such a virtual training system as a test system that can use a sound source using a head related transfer function (HRTF). Functional and auditory tests were performed to evaluate system performance.

A Study on the Roles of Local Disaster Response Organizations (지역 재난현장 대응조직의 역할에 관한 연구)

  • Kwon, Gun-Ju
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.9 no.5
    • /
    • pp.39-46
    • /
    • 2009
  • The purpose of this study is to compare and analyze the organizations for responses in disaster fields to cope with large-scaled disasters including Emergency Management Agency, Emergency Response Unit, Emergency Support Center, and Field Command Center (Field Command Office). According to the results of the analysis, the problems of the organizations for responses in local disaster fields are; 1) the scopes of roles among the organizations for responses in disaster fields are ambiguous, 2) the structures of the organizations for responses in disasters are different each other, 3) the integrated management functions among the organizations for responses in disasters are overlapped, and 4) the one who assumes the integrated command is not defined. In order to improve the problems, first, the range of working of each organization for responses in local disaster fields should be definitely established and an agreement in services among the organizations should be settled in advance. Second, similar designs in the structure among the organizations for responses in disasters are necessary for amicable communication. Third, the works for integration and management for each organization for responses should be apportioned. Fourth, the organization in charge and the one who assumes the integrated command for each type of disasters should be appointed in advance for rapid decision-making.

The Development Methodology of Korea Command and Control Information Exchange Model (한국 지휘통제 정보교환모델 개발 방법론 연구)

  • Park, Gyudong;Kim, Kunyoung;Kim, Jongmo;Jeon, Hocheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.9
    • /
    • pp.1412-1422
    • /
    • 2022
  • The importance of interoperability between weapon systems is continuously increasing. Usually it is implemented by data exchange. The existence of information heterogeneities between systems decreases the efficiency and quality of the implementations enterprise-widely. Many other developed countries increase the efficiency and quality of the implementations by using information exchange model commonly. However, Korean military is still not aware of the importance and necessity of the model. This study explains the necessity of development and adaptation of the Korea command and control information exchange model(KC2IEM), and presents the methodology for the development of the model, and verifies and improves it through a prototype model development. The completion of the information exchange model could not be possible by academic research, therefore this study contributes as a motivation and a stepping stone for the following developments.

Korean Security Risk Management Framework for the Application of Defense Acquisition System (국방획득체계 적용 한국형 보안위험관리 프레임워크)

  • Yang, Woo-sung;Cha, Sung-yong;Yoon, Jong-sung;Kwon, Hyeok-joo;Yoo, Jae-won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1183-1192
    • /
    • 2022
  • Information and Information processing systems must maintain a certain level of security during the total life cycle of Information. To maintain a certain level of security, security management processes are applied to software, automobile development, and the U.S. federal government information system over a life cycle, but theme of no similar security management process in Korea. This paper proposes a Korean-style security risk management framework to maintain a certain level of security in the total life cycle of information and information processing system in the defense sector. By applied to the defense field, we intend to present the direction of defense security work in the future and induce an shift in security paradigm.

Command Shaping Control for Limiting the Transient Sway Angle of Crane Systems

  • Hong, Kyung-Tae;Huh, Chang-Do;Hong, Keum-Shik
    • International Journal of Control, Automation, and Systems
    • /
    • v.1 no.1
    • /
    • pp.43-53
    • /
    • 2003
  • A modified command shaping control to reduce residual vibrations at a target position and to limit the sway angle of the payload during traveling for container crane systems is investigated. When the maneuvering time is minimized, a large transient amplitude and steady state oscillations may occur inherently. Since a large swing of the payload during the transfer is dangerous, the control objective is to transfer a payload to the desired place as quickly as possible while limiting the swing angle of the payload during the transfer. The conventional shapers have been enhanced by adding one more constraint to limit intermediate sway angles of the payload. The developed method is shown to be more effective than other conventional shapers for prevention of an excessive transient sway. Computer simulation results are provided.