• Title/Summary/Keyword: Command Center

Search Result 238, Processing Time 0.031 seconds

A Self-Tuning Fuzzy Speed Control Method for an Induction Motor (벡터제어 유도전동기의 자기동조 퍼지 속도제어 기법)

  • Kim, Dong-Shin;Han, Woo-Yong;Lee, Chang-Goo;Kim, Sung-Joong
    • Proceedings of the KIEE Conference
    • /
    • 2003.07b
    • /
    • pp.1111-1113
    • /
    • 2003
  • This paper proposes an effective self-turning algorithm based on Artificial Neural Network (ANN) for fuzzy speed control of the indirect vector controlled induction motor. Indirect vector control method divides and controls stator current by the flux and the torque producing current so that the dynamic characteristic of induction motor may be superior. However, if motor parameter changes, the flux current and the torque producing one's coupling happens and deteriorates the dynamic characteristic. The fuzzy speed controller of an induction motor has the robustness over the effect of this parameter variation than a conventional PI speed controller in some degree. This paper improves its adaptability by adding the self-tuning mechanism to the fuzzy controller. For tracking the speed command, its membership functions are adjusted using ANN adaptation mechanism. This adaptability could be embodied by moving the center positions of the membership functions. Proposed self-tuning method has wide adaptability than existent fuzzy controller or PI controller and is proved robust about parameter variation through Matlab/Simulink simulation.

  • PDF

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Utilizing Future Female Personnel in the South Korean Military

  • Myung-Sook Hong;Sang-Keun Cho;Eui-Chul Shin;In-Chan Kim;Jong-Hoon Kim;Sung-Hu Kang;Sang-Hyuk Park
    • International Journal of Advanced Culture Technology
    • /
    • v.11 no.1
    • /
    • pp.147-152
    • /
    • 2023
  • The South Korean military has undergone four changes in operating methods since its inception with 31 nursing officers in August 1948. While it initially began as a special unit for nursing and other specialized services, it later expanded to include various fields including technology, administration, and special forces. However, analysis shows that there have been few significant changes in how it operates and remains largely centered around technology, administration, and special forces. With the development of advanced science and technology and a decrease in military resources, there is a need for the South Korean military to proactively expand its use of female personnel, as has been done by the US military, Canadian military, Israeli military with female conscription, and Norwegian military. In order to achieve this, there needs to be a cultural shift towards co-ed military units, improvements in facilities and equipment, adequate pay and benefits, and resolution of childcare issues through institutional reforms.

Development of Autonomous Navigation System Using Simulation Based on Unity-ROS (Unity-ROS 시뮬레이터 기반의 자율운항 시스템 개발 및 검증)

  • Kiwon Kim;Hyuntae Bang;Jeonghwa Seo;Wonkeun Youn
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.6
    • /
    • pp.406-415
    • /
    • 2023
  • In this study, we focused on developing and verifying ship collision avoidance algorithms using Unity simulator and ROS(Robot Operating System). ROS is used to establish an environment where communication between different operating systems is possible, and a dynamic model of a ship is constructed within Unity simulator. The Lidar data collected in Unity environment is passed to the system based on python through ROS. In the system based on python, control command values were created through the logic of the collision avoidance algorithm using data, and the values were transferred back to Unity to control the movement of the virtual ship. Through the developed simulation system, the reliability of the collision avoidance algorithm of ships with two different forms in an environment similar to the actual physical world was confirmed. As a result, it was confirmed on the simulator that it could be avoided without collision even in an environment with various types of obstacles, and that the avoidance characteristics according to the dynamics of the ship could be analyzed.

Survival Analysis of Battalion-Level Commanders(leaders) Using Big Data as Results of Brigade-Level KCTC Training - Focused on Infantry Battalion Defensive Operations - (여단급 KCTC 훈련 결과 빅데이터를 활용한 대대급 이하 지휘관(자)의 생존분석 - 보병대대 방어작전을 중심으로 -)

  • Jinseong Yun;Hoseok Moon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.27 no.1
    • /
    • pp.94-106
    • /
    • 2024
  • In this study, we conducted a survival analysis on battalion-level commanders(leaders), focusing on infantry battalion defensive operations using the big data of brigade-level KCTC(Korea Combat Training Center) training results. Unlike previous studies, we utilized the brigade-level KCTC training results data for the first time to conduct a survival analysis, and the research subjects were battalion-level commanders(leaders), which can affect the battle. At this time, the battle results were defined, and through cluster analysis, infantry battalions were divided into excellent, average, and insufficient units, and the difference in the survival rate of the commanders was analyzed through the Kaplan-Meier survival analysis. This provided an opportunity to objectively compare the differences between excellent and insufficient units. Subsequently, factors affecting the survival of commanders were derived using the Cox proportional hazard model, and it was possible to confirm the influencing factors from various angles by also using the survival tree model. Significance and limitations confirmed in the research process were presented as policy suggestions and future research directions.

A Study on the NC Embedding of Vision System for Tool Breakage Detection (공구파손감지용 비젼시스템의 NC실장에 관한 연구)

  • 이돈진;김선호;안중환
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.05a
    • /
    • pp.369-372
    • /
    • 2002
  • In this research, a vision system for detecting tool breakage which is hardly detected by such indirect in-process measurement method as acoustic emission, cutting torque and motor current was developed and embedded into a PC-NC system. The vision system consists of CMOS image sensors, a slit beam laser generator and an image grabber board. Slit beam laser was emitted on the tool surface to separate the tool geometry well from the various obstacles surrounding the tool. An image of tool is captured through two steps of signal processing, that is, median filtering and thresholding and then the tool is estimated normal or broken by use of change of the centroid of the captured image. An air curtain made by the jetting high-pressure air in front of the lens was devised to prevent the vision system from being contaminated by scattered coolant, cutting chips in cutting process. To embed the vision system to a Siemens PC-NC controller 840D NC, an HMI(Human Machine Interface) program was developed under the Windows 95 operating system of MMC103. The developed HMI is placed in a sub window of the main window of 840D and this program can be activated or deactivated either by a soft key on the operating panel or M codes in the NC part program. As the tool breakage is detected, the HMI program emit a command for automatic tool change or send alarm to the NC kernel. Evaluation test in a high speed tapping center showed the developed system was successful in detection of the small-radius tool breakage.

  • PDF

The Design and Implementation of the Data Link System based on the Off-the-shelf Ultra Mobile Personal Computer for Network Centric Warfare(NCW) (네트워크중심전(NCW)을 위한 UMPC 기반 데이터 링크 시스템 설계 및 구축)

  • Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.175-181
    • /
    • 2009
  • All of the military aircrafts in Korea Air Force are administered and operated together in the same system regardless of whether they are equipped with the data communication capability or not. The absence of the data communication capability in some of the aircrafts might increase whole kill chain hour at the point of the Network Centric Warfare achievement. Network synergy effects cannot also be desired if the section which is not connected to the network influences to the whole tactical network. Equipping aircrafts with the data communication capability could be done by upgrading the aircrafts, but resulting in high costs and long updating time. This paper is a research about the design and implementation of the UMPC based Data Link System to aircrafts that do not have the data communication capability. The proposed system grafts the UHF-based wireless modem technology and the aircraft flight mission support software onto the off-the-shelf UMPC and GPS system. The employed UHF radio equipment allows communicating tactic data with another aircrafts on the air, the ground control point, and even the Tactical Air Control Party(TACP) control vehicle that achieve missions with aircrafts. It thereby increases such capabilities as navigation aid, situation awareness, quick target identification and attack. We also applied Closed Air Support(CAS) scenarios, which is very close to the real environment, to the experiments of the proposed system. The experimental results show that the proposed system could support the data communication capability effectively and the flight mission at low costs of money and time.

Short-course Versus Long-course Preoperative Radiotherapy plus Delayed Surgery in the Treatment of Rectal Cancer: a Meta-analysis

  • Liu, Shi-Xin;Zhou, Zhi-Rui;Chen, Ling-Xiao;Yang, Yong-Jing;Hu, Zhi-De;Zhang, Tian-Song
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.14
    • /
    • pp.5755-5762
    • /
    • 2015
  • Background: Short-course preoperative radiation (SCRT) with delayed surgery was found to increase pathologic complete response (pCR) rates in several trials. However, there was no clear answer on whether SCRT or long-course chemo-radiotherapy (LCRT) is more effective. Therefore we conducted this meta-analysis to evaluate the safety and efficacy of SCRT versus LCRT, both with delayed surgery, for treatment of rectal cancer. Materials and Methods: The literature was searched from PubMed, EMBASE, Web of Science, Cochrane Library and clinicaltrials.gov up to November, 2014. Quality of the randomized controlled trials (RCTs) was evaluated according to the Cochrane's risk of bias tool of RCT. The Grading of Recommendations Assessment, Development and Evaluation (GRADE) system was used to rate the level of evidence. Review Manager 5.3 was employed for statistical analysis. Pooled risk ratios (RRs) and 95% confidence intervals (CIs) were calculated. Results: Three RCTs, with a total of 357 rectal cancer patients, were included in this systematic review. Metaanalysis results demonstrated there were no significantly differences in sphincter preservation rate, local recurrence rate, grade 3~4 acute toxicity, R0 resection rate and downstaging rate. Compared with SCRT, LCRT was associated with significant increase in the pCR rate [RR=0.49, 95%CI (0.31, 0.78), P=0.003]. Conclusions: In terms of sphincter preservation rate, local recurrence rate, grade 3~4 acute toxicity, R0 resection rate and downstaging rate, SCRT with delayed surgery is as effective as LCRT with delayed surgery for management of rectal cancer. LCRT significantly increased pCR rate compared with SCRT. Due to risk of bias and imprecision, further multi-center large sample RCTs were needed to confirm this conclusion.

Home Management System Using Smartphone and Sensor Networks (스마트폰과 센서 네트워크를 이용한 홈 관리 시스템)

  • Han, Joosik;Jung, Yeonsoo;Son, Youngho;Hwang, Soyoung;Joo, Jaeheum
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.405-406
    • /
    • 2012
  • A sensor network is composed of a large number of sensor nodes which have sensing, computation and wireless communication capabilities. The sensor node sends such collected data, usually via radio transmitter, to a command center (sink) either directly or through a data concentration center (a gateway). These sensor networks can be used for various application areas such as health, military, home network, managing inventory, monitoring disaster areas and so on. Moreover, owing to the rapid growth of mobile technology, high-performance smartphones are widespread and in increasing cases are utilized as a terminal device. In this paper, we propose a home management system using smartphone and sensor networks.

  • PDF

Performance Evaluation of Emergency Medical Center (응급의료센터 성과 평가 기준개발과 적용)

  • Kang, Chul-Hwan;Kim, Yoon;Lee, Pyung-Soo;Kwon, Young-Dae;Kim, Chang-Yup;Shin, Young-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.30 no.4 s.59
    • /
    • pp.884-892
    • /
    • 1997
  • Currently, there are 100 community emergency centers which expect to provide professional emergency care like Level 1 trauma centers in U.S.A. To evaluate perforance of emergency centers, most studies have been widely adopted death rate based methods such as Trauma and Injury Severity Score(TRISS) and A Severity Characterization of Trauma(ASCOT). However, these methods are only applicable in situation where registration process of trauma patients is well established. Therefore, an alternative method should be applied to evaluate performance of emergency centers in Korea which does not have well-developed registration scheme. This study aims to develop new performance measures which are applicable to Korea and evaluate performance of 35 community emergency centers through new measures. The new measures are included that 'W-statistic' ; death rate calculated on the basis of International Classification based Injury Severity Score(ICISS), and 'the degree of severity' ; rate of severe trauma patients of each emergency medical centers. The study results can be summarized as follows. First, about 34% of sample emergency centers show they provide proper care in terms of their function. Second, tertiary hospitals, university hospitals, and hospitals located in Seoul show higher severity degree of patients and lower severity-adjusted death rate.

  • PDF