• Title/Summary/Keyword: Command following

Search Result 126, Processing Time 0.028 seconds

Tension Modeling and Looper-Tension ILQ Servo Control of Hot Strip Finishing Mills (열간 사상압연기의 장력 연산모델과 루퍼-장력 ILQ 서보 제어)

  • Hwang, I.C.;Park, C.J.
    • Journal of Power System Engineering
    • /
    • v.12 no.1
    • /
    • pp.72-79
    • /
    • 2008
  • This paper designs a looper-tension controller for mass-flow stabilization in hot strip finishing mills. By Newton's 2nd law and Hooke's law, nonlinear dynamic equations on the looper-tension system are firstly derived, and linearized by a linearization algorithm using a Taylor's series expansion. Moreover, a tension calculation model is obtained from the nonlinear dynamic equations which is called as a soft sensor of strip tension between two neighboring stands. Next, a looper-tension servo controller is designed by an ILQ(Inverse Linear Quadratic optimal control) algorithm, and it is combined with a minimal disturbance observer which to attenuate speed disturbances by AGC and operator interventions, etc.. Finally, it is shown from by a computer simulation that the proposed ILQ controller with a disturbance observer is very effective in stabilizing the strip mass-flow under some disturbances, moreover it has a good command following performance.

  • PDF

Study of the Enhancement of Military Operation Supporting System (비상시 정부의 효율적인 군사작전 지원방안 연구)

  • Choi, Jae-Kyung
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.87-130
    • /
    • 2007
  • ROK and the United States finally reached accord on the controversial transition of Wartime Operational Control on February, 2007, and ROK Government needs to strengthen the role of supporting for the comprehensive threats of futuristic warfare. The crucial point of the supporting for Military Operation depends on the nation's mobilization capabilities. For the effective mobilization the following facets can be improved further. First of all, the organizational integrity of the mobilization network within the government can be bolstered along the vertical command chain. The process of mobilization must be improved and it is import to utilize the information system. On the other side the government plan to distribute timely the mobilized resources must be made up for the weak points and developed continuously. We can expect these points to be improved steadily with the execution of the National Defence Reform 2020.

  • PDF

Lane-Curvature Method : A New Method for Local Obstacle Avoidance (차선-곡률 방법 : 새로운 지역 장애물 회피 방법)

  • Ko, Nak-Yong;Lee, Sang-Kee
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.3
    • /
    • pp.313-320
    • /
    • 1999
  • The Lane-Curvature Method(LCM) presented in this paper is a new local obstacle avoidance method for indoor mobile robots. The method combines Curvature-Velocith Method(CVM) with a new directional method called the Lane Method. The Lane Method divides the environment into lanes taking the information on obstacles and desired heading of the robot into account ; then it chooses the best lane to follow to optimize travel along a desired heading. A local heading is then calculated for entering and following the best lane, and CVM uses this heading to determine the optimal translational and rotational velocity space methods, LCM yields safe collision-free motion as well as smooth motion taking the dynamics of the robot Xavier, show the efficiency of the proposed method.

  • PDF

Adaptive control of gas metal arc welding process

  • Song, Jae-Bok;Hardt, David-E.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1993.10b
    • /
    • pp.191-196
    • /
    • 1993
  • Since the welding process is complex and highly nonlinear, it is very difficult to accurately model the process for real-time control. In this paper, a discrete-time transfer function matrix model for gas metal arc welding process is proposed. Although this linearized model is valid only around the operating point of interest, the adaptation mechanism employed in the control system render this model useful over a wide operating range. A multivariable one-step-ahead adaptive control strategy combined with a recursive least-squares method for on-line parameter estimation is implemented in order to achieve the desired weld bead geometries. Command following and disturbance rejection properties of the adaptive control system for both SISO and MIMO cases are investigated by simulation and experiment.

  • PDF

A Real-Time Embedded Speech Recognition System

  • Nam, Sang-Yep;Lee, Chun-Woo;Lee, Sang-Won;Park, In-Jung
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.690-693
    • /
    • 2002
  • According to the growth of communication biz, embedded market rapidly developing in domestic and overseas. Embedded system can be used in various way such as wire and wireless communication equipment or information products. There are lots of developing performance applying speech recognition to embedded system, for instance, PDA, PCS, CDMA-2000 or IMT-2000. This study implement minimum memory of speech recognition engine and DB for apply real time embedded system. The implement measure of speech recognition equipment to fit on embedded system is like following. At first, DC element is removed from Input voice and then a compensation of high frequency was achieved by pre-emphasis with coefficients value, 0.97 and constitute division data as same size as 256 sample by lapped shift method. Through by Levinson - Durbin Algorithm, these data can get linear predictive coefficient and again, using Cepstrum - Transformer attain feature vectors. During HMM training, We used Baum-Welch reestimation Algorithm for each words training and can get the recognition result from executed likelihood method on each words. The used speech data is using 40 speech command data and 10 digits extracted form each 15 of male and female speaker spoken menu control command of Embedded system. Since, in many times, ARM CPU is adopted in embedded system, it's peformed porting the speech recognition engine on ARM core evaluation board. And do the recognition test with select set 1 and set 3 parameter that has good recognition rate on commander and no digit after the several tests using by 5 proposal recognition parameter sets. The recognition engine of recognition rate shows 95%, speech commander recognizer shows 96% and digits recognizer shows 94%.

  • PDF

Effect Analysis of MW Transmission System for Strategic Unit Using Adaptive Modulation (적응변조 적용 전략제대 MW전송시스템 효과 분석)

  • Lim, Young-Gab;Youn, Jong-Taek;Choi, Young-Min;Kim, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.412-419
    • /
    • 2020
  • The strategic unit communication infrastructure for military command, communications requires a dualized network structure of various communication methods, considering the direction of development, strategic unit and line characteristic. It has been pointed out that MicroWave, which is typical of wireless systems, is inefficient because it operates only with existing technologies. Therefore, it is necessary to analyze the structure, efficiency of the MW transmission system and its effects. It is difficult to transfer efficiently considering wireless environment due to a fixed type of access structure in the existing MW transmission system. Adaptive modulation allows improvement, but with traditional access structures and fixed bandwidth, there is a limit. Following the transmission performance improvement technique considering availability and link distance in the previous study, this paper presented improved packetized MW transmission system structure and variable bandwidth transmission in consideration of adaptive modulation based variable transmission waveform, bandwidth and distance, and performed the analysis in view of the strategic unit and command control circuit.

A Study on Impediments and Suggestion in Developing DHRMIS (국방인사정보체계(DHRMIS) 개발의 문제점과 개선안 연구)

  • Rho, Seung-Dam;Yang, Hae-Sool
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.161-169
    • /
    • 2009
  • Republic of Korea is actively adopting IT fusion technologies to achieve the goal of 'Advanced National Defense'. This study is aiming to directly contribute to the ongoing DHRMIS project by analyzing its any discovered and substantial problems as well as suggesting improvements. Current difficulties include the efficient estimation on project cost, the lack of statistics for cross-referencing, the inefficient development methodology, compliance with global quality control standard, and the separated command centers. This study suggests the budget appraisal process prior to the actual execution, the introduce of regulatory business registration system, applying an efficient development methodologies as well as ISO9126 standard for quality control, and a centralized command department. We expect this study would contribute to following researches in advancing our national defense.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

Nonlinear Discrete-Time Reconfigurable Flight Control Systems Using Neural Networks (신경회로망을 이용한 이산 비선형 재형상 비행제어시스템)

  • 신동호;김유단
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.2
    • /
    • pp.112-124
    • /
    • 2004
  • A neural network based adaptive reconfigurable flight controller is presented for a class of discrete-time nonlinear flight systems in the presence of variations of aerodynamic coefficients and control effectiveness decrease caused by control surface damage. The proposed adaptive nonlinear controller is developed making use of the backstepping technique for the angle of attack, sideslip angle, and bank angle command following without two time separation assumption. Feedforward multilayer neural networks are implemented to guarantee reconfigurability for control surface damage as well as robustness to the aerodynamic uncertainties. The main feature of the proposed controller is that the adaptive controller is developed under the assumption that all of the nonlinear functions of the discrete-time flight system are not known accurately, whereas most previous works on flight system applications even in continuous time assume that only the nonlinear functions of fast dynamics are unknown. Neural networks learn through the recursive weight update rules that are derived from the discrete-time version of Lyapunov control theory. The boundness of the error states and neural networks weight estimation errors is also investigated by the discrete-time Lyapunov derivatives analysis. To show the effectiveness of the proposed control law, the approach is i]lustrated by applying to the nonlinear dynamic model of the high performance aircraft.

LQ control by linear model of Inverted Pendulum for Robust Control of Robotic Vacuum Sweeping Machine (연마기 로봇의 강인제어를 위한 역진자의 선형화 모델을 통한 LQ제어)

  • Kim, Soo-Young;Lee, Jae-Duck;Jin, Tae-Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.529-532
    • /
    • 2012
  • This paper presents the system modeling, analysis, and controller design and implementation with a inverted pendulum system in order to test robust algorithm for sweeping machine. The balancing of an inverted pendulum by moving pendulum robot like as 'segway' along a horizontal track is a classic problem in the area of control. This paper will describe two methods to swing a pendulum attached to a cart from an initial downwards position to an upright position and maintain that state. The results of real experiment show that the proposed control system has superior performance for following a reference command at certain initial conditions.

  • PDF