• Title/Summary/Keyword: Intelligent Control Method

Search Result 1,379, Processing Time 0.032 seconds

Design and Evaluation of a GNSS Receiver Network For Lane-By-Lane Traffic Monitoring (차선별 교통 모니터링을 위한 위성항법 수신기망 설계 및 성능 평가)

  • Kim, Hee-Sung;Lee, Hyung-Keun
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.151-160
    • /
    • 2010
  • For the realization of future intelligent transportation systems, fine-grained lane-by-lane traffic monitoring and control functionalities are among the most important technology barriers to overcome. To satisfy the accuracy requirement for traffic monitoring, a GNSS receiver network is designed. The designed receiver network consists of three different types of entities; reference server, broadcaster, and client. For deployment flexibility, all the entities utilize the international message standard RTCM SC-104 version 3.0. For fine-grained traffic monitoring, the client is designed to utilize position-domain carrier-smoothed-code filters to provide accurate vehicle coordinates in spite of frequent addages and outages of visible satellites. An experiment result is presented to evaluate the positioning accuracy of the proposed method.

Configuration of clustering and routing algorithms for energy efficiency by wireless sensor network in ship (선박 내 무선 센서 네트워크에서 에너지 효율을 위한 클러스터링 및 라우팅 알고리즘의 구성)

  • Kim, Mi-jin;Yu, Yun-Sik;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.435-438
    • /
    • 2012
  • Today, In all fields, As combination of ubiquitous computing-based technologies between electronic space and physical space, has been active trend research about wireless integration sensor network between sensors and wireless technology. Also, but in ship is underway research about Ship Area Network(SAN) of intelligent ship to integrate wireless technology, ship is required SAN-bridge technology of a variety of wired, wireless network integration and heterogeneous sensor and interoperability of the controller and SAN configuration management technology of remote control. Ship keep safe of all the surrounding environment including crew besides structural safety and freight management monitoring. In this paper, for monitoring design such as on climate change detection and temperature, pressure about various structures, there identify technology trends for routing and data aggregation to use energy efficiency in wireless sensor network. And to analyze self-organizing clustering method, study For wireless sensor network configuration in ship.

  • PDF

Design of Ubiquitous Reference Point for Location Service (위치정보 제공 서비스를 위한 유비쿼터스 기준점 설계 연구)

  • Park, Jae-Min;Oh, Yoon-Seuk;Kang, Jin-A;Kim, Byung-Guk
    • Spatial Information Research
    • /
    • v.15 no.3
    • /
    • pp.301-310
    • /
    • 2007
  • There are 21,000 National Surveying Control Points (NSCP) made of stone for precise surveying nationwide. NSCPs that provide location information are usually buried at the top of a mountain for view points that cannot be used by the public. Recently, according to the growing ubiquitous computing generation, location-based information has become very important and a service that can be easily accessed by the public is needed. In this research, a new type of reference point for a location information service is proposed. It is an Intelligent Reference Point (IRP) equipped with RFID tags and a two-dimensional bar-code system. The IRP system is composed of an electronic tag component, a tag identification component, and an IRP service component. We designed the IRP receiver identifying RFID tag and two-dimensional barcode was designed using a PDA, digital camera, and an RFID receiver. Also designed was IRP input data and input information. Furthermore, the operation software was developed in a PDA for identifying IRP and using IRP the service, and the IRP positioning method was developed using a GIS spatial analysis.

  • PDF

Action Realization of Modular Robot Using Memory and Playback of Motion (동작기억 및 재생 기능을 이용한 모듈라 로봇의 다양한 동작 구현)

  • Ahn, Ki-Sam;Kim, Ji-Hwan;Lee, Bo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.181-186
    • /
    • 2017
  • In recent years, robots have been actively used for children's creativity learning and play, but most robots have a stereotyped form and have a high dependency on the program, making it difficult to learn creativity and play. In order to compensate for these drawbacks, We have created a robot that can easily and reliably combine each other. The robot can memorize the desired operation and execute the memorized operation by using one button. Also, in case multiple modules are combined, pressing the button once on any module makes it possible to easily adjust the operation of all the combined modules. In order to verify the actual operation, two, three, and five modules are combined to demonstrate the usefulness of the proposed structure and algorithm by implementing a gobbling motion and a walking robot. It is required to study intelligent modular robots that can control over the Internet by supplementing the wireless connection method.

Adaptive Customer Relation Management Strategies using Association Rules (연관 규칙을 이용한 적응적 고객 관계 관리 전략)

  • Han, Ki-Tae;Chung, Kyung-Yong;Baek, Jun-Ho;Kim, Jong-Hun;Ryu, Joong-Kyung;Lee, Jung-Hyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.84-86
    • /
    • 2008
  • The customer relation marketing in which companies can utilize to control and to get the filtered information efficiently has appeared. It is applying data mining to build the management that can even predict and recommend products to customers. In this paper, we proposed the adaptive customer relation management strategies using the association rules of data mining. The proposed method uses the association rules composes frequent customers with occurrence of candidate customer set creates the rules of associative customers. We analyzed the efficient feature of purchase customers using the hyper graph partition according to the lift of creative association rules. Therefore, we discovered strategies of the cross-selling and the up-selling about customers.

  • PDF

A Study on Categorization of Accident Pattern for Organization's Information Security Strategy Establish (기업 정보보안 전략 수립을 위한 보안 사고 유형 분류에 관한 연구)

  • Kim, Hee-Ohl;Baek, Dong-Hyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.193-201
    • /
    • 2015
  • Corporation's valuable intelligent asset is being threatened from the skills of threatening subject that has been evolved along with the growth of the information system and the amount of the information asset. Domestically, attempts of various private information attacks, important information extortion, and information damage have been detected, and some of them have abused the vulnerability of security of information system, and have become a severe social problem that generates security incident. When accessing to the security, most of companies used to establish a strategy with a consistent manner and a solution plan. However, this is not a proper way. The order of priorities vary depending on the types of business. Also, the scale of damage varies significantly depending on the types of security incidents. And method of reaction and critical control point vary depending on the types of business and security incidents. In this study, I will define the security incidents by their types and preponderantly examine how one should react to those security incidents. In this study, analyzed many types of security accidents that can occur within a corporation and an organization considering various factors. Through this analysis, thought about factors that has to be considered by corporations and organizations when they intend to access to the information security. This study focuses on the response methodology based on the analysis of the case analysis of the leakage of industrial secret and private secret other than the conceptual response methodology that examines the way to prevent the leakage of the industry security systems and the industry information activities. And based on these factors, want to be of help for corporations to apply a reasonable approach when they establish a strategy to information security.

Design and Implement of BACnet based Intelligent Building Automation Control System (모바일 카메라를 이용한 방송 시스템 설계 및 구현)

  • Park, Youngha;Seong, Kiyoung;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1330-1336
    • /
    • 2021
  • Media sharing platform such as YouTube have grown significantly in the mobile environment. This is a platform that allows users to select and view broadcast programs that are only available on TV through network-connected PCs and mobiles, and share their media content to communicate. Currently, in the era where mobile and TV broadcasts can be viewed equally, there is a time difference between the video and real-time screen transmitted to TV and mobile, different from the actual situation.We want this time difference to be realized in the same way as the real time, and there is a need for a system that can broadcast in a free environment at any time. Therefore, in this paper, a broadcasting system was designed and implemented in a mobile environment. The result of reducing the delay time difference due to the improvement of the processing method was obtained.

A Service Model Development Plan for Countering Denial of Service Attacks based on Artificial Intelligence Technology (인공지능 기술기반의 서비스거부공격 대응 위한 서비스 모델 개발 방안)

  • Kim, Dong-Maeong;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.587-593
    • /
    • 2021
  • In this thesis, we will break away from the classic DDoS response system for large-scale denial-of-service attacks that develop day by day, and effectively endure intelligent denial-of-service attacks by utilizing artificial intelligence-based technology, one of the core technologies of the 4th revolution. A possible service model development plan was proposed. That is, a method to detect denial of service attacks and minimize damage through machine learning artificial intelligence learning targeting a large amount of data collected from multiple security devices and web servers was proposed. In particular, the development of a model for using artificial intelligence technology is to detect a Western service attack by focusing on the fact that when a service denial attack occurs while repeating a certain traffic change and transmitting data in a stable flow, a different pattern of data flow is shown. Artificial intelligence technology was used. When a denial of service attack occurs, a deviation between the probability-based actual traffic and the predicted value occurs, so it is possible to respond by judging as aggressiveness data. In this paper, a service denial attack detection model was explained by analyzing data based on logs generated from security equipment or servers.

Design of Hybrid V2X Communication Platform for Evaluation of Commercial Vehicle Autonomous Driving and Platooning (상용차 자율 군집 주행 평가를 위한 하이브리드 V2X 통신 플랫폼 설계)

  • Jin, Seong-keun;Jung, Han-gyun;Kwak, Jae-min
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.521-526
    • /
    • 2020
  • In this paper, we propose a design method and process for hybrid V2X communication platform that combines WAVE communication and LTE-V2X communication which are C-ITS communication protocols for vehicle environments and Legacy LTE communication which is a commercial mobile communication for evaluating the autonomous platooning platform of commercial vehicles. For a safe and efficient autonomous platooning platform, an low-latency communication function based on C-ITS communication is required, and to control it, commercial communication functions such as Legacy LTE, which can be connected at all times, are required. In order to evaluate such a system, the evaluation equipment must have the same level of communication performance or higher. The main design contents presented in this paper will be applied to the implementation of hybrid V2X terminals for functional evaluation.

A multi-layer approach to DN 50 electric valve fault diagnosis using shallow-deep intelligent models

  • Liu, Yong-kuo;Zhou, Wen;Ayodeji, Abiodun;Zhou, Xin-qiu;Peng, Min-jun;Chao, Nan
    • Nuclear Engineering and Technology
    • /
    • v.53 no.1
    • /
    • pp.148-163
    • /
    • 2021
  • Timely fault identification is important for safe and reliable operation of the electric valve system. Many research works have utilized different data-driven approach for fault diagnosis in complex systems. However, they do not consider specific characteristics of critical control components such as electric valves. This work presents an integrated shallow-deep fault diagnostic model, developed based on signals extracted from DN50 electric valve. First, the local optimal issue of particle swarm optimization algorithm is solved by optimizing the weight search capability, the particle speed, and position update strategy. Then, to develop a shallow diagnostic model, the modified particle swarm algorithm is combined with support vector machine to form a hybrid improved particle swarm-support vector machine (IPs-SVM). To decouple the influence of the background noise, the wavelet packet transform method is used to reconstruct the vibration signal. Thereafter, the IPs-SVM is used to classify phase imbalance and damaged valve faults, and the performance was evaluated against other models developed using the conventional SVM and particle swarm optimized SVM. Secondly, three different deep belief network (DBN) models are developed, using different acoustic signal structures: raw signal, wavelet transformed signal and time-series (sequential) signal. The models are developed to estimate internal leakage sizes in the electric valve. The predictive performance of the DBN and the evaluation results of the proposed IPs-SVM are also presented in this paper.