• 제목/요약/키워드: Intelligent Equipment

검색결과 446건 처리시간 0.03초

Routing optimization algorithm for logistics virtual monitoring based on VNF dynamic deployment

  • Qiao, Qiujuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1708-1734
    • /
    • 2022
  • In the development of logistics system, the breakthrough of important technologies such as technology platform for logistics information management and control is the key content of the study. Based on Javascript and JQuery, the logistics system realizes real-time monitoring, collection of historical status data, statistical analysis and display, intelligent recommendation and other functions. In order to strengthen the cooperation of warehouse storage, enhance the utilization rate of resources, and achieve the purpose of real-time and visual supervision of transportation equipment and cargo tracking, this paper studies the VNF dynamic deployment and SFC routing problem in the network load change scenario based on the logistics system. The BIP model is used to model the VNF dynamic deployment and routing problem. The optimization objective is to minimize the total cost overhead generated by each SFCR. Furthermore, the application of the SFC mapping algorithm in the routing topology solving problem is proposed. Based on the concept of relative cost and the idea of topology transformation, the SFC-map algorithm can efficiently complete the dynamic deployment of VNF and the routing calculation of SFC by using multi-layer graph. In the simulation platform based on the logistics system, the proposed algorithm is compared with VNF-DRA algorithm and Provision Traffic algorithm in the network receiving rate, throughput, path end-to-end delay, deployment number, running time and utilization rate. According to the test results, it is verified that the test results of the optimization algorithm in this paper are obviously improved compared with the comparison method, and it has higher practical application and promotion value.

준실시간 해상교통 정보를 반영한 자율운항 알고리즘 검증용 시뮬레이션 시스템 개발 (Simulation System Development for Verification of Autonomous Navigation Algorithm Considering Near Real-Time Maritime Traffic Information)

  • 박한솔;한정욱
    • 대한조선학회논문집
    • /
    • 제60권6호
    • /
    • pp.473-481
    • /
    • 2023
  • In this study, a simulation system was developed to verify autonomous navigation algorithm in complex maritime traffic areas. In particular, real-world maritime traffic scenario was applied by considering near real-time maritime traffic information provided by Korean e-Navigation service. For this, a navigation simulation system of Unmanned Surface Vehicle (USV) was integrated with an e-Navigation equipment, called Electronic Chart System (ECS). To verify autonomous navigation algorithm in the simulation system, initial conditions including initial position of an own ship and a set of paths for the ship to follow are assigned by an operator. Then, considering real-world maritime traffic information obtained from the service, the simulation is implemented in which the ship repeatedly travels by avoiding surrounding obstacles (e.g., approaching ships). In this paper, the developed simulation system and its application on verification of the autonomous navigation algorithm in complex maritime traffic areas are introduced.

Applying Artificial Intelligence Based on Fuzzy Logic for Improved Cognitive Wireless Data Transmission: Models and Techniques

  • Ahmad AbdulQadir AlRababah
    • International Journal of Computer Science & Network Security
    • /
    • 제23권12호
    • /
    • pp.13-26
    • /
    • 2023
  • Recently, the development of wireless network technologies has been advancing in several directions: increasing data transmission speed, enhancing user mobility, expanding the range of services offered, improving the utilization of the radio frequency spectrum, and enhancing the intelligence of network and subscriber equipment. In this research, a series of contradictions has emerged in the field of wireless network technologies, with the most acute being the contradiction between the growing demand for wireless communication services (on operational frequencies) and natural limitations of frequency resources, in addition to the contradiction between the expansions of the spectrum of services offered by wireless networks, increased quality requirements, and the use of traditional (outdated) management technologies. One effective method for resolving these contradictions is the application of artificial intelligence elements in wireless telecommunication systems. Thus, the development of technologies for building intelligent (cognitive) radio and cognitive wireless networks is a technological imperative of our time. The functions of artificial intelligence in prospective wireless systems and networks can be implemented in various ways. One of the modern approaches to implementing artificial intelligence functions in cognitive wireless network systems is the application of fuzzy logic and fuzzy processors. In this regard, the work focused on exploring the application of fuzzy logic in prospective cognitive wireless systems is considered relevant.

Possibilities of reinforcement learning for nuclear power plants: Evidence on current applications and beyond

  • Aicheng Gong;Yangkun Chen;Junjie Zhang;Xiu Li
    • Nuclear Engineering and Technology
    • /
    • 제56권6호
    • /
    • pp.1959-1974
    • /
    • 2024
  • Nuclear energy plays a crucial role in energy supply in the 21st century, and more and more Nuclear Power Plants (NPPs) will be in operation to contribute to the development of human society. However, as a typical complex system engineering, the operation and development of NPPs require efficient and stable control methods to ensure the safety and efficiency of nuclear power generation. Reinforcement learning (RL) aims at learning optimal control policies via maximizing discounted long-term rewards. The reward-oriented learning paradigm has witnessed remarkable success in many complex systems, such as wind power systems, electric power systems, coal fire power plants, robotics, etc. In this work, we try to present a systematic review of the applications of RL on these complex systems, from which we believe NPPs can borrow experience and insights. We then conduct a block-by-block investigation on the application scenarios of specific tasks in NPPs and carried out algorithmic research for different situations such as power startup, collaborative control, and emergency handling. Moreover, we discuss the possibilities of further application of RL methods on NPPs and detail the challenges when applying RL methods on NPPs. We hope this work can boost the realization of intelligent NPPs, and contribute to more and more research on how to better integrate RL algorithms into NPPs.

APPLICATION OF FUZZY SET THEORY IN SAFEGUARDS

  • Fattah, A.;Nishiwaki, Y.
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1993년도 Fifth International Fuzzy Systems Association World Congress 93
    • /
    • pp.1051-1054
    • /
    • 1993
  • The International Atomic Energy Agency's Statute in Article III.A.5 allows it“to establish and administer safeguards designed to ensure that special fissionable and other materials, services, equipment, facilities and information made available by the Agency or at its request or under its supervision or control are not used in such a way as to further any military purpose; and to apply safeguards, at the request of the parties, to any bilateral or multilateral arrangement, or at the request of a State, to any of that State's activities in the field of atomic energy”. Safeguards are essentially a technical means of verifying the fulfilment of political obligations undertaken by States and given a legal force in international agreements relating to the peaceful uses of nuclear energy. The main political objectives are: to assure the international community that States are complying with their non-proliferation and other peaceful undertakings; and to deter (a) the diversion of afeguarded nuclear materials to the production of nuclear explosives or for military purposes and (b) the misuse of safeguarded facilities with the aim of producing unsafeguarded nuclear material. It is clear that no international safeguards system can physically prevent diversion. The IAEA safeguards system is basically a verification measure designed to provide assurance in those cases in which diversion has not occurred. Verification is accomplished by two basic means: material accountancy and containment and surveillance measures. Nuclear material accountancy is the fundamental IAEA safeguards mechanism, while containment and surveillance serve as important complementary measures. Material accountancy refers to a collection of measurements and other determinations which enable the State and the Agency to maintain a current picture of the location and movement of nuclear material into and out of material balance areas, i. e. areas where all material entering or leaving is measurab e. A containment measure is one that is designed by taking advantage of structural characteristics, such as containers, tanks or pipes, etc. To establish the physical integrity of an area or item by preventing the undetected movement of nuclear material or equipment. Such measures involve the application of tamper-indicating or surveillance devices. Surveillance refers to both human and instrumental observation aimed at indicating the movement of nuclear material. The verification process consists of three over-lapping elements: (a) Provision by the State of information such as - design information describing nuclear installations; - accounting reports listing nuclear material inventories, receipts and shipments; - documents amplifying and clarifying reports, as applicable; - notification of international transfers of nuclear material. (b) Collection by the IAEA of information through inspection activities such as - verification of design information - examination of records and repo ts - measurement of nuclear material - examination of containment and surveillance measures - follow-up activities in case of unusual findings. (c) Evaluation of the information provided by the State and of that collected by inspectors to determine the completeness, accuracy and validity of the information provided by the State and to resolve any anomalies and discrepancies. To design an effective verification system, one must identify possible ways and means by which nuclear material could be diverted from peaceful uses, including means to conceal such diversions. These theoretical ways and means, which have become known as diversion strategies, are used as one of the basic inputs for the development of safeguards procedures, equipment and instrumentation. For analysis of implementation strategy purposes, it is assumed that non-compliance cannot be excluded a priori and that consequently there is a low but non-zero probability that a diversion could be attempted in all safeguards ituations. An important element of diversion strategies is the identification of various possible diversion paths; the amount, type and location of nuclear material involved, the physical route and conversion of the material that may take place, rate of removal and concealment methods, as appropriate. With regard to the physical route and conversion of nuclear material the following main categories may be considered: - unreported removal of nuclear material from an installation or during transit - unreported introduction of nuclear material into an installation - unreported transfer of nuclear material from one material balance area to another - unreported production of nuclear material, e. g. enrichment of uranium or production of plutonium - undeclared uses of the material within the installation. With respect to the amount of nuclear material that might be diverted in a given time (the diversion rate), the continuum between the following two limiting cases is cons dered: - one significant quantity or more in a short time, often known as abrupt diversion; and - one significant quantity or more per year, for example, by accumulation of smaller amounts each time to add up to a significant quantity over a period of one year, often called protracted diversion. Concealment methods may include: - restriction of access of inspectors - falsification of records, reports and other material balance areas - replacement of nuclear material, e. g. use of dummy objects - falsification of measurements or of their evaluation - interference with IAEA installed equipment.As a result of diversion and its concealment or other actions, anomalies will occur. All reasonable diversion routes, scenarios/strategies and concealment methods have to be taken into account in designing safeguards implementation strategies so as to provide sufficient opportunities for the IAEA to observe such anomalies. The safeguards approach for each facility will make a different use of these procedures, equipment and instrumentation according to the various diversion strategies which could be applicable to that facility and according to the detection and inspection goals which are applied. Postulated pathways sets of scenarios comprise those elements of diversion strategies which might be carried out at a facility or across a State's fuel cycle with declared or undeclared activities. All such factors, however, contain a degree of fuzziness that need a human judgment to make the ultimate conclusion that all material is being used for peaceful purposes. Safeguards has been traditionally based on verification of declared material and facilities using material accountancy as a fundamental measure. The strength of material accountancy is based on the fact that it allows to detect any diversion independent of the diversion route taken. Material accountancy detects a diversion after it actually happened and thus is powerless to physically prevent it and can only deter by the risk of early detection any contemplation by State authorities to carry out a diversion. Recently the IAEA has been faced with new challenges. To deal with these, various measures are being reconsidered to strengthen the safeguards system such as enhanced assessment of the completeness of the State's initial declaration of nuclear material and installations under its jurisdiction enhanced monitoring and analysis of open information and analysis of open information that may indicate inconsistencies with the State's safeguards obligations. Precise information vital for such enhanced assessments and analyses is normally not available or, if available, difficult and expensive collection of information would be necessary. Above all, realistic appraisal of truth needs sound human judgment.

  • PDF

보행자 우선 출발신호의 적정 시간 산출 연구 (Study on the Appropriate Time for Leading Pedestrian Intervals)

  • 김대경;윤수영;윤진수;김상옥;윤일수
    • 한국ITS학회 논문지
    • /
    • 제19권3호
    • /
    • pp.1-13
    • /
    • 2020
  • 비보호좌회전 및 우회전 차량으로 인해 보행신호 시 보행자가 교통사고 위험에 노출되어 있는 신호교차로에서 보행자의 안전이 담보될 수 있는 교통신호체계에 대한 요구가 증가하고 있다. 이에 본 연구는 비보호좌회전 및 우회전 차량과 보행자 상충 예방을 위한 보행자 우선 출발신호(leading pedestrian interval, LPI) 교통신호체계의 국내 도입에 따른 적정 운영방안을 수립하고자 한다. 이를 위해 객관적이고 현실성 있는 연구 수행을 위해 전문가와 일반인을 대상으로 보행자 우선 출발신호 도입이 필요에 대한 설문조사를 실시하였다. 국내 여건에 맞는 보행자 우선 출발신호 도입을 위한 현장 적용 조건을 수립하고 비보호좌회전 및 우회전 시범운영 대상지를 선정하여 산출된 보행자 우선 출발신호의 적정시간을 대상교차로에 적용하였다. 횡단보도 내 도착차량 속도 분석과 보행신호 위반율을 분석한 결과 보행신호 등화 시 횡단보도 내 도착차량 속도가 감소되었고, 보행신호 위반율이 개선되어 보행자가 보다 안전한 환경에서 보행하는 것이 현장에서도 확인되었다.

ITS를 활용한 국방수송정보체계 효율성 증진에 관한 연구 (Improving the Efficiency of National Defense Transportation Information System by using ITS)

  • 오병은;김형진;손봉수
    • 대한교통학회지
    • /
    • 제24권1호
    • /
    • pp.85-94
    • /
    • 2006
  • 현재 군에서는 전 평시 군사작전시 원활한 군수지원보장을 위한 실시간 도로정보 획득의 중요성이 대두되어 이에 따른 개선방향을 모색하고 있다. 본 연구의 목적은 최소한의 비용으로 군에서 활용 가능한 도로정보 획득방안에 대해서 제시하는 것이다. 본 논문에서는 이를 위해 우선 군에서 요구하는 도로정보 유형과 군과 유관기관간 네트워크 공유시 제한사항을 확인한 후 유관기관별(건교부, 도로공사, 서울시, 건설기술연구원, 경찰청) ITS 장비 운영 및 타 기관과 도로정보 네트워크 공유실태를 분석하였다. 그리고 이를 토대로 가장 효율적인 군과 유관기관간 공간적, 내용적 ITS 연계범위를 설정하고, 군과 유관기관 ITS 연계체계를 구성하였다. 그리하여 민 관에 의해 운용되는 ITS(Intelligent Transportation System) 정보자산을 군에서 공유하여 전 평시 활용할 수 있는 방안을 제시하였다. 또한 군과 유관기관 네트워크 공유시 제한사항에 대한 극복방안에 대해서도 간략하게 제시하였다. 하지만 이 논문에서 제시된 방안이 매우 제한되기 때문에 보다 더 깊이 있는 연구를 통해 제한사항에 대한 극복대책을 강구하여야 된다고 사료된다.

딥러닝으로 추정한 차량대기길이 기반의 감응신호 연구 (Study of the Operation of Actuated signal control Based on Vehicle Queue Length estimated by Deep Learning)

  • 이용주;심민경;김용만;이상수;이철기
    • 한국ITS학회 논문지
    • /
    • 제17권4호
    • /
    • pp.54-62
    • /
    • 2018
  • 본 연구는 인공지능 신호 구현의 일환으로서, 딥러닝을 통해 실시간으로 추정하는 차량대기길이 기반의 감응식 신호 알고리즘을 제시하였다. 알고리즘의 구현을 위해 딥러닝 모형을 구현한 텐서플로우에 미시적 교통시뮬레이터인 Vissim을 제어하는 API, 즉 COM Interface를 구축하였다. Vissim에서 신호주기별로 수집된 링크통행시간과 통과교통량이 텐서플로우에 전달되면 학습이 완료된 딥러닝 모형을 통해 접근로별 차량대기길이가 추정된다. 접근로별 차량대기길이를 기반으로 신호시간을 산정한 후 Vissim 내부의 신호등화를 조정하여 시뮬레이션 한다. 본 연구에서 개발한 알고리즘은 현 TOD 방식에 비해 차량 지체가 약 5% 감소한 것으로 분석되었으며, 이는 네트워크 내 하나의 교차로만 대상으로 적용하여 그 효과가 제한된 것이며, 축 또는 네트워크 제어로의 공간적 확대방안을 향후연구로 제시하였다.

AVI/AEI 국제표준 동향과 국내표준 개발에 관한 연구 (A study on the AVI/AEI International standardization and development of the Korea standard)

  • 김웅이;강경우
    • 한국ITS학회 논문지
    • /
    • 제2권1호
    • /
    • pp.1-13
    • /
    • 2003
  • AVI/AEI는 무선주파수 기술에 기초하여 ITS의 응용시스템 개발을 위해 고안된 것이다. 특히, 이 기술은 국제운송과 관련한 CVO 및 정보시스템과 같은 복합운송에 사용되는 차량과 장비에 관한 인식정보를 주고받는 것이 최근 주요 표준 과제가 되고 있다. AVI/AEI 국제표준에서는 설계, 시스템 매개변수, 데이터 구조 및 통신과 관련하여 일반적인 상호 운영이 가능하도록 그 형태를 제공하고 운영환경 및 성능을 결정하기 위한 국제표준을 설정하는 것이 목표이다. 이 표준에서는 AVI/AEI 응용시스템 내에서 명확한 인식을 위해 일반적인 표준형태를 설정하고, 이를 위해 서로 다른 시스템 간에 상호 운영성이 가능하도록 데이터 구조 등을 설정하도록 하고 있다. AVI/AEI 표준은 ISO TC204의 WG4에서 담당하고 있으며, 8개의 표준항목을 가지고 있다. 최근 새로은 작업항목인 ERI가 추가되어 적극적으로 표준화 활동이 전개되고 있다. WG4에서는 3개의 일반교통환경에서 사용하는 항목과 4개의 복합운송 표준작업항목이 개발되고 있다. 모든 작업항목들은 CEN TC278과 ISO TC204가 비엔나 협약에 따라 동등하게 표준활동을 하고 있으나 WG4의 경우 CEN이 주도하고 있다. 이러한 표준항목들은 16개국의 30여명의 표준화 전문가들이 지정되어 표준화 활동을 진행하고 있다. 본 연구는 이러한 표준에 대한 동향과 국내의 개발현황에 대하여 고찰해본 것이다.

  • PDF

무인속도위반단속시스템 설치구간에서의 운전자 운행특성 분석 (A Study on Driving Characteristics of Drivers at the Enforcement System Based on Speed Data)

  • 이호원;김동효;박부희;이철기;하동익;이병철
    • 한국ITS학회 논문지
    • /
    • 제9권6호
    • /
    • pp.43-53
    • /
    • 2010
  • '97년 전국 5개 지방경찰청 32개 지점에 무인과속과속단속시스템의 도입으로 교통사고 발생 건수와 사망자수를 현저하게 감소시키는 효과를 가져와 지속적으로 확대 설치할 예정에 있다. 2010년 7월말 현재 4,495대를 설치 운영하고 있다. 대교, 터널 및 경사구간 등 위험도로구간에서는 치사율이 일반도로부의 3배 이상 높게 나타나 연속적인 속도관리가 필요하다. 그러나 무인과속단속시스템은 한 지점의 속도만으로 과속을 단속하는 시스템으로 단속지점에서만 속도를 줄이는 캥거루 효과가 발생하고 있어 연속적인 속도감소 효과를 기대할 수 없다. 따라서 위와 같은 연속적인 위험이 존재하는 도로구간에서는 교통사고 예방을 위해서는 위험구간의 평균속도로 과속차량을 단속하는 무인구간속도위반단속시스템 도입이 필요하게 되었다. 이에 본 논문에서는 무인구간속도위반단속시스템과 무인과속단속시스템 설치구간에서의 운전자 운행 특성인 캥거루 효과를 분석하고, 또한 제한속도 준수를 위한 두 시스템에 효과성을 검토하기 위하여 데이터를 수집하고 통계적인 분석을 실시하였다. 그 결과 무인구간속도위반단속시스템에서는 캥거루효과가 발생하지 않았고, 무인과속단속시스템에서만 캥거루효과가 발생하였다. 이러한 캥거루효과에 의한 차량 감속은 약 400m 전방에서 감속을 시작하는 것으로 분석되었다. 그리고 무인구간속도위반단속시스템의 평균속도가 무인과속단속시스템 보다 약 35km/h 낮은 것으로 분석되었다. 결론 적으로 무인구간속도위반단속시스템이 캥거루효과도 없을 뿐만 아니라 제한속도 준수에도 효과적인 것으로 검증되었다.