• Title/Summary/Keyword: Key Update

Search Result 206, Processing Time 0.027 seconds

Reliability analysis for fatigue damage of railway welded bogies using Bayesian update based inspection

  • Zuo, Fang-Jun;Li, Yan-Feng;Huang, Hong-Zhong
    • Smart Structures and Systems
    • /
    • 제22권2호
    • /
    • pp.193-200
    • /
    • 2018
  • From the viewpoint of engineering applications, the prediction of the failure of bogies plays an important role in preventing the occurrence of fatigue. Fatigue is a complex phenomenon affected by many uncertainties (such as load, environment, geometrical and material properties, and so on). The key to predict fatigue damage accurately is how to quantify these uncertainties. A Bayesian model is used to account for the uncertainty of various sources when predicting fatigue damage of structural components. In spite of improvements in the design of fatigue-sensitive structures, periodic non-destructive inspections are required for components. With the help of modern nondestructive inspection techniques, the fatigue flaws can be detected for bogie structures, and fatigue reliability can be updated by using Bayesian theorem with inspection data. A practical fatigue analysis of welded bogies is utilized to testify the effectiveness of the proposed methods.

WiFi-Based Home IoT Communication System

  • Chen, Wenhui;Jeong, Sangho;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • 제18권1호
    • /
    • pp.8-15
    • /
    • 2020
  • Internet-of-Things (IoT) technologies are used everywhere, and communication is one of its core and essential aspect. To solve the networking and communication of small IoT terminals, in this paper, a communication scheme based on low-cost WiFi is proposed, which also has the advantages of good compatibility and low power consumption. At the same time, it has a convenient one-key configuration mode, which reduces the technical requirements for operators. In this study, a communication protocol is designed that mainly aims at up to dozens of domestic IoT terminals, in which the amount of data is not large, data exchange is not high, and network is unstable. According to the alarm data, update data, and equipment or network fault, the protocol can respectively transmit in real time, regularly and repeatedly. This protocol is open and easy to integrate, and after cooperating with tiny encryption algorithm, information can be safely transmitted.

A design of ANFIS controller through ES algorithm for disturbances rejection in Hot Rolling

  • Jaekyung Jung;Ohmin Kwon;Lee, Sangmoon;Sangchul Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2000년도 제15차 학술회의논문집
    • /
    • pp.374-374
    • /
    • 2000
  • In this paper, we developed an ANFIS controller through ES algorithm for disturbances rejection in Hot Rolling. The looper of a Hot Rolling is installed between each pair of stands and plays key roles to enhance the product quality of the strip by controlling the tension and the width of the strip. At the same time, the AGC on top of the Mill produces a strip with the desired thickness through pressing its Mill. Between both, however, interactions are caused by coupling effects among strip tension, looper angle and strip thickness. In addition, in case disturbances, it is more difficult to keep strip quantities desirable. So we present an ANFIS controller through ES algorithm which is able to identify fuzzy rule with input/output data and update itself through output errors.

  • PDF

A novel visual tracking system with adaptive incremental extreme learning machine

  • Wang, Zhihui;Yoon, Sook;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.451-465
    • /
    • 2017
  • This paper presents a novel discriminative visual tracking algorithm with an adaptive incremental extreme learning machine. The parameters for an adaptive incremental extreme learning machine are initialized at the first frame with a target that is manually assigned. At each frame, the training samples are collected and random Haar-like features are extracted. The proposed tracker updates the overall output weights for each frame, and the updated tracker is used to estimate the new location of the target in the next frame. The adaptive learning rate for the update of the overall output weights is estimated by using the confidence of the predicted target location at the current frame. Our experimental results indicate that the proposed tracker can manage various difficulties and can achieve better performance than other state-of-the-art trackers.

6시그마를 적용한 철도차량유지보수에 관한 연구 (A study on the 6sigma application technique for maintenance of the rolling-socks)

  • 유양하;최형수
    • 한국철도학회:학술대회논문집
    • /
    • 한국철도학회 2009년도 춘계학술대회 논문집
    • /
    • pp.169-176
    • /
    • 2009
  • This paper introduces 60 apply method at a railroad vehicle including basic technique of the 60. Basically rolling stock maintenance cost is high and life cycle is long. Therefore, the maintenance efficiency is the most important. Usually the length of the rolling stock life cycle is over 20years, the method of maintenance technique must be reformed periodically. So the key point of a inspection efficiency is to update the maintenance method regularly. The early days 60 method began from the thing to reduce a productions era. But after the year 2000, it took the place to the management reform technique of all business field. Finally optimal rolling stock maintenance method is introduced through the example.

  • PDF

계층적 위치 지역을 이용한 동적 위치 관리 기법 (Dynamic Location Management with Hierarchical Location Area)

  • Lee, Chan-Oh;Kim, Myung-Il;Kim, Sung-Jo
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2002년도 가을 학술발표논문집 Vol.29 No.2 (3)
    • /
    • pp.661-663
    • /
    • 2002
  • This paper introduces a dynamic location management with hierarchical location area, which helps in reducing location update(LU) and paging cost and hence total location management cost. Users are assigned to appropriate location area level utilizing the call-to-mobility ratio(CMR) value. CMR values are calculated each time a user enters a new cell by computing its mobility rate and incoming call rate, which are the two key factors for defining the size of the location area.

  • PDF

위상정보를 갖는 구배법에 기반한 이동로봇의 고속 경로계획 (High-Speed Path Planning of a Mobile Robot Using Gradient Method with Topological Information)

  • 함종규;정우진;송재복
    • 제어로봇시스템학회논문지
    • /
    • 제12권5호
    • /
    • pp.444-449
    • /
    • 2006
  • Path planning is a key element in navigation of a mobile robot. Several algorithms such as a gradient method have been successfully implemented so for. Although the gradient method can provide the global optimal path, it computes the navigation function over the whole environment at all times, which result in high computational cost. This paper proposes a high-speed path planning scheme, called a gradient method with topological information, in which the search space for computation of a navigation function can be remarkably reduced by exploiting the characteristics of the topological information reflecting the topology of the navigation path. The computing time of the gradient method with topological information can therefore be significantly decreased without losing the global optimality. This reduced path update period allows the mobile robot to find a collision-free path even in the dynamic environment.

Developing a Model to Explain the Process of Technology Transfer at Entrepreneurial University

  • Soleimani, Mohsen;Tabriz, Akbar Alem;Shavarini, Sohrab Khalili
    • Industrial Engineering and Management Systems
    • /
    • 제15권4호
    • /
    • pp.298-306
    • /
    • 2016
  • The gap between universities, scientific centers and industrial-production units is one of higher education concerns. In academic entrepreneurship, the university work simultaneously in education, research and entrepreneurship. The universities play a key and important role in providing educational opportunities in economic development. This research aims to develop and expand science as well as help managers to explain the process of technology transfer in entrepreneurial university. This research is applied-developmental type and on the other hand, data driven theories have been used in this study. Current model is generally tried to meanwhile compensate previous shortcomings, include some strengths such as considering domestic factors of Iran as well as update effective factors on the process of technology transfer. Finally the suggested model has been compared with existing well-known models that each one of those models have some drawbacks which have been tried to be minimized in suggested model as much as possible.

HMIPv6 LBU 메시지 인증 (Authorizing LBU Messages on HMIPv6)

  • 김보미;김태은;주소진;민소연;전문석
    • 한국산학기술학회:학술대회논문집
    • /
    • 한국산학기술학회 2006년도 추계학술발표논문집
    • /
    • pp.203-207
    • /
    • 2006
  • Mobile Ip 환경에서 모바일 노드가 외부 네트워크로 이동하는 경우, 이동할 때마다 매번 Binding Update(BU) 메시지를 시그널링 하게 되면 Registration latency가 길어져, 이로 인해 불필요한 네트워크 트래픽을 유발한다. 따라서 HMIPv6가 고안되었는데 지역적인 이동성을 관리하는 MAP을 두어 계층적인 관리가 가능하게 되었다. HMIPv6는 이동단말을 구분할 수 있는 주소로 지역적인 LCoA와 외부에 노출되는 RCoA를 가지게 된다. 여기서, Mobile IP 환경에서 노드가 이동시 발생하게 되는 BU 메시지는 보안 취약성이 제안되어 왔는데 HMIPv6 에서는 두개의 CoA를 가지게 되므로 보안위협이 늘어나게 된다. 본 논문에서는 Static Shared Key를 사용하여 LCoA의 BU 시그널링 메시지를 인증함으로써 보안 취약성을 개선하였다.

  • PDF

이동 Ad Hoc 네트워크를 위한 대칭키 관리 기법 (A Symmetric Key Management Scheme for Mobile Ad Hoc Networks)

  • 송지은;왕기철;조기환
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2003년도 봄 학술발표논문집 Vol.30 No.1 (A)
    • /
    • pp.314-316
    • /
    • 2003
  • Ad Hoc 네트워크는 무선의 고유특성으로 인해 여러 가지 보안상 위협에 취약한 면을 지니고 있다. 이러한 위협들의 예로는 무선채널을 통한 엿돋기, 트래픽 모니터링과 같은 수동적인 공격과 악의적인 사용자로부터의 서비스 거부 공격(Denial Of Service), 그리고 신뢰성이 손상된 개체나 도난 당한 장치로부터의 공격등과 같은 능동적인 공격이 있다. 임의의 네트워크 환경에서 이러한 공격에 대한 안전한 통신을 보장하기 위해서 기밀성, 인증, 무결성 그리고 가용성등을 충족시켜야 한다. 이러한 보안상의 요구는 적절한 키 관리 방법을 필요로 한다. 하지만 기존의 방법들은 키의 일치를 위해 과도한 통신 오버헤드. 오랜 지연시간을 요구하거나 안전상 취약점을 노출한다. 본 논문에서는 호스트가 이동하는 상황에서, 빠르게 비밀키를 공유하도록 클러스터 구성을 이용하고 보다 안전한 키 관리를 위해 임계치 암호화 방식을 사용하는 방법을 제안한다. 더불어 제안하는 방법은 프로토콜에서 사용되는 임시키들과 부분키들을 주기적으로 update하여 안전성을 향상 시키며, 호스트들이 이동하는 상황에서도 안전하게 비밀키를 공유하도록 해준다. 따라서 본 논문에서 제안하는 방법은 이동 Ad Hoc 네트워크에서 높은 가용성을 보장하고 보다 안전하게 그룹키나 세션키를 공유하는 방법으로 이용될 수 있다.

  • PDF