• Title/Summary/Keyword: Moving table

Search Result 154, Processing Time 0.023 seconds

Designing the Moving Pattern of Cleaning Robot based on Grammatical Evolution with Conditional Probability Table (문법적 진화기법과 조건부 확률을 이용한 청소 로봇의 이동 패턴 계획)

  • Gwon, Soon-Joe;Kim, Hyun-Tae;Ahn, Chang Wook
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.4
    • /
    • pp.184-188
    • /
    • 2016
  • The cleaning robot is popularly used as a home appliance. The state-of-the-art cleaning robot can clean more efficiently by using information gathered from its sensor, which is difficult for low-price cleaning robots due to limitation in this aspect. In this paper, we suggested a method for the moving pattern of cleaning robot based on grammatical evolution. Optimized program is generated by using moving pattern grammar, which is defined by Backus-Naur form. In addition, conditional probability is used between each of the grammar elements during the program creation process. The proposed method is evaluated by robot simulation in order to verify its performance and further compare it with existing algorithms. The experiment results showed that the proposed method is better than the compared algorithms.

Attack Surface Expansion through Decoy Trap for Protected Servers in Moving Target Defense

  • Park, Tae-Keun;Park, Kyung-Min;Moon, Dae-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.25-32
    • /
    • 2019
  • In this paper, we propose a method to apply the attack surface expansion through decoy traps to a protected server network. The network consists of a large number of decoys and protected servers. In the network, each protected server dynamically mutates its IP address and port numbers based on Hidden Tunnel Networking that is a network-based moving target defense scheme. The moving target defense is a new approach to cyber security and continuously changes system's attack surface to prevent attacks. And, the attack surface expansion is an approach that uses decoys and decoy groups to protect attacks. The proposed method modifies the NAT table of the protected server with a custom chain and a RETURN target in order to make attackers waste all their time and effort in the decoy traps. We theoretically analyze the attacker success rate for the protected server network before and after applying the proposed method. The proposed method is expected to significantly reduce the probability that a protected server will be identified and compromised by attackers.

Life Table Construction Based on the Recent Vital Registration Data (최근 신고자료를 기초로 한 우리나라 사망패턴)

  • 김백현;최봉호;김동회
    • Korea journal of population studies
    • /
    • v.13 no.1
    • /
    • pp.3-25
    • /
    • 1990
  • Life table of Korean population for years 1983 1985 1987 and 1989 were constructed byt the National Bureau of Statics. The ago specific death rates were calculated froom the death registral ion for numerators and the estimated population by age and sex for denominators. In the course of constructing life tables, we have maole some adjustments for deficiencies in regist rat ion olata as follows. First, the non-registered portion oof infant deaths especially for neo-natal deaths was estirnateol and added too the original data. The main reason is that deaths occorring in the neo-natal period and prior to the registrat ion of birth leave little incentive for the registration of either the birth or the death. Second. t he do~hayed p(ortioon of deaths registering after one year of occurrence was estimated and added too the original data. Third t the ptortioon haying in, occuracies in ,~oge reporting was also estimated. Fourth the moving average methood was finally employed in an effort too remove the random error. The major fin(hings are as foolloows. 1. the average life expectancy at birth in 1989 is calculateol as 70.8 years in 1989, 2. a gap netween the male and female life expectancies is widened to more than 8 years toorm 1.8 years in 1906 10. It means that the female life expectancy has increased substantially, 3. the death rates of the middle - aged men starting age 40 are found to he relatively higher than those of females and younger age groups. This peculiar pattern was also found with the comparison of those of other countries.

  • PDF

Experimental validation of smartphones for measuring human-induced loads

  • Chen, Jun;Tan, Huan;Pan, Ziye
    • Smart Structures and Systems
    • /
    • v.18 no.3
    • /
    • pp.625-642
    • /
    • 2016
  • The rapid technology developments in smartphones have created a significant opportunity for their use in structural live load measurements. This paper presents extensive experiments conducted in two stages to investigate this opportunity. Shaking table tests were carried out in the first stage using selected popular smartphones to measure the sinusoidal waves of various frequencies, the sinusoidal sweeping, and earthquake waves. Comparison between smartphone measurements and real inputs showed that the smartphones used in this study gave reliable measurements for harmonic waves in both time and frequency domains. For complex waves, smartphone measurements should be used with caution. In the second stage, three-dimensional motion capture technology was employed to explore the capacity of smartphones for measuring the movement of individuals in walking, bouncing and jumping activities. In these tests, reflective markers were attached to the test subject. The markers' trajectories were recorded by the motion capture system and were taken as references. The smartphone measurements agreed well with the references when the phone was properly fixed. Encouraged by these experimental validation results, smartphones were attached to moving participants of this study. The phones measured the acceleration near the center-of-mass of his or her body. The human-induced loads were then reconstructed by the acceleration measurements in conjunction with a biomechanical model. Satisfactory agreement between the reconstructed forces and that measured by a force plate was observed in several instances, clearly demonstrating the capability of smartphones to accurately assist in obtaining human-induced load measurements.

Road Slide Detection Algorithm Using CCD Camera (CCD 카메라를 이용한 도로 붕괴 사태 검출 알고리즘)

  • Kwon, Young-Man;Shin, Se-Yeon;Park, Young-Jin;Kim, Eun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.181-187
    • /
    • 2011
  • In this paper, we proposed the vision-based efficient algorithm for road slide detection like as destruction of road cut slope. The proposed algorithm defines the image region as non surveillance and surveillance which is further divided by road, boundary and non road region. After that, it find the moving block, remember the history of movement using the TTL(Time To Live) table, determine the road slide by checking the existence of moving blocks from non road region to road region together. We confirmed the proposed algorithm detected the road slide effectively through experiments.

Design of Active Magnetic Bearing System for Moving Vehicles (이동 차량 탑재용 전자기 베어링 시스템 설계)

  • Kim, Ha-Yong;Sim, Hyun-Sik;Lee, Chong-Won;Kang, Tae-Ha
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.15 no.3 s.96
    • /
    • pp.364-370
    • /
    • 2005
  • The active magnetic bearing (AMB) systems mounted in moving vehicles are exposed to the disturbances due to the base motion, often leading to malfunction or damage as well as inaccurate positioning of the systems. Thus, in the controller design of such AMB systems, robustness to base disturbances becomes an essential requirement. In this study, effective control schemes are proposed for the homo-polar AMB system, which uses permanent magnets for generation of bias magnetic flux, when it is subject to base motion, and its control performance is experimentally evaluated. The base motion of AMB system is modeled as the dynamic disturbances in the gravity and base excitation forces. To effectively compensate for the disturbances, the angle feed-forward controller based on the inverse dynamic model and the acceleration feed-forward controller based on the normalized filtered-X LMS algorithm are proposed. The performance test of the prototype AMB system is carried out, when the system is mounted on rate table. The experimental results show that the performance of the proposed controllers for the AMB system is satisfactory in compensating for the disturbances due to the base motion.

Calculating the Feedrate of 5-Axis NC Machining Data for the Constant Cutting Speed at a CL-point (공구 끝의 일정한 절삭속도를 위한 5축 NC 가공 데이터의 이송속도 산출)

  • 이철수;이제필
    • Korean Journal of Computational Design and Engineering
    • /
    • v.6 no.2
    • /
    • pp.69-77
    • /
    • 2001
  • This paper describes a method of calculating the feedrate for the constant cutting speed at a CL-point in 5-axis machining. Unlike 3-axis machining, 5-axis machining has the flexibility of the tool motions due to two rotation axes. But the feedrate at joint space differs from the feedrate at a tool tip(the CL-point) of the 3D Euclidean space for the tool motions. The proposed algorithm adjusts the feedrate based on 5-axis NC data, the kinematics of a machine, and the tool length. The following calculations is processed for each NC block to generate the new feedrate; 1) calculating the moving distance at the CL-point, 2) calculating the moving time by the given feedrate, 3) calculating the feedrate of each axis, 4) getting the new feedrate. The proposed algorithm was applied to a 5-axis machine which had a tilting spindle and a rotary table. Totally, the result of the algorithm reduced the machining time and smoothed the cutting-load by the constant cutting speed at the CL-point.

  • PDF

A Moving Window Principal Components Analysis Based Anomaly Detection and Mitigation Approach in SDN Network

  • Wang, Mingxin;Zhou, Huachun;Chen, Jia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3946-3965
    • /
    • 2018
  • Network anomaly detection in Software Defined Networking, especially the detection of DDoS attack, has been given great attention in recent years. It is convenient to build the Traffic Matrix from a global view in SDN. However, the monitoring and management of high-volume feature-rich traffic in large networks brings significant challenges. In this paper, we propose a moving window Principal Components Analysis based anomaly detection and mitigation approach to map data onto a low-dimensional subspace and keep monitoring the network state in real-time. Once the anomaly is detected, the controller will install the defense flow table rules onto the corresponding data plane switches to mitigate the attack. Furthermore, we evaluate our approach with experiments. The Receiver Operating Characteristic curves show that our approach performs well in both detection probability and false alarm probability compared with the entropy-based approach. In addition, the mitigation effect is impressive that our approach can prevent most of the attacking traffic. At last, we evaluate the overhead of the system, including the detection delay and utilization of CPU, which is not excessive. Our anomaly detection approach is lightweight and effective.

A Robust EWMA Control Chart (로버스트 지수가중 이동평균(EWMA) 관리도)

  • Nam, Ho-Soo;Lee, Byung-Gun;Joo, Cheol-Min
    • Journal of the Korean Data and Information Science Society
    • /
    • v.10 no.1
    • /
    • pp.233-241
    • /
    • 1999
  • Control chart is a very extensively used tool in testing whether a process is in a state of statistical control or not. In this paper, we propose a robust EWMA(exponentially weighted moving averages) control chart for variables, which is based on the Huber's M-estimator. The Huber's M-estimator is a well-known robust estimator in sense of distributional robustness. In the proposed chart, the estimation of the process deviation is modified to have a s table level and high power. To compare the performances of the proposed control chart with other charts, some Monte Carlo simulations we performed. The simulation results show that the robust EWMA control chart has good performance.

  • PDF

On the Adaptive 3-dimensional Transform Coding Technique Employing the Variable Length Coding Scheme (가변 길이 부호화를 이용한 적응 3차원 변환 부호화 기법)

  • 김종원;이신호;이상욱
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.7
    • /
    • pp.70-82
    • /
    • 1993
  • In this paper, employing the 3-dimensional discrete cosine transform (DCT) for the utilization of the temporal correlation, an adaptive motion sequence coding technique is proposed. The energy distribution in a 3-D DCT block, due to the nonstationary nature of the image data, varies along the veritical, horizontal and temporal directions. Thus, aiming an adaptive system to local variations, adaptive procedures, such as the 3-D classification, the classified linear scanning technique and the VLC table selection scheme, have been implemented in our approach. Also, a hybrid structure which adaptively combines inter-frame coding is presented, and it is found that the adaptive hybrid frame coding technique shows a significant performance gain for a moving sequence which contains a relatively small moving area. Through an intensive computer simulation, it is demonstrated that, the performance of the proposed 3-D transform coding technique shows a close relation with the temporal variation of the sequence to be code. And the proposed technique has the advantages of skipping the computationally complex motion compensation procedure and improving the performance over the 2-D motion compensated transform coding technique for rates in the range of 0.5 ~ 1.0 bpp.

  • PDF