• 제목/요약/키워드: Multiple robotics

검색결과 603건 처리시간 0.035초

Representing Human Motions in an Eigenspace Based on Surrounding Cameras

  • Houman, Satoshi;Rahman, M. Masudur;Tan, Joo Kooi;Ishikawa, Seiji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.1808-1813
    • /
    • 2004
  • Recognition of human motions using their 2-D images has various applications. An eigenspace method is employed in this paper for representing and recognizing human motions. An eigenspace is created from the images taken by multiple cameras that surround a human in motion. Image streams obtained from the cameras compose the same number of curved lines in the eigenspace and they are used for recognizing a human motion in a video image. Performance of the proposed technique is shown experimentally.

  • PDF

Intelligent Hybrid Modular Architecture for Multi Agent System

  • Lee, Dong-Hun;Baek, Seung-Min;Kuc, Tae-Yong;Chung, Chae-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.896-902
    • /
    • 2004
  • The purpose of the study of multi-robot system is to realize multi-robot system easy for the control of robot system in case robot is adapted in the complicated environment of task structure. The purpose of the study of multi-robot system is to realize multi-robot system easy for the control of robot system in case robot is adapted in the complicated environment of task structure. To make real time control possible by making effective use of recognized information in this dynamic environment, suitable distribution of tasks should be made in consideration of function and role of each performing robots. In this paper, IHMA (Intelligent Hybrid Modular Architecture) of Intelligent combined control architecture which utilizes the merits of deliberative and reactive controllers will be suggested and its efficiency will be evaluated through the adaptation of control architecture to representative multi-robot system.

  • PDF

Cooperating Control of Multiple Nonholonomic Mobile Robots Carrying a Ladder with Obstacles

  • Yang, Dong-Hoon;Choi, Yong-Chul;Hong, Suk-Kyo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.818-829
    • /
    • 2003
  • A cooperating control algorithm for two nonholonomic mobile robots is proposed. The task is composed of collision avoidance against obstacles and carrying a ladder. The front robot and the rear robot are called the leader and the follower, respectively. Each robot has a nonholonomic constraint so it cannot move in perpendicular directions. The environment is initially supposed to be unknown except target position. The torque that drives leader is determined by distance between the leader and the target position or the distance between it and the obstacles. The torque by target is attractive and the torque by obstacles is repulsive. The two mobile robots are supposed to be connected by link that can be expanded and contracted. The follower computes its torque using position and orientation information from the leader by communication. Simulation results show that the robots can drive to target position without colliding into the obstacles and maintain the distance in the allowable range.

  • PDF

Fuzzy Petri-net Approach to Fault Diagnosis in Power Systems Using the Time Sequence Information of Protection System

  • Roh, Myong-Gyun;Hong, Sang-Eun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1727-1731
    • /
    • 2003
  • In this paper we proposed backward fuzzy Petri-net to diagnoses faults in power systems by using the time sequence information of protection system. As the complexity of power systems increases, especially in the case of multiple faults or incorrect operation of protective devices, fault diagnosis requires new and systematic methods to the reasoning process, which improves both its accuracy and its efficiency. The fuzzy Petri-net models of protection system are composed of the operating process of protective devices and the fault diagnosis process. Fault diagnosis model, which makes use of the nature of fuzzy Petri-net, is developed to overcome the drawbacks of methods that depend on operator knowledge. The proposed method can reduce processing time and increase accuracy when compared with the traditional methods. And also this method covers online processing of real-time data from SCADA (Supervisory Control and Data Acquisition)

  • PDF

Stepping Stones Attack Simulator for TCP Connection Traceback Test

  • Choi, Byeong-cheol;Seo, Dong-Il;Sohn, Sung-Won;Lee, Sang-Ho
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2112-2115
    • /
    • 2003
  • In this paper, we describe a SSAS (stepping stones attack simulator) that is automatic tool for testing and evaluation in TCP connection traceback system. The SSAS can pass multiple hosts that are included with hacker, middle-path hosts and victim’s system. And SSAS can also attack through commands to exploit the victim’s system. Usually, hackers do not expose their real attack positions through compromising the middle-path hosts like stepping-stones. Namely, hackers perform the stepping stones attacks in Internet. The SSAS can be utilized by developments and tests of the various countermeasure techniques of hacking. Specially, in this paper, it is used to test the performance of TCP connection traceback system.

  • PDF

A New TLS-Based Sequential Algorithm to Identify Two Failed Satellites

  • Jeon, Chang-Wan;Lachapelle, Gerard
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.2627-2631
    • /
    • 2003
  • With the development of RAIM techniques for single failure, there has been increasing interest in the multiple failure problem. There have been many approaches to tackle the problem from various points of view. This paper approaches to two failure problem with total least squares (TLS) technique, which has rarely been addressed because TLS requires a great number of computations. In this paper, the special form of the observation matrix H, that is, one column is exactly known, is exploited so as to develop an algorithm in a sequential form, which reduces computational burden. The algorithm makes us enjoy the advantages of TLS without much computational burden. The proposed algorithm is verified through a numerical simulation.

  • PDF

Development of CAN based Automatic Fire Detection System

  • Lee, Hong-Hee;Kim, Jung-Hee
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.695-699
    • /
    • 2003
  • It is general to use the control network in control systems in order to reduce the complexity of the related wiring harnesses and to improve the system flexibility. CAN becomes one of the most popular network protocols because of its low price, multiple sources, high performance and reliability. This paper describes a CAN based real-time control of the fire detection system for the intelligent building system. The proposed fire detection and alarm system is stronger than the previous one against noises and communication media faults and can solve many problems such as complex cabling and increment of I/O ports by using many sensors. Furthermore, MMI can be achieved easily with the personal computer that is used for replacing the traditional monitoring system. The proposed system is implemented and the experimental results are given.

  • PDF

Policy-based Network Security with Multiple Agents (ICCAS 2003)

  • Seo, Hee-Suk;Lee, Won-Young;Yi, Mi-Ra
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1051-1055
    • /
    • 2003
  • Policies are collections of general principles specifying the desired behavior and state of a system. Network management is mainly carried out by following policies about the behavior of the resources in the network. Policy-based (PB) network management supports to manage distributed system in a flexible and dynamic way. This paper focuses on configuration management based on Internet Engineering Task Force (IETF) standards. Network security approaches include the usage of intrusion detection system to detect the intrusion, building firewall to protect the internal systems and network. This paper presents how the policy-based framework is collaborated among the network security systems (intrusion detection system, firewall) and intrusion detection systems are cooperated to detect the intrusions.

  • PDF

A Distributed Power Optimization Method for CDMA Cellular Mobile Systems Using an Adaptive Search Scheme

  • Lee, Young-Dae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1982-1985
    • /
    • 2003
  • Future cellular networks will mainly be driven by, high quality channels, high band with utilization, low power consumption and efficient network management. For a given channel allocation, the capacity and quality of communication of cellular radio systems using CDMA(Code Division Multiple Access) can be increased by using a transmitter power control scheme to combat the near-far problem. Centralized power control schemes or distributed ones to maximize the minimum signal-to-interference in each user of CDMA wireless network have been investigated. This paper has proposed a distributed power control algorithm, which employs an adaptive search scheme, in order to solve quickly the linear systems of equations for power update in CDMA cellular radio systems. The simulation results show that the proposed scheme has faster convergence rate than the typical bang-bang type of distributed power control algorithm, which has been much used as a reference algorithm in IS-95A and W-CDMA communication network.

  • PDF

Local Obstacle Avoidance of Nonholonomic Wheeled Mobile Robots in Trajectory Tracking

  • Lee, Young-Ho;Park, Jong-Hyeon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1172-1177
    • /
    • 2003
  • In this paper, we propose an obstacle avoidance technique in trajectory tracking of nonholonomic wheeled mobile robots. Input-output linearized backstepping controller is used in trajectory tracking, and repulsive type control input for obstacle avoidance is added to it. The added input is generated by fuzzy logic. And we do not add the two inputs directly but combine them via fuzzy logic, which determines the ratings of each input. Some simulations are performed to show that with the proposed algorithm, the mobile robot can track its reference trajectory even if there are multiple obstacles on the trajectory of robot.

  • PDF