• Title/Summary/Keyword: Network topology

Search Result 1,191, Processing Time 0.028 seconds

Spatial target path following and coordinated control of multiple UUVs

  • Qi, Xue;Xiang, Peng;Cai, Zhi-jun
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.12 no.1
    • /
    • pp.832-842
    • /
    • 2020
  • The coordination control of multiple Underactuated Underwater Vehicles (UUVs) moving in three dimensional space is investigated in this paper. The coordinated path following control task is decomposed into two sub tasks, that is, path following control and coordination control. In the spatial curve path following control task, path following error dynamics is build in the Serret-Frenet coordinate frame. The virtual reference object can be chosen freely on the desired spatial path. Considering the speed of the UUV, the line-of-sight navigation is introduced to help the path following errors quickly converge to zero. In the coordination control sub task, the communication topology of multiple UUVs is described by the graph theory. The speed of each UUV is adjusted to achieve the coordination. The path following system and the coordination control system are viewed as the feedback connection system. Input-to-state stable of the coordinated path following system can be proved by small gain theorem. The simulation experiments can further demonstrate the good performance of the control method.

A Differential Voltage-controlled Oscillator as a Single-balanced Mixer

  • Oh, Nam-Jin
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.12-23
    • /
    • 2021
  • This paper proposes a low power radio frequency receiver front-end where, in a single stage, single-balanced mixer and voltage-controlled oscillator are stacked on top of low noise amplifier and re-use the dc current to reduce the power consumption. In the proposed topology, the voltage-controlled oscillator itself plays the dual role of oscillator and mixer by exploiting a series inductor-capacitor network. Using a 65 nm complementary metal oxide semiconductor technology, the proposed radio frequency front-end is designed and simulated. Oscillating at around 2.4 GHz frequency band, the voltage-controlled oscillator of the proposed radio frequency front-end achieves the phase noise of -72 dBc/Hz, -93 dBc/Hz, and -113 dBc/Hz at 10KHz, 100KHz, and 1 MHz offset frequency, respectively. The simulated voltage conversion gain is about 25 dB. The double-side band noise figure is -14.2 dB, -8.8 dB, and -7.3 dB at 100 KHz, 1 MHz and 10 MHz offset. The radio frequency front-end consumes only 96 ㎼ dc power from a 1-V supply.

Development of the High Input Voltage Self-Power for LVDC

  • Kim, Kuk-Hyeon;Kim, Soo-Yeon;Choi, Eun-Kyung;HwangBo, Chan;Park, Seong-Mi;Park, Sung-Jun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.4_1
    • /
    • pp.387-395
    • /
    • 2021
  • Distributed resources such as renewable energy sources and ESS are connected to the low voltage direct current(LVDC) distribution network through the power conversion system(PCS). Control power is required for the operation of the PCS. In general, controller power is supplied from AC power or DC power through switch mode power supply(SMPS). However, the conventional SMPS has a low input voltage, so development and research on high input voltage self-power suitable for LVDC is insufficient. In this paper, to develop Self-Power that can be used for LVDC, the characteristics of the conventional topology are analyzed, and a series-input single-output flyback converter using a flux-sharing transformer for high voltage is designed. The high input voltage Self-Power was designed in the DCM(discontinuous current mode) to reduce the switching loss and solve the problem of current dissipation. In addition, since it operates even at low input voltage, it can be applied to many applications as well as LVDC. The validity of the proposed high input voltage self-power is verified through experiments.

Optical Transmission Link with Dispersion Map of Antipodal Symmetry and OPC (원점 대칭 분산 맵과 OPC를 가진 광전송 링크)

  • Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.286-292
    • /
    • 2021
  • Dispersion maps of antipodal symmetric type for improvement of compensation effect in dispersion managed link combined with optical phase conjugation, which can compensate for the distorted wavelength division multiplexed (WDM) signals due to chromatic dispersion and nonlinear Kerr effects of single-mode fiber, were proposed. It was confirmed that the proposed all of antipodal symmetric dispersion maps was more effective to compensate for the distorted WDM channels than the conventional link of uniform type dispersion map. Especially, dispersion maps formed like the inversion of alphabet S were more advantageous as the distorted WDM channels were compensated than dispersion maps formed like alphabet S. It was expected that the variety of optical network topology was more expanded by applying the proposed antipodal symmetric dispersion maps into transmission link.

Identification of WAT1-like genes in Panax ginseng and functional analysis in secondary growth

  • Hong, Jeongeui;Ryu, Hojin
    • Journal of Plant Biotechnology
    • /
    • v.49 no.3
    • /
    • pp.171-177
    • /
    • 2022
  • The precise homeostatic regulation of local auxin accumulation in xylem precursors of cambium stem cell tissues is one of the most important mechanisms for plant vascular patterning and radial secondary growth. Walls are thin (WAT1), a novel intracellular auxin transporter, contributes directly to the auxin accumulation maxima in xylem precursors. According to recent research, the auxin signaling activated pathway-related gene network was significantly enriched during the secondary growth of Panax ginseng storage roots. These imply that during P. ginseng root secondary growth, specific signaling mechanisms for local auxin maxima in the vascular cambial cells are probably triggered. This study identified four WAT1-like genes, PgWAT1-1/-2 and PgWAT2-1/-2, in the P. ginseng genome. Their expression levels were greatly increased in nitratetreated storage roots stimulated for secondary root growth. PgWAT1-1 and PgWAT2-1 were similar to WAT1 from Arabidopsis and tomato plants in terms of their subcellular localization at a tonoplast and predicted transmembrane topology. We discovered that overexpression of PgWAT1-1 and PgWAT2-1 was sufficient to compensate for the secondary growth defects observed in slwat1-copi loss of function tomato mutants. This critical information from the PgWAT1-1 and PgWAT2-1 genes can potentially be used in future P. ginseng genetic engineering and breeding for increased crop yield.

Commercial ECU-Based Test-Bed for LIN-CAN Co-Analysis and Proof on Ultrasonic Sensors through Physical Error Injection (실차기반 LIN-CAN 연계 통합 분석 테스트베드 개발과 초음파센서 물리적 오류주입 및 분석을 통한 효용성 검증)

  • Yoon-ji Kim;Ye-ji Koh;In-su Oh;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.325-336
    • /
    • 2023
  • With the development of autonomous driving technology, the number of external contact sensors mounted on vehicles is increasing, and the importance is also rising. The vehicular ultrasonic sensor uses the LIN protocol in the form of a bus topology and reports a status message about its surroundings through the vehicle's internal network. Since ultrasonic sensors are vulnerable to various threats due to poor security protocols, physical testing on actual vehicle is needed. Therefore, this paper developed a LIN-CAN co-analysis testbed with a jig for location-specific distance test to examine the operational relation between LIN and CAN caused by ultrasonic sensors.

Explainable Prediction Model of Exchange Rates via Spatiotemporal Network Topology and Graph Neural Networks (시공간 의존성 네트워크 위상 및 그래프 신경망을 활용한 설명 가능한 환율 변화 예측 모형 개발)

  • Insu Choi;Woosung Koh;Gimin Kang;Yuntae Jang;Yu Jin Roh;Ji Yun Lee;Woo Chang Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.374-376
    • /
    • 2023
  • 최근 환율 예측에 관한 다양한 연구가 진행되어 왔다. 이러한 추세에 대응하여 본 연구에서는 Pearson 상관 계수 및 상호 정보를 사용하여 외환 시장의 환율 변동을 분석하는 다중 연결 네트워크를 구축하였다. 본 연구에서는 이러한 구성된 환율 변화에 대한 시공간 의존성 네트워크를 만들고 그래프 기계 학습의 잠재력을 조사하여 예측 정확도를 향상시키려고 노력하였다. 본 연구 결과는 선형 및 비선형 종속 네트워크 모두에 대해 그래프 신경망을 활용한 임베딩을 활용하여 기존의 기계 학습 알고리즘과 결합시킬 경우 환율 변화의 예측력이 향상될 수 있음을 경험적으로 확인하였다. 특히, 이러한 결과는 통화 간 상호 의존성에만 의존하여 추가 데이터 없이 달성되었다. 이 접근 방식은 데이터 효율성을 강화하고 그래프 시각화를 통해 설명력 있는 통찰력을 제공하며 주어진 데이터 세트 내에서 효과적인 데이터를 생성하여 예측력을 높이는 결과로 해석할 수 있다.

An Adaptive AODV Algorithm for Considering the Changes In The Network Topology (네트워크 토폴로지 변화를 고려한 적응형 AODV 알고리즘)

  • Kim, Ji-Hong;Kim, Yong-Hyun;Lee, Su-Yong;Lim, Hwa-Seok;Oh, Myung-Keun;Hong, Youn-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.954-957
    • /
    • 2007
  • AODV 에서는 RREQ 메시지 전송을 통해 라우팅 경로를 설정한다. Ad-hoc 네트워크에서 노드가 자주 이동하거나 전송 지연 시간이 클 경우 RREQ 메시지 발생이 증가한다. 이러한 네트워크 변동에 따른 RREQ 메시지 발생 증가는 결과적으로 데이터 패킷 수신율을 저하시킬 뿐만 아니라, 노드의 에너지 소모율도 증가시킨다. 본 논문에서는 네트워크 토폴로지 변동 상황을 감지하여 AODV 에서의 RREQ 메시지 발생 빈도를 효과적으로 조절하는 알고리즘을 제안하였다. 제안된 알고리즘을 50개의 노드가 10m/s 이하의 속도로 무작위로 이동하는 Ad-hoc 네트워크에 적용한 결과, 기존 AODV 알고리즘에 비해 RREQ 메시지 발생 빈도가 25% 감소하였다. 뿐만 아니라 RREP 패킷과 RERR 패킷 역시 각각 26% 및 31%씩 감소하였다. 모든 종류의 메시지 발생 빈도 수가 감소함에 따라 데이터 패킷 수신율은 3% 증가했으며, 에너지 소모율 역시 13% 감소하였다.

Analysis of the Bogus Routing Information Attacks in Sensor Networks (센서 네트워크에서 AODV 라우팅 정보 변조공격에 대한 분석)

  • Lee, Myung-Jin;Kim, Mi-Hui;Chae, Ki-Joon;Kim, Ho-Won
    • The KIPS Transactions:PartC
    • /
    • v.14C no.3 s.113
    • /
    • pp.229-238
    • /
    • 2007
  • Sensor networks consist of many tiny sensor nodes that collaborate among themselves to collect, process, analyze, and disseminate data. In sensor networks, sensor nodes are typically powered by batteries, and have limited computing resources. Moreover, the redeployment of nodes by energy exhaustion or their movement makes network topology change dynamically. These features incur problems that do not appear in traditional, wired networks. Security in sensor networks is challenging problem due to the nature of wireless communication and the lack of resources. Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop suity mechanisms that can survive malicious attacks from "insiders" who have access to the keying materials or the full control of some nodes. In order to protect against insider attacks, it is necessary to understand how an insider can attack a sensor network. Several attacks have been discussed in the literature. However, insider attacks in general have not been thoroughly studied and verified. In this paper, we study the insider attacks against routing protocols in sensor networks using the Ad-hoc On-Demand Distance Vector (AODV) protocol. We identify the goals of attack, and then study how to achieve these goals by modifying of the routing messages. Finally, with the simulation we study how an attacker affects the sensor networks. After we understand the features of inside attacker, we propose a detect mechanism using hop count information.

A Searching Technique of the Weak Connectivity Boundary using Small Unmanned Aerial Vehicle in Wireless Tactical Data Networks (무선 전술 데이터 네트워크에서 소형 무안항공기를 이용한 연결성 약화 지역 탐색 기법)

  • Li, Jin;Song, Ju-Bin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.1C
    • /
    • pp.89-96
    • /
    • 2012
  • Since tactical robots are going to be grown and tactical data communications will be more network-centric, the reliability of wireless tactical data networks is going to be very important in the future. However, the connectivity of such wireless tactical data networks can be extremely uncertain in practical circumstances. In this paper, we propose a searching technique to find out the weak boundary area of the network connectivity using a small UAV(unmanned aerial vehicle) which has a simple polling access function to wireless nodes on the ground in wireless tactical data networks. The UA V calculates the network topology of the wireless tactical data networks and coverts it to the Lapalcian matrix. In the proposed algorithm, we iteratively search the eigenvalues and find a minimum cut in the network resulting in finding the weak boundary of the connectivity for the wireless tactical data networks. If a UAV works as a relay nodes for the weak area, we evaluate that the throughput performance of the proposed algorithm outperforms star connection method and MST(minimum Spanning Tree) connection method. The proposed algorithm can be applied for recovering the connectivity of wireless tactical data networks.