• Title/Summary/Keyword: School Network

Search Result 7,503, Processing Time 0.033 seconds

Speed Estimation and Control of IPMSM using HAI Control (HAI 제어를 이용한 IPMSM의 속도 추정 및 제어)

  • Lee, Jung-Chul;Lee, Hong-Gyun;Lee, Young-Sil;Nam, Su-Myeong;Chung, Dong-Hwa
    • Proceedings of the KIEE Conference
    • /
    • 2004.10a
    • /
    • pp.176-178
    • /
    • 2004
  • Precise control of interior permanent magnet synchronous motor(IPMSM) over wide speed range is an engineering challenge. This paper considers the design and implementation of novel technique of speed estimation and control for IPMSM using hybrid intelligent control. The hybrid combination of neural network and adaptive fuzzy control will produce a powerful representation flexibility and numerical processing capability. Also, this paper is proposed speed control of IPMSM using adaptive neural network fuzzy(A-NNF) and estimation of speed using artificial neural network(ANN) controller. The back propagation neural network technique is used to provide a real time adaptive estimation of the motor speed.

  • PDF

JXTA Based P2P Services for Mobile Devices

  • Park, Hae-Woo;Jung, Hun;Seo, Yeung-Su;Yu, Chun-Gun;Lee, Jun-Hyuk;Kang, Byung-Wook
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.195-198
    • /
    • 2008
  • The JXTA was made in order to solve the problem of being generated with the computer platform suggested with the P2P(Peer-to-peer) method in the distributed computing. JXTA makes a communication between the various network and the devices is connected to a network which possible. It was designed to the client having the minimum computing ability could attend in the peer-to-peer network. However, for smoothly applying JXTA in the wireless environment, there is a limit with the limited resource of the Mobile Device. By using the Relay of the JXTA based for the Mobile Device, this paper implemented the P2P service which is flexibly effective in the wireless network environment.

  • PDF

A Study of method to apply MANET Protocol for Route Optimization in Nested Mobile Network (Nested Mobile Network상의 Route Optimization을 위한 MANET Protocol 적용 방안 연구)

  • Choi, Seung-Won;Kim, Sang-Bok;Kim, Young-Beom
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.269-272
    • /
    • 2005
  • 무선 네트워크 이동성 기술에 대한 연구가 수년간 진행되어 오면서 Mobile Network에 PAN(Personal Area Network)과 유사한 형태의 Nested Mobile Network에 대한 관심이 높아지고 있으며, 이러한 Nested Mobile Network에서의 경로최적화(Route Optimization : RO) 기술에 대한 연구가 활발하게 진행되고 있다. NEMO(NEtwork MObility)의 RO를 위해 제안된 논문 중에 ORC(Optimized Route Cache Protocol)에 대한 제안이 있었다.[1] NEMO Basic Support가 표준안으로 채택되면서 연구 대상에서 거론되지 않고 있지만, 복잡한 이동성 기술인 Nested Mobile Network상의 RO를 위해 다시 검토해 볼 수 있을 것이다. 또한 동일 저자에 의해 제안된 Nested Mobile Network 내부에 Ad-hoc Routing 알고리즘인 OLSR(Optimized Link State Routing Protocol)을 적용한 제안이 발표되었다.[2] 본 논문에서는 ORC와 Nested Mobile Network상의 OLSR Scheme을 적용하여 RO를 위한 방안을 제안하고자 한다.

  • PDF

DEVELOPMENT OF A NETWORK-BASED TRACTION CONTROL SYSTEM, VALIDATION OF ITS TRACTION CONTROL ALGORITHM AND EVALUATION OF ITS PERFORMANCE USING NET-HILS

  • Ryu, J.;Yoon, M.;SunWoo, M.
    • International Journal of Automotive Technology
    • /
    • v.7 no.6
    • /
    • pp.687-695
    • /
    • 2006
  • This paper presents a network-based traction control system(TCS), where several electric control units(ECUs) are connected by a controller area network(CAN) communication system. The control system consists of four ECUs: the electric throttle controller, the transmission controller, the engine controller and the traction controller. In order to validate the traction control algorithm of the network-based TCS and evaluate its performance, a Hardware-In-the-Loop Simulation(HILS) environment was developed. Herein we propose a new concept of the HILS environment called the network-based HILS(Net-HILS) for the development and validation of network-based control systems which include smart sensors or actuators. In this study, we report that we have designed a network-based TCS, validated its algorithm and evaluated its performance using Net-HILS.

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Development of Network-based Traction Control System and Study its on Performance Evaluation using Net-HILS (Net-HILS를 이용한 네트워크기반 구동력제어시스템 개발 및 성능평가에 관한 연구)

  • Ryu, Jung-Hwan;Yoon, Ma-Ru;Hwang, In-Yong;SunWoo, Myoung-Ho
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.5
    • /
    • pp.47-57
    • /
    • 2006
  • This paper presents a network-based traction control system(TCS), where several electric control units (ECUs) are connected by a controller area network(CAN) communication system. The control system consists of four ECUs: the electricthrottle controller, the transmission controller, the engine controller and the traction controller. In order to validate the traction control algorithm of the network-based TCS and evaluate its performance, a Hardware-In-the-Loop Simulation(HILS) environment was developed. Herein we propose a new concept of the HILS environment called the network-based HILS(Net-HILS) for the development and validation of network-based control systems which include smart sensors or actuators. In this study, we report that we have designed a network-based TCS, validated its algorithm and evaluated its performance using Net-HILS.

Vasorelaxing Activity of Ulmus davidiana Ethanol Extracts in Rats: Activation of Endothelial Nitric Oxide Synthase

  • Cho, Eun-Jung;Park, Myoung-Soo;Kim, Sahng-Seop;Kang, Gun;Choi, Sung-A;Lee, Yoo-Rhan;Chang, Seok-Jong;Lee, Kwon-Ho;Lee, Sang-Do;Park, Jin-Bong;Jeon, Byeong-Hwa
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.15 no.6
    • /
    • pp.339-344
    • /
    • 2011
  • Ulmus davidiana var. japonica Rehder (Urticales: Ulmaceae) (UD) is a tree widespread in northeast Asia. It is traditionally used for anticancer and anti-inflammatory therapy. The present study investigated the effect of an ethanol extract of UD on vascular tension and its underlying mechanism in rats. The dried root bark of UD was ground and extracted with 80% ethanol. The prepared UD extract was used in further analysis. The effect of UD on the cell viability, vasoreactivity and hemodynamics were investigated using propidium iodide staining in cultured cells, isometric tension recording and blood pressure analysis, respectively. Low dose of UD ($10{\sim}100{\mu}g/ml)$ did not affect endothelial cell viability, but high dose of UD reduced cell viability. UD induced vasorelaxation in the range of $0.1{\sim}10{\mu}g/ml$ with an $ED_{50}$ value of $2{\mu}g/ml$. UD-induced vasorelaxation was completely abolished by removal of the endothelium or by pre-treatment with L-NAME, an inhibitor of nitric oxide synthase. UD inhibited calcium influx induced by phenylephrine and high $K^+$ and also completely abolished the effect of L-NAME. Intravenous injection of UD extracts (10~100 mg/kg) decreased arterial and ventricular pressure in a dose-dependent manner. Moreover, UD extracts reduced the ventricular contractility (+dP/dt) in anesthetized rats. However, UD-induced hypotensive actions were minimized in L-NAME-treated rats. Taken together, out results showed that UD induced vasorelaxation and has antihypertensive properties, which may be due the activation of nitric oxide synthase in endothelium.

A Comparative Study of Information Delivery Method in Networks According to Off-line Communication (오프라인 커뮤니케이션 유무에 따른 네트워크 별 정보전달 방법 비교 분석)

  • Park, Won-Kuk;Choi, Chan;Moon, Hyun-Sil;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.131-142
    • /
    • 2011
  • In recent years, Social Network Service, which is defined as a web-based service that allows an individual to construct a public or a semi-public profile within a bounded system, articulates a list of other users with whom they share connections, and traverses their list of connections. For example, Facebook and Twitter are the representative sites of Social Network Service, and these sites are the big issue in the world. A lot of people use Social Network Services to connect and maintain social relationship. Recently the users of Social Network Services have increased dramatically. Accordingly, many organizations become interested in Social Network Services as means of marketing, media, communication with their customers, and so on, because social network services can offer a variety of benefits to organizations such as companies and associations. In other words, organizations can use Social Network Services to respond rapidly to various user's behaviors because Social Network Services can make it possible to communicate between the users more easily and faster. And marketing cost of the Social Network Service is lower than that of existing tools such as broadcasts, news papers, and direct mails. In addition, Social network Services are growing in market place. So, the organizations such as companies and associations can acquire potential customers for the future. However, organizations uniformly communicate with users through Social Network Service without consideration of the characteristics of the networks although networks have different effects on information deliveries. For example, members' cohesion in an offline communication is higher than that in an online communication because the members of the offline communication are very close. that is, the network of the offline communication has a strong tie. Accordingly, information delivery is fast in the network of the offline communication. In this study, we compose two networks which have different characteristic of communication in Twitter. First network is constructed with data based on an offline communication such as friend, family, senior and junior in school. Second network is constructed with randomly selected data from users who want to associate with friends in online. Each network size is 250 people who divide with three groups. The first group is an ego which means a person in the center of the network. The second group is the ego's followers. The last group is composed of the ego's follower's followers. We compare the networks through social network analysis and follower's reaction analysis. We investigate density and centrality to analyze the characteristic of each network. And we analyze the follower's reactions such as replies and retweets to find differences of information delivery in each network. Our experiment results indicate that density and centrality of the offline communicationbased network are higher than those of the online-based network. Also the number of replies are larger than that of retweets in the offline communication-based network. On the other hand, the number of retweets are larger than that of replies in the online based network. We identified that the effect of information delivery in the offline communication-based network was different from those in the online communication-based network through experiments. So, you configure the appropriate network types considering the characteristics of the network if you want to use social network as an effective marketing tool.

High-Capacity Robust Image Steganography via Adversarial Network

  • Chen, Beijing;Wang, Jiaxin;Chen, Yingyue;Jin, Zilong;Shim, Hiuk Jae;Shi, Yun-Qing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.366-381
    • /
    • 2020
  • Steganography has been successfully employed in various applications, e.g., copyright control of materials, smart identity cards, video error correction during transmission, etc. Deep learning-based steganography models can hide information adaptively through network learning, and they draw much more attention. However, the capacity, security, and robustness of the existing deep learning-based steganography models are still not fully satisfactory. In this paper, three models for different cases, i.e., a basic model, a secure model, a secure and robust model, have been proposed for different cases. In the basic model, the functions of high-capacity secret information hiding and extraction have been realized through an encoding network and a decoding network respectively. The high-capacity steganography is implemented by hiding a secret image into a carrier image having the same resolution with the help of concat operations, InceptionBlock and convolutional layers. Moreover, the secret image is hidden into the channel B of carrier image only to resolve the problem of color distortion. In the secure model, to enhance the security of the basic model, a steganalysis network has been added into the basic model to form an adversarial network. In the secure and robust model, an attack network has been inserted into the secure model to improve its robustness further. The experimental results have demonstrated that the proposed secure model and the secure and robust model have an overall better performance than some existing high-capacity deep learning-based steganography models. The secure model performs best in invisibility and security. The secure and robust model is the most robust against some attacks.