• Title/Summary/Keyword: Time step control

Search Result 987, Processing Time 0.04 seconds

Identification of Motor Parameters and Improvement of Voltage Error for Improvement of Back-emf Estimation in Sensorless Control of Low Speed Operation (저속 센서리스 제어의 역기전력 추정 성능 향상을 위한 모터 파라미터 추정과 전압 오차의 개선)

  • Kim, Kyung-Hoon;Yun, Chul;Cho, Nae-Soo;Jang, Min-Ho;Kwon, Woo-Hyen
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.5
    • /
    • pp.635-643
    • /
    • 2018
  • This paper propose a method to identify the motor parameters and improve input voltage error which affect the low speed position error of the back-emf(back electromotive force) based sensorless algorithm and to secure the operation reliability and stability even in the case where the load fluctuation is severe and the start and low speed operation frequently occurs. In the model-based observer used in this paper, stator resistance, inductance, and input voltage are particularly influential factors on low speed performance. Stator resistance can cause resistance value fluctuation which may occur in mass production process, and fluctuation of resistance value due to heat generated during operation. The inductance is influenced by the fluctuation due to the manufacturing dispersion and at a low speed where the change of the current is severe. In order to find stator resistance and inductance which have different initial values and fluctuate during operation and have a large influence on sensorless performance at low speed, they are commonly measured through 2-point calculation method by 2-step align current injection. The effect of voltage error is minimized by offsetting the voltage error. In addition, when the command voltage is used, it is difficult to estimate the back-emf due to the relatively large distortion voltage due to the dead time and the voltage drop of the power device. In this paper, we propose a simple circuit and method to detect the voltage by measuring the PWM(Pulse Width Modulation) pulse width and compensate the voltage drop of the power device with the table, thereby minimizing the position error due to the exact estimation of the back-emf at low speed. The suitability of the proposed algorithm is verified through experiment.

Comparative Analysis of the Multiple Test Methods for the Detection of Pandemic Influenza A/H1N1 2009 Virus

  • Choi, Young-Jin;Nam, Hae-Seon;Park, Joon-Soo;Kim, Hwi-Jun;Park, Kyung-Bae;Jeon, Min-Hyok;Kim, Chang-Jin;HwangBo, Young;Park, Kwi-Sung;Baek, Kyoung-Ah
    • Journal of Microbiology and Biotechnology
    • /
    • v.20 no.10
    • /
    • pp.1450-1456
    • /
    • 2010
  • Accurate and rapid diagnosis of Pandemic Influenza A/H1N1 2009 virus (H1N1 2009) infection is important for the prevention and control of influenza epidemics and the timely initiation of antiviral treatment. This study was conducted to evaluate the performance of several diagnostic tools for the detection of H1N1 2009. Flocked nasopharyngeal swabs were collected from 254 outpatients of suspected H1N1 2009 during October 2009. This study analyzed the performances of the RealTime Ready Inf A/H1N1 Detection Set (Roche), Influenza A (H1N1) Real-Time Detection Kit (Bionote), Seeplex Influenza A/B OneStep Typing Set [Seeplex Reverse Transcriptase PCR (RT-PCR)], BinaxNow Influenza A & B Test Kit [Binax Rapid Antigen Test (RAT)], and SD BIOLINE Influenza Ag kit (SD RAT). Roche and Bionote real-time RT-PCR showed identical results for the H1N1 2009 hemagglutinin gene. Compared with real-time RT-PCR, the sensitivities and specificities were 83.7% and 100% for Seeplex RT-PCR, 64.5% and 94.7% for Binax RAT, and 69.5% and 100% for SD RAT. The sensitivities of Seeplex RT-PCR, Binax RAT, and SD RAT in patients aged over 21 years were 73.7%, 47.4%, and 57.9%, respectively. The sensitivities of Seeplex RT-PCR, Binax RAT, and SD RAT on the day of initial symptoms were mostly lower (68.8%, 56.3%, and 31.3%, respectively). In conclusion, multiplex RT-PCR and RAT for the detection of H1N1 2009 were significantly less sensitive than real-time RT-PCR. Moreover, a negative RAT may require more sensitive confirmatory assays, because it cannot be ruled out from influenza infection.

Multiple damage detection of maglev rail joints using time-frequency spectrogram and convolutional neural network

  • Wang, Su-Mei;Jiang, Gao-Feng;Ni, Yi-Qing;Lu, Yang;Lin, Guo-Bin;Pan, Hong-Liang;Xu, Jun-Qi;Hao, Shuo
    • Smart Structures and Systems
    • /
    • v.29 no.4
    • /
    • pp.625-640
    • /
    • 2022
  • Maglev rail joints are vital components serving as connections between the adjacent F-type rail sections in maglev guideway. Damage to maglev rail joints such as bolt looseness may result in rough suspension gap fluctuation, failure of suspension control, and even sudden clash between the electromagnets and F-type rail. The condition monitoring of maglev rail joints is therefore highly desirable to maintain safe operation of maglev. In this connection, an online damage detection approach based on three-dimensional (3D) convolutional neural network (CNN) and time-frequency characterization is developed for simultaneous detection of multiple damage of maglev rail joints in this paper. The training and testing data used for condition evaluation of maglev rail joints consist of two months of acceleration recordings, which were acquired in-situ from different rail joints by an integrated online monitoring system during a maglev train running on a test line. Short-time Fourier transform (STFT) method is applied to transform the raw monitoring data into time-frequency spectrograms (TFS). Three CNN architectures, i.e., small-sized CNN (S-CNN), middle-sized CNN (M-CNN), and large-sized CNN (L-CNN), are configured for trial calculation and the M-CNN model with excellent prediction accuracy and high computational efficiency is finally optioned for multiple damage detection of maglev rail joints. Results show that the rail joints in three different conditions (bolt-looseness-caused rail step, misalignment-caused lateral dislocation, and normal condition) are successfully identified by the proposed approach, even when using data collected from rail joints from which no data were used in the CNN training. The capability of the proposed method is further examined by using the data collected after the loosed bolts have been replaced. In addition, by comparison with the results of CNN using frequency spectrum and traditional neural network using TFS, the proposed TFS-CNN framework is proven more accurate and robust for multiple damage detection of maglev rail joints.

A Fully Digital Automatic Gain Control System with Wide Dynamic Range Power Detectors for DVB-S2 Application (넓은 동적 영역의 파워 검출기를 이용한 DVB-S2용 디지털 자동 이득 제어 시스템)

  • Pu, Young-Gun;Park, Joon-Sung;Hur, Jeong;Lee, Kang-Yoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.9
    • /
    • pp.58-67
    • /
    • 2009
  • This paper presents a fully digital gain control system with a new high bandwidth and wide dynamic range power detector for DVB-S2 application. Because the peak-to-average power ratio (PAPR) of DVB-S2 system is so high and the settling time requirement is so stringent, the conventional closed-loop analog gain control scheme cannot be used. The digital gain control is necessary for the robust gain control and the direct digital interface with the baseband modem. Also, it has several advantages over the analog gain control in terms of the settling time and insensitivity to the process, voltage and temperature variation. In order to have a wide gain range with fine step resolution, a new AGC system is proposed. The system is composed of high-bandwidth digital VGAs, wide dynamic range power detectors with RMS detector, low power SAR type ADC, and a digital gain controller. To reduce the power consumption and chip area, only one SAR type ADC is used, and its input is time-interleaved based on four power detectors. Simulation and measurement results show that the new AGC system converges with gain error less than 0.25 dB to the desired level within $10{\mu}s$. It is implemented in a $0.18{\mu}m$ CMOS process. The measurement results of the proposed IF AGC system exhibit 80-dB gain range with 0.25-dB resolution, 8 nV/$\sqrt{Hz}$ input referred noise, and 5-dBm $IIP_3$ at 60-mW power consumption. The power detector shows the 35dB dynamic range for 100 MHz input.

A Study on Defense and Attack Model for Cyber Command Control System based Cyber Kill Chain (사이버 킬체인 기반 사이버 지휘통제체계 방어 및 공격 모델 연구)

  • Lee, Jung-Sik;Cho, Sung-Young;Oh, Heang-Rok;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.41-50
    • /
    • 2021
  • Cyber Kill Chain is derived from Kill chain of traditional military terms. Kill chain means "a continuous and cyclical process from detection to destruction of military targets requiring destruction, or dividing it into several distinct actions." The kill chain has evolved the existing operational procedures to effectively deal with time-limited emergency targets that require immediate response due to changes in location and increased risk, such as nuclear weapons and missiles. It began with the military concept of incapacitating the attacker's intended purpose by preventing it from functioning at any one stage of the process of reaching it. Thus the basic concept of the cyber kill chain is that the attack performed by a cyber attacker consists of each stage, and the cyber attacker can achieve the attack goal only when each stage is successfully performed, and from a defense point of view, each stage is detailed. It is believed that if a response procedure is prepared and responded, the chain of attacks is broken, and the attack of the attacker can be neutralized or delayed. Also, from the point of view of an attack, if a specific response procedure is prepared at each stage, the chain of attacks can be successful and the target of the attack can be neutralized. The cyber command and control system is a system that is applied to both defense and attack, and should present defensive countermeasures and offensive countermeasures to neutralize the enemy's kill chain during defense, and each step-by-step procedure to neutralize the enemy when attacking. Therefore, thist paper proposed a cyber kill chain model from the perspective of defense and attack of the cyber command and control system, and also researched and presented the threat classification/analysis/prediction framework of the cyber command and control system from the defense aspect

EXPRESSION OF TGF-α AND TGF-β (구강암 발생 과정에서 TGF-α 및 TGF-β 발현에 관한 연구)

  • Yang, Hee-Chang;Lee, Dong-Keun;Kim, Eun-Cheol
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.19 no.4
    • /
    • pp.414-434
    • /
    • 1997
  • Though many genetic and epigenetic alterations have been identified in hamster oral carcinogenesis model, there is no information about the possible role of transforming growth factor related with oral cancer. The purpose of this paper was to find the expression patterns of transforming growth factor alpha and beta during the stages of complete oral carcinogenesis model in hamster. 0.5% 9, 10-dimethyl-1, 2-benzanthracene(DMBA) in mineral oil was topically applied to the buccal pouch of 75 hamster three times a week during the experimental periods. The experimental animals were subdivided into two groups of control and experiment. Only the mineral oil was applied to the control group. 0.5% DMBA in mineral oil was applied to the experimental groups of 6, 8, 10, 12, 14, 16, 18 and 20 weeks. The expression of the $TGF-{\alpha}$ and $TGF-{\beta}$ protein were evaluated by the distribution and intensity of positive cells during the carcinogenesis using the immunohistochemical study. The following results were obtained ; 1. The buccal pouch epithelium of hamster was histologically changed to the dysplasia at 6, 8, 10 weeks, carcinoma in situ at 12 weeks, and squamous cell carcinoma at 14 weeks. 2. The expression of the $TGF-{\alpha}$ was restricted to the parabasal and basal layers of the normal and dysplastic mucosa, but those positive cells were extended to the spinous layers of the epithelium in the carcinoma. 3. The degree of $TGF-{\alpha}$ expression was markedly decreased in the carcinoma at 16, 18, 20. The strong positive staining in the center of cancer islands and weak positive staining in periphery of tumor were seen at the stage of squamous cell carcinoma. 4. The positive index of the $TGF-{\alpha}$ had a tendency to increase with DMBA- applied time. There was a statistically significant difference between 12, 18, 20 experimental group and control group (p<0.05). 5. The expression of the $TGF-{\beta}$ was shown at the cytoplasm of all control and experimental groups, and the parabasal and basal layers of the normal and dyslastic mucosa, but it was shown at the basal layers of the epithelium in the carcinoma. 6. $TGF-{\beta}$ was expressed diffusely at 16, 18, 20 experimental group. The strong positive staining in the center of cancer islands and positive staining in periphery of tumor were seen at the stage of squamous cell carcinoma. From the above findings, the expression of $TGF-{\alpha}$ and ${\beta}$ in oral carcinogenesis model seems to have two formal stages, the first being an overexpression step as reaction to uncontrolled growth and the second being one in which external protein accumulate in the surrounding stroma and intracytoplasm. Overexpression of $TGF-{\alpha}$ and ${\beta}$ may have important cooperative roles for the promotion of cancer and factor of prognosis.

  • PDF

Basic Research on Revetments Development of Erosion Protection for Coastline Creation of Hydrophilic Environment by Field Observation (현장관측에 의한 친환경 해안조성을 위한 침식방지 호안공 개발에 관한 기초적 연구)

  • Lee, Jong-Seok;Han, Jae-Myung
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.10
    • /
    • pp.983-993
    • /
    • 2008
  • In recent times, sea level increasing caused by abnormal weather and global warming, sea-sand dredging and complex development causes various kind of erosion damages onto the coastal area in the world. The various types of erosion control and protection methods are applied but there are no signs of fruitful effectiveness. The PC concrete protection block for shore protection structure is practically installed in globally but most of structures in the present day became villainous because of bad accessability. In this study, hydrophilic revetments for control and protection of coastline erosion will be developed in order to make up for a faculty of the shore erosion protection block with better accessibility and excellent protection ability. Experimental measurements were researched to insure for the capacity and facility on reflection coefficient, overtopping volume, and overtopping height characteristics of newly developed shore erosion protection block in model tests. As the result, hydraulic model tests show much excellent than the general step block. Field tests were carried out also to verify through vegetative test on an affinity and construction work test of control-protection on coastline erosion with actual utilization. In the latter case, deposition of sand accumulation occurred in fairly short time at the established reaches and then we can be confirmed to utilize for newly developed block as the revetments for control and protection of coastline erosion.

Comparative Analysis of Opinions about Practicing Works among Farm, Consultant, and Consulting Company in Consulting Field of Fruits and Vegetables (과채류 컨설팅에 대한 농가, 컨설턴트 및 컨설팅업체 간 견해 비교 분석)

  • Kim, Ho-Cheol;Choi, Jun-Hyuk;Jung, Sek-Gi;Lee, Yong-Beom;Bae, Hyang-Jong
    • Journal of Bio-Environment Control
    • /
    • v.18 no.3
    • /
    • pp.266-272
    • /
    • 2009
  • This study was conducted survey on fruit and vegetables farms (FM), consulting companies (CC), and the consultants (CT) to investigation actual conditions and improvements in consulting part of horticulture. In results of survey on FM, FM chose 'necessity' on consulting for learning of production skill and 'field visit' in means of consulting. FM had a low trust on experience and knowledge of CT and answered that FM had not enough time for consulting by reason of over-work of CT, chose 'necessity' on crop registration system. In results of common questions among FM, CC, and CT, same answer of questions were term of contract (answer: yearly contract), means of consulting (answer: visit), consulting time per a visit (answer: $2{\sim}3$hours). Different answer between supplier (CC, CT) and consumer of consulting were decision method of contract price (answer: provisional contract$\neq$contents and the quality of consulting), percentage of government subsidy (answer: propriety$\neq$step-up).

Case study of Music & Imagery for Woman with Depression (우울한 내담자를 위한 MI(Music & Imagery) 치료사례)

  • Song, In Ryeong
    • Journal of Music and Human Behavior
    • /
    • v.5 no.1
    • /
    • pp.67-90
    • /
    • 2008
  • This case used MI techniques that give an imagery experience to depressed client's mental resource, and that makes in to verbalism. Also those images are supportive level therapy examples that apply to positive variation. MI is simple word of 'Music and Imagery' with one of psychology cure called GIM(Guided Imagery and Music). It makes client can through to the inner world and search, confront, discern and solve with suitable music. Supportive Level MI is only used from safety level music. Introduction of private session can associate specification feeling, subject, word or image. And those images are guide to positive experience. The First session step of MI program is a prelude that makes concrete goal like first interview. The Second step is a transition that can concretely express about client's story. The third step is induction and music listening. And it helps to associate imagery more easily by used tension relaxation. Also it can search and associate about various imagery from the music. The last step is process that process drawing imagery, talking about personal imagery experience in common with therapist that bring the power by expansion the positive experience. Client A case targets rapport forming(empathy, understanding and support), searching positive recourse(child hood, family), client's emotion and positive support. Music must be used simple tone, repetition melody, steady rhythm and organized by harmony music of what therapist and client's preference. The client used defense mechanism and couldn't control emotion by depression in 1 & 2 sessions. But the result was client A could experience about support and understanding after 3 sessions. After session 4 the client had stable, changed to positive emotion from the negative emotion and found her spontaneous. Therefore, at the session 6, the client recognized that she will have step of positive time at the future. About client B, she established rapport forming(empathy, understanding and support) and searching issues and positive recognition(child hood, family), expression and insight(present, future). The music was comfortable, organizational at the session 1 & 2, but after session 3, its development was getting bigger and the main melody changed variation with high and low of tune. Also it used the classic and romantic music. The client avoids bad personal relations to religious relationship. But at the session 1 & 2, client had supportive experience and empathy because of her favorite, supportive music. After session 3, client B recognized and face to face the present issue. But she had avoidance and face to face of ambivalence. The client B had a experience about emotion change according depression and face to face client's issues After session 4. At the session 5 & 6, client tried to have will power of healthy life and fairly attitude, train mental power and solution attitude in the future. On this wise, MI program had actuality and clients' issues solution more than GIM program. MI can solute the issue by client's based issue without approach to unconsciousness like GIM. Especially it can use variety music and listening time is shorter than GIM and structuralize. Also can express client's emotion very well. So it can use corrective and complement MI program to children, adolescent and adult.

  • PDF

Hardware Approach to Fuzzy Inference―ASIC and RISC―

  • Watanabe, Hiroyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.975-976
    • /
    • 1993
  • This talk presents the overview of the author's research and development activities on fuzzy inference hardware. We involved it with two distinct approaches. The first approach is to use application specific integrated circuits (ASIC) technology. The fuzzy inference method is directly implemented in silicon. The second approach, which is in its preliminary stage, is to use more conventional microprocessor architecture. Here, we use a quantitative technique used by designer of reduced instruction set computer (RISC) to modify an architecture of a microprocessor. In the ASIC approach, we implemented the most widely used fuzzy inference mechanism directly on silicon. The mechanism is beaded on a max-min compositional rule of inference, and Mandami's method of fuzzy implication. The two VLSI fuzzy inference chips are designed, fabricated, and fully tested. Both used a full-custom CMOS technology. The second and more claborate chip was designed at the University of North Carolina(U C) in cooperation with MCNC. Both VLSI chips had muliple datapaths for rule digital fuzzy inference chips had multiple datapaths for rule evaluation, and they executed multiple fuzzy if-then rules in parallel. The AT & T chip is the first digital fuzzy inference chip in the world. It ran with a 20 MHz clock cycle and achieved an approximately 80.000 Fuzzy Logical inferences Per Second (FLIPS). It stored and executed 16 fuzzy if-then rules. Since it was designed as a proof of concept prototype chip, it had minimal amount of peripheral logic for system integration. UNC/MCNC chip consists of 688,131 transistors of which 476,160 are used for RAM memory. It ran with a 10 MHz clock cycle. The chip has a 3-staged pipeline and initiates a computation of new inference every 64 cycle. This chip achieved an approximately 160,000 FLIPS. The new architecture have the following important improvements from the AT & T chip: Programmable rule set memory (RAM). On-chip fuzzification operation by a table lookup method. On-chip defuzzification operation by a centroid method. Reconfigurable architecture for processing two rule formats. RAM/datapath redundancy for higher yield It can store and execute 51 if-then rule of the following format: IF A and B and C and D Then Do E, and Then Do F. With this format, the chip takes four inputs and produces two outputs. By software reconfiguration, it can store and execute 102 if-then rules of the following simpler format using the same datapath: IF A and B Then Do E. With this format the chip takes two inputs and produces one outputs. We have built two VME-bus board systems based on this chip for Oak Ridge National Laboratory (ORNL). The board is now installed in a robot at ORNL. Researchers uses this board for experiment in autonomous robot navigation. The Fuzzy Logic system board places the Fuzzy chip into a VMEbus environment. High level C language functions hide the operational details of the board from the applications programme . The programmer treats rule memories and fuzzification function memories as local structures passed as parameters to the C functions. ASIC fuzzy inference hardware is extremely fast, but they are limited in generality. Many aspects of the design are limited or fixed. We have proposed to designing a are limited or fixed. We have proposed to designing a fuzzy information processor as an application specific processor using a quantitative approach. The quantitative approach was developed by RISC designers. In effect, we are interested in evaluating the effectiveness of a specialized RISC processor for fuzzy information processing. As the first step, we measured the possible speed-up of a fuzzy inference program based on if-then rules by an introduction of specialized instructions, i.e., min and max instructions. The minimum and maximum operations are heavily used in fuzzy logic applications as fuzzy intersection and union. We performed measurements using a MIPS R3000 as a base micropro essor. The initial result is encouraging. We can achieve as high as a 2.5 increase in inference speed if the R3000 had min and max instructions. Also, they are useful for speeding up other fuzzy operations such as bounded product and bounded sum. The embedded processor's main task is to control some device or process. It usually runs a single or a embedded processer to create an embedded processor for fuzzy control is very effective. Table I shows the measured speed of the inference by a MIPS R3000 microprocessor, a fictitious MIPS R3000 microprocessor with min and max instructions, and a UNC/MCNC ASIC fuzzy inference chip. The software that used on microprocessors is a simulator of the ASIC chip. The first row is the computation time in seconds of 6000 inferences using 51 rules where each fuzzy set is represented by an array of 64 elements. The second row is the time required to perform a single inference. The last row is the fuzzy logical inferences per second (FLIPS) measured for ach device. There is a large gap in run time between the ASIC and software approaches even if we resort to a specialized fuzzy microprocessor. As for design time and cost, these two approaches represent two extremes. An ASIC approach is extremely expensive. It is, therefore, an important research topic to design a specialized computing architecture for fuzzy applications that falls between these two extremes both in run time and design time/cost. TABLEI INFERENCE TIME BY 51 RULES {{{{Time }}{{MIPS R3000 }}{{ASIC }}{{Regular }}{{With min/mix }}{{6000 inference 1 inference FLIPS }}{{125s 20.8ms 48 }}{{49s 8.2ms 122 }}{{0.0038s 6.4㎲ 156,250 }} }}

  • PDF