• 제목/요약/키워드: Tool-Normal Vector

검색결과 27건 처리시간 0.028초

B-스플라인 곡선의 기하특성을 이용한 형상 옵셋 (2) -제어다각형 옵셋에서 발생하는 루프의 제거에 대한 연구- (Shape offsetting using the geometric properties of B-spline curves(2) - A Study on the removal of loops in control polygon offsetting -)

  • 정재현;김희중;조우승
    • Journal of Advanced Marine Engineering and Technology
    • /
    • 제21권4호
    • /
    • pp.381-386
    • /
    • 1997
  • The offsetting method using geometric properties of B-spline control polygon is more faster than using of general normal vector in offset processing. But this method itself does not solve the prob¬lems of loop removal in normal offsetting. Generally the distance between neighborhood spans of B-spline control polygon is greater than the offset distance, the loops are occurred in offsetting. For generating of the more precision tool-path in NC machining, the loops of offset must be removed. In this paper, two methods for loop removal are introduced in offsetting of B-spline curve. One is using the intersection of B-spline control span which being occurred of the loop. The other is using two B-spline curve divisions divided from original B-spline curve or its offset curve. After the inter¬section point of loop was searched, the loop being removed to cusp. Also the method for filleting of cusp is inspected to more precision cutting. It is shown that the offsetting using B-spline control polygon is more effective in the sculptured surface machining.

  • PDF

A Study on Weld Bead Profile Measurement System for Use in Automatic Weld Bead Removal System

  • Lee, Jeong-Woo;Lee, Eun-Hyun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1999년도 제14차 학술회의논문집
    • /
    • pp.194-197
    • /
    • 1999
  • Automatic weld bead removal system is consisted of bead removal tool, bead profile measurement system and tool motion control system. In this paper, design of weld bead profile measurement system which is used for automatic weld bead removal system is described. The system measures the weld bead position, normal vector of the auto-body and weld bead profile. The optical sensor with structured laser beam is used as a sensor and comparison of the sensor that can be used for this purpose is discussed in detail. The measurement process and the related software developed for this purpose are also described. A median filter, average filter and long line filters are used and their effects in bead profile measurement are discussed. The measurement system is integrated into automatic bead removal system and is used to remove weld bead in rear pillar of automotive body. The whole system operates well in automotive body assembly line and thus the system is proved to be good for this purpose.

  • PDF

SVDD를 활용한 상업용 건물에너지 소비패턴의 이상현상 감지 (Anomaly Detection and Diagnostics (ADD) Based on Support Vector Data Description (SVDD) for Energy Consumption in Commercial Building)

  • 채영태
    • 한국건축친환경설비학회 논문집
    • /
    • 제12권6호
    • /
    • pp.579-590
    • /
    • 2018
  • Anomaly detection on building energy consumption has been regarded as an effective tool to reduce energy saving on building operation and maintenance. However, it requires energy model and FDD expert for quantitative model approach or large amount of training data for qualitative/history data approach. Both method needs additional time and labors. This study propose a machine learning and data science approach to define faulty conditions on hourly building energy consumption with reducing data amount and input requirement. It suggests an application of Support Vector Data Description (SVDD) method on training normal condition of hourly building energy consumption incorporated with hourly outdoor air temperature and time integer in a week, 168 data points and identifying hourly abnormal condition in the next day. The result shows the developed model has a better performance when the ${\nu}$ (probability of error in the training set) is 0.05 and ${\gamma}$ (radius of hyper plane) 0.2. The model accuracy to identify anomaly operation ranges from 70% (10% increase anomaly) to 95% (20% decrease anomaly) for daily total (24 hours) and from 80% (10% decrease anomaly) to 10%(15% increase anomaly) for occupied hours, respectively.

단일 홀센서 힘반영 조이스틱을 이용한 모바일 로봇 원격제어 (Tele-operation of a Mobile Robot Using Force Reflection Joystick with Single Hall Sensor)

  • 이장명;전찬성;조승근
    • 로봇학회논문지
    • /
    • 제1권1호
    • /
    • pp.17-24
    • /
    • 2006
  • Though the final goal of mobile robot navigation is to be autonomous, operators' intelligent and skillful decisions are necessary when there are many scattered obstacles. There are several limitations even in the camera-based tele-operation of a mobile robot, which is very popular for the mobile robot navigation. For examples, shadowed and curved areas cannot be viewed using a narrow view-angle camera, especially in bad weather such as on snowy or rainy days. Therefore, it is necessary to have other sensory information for reliable tele-operations. In this paper, sixteen ultrasonic sensors are attached around a mobile robot in a ring pattern to measure the distances to obstacles. A collision vector is introduced in this paper as a new tool for obstacle avoidance, which is defined as a normal vector from an obstacle to the mobile robot. Based on this collision vector, a virtual reflection force is generated to avoid the obstacles and then the reflection force is transferred to an operator who is holding a joystick to control the mobile robot. Relying on the reflection force, the operator can control the mobile robot more smoothly and safely. For this bi-directional tele-operation, a master joystick system using a hall sensor was designed to resolve the existence of nonlinear sections, which are usual for a general joystick with two motors and potentiometers. Finally, the efficiency of a force reflection joystick is verified through the comparison of two vision-based tele-operation experiments, with and without force reflection.

  • PDF

Network Traffic Measurement Analysis using Machine Learning

  • Hae-Duck Joshua Jeong
    • 한국인공지능학회지
    • /
    • 제11권2호
    • /
    • pp.19-27
    • /
    • 2023
  • In recent times, an exponential increase in Internet traffic has been observed as a result of advancing development of the Internet of Things, mobile networks with sensors, and communication functions within various devices. Further, the COVID-19 pandemic has inevitably led to an explosion of social network traffic. Within this context, considerable attention has been drawn to research on network traffic analysis based on machine learning. In this paper, we design and develop a new machine learning framework for network traffic analysis whereby normal and abnormal traffic is distinguished from one another. To achieve this, we combine together well-known machine learning algorithms and network traffic analysis techniques. Using one of the most widely used datasets KDD CUP'99 in the Weka and Apache Spark environments, we compare and investigate results obtained from time series type analysis of various aspects including malicious codes, feature extraction, data formalization, network traffic measurement tool implementation. Experimental analysis showed that while both the logistic regression and the support vector machine algorithm were excellent for performance evaluation, among these, the logistic regression algorithm performs better. The quantitative analysis results of our proposed machine learning framework show that this approach is reliable and practical, and the performance of the proposed system and another paper is compared and analyzed. In addition, we determined that the framework developed in the Apache Spark environment exhibits a much faster processing speed in the Spark environment than in Weka as there are more datasets used to create and classify machine learning models.

Determination of Reactive Power Compensation Considering Large Disturbances for Power Flow Solvability in the Korean Power System

  • Seo, Sang-Soo;Kang, Sang-Gyun;Lee, Byong-Jun;Kim, Tae-Kyun;Song, Hwa-Chang
    • Journal of Electrical Engineering and Technology
    • /
    • 제6권2호
    • /
    • pp.147-153
    • /
    • 2011
  • This paper proposes a methodology using a tool based on the branch-parameter continuation power flow (BCPF) in order to restore the power flow solvability in unsolvable contingencies. A specified contingency from a set of transmission line contingencies is modeled, considering the transient analysis and practice in the Korean power system. This tool traces a solution path that satisfies the power flow equations with respect to the variation of the branch parameter. At a critical point, in which the branch parameter can move on to a maximum value, a sensitivity analysis with a normal vector is performed to identify the most effective compensation. With the sensitivity information, the location of the reactive power compensation is determined and the effectiveness of the sensitivity information is verified to restore the solvability. In the simulation, the proposed framework is then applied to the Korean power system.

Asymmetric Multiple-Image Encryption Based on Octonion Fresnel Transform and Sine Logistic Modulation Map

  • Li, Jianzhong
    • Journal of the Optical Society of Korea
    • /
    • 제20권3호
    • /
    • pp.341-357
    • /
    • 2016
  • A novel asymmetric multiple-image encryption method using an octonion Fresnel transform (OFST) and a two-dimensional Sine Logistic modulation map (2D-SLMM) is presented. First, a new multiple-image information processing tool termed the octonion Fresneltransform is proposed, and then an efficient method to calculate the OFST of an octonion matrix is developed. Subsequently this tool is applied to process multiple plaintext images, which are represented by octonion algebra, holistically in a vector manner. The complex amplitude, formed from the components of the OFST-transformed original images and modulated by a random phase mask (RPM), is used to derive the ciphertext image by employing an amplitude- and phase-truncation approach in the Fresnel domain. To avoid sending whole RPMs to the receiver side for decryption, a random phase mask generation method based on SLMM, in which only the initial parameters of the chaotic function are needed to generate the RPMs, is designed. To enhance security, the ciphertext and two decryption keys produced in the encryption procedure are permuted by the proposed SLMM-based scrambling method. Numerical simulations have been carried out to demonstrate the proposed scheme's validity, high security, and high resistance to various attacks.

흉상환조가공 전용 CAM 시스템 개발 (Development of a Dedicated CAM System for Human Bust Machining)

  • 정회민;박준철
    • 한국정밀공학회:학술대회논문집
    • /
    • 한국정밀공학회 2001년도 춘계학술대회 논문집
    • /
    • pp.7-10
    • /
    • 2001
  • We have developed a prototype dedicated CAM system for machining a human bust that is not a relief. The input is STL file format, and the output is NC-codes for machining on a 3-axis general purpose CNC milling machine with an index table attached. Main modules are STL import, STL transformation, modeling jig/fixture, master model generation, and calculation of machining area. System architecture is proposed and main modules are briefly described. We adopted the angle between tool-axis and the surface normal vector to calculate machining area, and tested at several degrees.

  • PDF

Ensemble of Degraded Artificial Intelligence Modules Against Adversarial Attacks on Neural Networks

  • Sutanto, Richard Evan;Lee, Sukho
    • Journal of information and communication convergence engineering
    • /
    • 제16권3호
    • /
    • pp.148-152
    • /
    • 2018
  • Adversarial attacks on artificial intelligence (AI) systems use adversarial examples to achieve the attack objective. Adversarial examples consist of slightly changed test data, causing AI systems to make false decisions on these examples. When used as a tool for attacking AI systems, this can lead to disastrous results. In this paper, we propose an ensemble of degraded convolutional neural network (CNN) modules, which is more robust to adversarial attacks than conventional CNNs. Each module is trained on degraded images. During testing, images are degraded using various degradation methods, and a final decision is made utilizing a one-hot encoding vector that is obtained by summing up all the output vectors of the modules. Experimental results show that the proposed ensemble network is more resilient to adversarial attacks than conventional networks, while the accuracies for normal images are similar.

초경절단공구의 인선결손에 관한 연구 (A Study on the Cutting Edge Chipping of Cemented Carbide Cut-off Tools)

  • 김원일
    • 한국정밀공학회지
    • /
    • 제5권1호
    • /
    • pp.71-77
    • /
    • 1988
  • This study applies dynamic deformation analysis to the rake face stress distribution of cemented carbide cut-off tools by turning, using a finite element method. The results are following: 1. The dynamic loaded state of a cut-off tool was very changeable for the first 0.6 seconds. Reaching the normal state, it became in active. 2. Chipping was influnced not only by the magnitude of stress but also by the abrupt change of tensile and compressive stresses. 3. The distribution chat of principal stress by dynamic load and the direction of resultant vector were almost constant regardless of load time.

  • PDF