• Title/Summary/Keyword: User Control

Search Result 3,798, Processing Time 0.035 seconds

D2D Power Control in the Cellular System: Iterative Algorithm and Convergence

  • Oh, Changyoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.41-47
    • /
    • 2017
  • In this paper, we consider the case where D2D users and the cellular user share the uplink of the cellular system. We propose an iterative power control algorithm that converges to the optimum power value. Each user iteratively updates its transmit power level according to the interference function. Finally, all D2D users and cellular user that participate in the transmission get the optimum transmit power level. We first investigate the interference structure and define the interference function. Then, we show that the considered interference function belongs to the standard interference function that converges the unique transmit power level. Through numerical examples, the convergence of the proposed power control algorithm is examined in the various transmission scenarios.

Interacting Mobile Robots for Tele-Operation System Using the Internet

  • Park, Kwang-Soo;Ahn, Doo-Sung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.44.1-44
    • /
    • 2001
  • This paper discusses the interacting mobile robots for tele-operation system using the world wide web. In multi-agent and web-based teleoperation environment the problem of communication delay must be solved for the efficient and robust control of the system. The standard graphic user interface(GUI)is implemented using Java Programing language. The web browser is used to integrate the virtual environment and the standard GUI(Java applet) in a single user interface. Users can access a dedicated WWWserver and download the user interface. Reinforcement learning is applied to indirect control in order to autonomously operate without the need of human intervention. Java application has been developed to communicate and control multi robots using WWW. The effectiveness of our multi robots system is verified by simulation and experiments ...

  • PDF

A Study on Development of Automatic Weld-Seam Tracking System using Vision Sensor (시각센서를 이용한 용접선 자동추적시스템의 개발에 관한 연구)

  • 배강열;이지형
    • Journal of Welding and Joining
    • /
    • v.14 no.4
    • /
    • pp.79-88
    • /
    • 1996
  • For improvement in productivity and weld quality, weld seam tracking and welding parameter control are very essential in the welding of a structure which can not be cxactly fit-up due to mismatch, discontinous gap, deflection, etc.. In this study, an automatic weld seam tracking system is developed for I-butt joint structure, and the system consists of XYZ working table, vision sensor and user interface program. In the developed vision sensor system, an image projection algorithm for weld-line detection and an adaptive current control algorithm for gap variation were implemented. The user interface program developed in this study by basing on the objct oriented concept could provide very convenient way to utilize the tracking system with the pull-down menu driven structure. The developed system showed a good seam tracking and weld quality control capability corresponding to deflected weld lines and gap variations.

  • PDF

A User Driven Adaptable Bandwidth Video System for Remote Medical Diagnosis System (원격 의료 진단 시스템을 위한 사용자 기반 적응 대역폭 비디오 시스템)

  • Chung, Yeongjee;Wright, Dustin;Ozturk, Yusuf
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.99-113
    • /
    • 2015
  • Adaptive bitrate (ABR) streaming technology has become an important and prevalent feature in many multimedia delivery systems, with content providers such as Netflix and Amazon using ABR streaming to increase bandwidth efficiency and provide the maximum user experience when channel conditions are not ideal. Where such systems could see improvement is in the delivery of live video with a closed loop cognitive control of video encoding. In this paper, we present streaming camera system which provides spatially and temporally adaptive video streams, learning the user's preferences in order to make intelligent scaling decisions. The system employs a hardware based H.264/AVC encoder for video compression. The encoding parameters can be configured by the user or by the cognitive system on behalf of the user when the bandwidth changes. A cognitive video client developed in this study learns the user's preferences (i.e. video size over frame rate) over time and intelligently adapts encoding parameters when the channel conditions change. It has been demonstrated that the cognitive decision system developed has the ability to control video bandwidth by altering the spatial and temporal resolution, as well as the ability to make scaling decisions

A Privacy Negotiation Algorithm for Digital Rights Management

  • Phuttharak, Jurairat;Sathitwiriyawong, Chanboon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.788-793
    • /
    • 2004
  • Internet-based distribution of digital contents provides great opportunities for producers, distributors and consumers, but it may seriously threaten users' privacy. The Digital Rights Management (DRM) systems which one of the major issues, concern the protection of the ownership/copyright of digital content. However, the most recent DRM systems do not support the protection of the user's personal information. This paper examines the lack of privacy in DRM systems. We describe a privacy policy and user's privacy preferences model that protect each user's personal information from privacy violation by DRM systems. We allow DRM privacy agent to automatically negotiate between the DRM system policy and user's privacy preferences to be disclosed on behalf of the user. We propose an effective negotiation algorithm for the DRM system. Privacy rules are created following the negotiation process to control access of the user's personal information in the DRM system. The proposed privacy negotiation algorithm can be adapted appropriately to the existing DRM systems to solve the privacy problem effectively.

  • PDF

Intelligent Control Interface for Display Power Response to a User's Activity (사용자 활동 상태에 반응하는 지능형 디스플레이 전원 제어 인터페이스)

  • Baek, Jong-Hun;Yun, Byoung-Ju
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.2
    • /
    • pp.61-68
    • /
    • 2010
  • As a result of the growth of mobile devices such as PDA and cellular phone, a user can utilize various digital contents everywhere and anytime. However, mobile devices have the limited resources and interaction mechanisms. This paper introduces the schema for a user activity estimation and its application in order to overcome the poor user interface and limited resource problems. We are able to supplement lacking the user interface of mobile devices by using the user activity estimation proposed in this paper, and its application is a intelligent control interface for the display power on or off which can effectively utility the battery of the mobile device.

User Interface Satisfaction of the Air Traffic Control System (항공교통관제시스템에 대한 사용자 인터페이스 만족도 조사)

  • Song, Chang-Sun;Sohn, Young-Woo;Kwon, Hyuk-Jin
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.22 no.4
    • /
    • pp.1-7
    • /
    • 2014
  • The purpose of study is to investigate the current user interface level of air traffic control system with the usability analysis and satisfaction survey questionnaire on user satisfaction. Think aloud protocol is used to identify not only task analysis, but also the level of user-friendliness of the FIMS and ASDE system, and the user interface questionnaires was conducted by QUIS. We collected data from 6 controllers for Think aloud protocol and 15 controllers for QUIS in Incheon airport. The results showed that the system was the valuable tool for ensuring human performance with the support of memory and the facilitation of decision-making tasks. It helps air traffic controllers perform better and minimize errors in a congested time. The human-computer interface system design, however, was not applied, which led to the increase of workload. Air traffic controller participation in software development provided excellent examples for applications in terms of software in FIMS. Based on these results, the study provided that the usability of system interface was necessary to take into account human factors. The development and design of system was discussed in User Interface environment.

Path Generation Method of UAV Autopilots Using Max-Min Algorithm

  • Kwak, Jeonghoon;Sung, Yunsick
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1457-1463
    • /
    • 2018
  • In recent times, Natural User Interface/Natural User Experience (NUI/NUX) technology has found widespread application across a diverse range of fields and is also utilized for controlling unmanned aerial vehicles (UAVs). Even if the user controls the UAV by utilizing the NUI/NUX technology, it is difficult for the user to easily control the UAV. The user needs an autopilot to easily control the UAV. The user needs a flight path to use the autopilot. The user sets the flight path based on the waypoints. UAVs normally fly straight from one waypoint to another. However, if flight between two waypoints is in a straight line, UAVs may collide with obstacles. In order to solve collision problems, flight records can be utilized to adjust the generated path taking the locations of the obstacles into consideration. This paper proposes a natural path generation method between waypoints based on flight records collected through UAVs flown by users. Bayesian probability is utilized to select paths most similar to the flight records to connect two waypoints. These paths are generated by selection of the center path corresponding to the highest Bayesian probability. While the K-means algorithm-based straight-line method generated paths that led to UAV collisions, the proposed method generates paths that allow UAVs to avoid obstacles.

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

Context based User Required Services Reasoning Model (상황 정보 기반 사용자 요구 서비스 추론 모델)

  • Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.1
    • /
    • pp.21-26
    • /
    • 2008
  • It was already realized at a current technological level of home network systems that the systems recognizes a user's simple order and carry out the order in the ubiquitous computing environment. However home is not a simple environment consisting into a large number of family members, so various order and situation would be needed accordingly. From now on we need to reach the technological level to infer that how is the user's behavior patterns and what kinds of service is the fittest to user who belong to the ubiquitous computing environment by using the result of the context interpreter. In this regards, active inferred-model needs to be suggested upgrading user's command into one step more higher level than the simple one adapting diversified feature. This study would like to suggest this active model recognizing context, which is user's environmental information applying basic network and inferring Context-based Service that user wants through the recognized result This study proposes a new method that can infer the user's desire in ubiquitous computing environment. First of all, we define a context as user's information of ubiquitous computing environment situation that user belongs to and we classify the context into 4W1H(Where, Who, When, What) formats. We construct Bayesian network and put the factor of context use as Bayesian network nodes. As a result, we can infer the user's behavior pattern and most proper service for user in the intelligent space from the probabilistic result of Bayesian network.