• Title/Summary/Keyword: executing

Search Result 1,025, Processing Time 0.034 seconds

Linear Decentralized Learning Control for the Multiple Dynamic Subsystems

  • Lee, Soo-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.1 no.1
    • /
    • pp.153-176
    • /
    • 1996
  • The new field of learning control devleops controllers that learn to improve their performance at executing a given task, based on experience performing this task. the simplest forms of learning control are based on the same concepts as integral control, but operating in the domain of the repetitions of the task. This paper studies the use of such controllers ina decentralized system, such as a robot with the controller for each link acting independently. The basic result of the paper is to show that stability of the learning controllers for all subsystems when the coupling between subsystems is turned off, assures stability of the decentralized learning in the coupled system, provided that the sample time in the digital learning controller is sufficiently short.

  • PDF

Electrical Conduction Characteristics of a Thick-film Form Multiwalled Carbon Nanotubes for Field Electron Emitter

  • Lee, Yun-Hi;Kim, Hoon;Ju, Byeong-Kwon;Yu, Jae-Eun;Oh, Myung-Hwan
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2000.01a
    • /
    • pp.53-54
    • /
    • 2000
  • Measurements of the direct current resistivity, on multiwalled carbon nanotubes(MWNT) for field electron emitter source that had been screen printed in a thick film form were made as a function of temperature T in the range of 1.7K-390K. In this measuring temperature range, the electrical resistivity for the MWNT show that the main contribution to the conductivity comes form carries that hop directly between localized states executing variable range hopping processes. This thick-film form system for large area display showed a high bright light emission as well as very low turn-on field as like an individual MWNT system at room temperature. Furthermore, the electron emission characteristics followed well typical Fowler-Nordheim conduction under the vacuum.

  • PDF

A Study on the Application of Image Processing Algorithm for Paper-cup Inner Defect Inspection (종이컵 내면불량 검사를 위한 영상처리 알고리즘 응용에 관한 연구)

  • Eom, Ki-Bok;Kim, Yong;Lee, Kyu-Hun;Kwon, Soon-Do;Yoon, Suk-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2521-2524
    • /
    • 2002
  • In this paper, We propose an Image processing algorithm for a paper-cup inner defect inspection. First, we devide a cup image to four sections considering the characteristic of a cup and filter noises limit by using the flood-fill algorithm and median filter. Second, to obtain the clearer inspection result of the edge point inner cup, We apply the sharpening convolution filer to the objected inspect the edge points by using the LOG edge detector. Third, executing sub-pixel operation with the orignal image, we find the defect parts in the cup. Finally, denoting the inspected defect parts as rectangular, we recompose the images of the defected ones.

  • PDF

-CTP System Study for Customer Reliability Improvement through Due date Promising- (납기확약을 통해 고객 신뢰성 향상을 도모하기 위한 CTP 시스템에 관한 연구)

  • Oh Sung Hwan;Park Young Ki;Kang Kyong Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.6 no.3
    • /
    • pp.121-130
    • /
    • 2004
  • This Study will introduce the concept of CTP(Capable-to-Promise) Algorithm, CTP process, and the modeling of algorithm. This research is based on the environment of using Job-Shop method. CTP algorithm model use LPST(Latest Possible Start Time) and EPST(Earliest Possible Start Time) method especially. It is important part of executing CTP system. The CTP modeling and implementing develops to system which is able to implement in the various business environment through additional and continuous research.

A Study on Effectiveness of Technical Consulting System for Accident Prevention in Construction Work (건설업 재해예방 전문지도제도의 실효성 연구)

  • Park Hai-Chun;Park Jun-Ho;Kim Hyun-Woo;Park Jung-Sik;Kim Hun-Soo
    • Journal of the Korea Safety Management & Science
    • /
    • v.8 no.1
    • /
    • pp.65-84
    • /
    • 2006
  • This study was to suggest the necessity of depth research in order to enhance the effectiveness of technical consulting system. And the purpose of this study was to decrease the construction accidents to some extent, being on the increase day by day as it takes issue properly and suggest a reform measure. As for research method, it executed the collection of public opinions widely and questionnaire with the bibliography, expert of construction safety, the related institutions, academic world, safety association, and director of construction site. Also, it was to suggest the reform measure by the stage, classifying the problems on the system and operation by 4 stages like a stage of delivery of subscription and supervision, a stage of contract with guidance of technology, a stage of executing the guidance work of technology, and a stage of performance of advice.

Modeling Due-date Promising system using CTP Algorithm in SCM Environment (공급망상에세 CTP 알고리즘을 이용한 납기확약 시스템 모델링)

  • 최진;박상민;남호기;이종천
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2003.11a
    • /
    • pp.117-127
    • /
    • 2003
  • This Study will introduce the concept of ATP(Available To Promise) and CTP(Capable to Promise) through the existing study , the process analysis of CTP(Capable to Promise), the modeling of algorithm and the embodiment of system. This research considers the environment of using Job-Shop method. The CTP algorithm models espicially through using LPST(Latest Possible Start Time) and EPST(Earlist Possible Start Time) method. It is important part of executing CTP(Capable to Promise), The CTP(Capable to Promise) modeling and implementing system develops to system which is capable to implement in the various business environment through addational and continuous research.

  • PDF

A study on the Research & Analysis of the Health and safety Managing's Understanding on the Applied Construction work site Risk Assessment - Focus on Site manager & manager - (건설업 위험성평가 적용사업장 종사자 안전보건 인식도 조사 연구 -사업장책임자 및 관리감독자를 중심으로-)

  • Choe, Su-Hwan;Bae, Jun-Tae;Lee, Yeon-Su;Kim, Chi-Gyeong
    • Proceedings of the Safety Management and Science Conference
    • /
    • 2012.04a
    • /
    • pp.1-11
    • /
    • 2012
  • Risk Assessment, a basis of health and safety management system, is an calamity prevention activity which regularly measure the level of a risk to passively improve potential hazard. A problem, the assessment not being improved to be applied to the construction work site where requires diversity and complexity, causes the assessment to be inefficient to bring quality results. A study on the investigates and compares the surveyed degree of recognitions of workers who works in companies executing the risk assessment By the investigation and comparison, it is expected to bring the better solution for early and efficient application for those companies which are not taking the risk assessment.

  • PDF

Exchanging of old electrical equipment and discussion of SCADA system's operation related with exchanging of old electrical equipment (노후전력설비 교체에 따른 SCADA시스템의 운용 고찰)

  • Kim, Youn-Sik;Park, Rai-Hyug;Lee, Gi-Seung
    • Proceedings of the KSR Conference
    • /
    • 2008.06a
    • /
    • pp.417-422
    • /
    • 2008
  • The DC high speed circuit breaker used in Seoul Metro for line no.1.2 is Japan HITACHI and FUJI breaker, and for line no.3.4 is Whipp & Bourne MM74 breaker from UK. The years that each breakers made are 1973(line no.1), 1984(line no.3.4), So that equipments are superannuated. Nowday the for equipment exchanging is executing, equipment for exchanging were used the Secheron breaker from Swiss. but now the Intec breaker made in Korea is used. The RTU of supervisory control and data acquisition system have the capabilities that can observe, control and work the installation efficiently. In this paper, as summarizing the solving process of problem that happened the SCADA system when old-equipment exchange and concerned point for logical supervision and control of reservation factors and equipment, I'll provide the direction that can do receiving-process of control-equipment, progressed with the exchange of old-electronic equipment.

  • PDF

A Study on the Communication Strategy to Risk Management of Agri-marine Products Distribution Policy (농수산물 유통정책의 위기관리에 따른 커뮤니케이션전략에 관한 연구 - 유통정책 갈등해소에 대한 스캐닝, 모니터링을 중심으로)

  • Kim, Man-Ki
    • Journal of Digital Convergence
    • /
    • v.6 no.1
    • /
    • pp.63-73
    • /
    • 2008
  • The present study attempted to explore effective scanning and monitoring in process of risk management on agri-marine products distribution policy. The interest public's group interests clash in accordance with theme for issue on marking policy. For executing a better systematic scanning and monitoring on actual affairs of marketing, selecting information personnel, gathering and analysing information, issue and risk management and their valuation with ongoing and simultaneously. Especially, In order to explore effective scanning and monitoring as a model of risk management, the study attempted to analyze within and without environment of marketing, to analyze issue management strategy, to evaluate issue activity for likelihood and impact, risk cycle analysis, interest public's group concerned, grade of interest public's group threatened(power, legitimacy, willingness), rapport(staying close, credibility, meeting expectation). And the study make an ongoing observation progress of subjects, and the serious subjects need have made an close observation. The study suggested to establish friendly relationship between organization and interest public's group, and to regularly accomplish two-way symmetric communication.

  • PDF

A Network Intrusion Detection System Model for Detecting of Insertion and Evasion Attacks (삽입 및 배제 공격을 고려한 네트워크 침입 탐지 시스템 모델)

  • 차현철
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.4
    • /
    • pp.69-75
    • /
    • 2000
  • This paper proposes a network intrusion detection model which can detect the insertion and evasion attacks. These attacks can be prevented when some kind of information are available in the network intrusion detection system. We classified these information with three categories and used each category at setup phase and executing Phase. Within the proposed model, all necessary information which are related with networks and operating systems are maintained in the database and created as a table. This table is used during intrusion detection. The overheads of database and table may be simple in this model.

  • PDF