• Title/Summary/Keyword: network base control

Search Result 355, Processing Time 0.032 seconds

A Study on Path Planning Algorithm of a Mobile Robot for Obstacle Avoidance using Optimal Design Method

  • Tran, Anh-Kim;Suh, Jin-Ho;Kim, Kwang-Ju;Kim, Sang-Bong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.168-173
    • /
    • 2003
  • In this paper, we will present a deeper look on optimal design methods that are related to path-planning for a mobile robot. To control the motion of a mobile robot in a clustered environment, it's necessary to know a suitable trajectory assuming certain start and goal point. Up to now, there are many literatures that concern optimal path planning for an obstacle avoided mobile robot. Among those literatures, we have chosen 2 novel methods for our further analysis. The first approach [4] is based on HJB(Hamilton-Jacobi-Bellman) equation whose solution is the return-function that helps to generate a shortest path to the goal. The later [5] is called polynomial-path-planning approach, in this method, a shortest polynomial-shape path would become a solution if it was a collision-free path. The camera network plays the role as sensors to generate updated map which locates the static and dynamic objects in the space. Therefore, the exhibition of both path planning and dynamic obstacle avoidance by the updated map would be accomplished simultaneously. As we mentioned before, our research will include the motion control of a true mobile robot on those optimal planned paths which were generated by above algorithms. Base on the kinematic and dynamic simulation results, we can realize the affection of moving speed to the stable of motion on each generated path. Also, we can verify the time-optimal trajectory through velocity tuning. To simplify for our analysis, we assumed the obstacles are cylindrical circular objects with the same size.

  • PDF

A Feasibility Study on Opportunistic Interference Alignment: Improved Energy Efficiency via Power Control (기회적 간섭 정렬의 실현 가능성 연구: 전력 제어를 통한 에너지 효율성 개선)

  • Shin, Won-Yong;Yoon, Jangho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1077-1083
    • /
    • 2015
  • In this paper, we introduce an energy-efficient opportunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multi-cell uplink networks. Each user employs optimal transmit vector design and power control in the sense of minimizing the amount of generated interference to other-cell base stations while satisfying a required signal quality. As our main result, it is shown that owing to the reduced interference level, the proposed OIA schemes attains larger sum-rates than those of OIA with no power control for almost all signal-to-noise ratio regions. In addition, when both zero-forcing and minimum mean square error (MMSE) detectors are employed at the receiver along with the OIA scheme, it is shown that the OIA scheme with MMSE detection shows superior performance.

ACCESS CONTROL MODEL FOR DATA STORED ON CLOUD COMPUTING

  • Mateen, Ahmed;Zhu, Qingsheng;Afsar, Salman;Rehan, Akmal;Mumtaz, Imran;Ahmad, Wasi
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.208-221
    • /
    • 2019
  • The inference for this research was concentrated on client's data protection in cloud computing i.e. data storages protection problems and how to limit unauthenticated access to info by developing access control model then accessible preparations were introduce after that an access control model was recommend. Cloud computing might refer as technology base on internet, having share, adaptable authority that might be utilized as organization by clients. Compositely cloud computing is software's and hardware's are conveying by internet as a service. It is a remarkable technology get well known because of minimal efforts, adaptability and versatility according to client's necessity. Regardless its prevalence large administration, propositions are reluctant to proceed onward cloud computing because of protection problems, particularly client's info protection. Management have communicated worries overs info protection as their classified and delicate info should be put away by specialist management at any areas all around. Several access models were accessible, yet those models do not satisfy the protection obligations as per services producers and cloud is always under assaults of hackers and data integrity, accessibility and protection were traded off. This research presented a model keep in aspect the requirement of services producers that upgrading the info protection in items of integrity, accessibility and security. The developed model helped the reluctant clients to effectively choosing to move on cloud while considerate the uncertainty related with cloud computing.

Security of Ethernet in Automotive Electric/Electronic Architectures (차량 전자/전기 아키텍쳐에 이더넷 적용을 위한 보안 기술에 대한 연구)

  • Lee, Ho-Yong;Lee, Dong-Hoon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.39-48
    • /
    • 2016
  • One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BASE-T1, respectively IEEE P802.3bp - 1000BASE-T1) will lead to a much broader adoption in future. Those applications will not be limited to simple point-to-point connections, but may affect Electric/Electronic(EE) Architectures as a whole. It is agreed that IP based traffic via Ethernet could be secured by application of well-established IP security protocols (e.g., IPSec, TLS) combined with additional components like, e.g., automotive firewall or IDS. In the case of safety and real-time related applications on resource constraint devices, the IP based communication is not the favorite option to be used with complicated and performance demanding TLS or IPSec. Those applications will be foreseeable incorporate Layer-2 based communication protocols as, e.g., currently standardized at IEEE[13]. The present paper reflects the state-of-the-art communication concepts with respect to security and identifies architectural challenges and potential solutions for future Ethernet Switch-based EE-Architectures. It also gives an overview and provide insights into the ongoing security relevant standardization activities concerning automotive Ethernet. Furthermore, the properties of non-automotive Ethernet security mechanisms as, e.g., IEEE 802.1AE aka. MACsec or 802.1X Port-based Network Access Control, will be evaluated and the applicability for automotive applications will be assessed.

Design and Implementation of DGPS Interface Module using CDMA Communication Network (CDMA 통신망을 이용한 DGPS 인터페이스 모듈의 설계 및 구현)

  • Kim Chang-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.921-927
    • /
    • 2006
  • The current DGPS technique is many problems that is permission of radio station using RF Wireless Modem, that is influence of geographic obstacle using radio wave, that is frequency interference, that is finiteness of frequency resources. In this paper, we are solved many elements, IM(Interface Module) replaces RF Wireless Modem, we suggest transmission technique of correction message using mobile phone, we researched Interface Module development which is linkage of DGPS receiver and mobile phone. IM can transmit correction message passing RS-232 port and modem communication control. IM of base station is initialized RS-232 port and modem to move station for correction message transmission, IM waited response mode. IM of move station is initialized RS-232 port and modem, IM requests hand shaking to base station, completed connection establishment. Users are worked Differential surveying using receiving correction message between mobile phones.

Game Theoretic Approach for Joint Resource Allocation in Spectrum Sharing Femtocell Networks

  • Ahmad, Ishtiaq;Liu, Shang;Feng, Zhiyong;Zhang, Qixun;Zhang, Ping
    • Journal of Communications and Networks
    • /
    • v.16 no.6
    • /
    • pp.627-638
    • /
    • 2014
  • In this paper, we study the joint price and power allocation in spectrum sharing macro-femtocell networks. The proposed game theoretic framework is based on bi-level Stackelberg game where macro base station (MBS) works as a leader and underlaid femto base stations (FBSs) work as followers. MBS has fixed data rate and imposes interference price on FBSs for maintaining its data rate and earns revenue while FBSs jointly adjust their power for maximizing their data rates and utility functions. Since the interference from FBSs to macro user equipment is kept under a given threshold and FBSs compete against each other for power allocation, there is a need to determine a power allocation strategy which converges to Stackelberg equilibrium. We consider two cases for MBS power allocation, i.e., fixed and dynamic power. MBS can adjust its power in case of dynamic power allocation according to its minimum data rate requirement and number of FBSs willing to share the spectrum. For both cases we consider uniform and non-uniform pricing where MBS charges same price to all FBSs for uniform pricing and different price to each FBS for non-uniform pricing according to its induced interference. We obtain unique closed form solution for each case if the co-interference at FBSs is assumed fixed. And an iterative algorithm which converges rapidly is also proposed to take into account the effect of co-tier interference on interference price and power allocation strategy. The results are explained with numerical simulation examples which validate the effectiveness of our proposed solutions.

Optimization of a Single-Channel Pump Impeller for Wastewater Treatment

  • Kim, Joon-Hyung;Cho, Bo-Min;Kim, Youn-Sung;Choi, Young-Seok;Kim, Kwang-Yong;Kim, Jin-Hyuk;Cho, Yong
    • International Journal of Fluid Machinery and Systems
    • /
    • v.9 no.4
    • /
    • pp.370-381
    • /
    • 2016
  • As a single-channel pump is used for wastewater treatment, this particular pump type can prevent performance reduction or damage caused by foreign substances. However, the design methods for single-channel pumps are different and more difficult than those for general pumps. In this study, a design optimization method to improve the hydrodynamic performance of a single-channel pump impeller is implemented. Numerical analysis was carried out by solving three-dimensional steady-state incompressible Reynolds-averaged Navier-Stokes equations using the shear stress transport turbulence model. As a state-of-the-art impeller design method, two design variables related to controlling the internal cross-sectional flow area of a single-channel pump impeller were selected for optimization. Efficiency was used as the objective function and was numerically assessed at twelve design points selected by Latin hypercube sampling in the design space. An optimization process based on a radial basis neural network model was conducted systematically, and the performance of the optimum model was finally evaluated through an experimental test. Consequently, the optimum model showed improved performance compared with the base model, and the unstable flow components previously observed in the base model were suppressed remarkably well.

A Study on Data Acquisition in the Invisible Zone of UAV through LTE Remote Control (LTE 원격관제를 통한 UAV의 비가시권 데이터 취득방안)

  • Jeong, HoHyun;Lee, Jaehee;Park, Seongjin
    • Korean Journal of Remote Sensing
    • /
    • v.35 no.6_1
    • /
    • pp.987-997
    • /
    • 2019
  • Recently the demand for drones is rapidly increasing, as developing Unmanned Aerial Vehicle (UAV) and growing interest in them. Compared to traditional satellite and aerial imagery, it can be used for various researches (environment, geographic information, ocean observation, and remote sensing) because it can be managed with low operating costs and effective data acquisition. However, there is a disadvantage in that only a small area is acquired compared to the satellite and an aircraft, which is a traditional remote sensing method, depending on the battery capacity of the UAV, and the distance limit between Ground Control System (GCS) and UAV. If remote control at long range is possible, the possibility of using UAV in the field of remote sensing can be increased. Therefore, there is a need for a communication network system capable of controlling regardless of the distance between the UAV and the GCS. The distance between UAV and GCS can be transmitted and received using simple radio devices (RF 2.4 GHz, 915 MHz, 433 MHz), which is limited to around 2 km. If the UAV can be managed simultaneously by improving the operating environment of the UAV using a Long-Term Evolution (LTE) communication network, it can make greater effects by converging with the existing industries. In this study, we performed the maximum straight-line distance 6.1 km, the test area 2.2 ㎢, and the total flight distance 41.75 km based on GCS through LTE communication. In addition, we analyzed the possibility of disconnected communication through the base station of LTE communication.

Proactive Congestion Control for Energy Efficiency of Mobile Device in Ad-hoc Network (Ad-hoc 통신망에서 이동 단말의 에너지 효율성을 고려한 능동적인 혼잡 제어 기법)

  • Cho, Nam-Ho;Lee, Jung-Min;Choi, Woong-Chul;Rhee, Seung-Hyong;Chung, Kwang-Sue
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.340-342
    • /
    • 2005
  • 최근 기지국(Base Station)의 도움 없이 이동 단말기(Mobile Device) 간의 다중 무선 홉을 사용하여 송수신자 간의 데이터 전송을 가능하게 하는 Ad-hoc 통신망에 관한 연구가 활발히 진행되고 있다. Ad-hoc 통신망을 구성하는 이동 단말은 이동성을 고려하여 한정된 배터리로 동작을 하게 된다. Ad-hoc 통신망에서 이동 단말은 종단(End Host)으로만 동작하는 것이 아닌 중계 노드(Intermediate Node)로도 동작을 하기 때문에 통신상에 경로를 제공하는 중요한 역할도 한다. 하지만, 현재 인터넷 상에서 광범위하게 사용되고 있는 전송 규약인 TCP(Transmission Control Protocol)는 수동적인(Reactive)혼잡 제어(Congestion Control)방식으로 망의 혼잡으로 인한 패킷 손실 발생 이전까지 전송 윈도우의 크기를 증가 때문에 반복적인 혼잡과 그로 인한 패킷 손실로 인해 불필요한 재전송을 반복하게 된다. 이와 같이 기존 TCP는 무선 통신망에서 동작하는 이동 단말의 한정된 배터리 전원을 고려하지 않고 동작하기 때문에 이동 단말의 에너지를 불필요하게 낭비하는 문제를 가지게 된다. 본 논문은 Ad-hoc 망에서 이동 단말의 에너지 효율을 개선하기 위해 불필요한 재전송 방지 및 망 상태에 따라 전송률을 적절하게 조절하는 TCP의 새로운 혼잡 제어 기법을 제시하였다. 또한 ns-2 시뮬레이터를 이용한 실험을 통해 이동 단말의 에너지 효율이 제안된 혼잡 제어 기법에 의해 향상되었음을 확인하였다.

  • PDF

Development of Managing Security Services System Protection Profile (보안관제시스템 보호프로파일 개발)

  • Son, Seung-Wan;Kim, Kwang-Seok;Choi, Jung-Won;Lee, Gang-Soo
    • Journal of Digital Contents Society
    • /
    • v.16 no.2
    • /
    • pp.345-353
    • /
    • 2015
  • Security Management System is a system which operates in the security control center for security control. All living things across the Internet in recent years, with the rapid increase in the subscriber base has increased the need for network security dramatically depending on yirueojim through web services, thus cyber security sheriff, I have a big issue to build a security management system, each agency and perform control tasks. But the security functional requirements for security management system would not specified exactly, in developing a security management system to build and design a situation that PP's needs require a lot of trouble. In this paper, we develop a Managed Security System Protection Profile for the security functional requirements specification of the security management system.