• Title/Summary/Keyword: off-line identification

Search Result 74, Processing Time 0.024 seconds

A Study on the Off-Line Parameter Estimation for Sensorless 3-Phase Induction Motor using the D-Axis Model in Stationary Frame (정지좌표계 d축 모델을 이용한 위치센서 없는 3상 유도전동기의 오프라인 제정수 추정에 관한 연구)

  • Mun, Tae-Yang;In, Chi-Gak;Kim, Joohn-Sheok
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.25 no.1
    • /
    • pp.13-20
    • /
    • 2020
  • Accurate parameters based on equivalent circuit are required for high-performance field-oriented control in a three-phase induction motor. In a normal case, stator resistance can be accurately measured using a measuring equipment. Except for stator resistance, all machine parameters on the equivalent circuit should be estimated with particular algorithms. In the viewpoint of traditional regions, the parameters of an induction motor can be identified through the no-load and standstill test. This study proposes an identification method that uses the d-axis model of the induction motor in a stationary frame with the predefined information on stator resistance. Mutual inductance is estimated on the rotational dq coordination similar to that in the traditional no-load experiment test. The leakage inductance and rotor resistance can be estimated simply by applying different voltages and frequencies in the d-axis model of the induction motor. The proposed method is verified through simulation and experimental results.

Design of an Authentication System Based on Personal Identity Verification Card (전자신분증 기반의 개인 신분확인을 위한 인증시스템 설계)

  • Park, Young-Ho;Kong, Byung-Un;Rhee, Kyung-Hyune
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.8
    • /
    • pp.1029-1040
    • /
    • 2011
  • Electronic identity (e-ID) card based on smartcard is a representative identity credential for on-line and off-line personal identification. The e-ID card can store the personal identity information securely, so that the information can be accessed fast, automated identity verification and used to determine the cardholder's authorization to access protected resources. Due to such features of an e-ID card, the number of government organizations and corporate enterprises that consider using e-ID card for identity management is increasing. In this paper, we present an authentication framework for access control system using e-ID cards by discussing the threat environment and security requirement against e-ID card. Specifically, to accomplish our purpose, we consider the Personal Identity Verification system as our target model.

3D Depth Measurement System-based Unpaved Trail Recognition for Mobile Robots (이동 로봇을 위한 3차원 거리 측정 장치기반 비포장 도로 인식)

  • Gim Seong-Chan;Kim Jong-Man;Kim Hyong-Suk
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.4
    • /
    • pp.395-399
    • /
    • 2006
  • A method to recognize unpaved road region using a 3D depth measurement system is proposed for mobile robots. For autonomous maneuvering of mobile robots, recognition of obstacles or recognition of road region is the essential task. In this paper, the 3D depth measurement system which is composed of a rotating mirror, a line laser and mono-camera is employed to detect depth, where the laser light is reflected by the mirror and projected to the scene objects whose locations are to be determined. The obtained depth information is converted into an image. Such depth images of the road region represent even and plane while that of off-road region is irregular or textured. Therefore, the problem falls into a texture identification problem. Road region is detected employing a simple spatial differentiation technique to detect the plain textured area. Identification results of the diverse situation of unpaved trail are included in this paper.

Robust Trajectory Control of a Hydraulic Excavator using Disturbance Observer in $H_\infty$Framework ($H_\infty$구조의 외란 관측기를 이용한 유압 굴삭기의 강인한 궤적 제어)

  • 최종환;김승수;양순용;이진걸
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.10
    • /
    • pp.130-140
    • /
    • 2003
  • This paper presents an $H_\infty$controller synthesis based on disturbance observer for the trajectory control of a hydraulic excavator. Compared to conventional robot manipulators driven by electrical motors, hydraulic excavator have more nonlinear and coupled dynamics. In particular, the interactions between an excavation tool and the materials being excavated are unstructured and complex. In addition, its operating modes depend on working conditions, which make it difficult to not only derive the exact mathematical model but also design a controller systematically. In this study, the approximated linear model obtained through off-line system identification is used as nominal plant model for a disturbance observer. A disturbance observer based tracking controller which considers the effect of disturbance and model uncertainty is synthesized in $H_\infty$frameworks. Simulation results are used to demonstrate the applicability of the proposed control scheme.

(Design of Neural Network Controller for Contiunous-Time Chaotic Nonlinear Systems) (연속 시간 혼돈 비선형 시스템을 위한 신경 회로망 제어기의 설계)

  • O, Gi-Hun;Choe, Yun-Ho;Park, Jin-Bae;Im, Gye-Yeong
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.39 no.1
    • /
    • pp.51-65
    • /
    • 2002
  • This paper presents a design method of the neural network-based controller using an indirect adaptive control method to deal with an intelligent control for chaotic nonlinear systems. The proposed control method includes the identification and control Process for chaotic nonlinear systems. The identification process for chaotic nonlinear systems is an off-line process which utilizes the serial-parallel structure of multilayer neural networks and simple state space neural networks. The control process is an on-line process which uses the trained neural networks as the system model. An error back-propagation method was used for training of identification and control for chaotic nonlinear systems. The performance of the proposed neural network controller was evaluated by application to the Duffing equation and the Lorenz equation, and the proposed controller was compared with other neural network-based controllers by computer simulations.

Wavelet Analysis to Real-Time Fabric Defects Detection in Weaving processes

  • Kim, Sung-Shin;Bae, Hyeon;Jung, Jae-Ryong;Vachtsevanos, George J.
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.1
    • /
    • pp.89-93
    • /
    • 2002
  • This paper introduces a vision-based on-line fabric inspection methodology of woven textile fabrics. Current procedure for determination of fabric defects in the textile industry is performed by human in the off-line stage. The advantage of the on-line inspection system is not only defect detection and identification, but also 벼ality improvement by a feedback control loop to adjust set-points. The proposed inspection system consists of hardware and software components. The hardware components consist of CCD array cameras, a frame grabber and appropriate illumination. The software routines capitalize upon vertical and horizontal scanning algorithms characteristic of a particular deflect. The signal to noise ratio (SNR) calculation based on the results of the wavelet transform is performed to measure any deflects. The defect declaration is carried out employing SNR and scanning methods. Test results from different types of defect and different style of fabric demonstrate the effectiveness of the proposed inspection system.

3D Depth Measurement System-based Nonliniar Trail Recognition for Mobile Robots (3 차원 거리 측정 장치 기반 이동로봇용 비선형 도로 인식)

  • Kim, Jong-Man;Kim, Won-Sop;Shin, Dong-Yong
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.06a
    • /
    • pp.517-518
    • /
    • 2007
  • A method to recognize unpaved road region using a 3D depth measurement system is proposed for mobile robots. For autonomous maneuvering of mobile robots, recognition of obstacles or recognition of road region is the essential task. In this paper, the 3D depth measurement system which is composed of a rotating mirror, a line laser and mono-camera is employed to detect depth, where the laser light is reflected by the mirror and projected to the scene objects whose locations are to be determined. The obtained depth information is converted into an image. Such depth images of the road region represent even and plane while that of off-road region is irregular or textured. Therefore, the problem falls into a texture identification problem. Road region is detected employing a simple spatial differentiation technique to detect the plain textured area. Identification results of the diverse situation of Nonlinear trail are included in this paper.

  • PDF

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.

A Method to Enhance the Security of ZKIP with Weak Keys and Its Application (약한 키를 가지는 대화식 영지식 증명의 안전성 강화 방법과 그 응용)

  • 양대헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.1
    • /
    • pp.33-42
    • /
    • 2002
  • We present a systematic way to armor a zero-knowledge interactive proof based identification scheme that has badly chosen keys. Keys are sometimes mistakenly chosen to be weak(neither random nor long), and a weak key is often preferred to a strong key so that it might be easy for human to remember. Weak keys severely degrade the security of ZKIP based identification schemes. We show using off-line guessing attack how the weak key threats the security of ZlKIP based identification schemes. For the proper usage of ZKIP, we introduce a specialized form of ZKIP, which has a secret coin-tossing stage. Using the secret coin tossing, a secure framework is proposed for ZKIP based identification schemes with weak key in the ideal cipher model. The framework is very useful in password based authentication and key exchange protocol

The Effect of Consumer-Brand Relationship of Fashion Luxury Product on Brand Loyalty (패션 명품 소비자-브랜드 관계가 관계 만족과 브랜드 충성도에 미치는 영향)

  • Kim, Soo-Jin;Chung, Myung-Sun
    • The Research Journal of the Costume Culture
    • /
    • v.16 no.6
    • /
    • pp.1076-1086
    • /
    • 2008
  • The purpose of this study were to examine the effect of consumer-brand relationship of fashion luxury product on brand loyalty and the mediating effect of consumer satisfaction. The questionnaire developed through the literature search and a survey was conducted both in on-line and off-line questionnaire simultaneously. Finally 227 data from women who had a buying experience of fashion luxury products were analyzed using frequency, factor analysis, ANOVA, t-test, regression analysis by SPSS for WIN program. The results were as follows. First, the consumers' brand identification was composed of three factors; self-connection, interdependence, attachment. Second, the consumer-brand relationship significantly influenced on the brand loyalty. Third, the consumer-brand relationship significantly influenced on the consumer satisfaction. Fourth, the consumer satisfaction significantly influenced on the brand loyalty. Fifth, the consumer-brand relationship had both direct and indirect effects on brand loyalty mediated by consumer satisfaction. The results indicated that causal relationship was existed among these three variables.

  • PDF