Earticle

현재 위치 Home

International Journal of Control and Automation

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJCA) [Science & Engineering Research Support Center, Republic of Korea(IJCA)]
  • pISSN
    2005-4297
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.6 No.2 (39건)
No
1

A Novel Wireless MAC Protocol for RFID Networks

Kyeong Hur, Won-Sung Sohn, Jae-Kyung Kim, YangSun Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Because of absence of a unified standard for the communication between RFID nodes, it can be cut off due to protocol mismatch in case of movement of the RFID reader to a region of a different protocol. Moreover, centralized MAC schemes for RFID communication in previous studies have severe problems. For instance, if a RFID cluster header disappears from the cluster due to the cluster header's movement or a bad channel condition, the member RFID nodes of the cluster waste lots of time and energy to re-elect a new RFID cluster header. Therefore, in this paper, we propose a cooperative relay transmission scheme for WiMedia Distributed MAC (D-MAC) protocol for RFID networks and demonstrate performance improvement via simulation results.

2

Design and Simulation of Robust Controller for Flexure Stage Based Piezo-Actuated Nanopositioning Device

Sheilza Jain, Maneesha Garg, Akhilesh Swarup

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.17-28

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The rapid growth and rise in applications of nanotechnology demand investigation and control of matters at nanometer or subnanometer scale. The fundamental component of nanotechnology is the nanopositioning device, which can be used to scan or position the sample precisely at nanometer or subnanometer scale. Besides fine resolution, high precision positioning and long travel range, many applications of nanotechnology require fast positioning system. To achieve these requirements, design of high precision and high bandwidth nanopositioning device is needed. To achieve nanoscale precision over nanoscale, nanopositioning stage driven by stack piezoelectric actuator is widely used in applications such as atomic force microscope (AFM) and scanning tunneling microscope (STM). This paper presents open loop time and frequency response characteristics of piezoelectric actuator based nanopositioner. The transient response characteristics and stability margins of this device can be improved by using feedback control law. This paper shows that substantial improvement in operating speed and position precision has been achieved using a feedback controller. The presence of hysteresis is the significant challenge in the use of piezoelectric actuator for nanopositioning applications. A successfully designed control system must be able to maintain stability margins and performance level, even in the presence of uncertainties/ nonlinearities in system dynamics and/or in the working environment to a certain degree. To meet these requirements, this paper synthesizes robust and optimal H- infinity controllers for a system having hysteresis non-linearities. Simulation results using MATLAB are given to validate the proposed controller for nanopositioning device. Further, a comparative analysis of different types of proposed controllers is also described.

3

A Novel Method for Moving Objects Detection Inspired by Frog's Visual Characteristics

Zhiyong Li, Zhen Jiang, Ahmed Sallam, Junmin Liu

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.29-36

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The detection of moving objects is the hot topic of computer vision researches now. On this subject, we propose a novel method to detect moving object in surveillance videos based on the visual features of the frog eyes. This method is divided into three steps; first, to extract the moving regions using Frame Difference and Spatial-temporal entropy methods; second, to establish the edge map by the Canny edge operator; finally, to produce the moving object’s edge by double threshold fusion based on motion regions and edge map. Our experimental results show that the proposed method can detect the edge of moving object effectively.

4

Effect of Computer-Aided Education for the Prevention of Drug Misuse and Abuse

Seong-Ran Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.37-44

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An attempt of this paper is to determine the effect of computer-aided education for the prevention of drug misuse and abuse. The subjects consisted of 302 patients in a general hospital located in urban area from September 1, 2011 to December 31, 2011. The pairwise t-test was done to compare the drug misuse and abuse before and after computer-aided education. The present research showed that drug misuse and abuse decreased to 54.9-67.1% by the computer-aided education. This paper resulted in significant positive effects in quality of life of patients with drug misuse and abuse and its implications could be used as the basic data for developing further systematic materials on computer-aided education.

5

A Decision-Making Framework to Evaluate Traffic Control Strategies on Freeway Work Zone

Taehyung Kim, Taehyeong Kim, Hyoungsoo Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.45-52

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Road construction and maintenance activities cause significant impacts on traffic conditions. This paper developed a simple and practical work zone simulation model to provide a decision-making framework that can be used to evaluate various work zone traffic control strategies. This freeway work zone simulation model was programmed as Visual Basic language within a commercial spreadsheet program, EXCEL, in order to access and use easily. We expect that officials and contractors related to transportation will be able to make use of this software tool in regular work zone planning activities.

6

EKF and K-means to Generate Optimized Paths of a Mobile Robot

Md Nasir Uddin Laskar, Hoang Huu Viet, TaeChoong Chung

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.53-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Finding optimized path in the workspace is one of the fundamental problems to solve for an autonomous mobile robot. Avoiding obstacles and building an efficient trajectory is the key goal. For this reason, a mobile robot has to manage the free configuration space very efficiently for the purpose of path planning and navigation. Partitioning the configuration space will make the path planning task easy, faster and efficient. Also, data read by the sensor has some inherent noise. So we implement an algorithm to make an efficient estimation of the future states to build map that helps manage the environment efficiently to find the optimized paths to destination. We apply Extended Kalman Filter (EKF) to find the accurate estimation on sensor data and then K-means clustering algorithm to find the next landmarks avoiding the obstacles.

7

Symmetrical Optimum Design of Compensating Current and DC Voltage Controllers for D-STATCOM

Kittaya Somsai, Nitus Voraphonpiput, Thanatchai Kulworawanichpong

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.65-80

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Distribution static compensator (D-STATCOM) is used for load voltage regulation in distribution system. This paper presents the system modeling and controller design based on symmetrical optimal method for D-STATCOM. The modeling strategy similar to that used for the field-oriented control of three-phase AC machines is employed. In this work, the current and DC voltage decoupling control based on the dq reference frame are determined. The symmetrical optimum method is applied to obtain the parameters of PI controllers. The response of the D-STATCOM current and DC voltage controllers with and without the decoupling are compared and discussed.

8

Initial Free Self-Organizing Map by Aggregation

Amin Allahyar, Hadi Sadoghi Yazdi

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.81-98

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Initialization parameters of Self-organizing map networks (SOM) have a great influence in their final result. This is the only known problem of SOM networks. The uncertainty of solution is resolved with the fusion methods in many machine learning algorithms. Motivated by this application, we aim to reduce the uncertainty in SOM final result and provide a more robust solution. This is done by aggregating the results obtained from several run of SOM network. The objective in uniting several SOM run is to reduce the effect of two above factors and reach a more appropriate solution. To achieve this, a number of methods for integration of SOM solutions have been proposed and their characteristics are discussed in detail. Finally, these approaches are experimentally compared with some recently proposed SOM networks and their effectiveness are investigated.

9

Stable Walking of Qauadruped Robot by Impedance Control for Body Motion

Sooyeong Yi

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.99-110

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

General gait design for a walking robot has an assumption that the weight of a leg is negligible compared to that of body. Under the assumption, only the gravity center of the body is taken into consideration in the gait design since the total gravity center of whole robot coincides always with the gravity center of the body only. Roughly speaking, however, motion of a weighty leg has serious influence on stable walking of a quadruped robot in practical sense. In this paper, an impedance control for body sway motion is proposed to compensate the influence of a weighty leg on the total gravity center of the robot, so that the walking stability is secured in accordance with the pre-designed gait with consideration of the gravity center of the body only.

10

Fault-Mitigation by Adaptive Dynamic Reconfiguration for Survivable Signal-Processing Architectures

Naveed Imran, Jooheung Lee, Youngju Kim, Mingjie Lin, Ronald F. DeMara

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.111-120

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

We present an area-efficient dynamic fault-handling approach to achieve high survivability for DSP circuits. Fault detection, isolation, and recovery are performed using discrepancy information derived from the existing functional throughput by reconfiguring one of the N + 1 Reconfigurable Partitions (RPs) to replicate each of the N modules in succession. This differs significantly from the conventional approaches that heavily rely on static temporal/spatial redundancy and sophisticated error prediction/estimation techniques. The principal space complexity metric is the additional physical resources utilized to support the underlying fault-handling mechanism where a single RP can check the health of multiple distinct functional blocks, by leveraging the property of dynamic partial reconfiguration. We demonstrate this approach by implementing a video encoder’s DCT block with a Xilinx Virtex-4 device and also numerically simulating a Canny Edge Detector.

11

Performance Analysis of Cache-conscious Hashing Techniques for Multi-core CPUs

Euihyeok Kim, Min-Soo Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.121-134

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A hash table is a fundamental data structure implementing an associative memory that maps a key to its associative value. Due to its very fast mapping operation of O(1), it has been widely used in various areas such as databases, bioinformatics, and distributed computing. Besides, the paradigm of micro-architecture design of CPUs is shifting away from faster uniprocessors toward slower chip multiprocessors. In order to fully exploit the performance of such modern computer architectures, the data structures and algorithms considering parallelism become more important than ever. This paper implements three cache-conscious hashing methods, linear hashing and chained hashing, and also, a modern hashing method, hopscotch hashing, and analyzes their performance under Intel 32-core CPU of Nehalem microarchitecture. We implement each hashing method using state-of-the-art techniques such as lock-free data structures, especially based on compare-and-swap (CAS) operations, and refinable data structures. To the best of our knowledge, the work done by this paper is the first work analyzing the performance of three all hashing methods under the same implementation framework. Experimental results using data of 223 (i.e., about eight millions) key-value pairs shows that lock-free linear hashing is the best for insert operation among three hashing methods, and lock-free chained hashing is the best for lookup operation. Hopscotch hashing shows the second best performance of lookup operation. However, hopscotch hash table size is much bigger than other hash table size. Through experiments, we have found that the hopscotch hashing is relatively not efficient than other hash methods.

12

A Comparative Analysis of Consumers' Smart Phone Preferences by NLP Preference Sensation Types

Young Ju Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.135-142

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This research analyzes the correlation between user’s behavioral patterns based on preferred sensory organs and their preference for smartphones so that smartphone developers may have better idea of which user types to focus on in the future. The result of this research indicated that, in terms of NLP primary preferred sense types, those who prefer Galaxy phones and iPhones did not differ by much in their responses, however; in terms of individual types, 60% of type V preferred iPhone while 65% of type K preferred Galaxy phone. With 60 survey participants composed of Type V whose 60% preferred iPhone and Type K whose 65% preferred Galaxy Phone, this study carried out a factor analysis of the 4 sections, exterior appearance satisfaction, usability satisfaction, service satisfaction and value satisfaction. As a result, it was found that users preferring iPhone showed a higher degree of exterior appearance satisfaction, while user preferring Galaxy Phone showed high degrees above average in all the 4 items.

13

LED-ID Systems Applying the Modulation and Coding Selection Based on Received Angle

Kyujin Lee, Dongho Cha, Kyesan Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.143-152

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposed the Modulation and Coding Selection (MCS) scheme according to the received angle in LED-ID optical wireless system. If location of LED-ID receiver is different, the optical power of received signal is different due to the received angle in LED-ID system. Therefore, system performance varies as the receiving angle changes, affecting the stability of the whole system. In the implemented LED-ID transceiver with 400Mbps data rate, a combination of convolutional code and variety modulation order such as BPSK, QPSK, 16QAM, 64QAM is adaptively changed based on the received power according to received angle in the LED-ID channel. The proposed system can achieve improved throughput in comparison to those of conventional LED-ID systems, as well as a superior target bit error rate (BER).

14

For the multi-sensor multi-channel ARMA( the autoregressive and moving average model) signal with white measurement noise, unknown model parameters and noise variance, a multi-segment identification method is proposed. The simulation example shows the effectiveness of this method. These identification methods can be used to design self-turning information filters.

15

Design of a Low-cost Control System of Automatic Blood Component Fractionation Machine based-on MCU

He Hui, He Yan-Ping, Wang Bai-Ling, Yao Yu-Feng

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.165-174

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Since there are many flaws in traditional blood fractionation method, such as a complicated operation, the results are not accurate, and non-standard information recording, etc. The low-cost blood fractionation machine has good research significance. This paper proposes a low-cost control system of automatic blood fractionation machine to solve these problems. Up to more than one hundred of automatic blood fractionation machines can work together through CAN network connections, and all these machines can be centralized control by a PC. The control system of this machine is designed based on C8051F040 MCU, a kind of SOC with many AD interfaces, DA interfaces, digital IO interfaces, etc. For the scalability and flexibility of the system, each sub-process of blood fractionation is realized by a sub-program, and the whole fractionation process can be flexibly programmed by users for special demand. The software of the control system uses a modular design method, propoes four states to realize workflow control. In order to meet the requirements of blood bank blood fractionation requirements, the process of blood fractionation is accurate, precise, and standard, the records of every produced blood component bag is very detailed, and can be easily traceable.This system can produce the blood components meeting to the management standard of the Blood Bank, and has been shown adaptable in various blood bag systems.

16

A Recovery Algorithm based on Minimum Distance Redundant Nodes in Fault Management in WSNs

Song Jia, Wang Bailing, Peng Xiyuan, Li Jianfeng, Zhong Cheng

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.175-184

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Fault recovery is vital to WSNs since node death is a typical fault. Aiming to recover the “coverage hole”, a Recovery Algorithm based on Minimum Distance Redundant Nodes (MDRN) is proposed in this paper. By employing redundant nodes carefully, the recovery algorithm is deployed on the sink node with unconstrained energy consumption which knows the locations of all active nodes and redundant nodes in the WSNs. Simulation results demonstrate that, by choosing appropriate number of redundant nodes, this algorithm will have great recovery accuracy and coverage quality, also achieve the purpose of prolonging the lifecycle of WSNs.

17

Estimation of State of Charge of Batteries for Electric Vehicles

Haiying Wang, Yang Liu, Hang Fu, Gechen Li

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.185-194

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

State of charge (SOC) can be applied in various fields characterized as an important parameter for estimating residual capacity state of battery. It is obtained from current or collected data, such as voltage, current and temperature as well. The accuracy of estimation of SOC of power battery can be essential and premise in designing the battery management system. Researchers in the fields shall take it an important and challenging task, requiring lots of work and energy, in order to improve the accuracy in estimation of SOC for eletric vehicles (EV). The SOC estimation tasks have made it great headway from classical and typical methods. This paper has proposed the shortcomings over various existed estimation methods and discussed the definition of SOC in details in the application. Study on the principle and application of the SOC estimation algorithm against many existing technical difficulties of SOC estimation algorithm for power batteries is very necessary. This paper analyzes the influence of charge and discharge rate, temperature, self-discharge and aging on SOC. It has important meaning for the further development of power battery SOC estimation.

18

A DSP-based sequential estimation of electrical parameters of a PWM inverter-fed interior permanent magnet synchronous motor (IPMSM) drive for auto-tuning applications is presented. The flux linkage and stator resistance are considered as main parameters and sequentially estimated using the state observer and model reference adaptive control (MRAC) scheme. As compared with other adaptation schemes such as a recursive least square method (RLSM), the proposed MRAC-based sequential parameter estimation is not sensitive to noise. Also, it does not require a strict condition like the persistent excitation. Considering that the most servo system has a current reference in the step waveform, it can be a very effective way of estimating electrical parameters. The whole control system is implemented using the digital signal processor (DSP) TMS320F28335 based controller and the effectiveness is verified through the comparative simulations and experiments.

19

What is an Entrepreneur Missing? The Role of Innovation Confidence

Jin-Hyuk Hong, Dong-Hwan Cho

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.205-214

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Most of the previous studies on the innovation have focused on the supply-side of innovations, and the research topics have been about how to execute the change and innovation consistently, to create the innovation products and services, and to strengthen innovation competencies. This study focused on the demand-side of innovations which did not have had much spotlight relatively. Therefore, factors affecting the innovation confidence are investigated in this study. Independent variables which can affect the innovation confidence are identified through literature review, and research hypotheses are generated. In order to test the hypotheses, telephone survey was performed. This survey study results show that market or customer age, income, personal networks, opportunity recognition and capability competence can affect the innovation confidence. On the other hand, it is hardly to say that working status and regional homogeneity can affect the innovation confidence. The results of this study can be practically used how to operate the marketing activities through customer segmentation in order to perform the marketing activities of firms effectively.

20

Tectonic Motion Monitoring of Antarctica Using GPS Measurements

Joon-Kyu Park, Min-Gyu Kim, Jong-Sin Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.215-224

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With its low installation cost and high accuracy, GPS has become an essential method in the field for tectonic motion let alone location decision. In this study, data obtained from IGS stations between 2004 and 2012 analyzed using precise point positioning. Monitoring of tectonic motion demonstrates that the Antarctic continent behaves as a rigid plate. The speed vector for each station decided based on the GPS data processing result showed that Antarctica rotates around the Mawson and its rotation speed was calculated as about 0.001” per year on an X-Y plane. The processed GPS results were compared with other models for verification and suggested the Tectonic Motion of Antarctica precisely. It is expected that the tectonic motion of Antarctica can be used as the basic data on various scientific purposes.

21

Smooth Trajectory Planning Along Bezier Curve for Mobile Robots with Velocity Constraints

Gil Jin Yang, Byoung Wook Choi

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.225-234

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents a smooth path planning method considering physical limits for two-wheeled mobile robots (TMRs). A Bezier curve is utilized to make an S-curve path. A convolution operator is used to generate the center velocity trajectory to travel the distance of the planned path while considering the physical limits. The trajectory gained through convolution does not consider the direction angle of the TMR, so a transformational method for a center velocity trajectory following the planned path as a function of time of parameter for the Bezier curve is presented. Finally, the joint space velocity is computed to drive the TMR from the center velocity. The effectiveness of the proposed method was performed through numerical simulations. This algorithm can be used for path planning to optimize travel time and energy consumption.

22

Tourism and Leisure City refers to a comprehensive and self-sufficient city, which retains residential, medical and educational functions, and which creates a win-win relationship with final consumers such as enterprises, workers, and tourists. However, the creation of Tourism and Leisure City without considering existing local industry may cause conflict against community and impede successful urban development. Therefore, characteristics of present local industry should be thoroughly considered to devise measures to have a synergistic effect and win-win strategy for business and community. Understanding the necessity of this study, characteristics of the local business in the Southwest Coast Tourism and Leisure City(Haenam and Youngam) is elicited in this study in order to provide effective affiliation strategy. Also, extensive opinions from community and professionals are applied to the final affiliation strategy between local business and the Southwest Coast Tourism and Leisure City so as to retain both objectivity and practicality.

23

IOT Secure Transmission Based on Integration of IBE and PKI/CA

Liu Yang, Peng Yu, Wang Bailing, Bai Xuefeng, Yuan Xinling, Li Geng

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.245-254

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

With the rapid development in Internet of Thing technology, the security issues have become increasingly prominent. There are many problems and shortcomings in applying current security mechanisms to the Internet of Thing. In this article we build network security architecture by presenting combination of IBE and PKI/CA in the Internet acquisition and transport layer. With the KDC security certification, the node open parameters and the security of the private key of the node with the PKG distribution are implemented, and the nodes and node data transmission together are effectively protected. We also enable the secure authentication and encrypted transmission by PKI/CA in the middle of certification in aggregation nodes and network data processing. Moreover we propose the key management strategy of private key generator and realize the publication of PKG parameter and the fast distribution, update, and withdraw process of private key, which further ensure secure data network transmission.

24

Rapid Phase Selection Method based on Multi-resolution Morphological Gradient with Series Structure

Yuheng Yin, Lei Wang, Hang Liu, Qi Fan

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.255-262

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Protective measures can be rapidly and reliably taken by timely and correctly selecting the fault phase coping with the line protection, as well as the right operation of single-phase tripping and single phase re-closing. Traditional selection method is insensitive and insufficient in dealing with fault resistance, fault position, mutual inductance between closed lines, reactive effect and the in-sufficient for system parameters using power frequency component. This paper has proposed series multi-resolution morphological gradient (SMMG) filter, to extract the deviation of power frequency component of mode current, constructing a new phase selecting component of fault phase component, which provides a solution to fault phase selecting component of fault phase component.

25

Research in Equalizing Charging Control Strategy in Li-ion Power Battery

Bo Wu, Hang Liu, Haiying Wang, Zongru Zhou, Qi Fan

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.263-272

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Immanent problem existed in equalizing charging process may induce performance recession of power battery, and a new method raised in this paper, combining fuzzy strategy, is put forward in dealing with the problem. It is functioned with established mathematical model, closed-loop energy controlled digital pulse-width modulation power source on the foundation of element simulation in Simulink. The method can conduct simulation experiments on system response with and without static load-balance, as well as prompt load-balance respectively. It is shown in the results that, the sever coupling occurred between internal error voltage and external load current, can be escaped by applying the fuzzy controller based on closed- loop energy control model. The results also embrace real-time control output under any error voltage input signal and load current, which improves the adaptability and robustness of the system.

26

The Research and Application of College Student Attendance System based on RFID Technology

Zhang Yuru, Chen Delong, Tan Liping

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.273-282

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

College student attendance management of class plays an important position in the work of management of college student, this can help to urge student to class on time, improve learning efficiency, increase learning grade, and thus entirely improve the education level of the school. Therefore, colleges need an information system platform of check attendance management of class strongly to enhance check attendance management of class using the information technology which gathers the basic information of student automatically. According to current reality and specific needs of check attendance and management system of college students and the exist device of the system. Combined with the study of college attendance system, this paper gave the node design of check attendance system of class which based on RFID on the basic of characteristics of embedded ARM and RFID technology.

27

Study on Teamwork in Robot Football Game Based on Multi-Agent System (MAS)

Deyu Chen, Shicheng Dong

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.283-292

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The robot football game requires several robots to accomplish task in an real-time antagonism environment, which provides a good platform for studying multi-agent cooperation. This paper applied a real-time multi-agent cooperation model to achieve teamwork in robot football game, the concrete contents include: description of strategy, cooperation based on strategy, formation and termination of cooperation and execution of cooperation.

28

Quarter-Wavelength Stub Bandpass Filter with T-type Inverter for Harmonic Suppressed Application

Sun-Kuk Noh, Tae-Soon Yun

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.293-302

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, the design method of stub bandpass filter (BPF) is suggested by equations of the tapped-line geometry and the λg/4 stub BPF with T-type inverter is implemented for the harmonic suppressing for ISM band. Design parameters for the tapped-line geometry are obtained using the equivalent circuit of the J-inverter for the filter prototypes and the T-type inverter is realized by the equivalent circuit of the quarter wavelength transmission-line. The harmonic suppressed λg/4 stub BPF is fabricated on Teflon substrate and its harmonics of the λg/4 stub BPF are suppressed over 30 dB up to 10 GHz.

29

Transient Response Improvement for Uncertain Time-varying Nonlinear Systems via Switching Control

Young-Jun Cho

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.303-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Because nonlinear systems have more complex behaviors than linear systems, it is hard to apply classical linear system theories and techniques to analyze and control nonlinear systems. So, to apply these theories and techniques, the feedback linearization method is used when the nonlinear system satisfies certain conditions. In the linearizing procedure, there exist infinite pairs of coordinates transformations and feedback controllers. The freedom in the exact linearization technique is used to improve the feedback system in some sense. So, by the switching control with the proper switching rule, we can obtain the better transient behavior than that of using one diffeomorphism. For many real processes, nonlinear systems have uncertainties. Because the linearizing method requires the accurate mathematical models of the system for the exact linearization, the uncertainties have an effect on stability of the nonlinear system. But, if we know the bounds of uncertainties, we can compensate the uncertainties based on the Lyapunov redesign technique. In this paper, we propose a switching rule for taking the transient behavior improvements in the case of uncertain time-varying nonlinear system.

30

Burst-based Anomaly Detection on the DNP3 Protocol

Jeong-Han Yun, Sung-Ho Jeon, Kyoung-Ho Kim, Woo-Nyon Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.2 2013.04 pp.313-324

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The potential effectiveness of cyber-attacks against SCADA systems could be increased because they are connected to the Internet for several purposes. The Distributed Network Protocol Version 3 (DNP3) protocol is widely used in SCADA systems as a means of communicating observed sensor state information back to a control center. Previous DNP3 security researches are based on such specifications as attack signatures and protocol-based authorization. The provision of an exact and detailed specification is a good security criterion, but the drafting of proper specifications tends to be a time-consuming and error-prone process. In general, utilities that use the DNP3 protocol repeat their own limited operations, so a whitelist-based approach is clearly suitable for network intrusion detection. A burst is a group of consecutive packets with shorter inter-arriving time than packets arriving before or after the burst of packets. When utilities communicate on the DNP3 protocol, one transaction at the application-level is mapped to one burst. We collected and analyzed the DNP3 network traffic of a real-world SCADA system and, based on the results obtained from the analysis, produced a burst-based whitelist model for utilities using the DNP3 protocol. The proposed model can be used for intrusion detection and abnormal behaviors in the SCADA system.

 
1 2
페이지 저장