Earticle

현재 위치 Home

International Journal of Control and Automation

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJCA) [Science & Engineering Research Support Center, Republic of Korea(IJCA)]
  • pISSN
    2005-4297
  • 간기
    월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.6 No.3 (39건)
No
1

Authoring and Sharing Annotation in Touch-based Mobile Devices

Jae-Kyung Kim, Won-Sung Sohn, Kyung Hur, YangSun Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.1-14

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Electronic textbooks are offering functional advantages over classic paper textbooks. They provide various features like bookmark, annotation, and interactive contents. However, the growth of electronic textbooks has been slow. One of the main reasons is that usability of digital textbooks was often not evaluated carefully. For example, most students frequently highlight text and insert notes in the digital textbooks. Thus, annotating usability should be examined and designed for the reading system in education. The proposing interface was designed to support the students’ annotating behavior and learner-centered education. The interface design was based on a requirement specification defined by expert consultation, data analysis and mental model. Therefore, we implement note-taking interface for digital textbooks according to the requirement. In this, paper, we present then the evaluation indicating that usability of our proposing interface in touch-based mobile devices satisfies users and reflect their needs.

2

Intelligent Robust Fuzzy-Parallel Optimization Control of a Continuum Robot Manipulator

Mohammad Mahdi Ebrahimi, Farzin Piltan, Mansour Bazregar, AliReza Nabaee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.15-34

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The focus of this research is on the development, modeling and high precision robust control of an electro-mechanical continuum robot manipulator that serves as a sensing and motion system for hybrid testing. In this research parallel fuzzy logic theory is used to compensate the system dynamic uncertainty controller based on sliding mode theory. This design resulted in strongly non-linear and coupled dynamics as well as an inertial moving platform that attracted model-based control strategies. A novel non-linear control technique based on sliding mode Lyapunov based was selected to meet the multiple simultaneous specification control of nonlinear, uncertain and asymptotic tracking. Sliding mode controller (SMC) is a significant nonlinear controller under condition of partly uncertain dynamic parameters of system. This controller is used to control of highly nonlinear systems especially for continuum robot manipulator, because this controller is robust and stable in presence of partly uncertainties. Sliding mode controller was used to achieve a stable tracking, while the parallel fuzzy-logic optimization added intelligence to the control system through an automatic tuning of the sliding mode methodology uncertainties. Simulation results demonstrated the validity of the Mamdani parallel fuzzy-optimization control with asymptotic and stable tracking at different position inputs. This compensation demonstrated a well synchronized control signal at different excitation conditions.

3

Torque Analysis and Motion Realization of Reconfigurable Modular Robot

Bo-Hee Lee, In-Hwan Yu, Jung-Shik Kong

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.35-48

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper deals with design of the intelligent mechanism and working algorithm for a cube-style modular robot. The modular robot changes own shape according to the working environment. Therefore it is suitable to work in the search and rescue area where requires the adaptation of situation with a shape of snake, legged robot or humanoid. Each of modular unit has to install own controller on the body and drive the body to give some mobility autonomously, also combine and separate their modules with docking and unlocking mechanism. In this paper we proposed design concept of our modular robot including the combination, control, and communication algorithm between modules, and also suggest some application movement with respect to various situations after torque consideration. Torque analysis according to the motion were accomplished by generation of trajectory and followed by simulation with respect to walking gait. The motions are verified with some simple action and shown their effectiveness through actual experiment for corporative motion of multiple modular robots such as inchworm, butterfly, crab, and bipedal motion.

4

An Efficient Area Maximizing Coverage Algorithm for Intelligent Robots with Deadline Situations

Heung Seok Jeon

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.49-56

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Coverage algorithm is one of the core technologies required for intelligent robots such as cleaning robots, harvesting robots, painting robots and lawn mowing robots. Although many smart coverage algorithms have been proposed, to the best of our knowledge, all of them make the same assumption that they have sufficient time to cover the entire target area. However, the time to completely cover the whole target area may not always be available. Therefore, in this paper, we propose another new coverage scheme, which we call the DmaxCoverage algorithm that decides the coverage path by considering the deadline for coverage. This approach can be beneficial when the time for the coverage is not sufficient to cover the entire target area. Experimental results show that the DmaxCoverage algorithm outperforms previous algorithms for these situations.

5

Development of an Elderly Telecare System

Jer-Vui Lee, Yea-Dat Chuah, Kenny T.H. Chieng

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.57-68

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this project, a smart elderly home monitoring system (SEHMS) has been designed and developed. The system consists of three modules which are the telecare system, telehealth system and monitoring system. This paper focuses on the discussion on the development of the telecare system and how it is integrated with the monitoring system to monitor elderly or chronically ill patients. The telecare system consists of two types of devices which are the panic buttons and the presence detectors. The panic buttons can be installed in the strategic area in the house which enables the elderly or individual with disability to call for help when communicating an emergency. Presence detectors are installed under or around the bed to detect the presence of the elderly. The monitoring system behaves as the heart of the overall system. When the telecare devices are triggered, it will send the alarm notification to care giver, social contact and/or emergency respond team via sms, emails or/and phone calls. With the developed system, elderly and chronically ill patients could stay independently in their own home with care facilities and secure in the knowledge that they are being monitored.

6

Micro Auto Blogging by Using Granular Tree Based Context Model and AHP

Il-Kyoung Kwon, Sang-Yong Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.69-82

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

It is necessary to have blogging technology which automatically figures out context information from the user in order to provide efficient micro blogging service for users in the social network service (SNS) environment. This paper proposes a context-based micro blogging service which considers the situations and emotions of users. To achieve this, a preprocessing method has been modeled based on users’ location and time context by using a granular tree, and Naive Bayes Classification has been adopted to assess a user’s behavior on the basis of a modeling context. In addition, a questionnaire has been administered to gain information about a user’s emotion in different situations and which considers location by using the Analytic Hierarchy Process (AHP). Based on this, a blog-able single sentence generation and auto blogging have been performed. The evaluation result of blogging a sentence and user’s emotional information shows 85.4% and 82.6% of accuracy, respectively; therefore, the proposed context modeling method for auto blogging is both efficient and effective.

7

A Study on Localization Algorithm using Hop Count and RSSI

Munsuck Jang, Inseong Song, Pyung Soo Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.83-94

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we propose a location estimating algorithm for a remotely controlled robot with a sensor node using a wireless sensor network, named RDV-HOP. The proposed algorithm is based on, and improves the DV-HOP algorithm, which estimates the location by counting the number of hops between the sensor nodes. The RDV-HOP separates the Estimative Distance (ED) from Non-Estimative Distance (NED) based on the Received Signal Strength Indication (RSSI) scheme, and locates the robot with the RSSI if the robot is in the ED, or locates the robot with the number of hops if the robot is in the NED. A simulation of the RDV-HOP algorithm is performed by applying various environments as its model. When the effective distance is in a range of 40~80%, it shows the largest performance improvement in location errors. The proposed RDV-HOP algorithm decreases the distance error of 121.89% maximum when compared to the DV-HOP.

8

Highly Effective Filtration and Prevention Framework for Secure Incoming VoIP Calls

Aws Naser Jaber, Supriyanto, Selvakumar Manickam, Sureswaran Ramadass

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.95-102

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the past 10 years, numerous users have applied Voice over Internet Protocol (VoIP) with the rise of VoIP-oriented businesses. The system filters incoming calls through an intrusion detection system engine. If a call is accepted, the middle box signature inspection initiates a Session Initiation Protocol (SIP) proxy for the incoming call. A bridge is then used to send the call to the SIP server through a double virtual private network. If the call is rejected by the anomaly detection box, however, the box sends a report to the network administration and efficiently audits rejected calls. This paper examines the use of SIP as an integrated protocol for managing a specific multimedia service, including several aspects of configuration, coordination, and adaptation logic, to enable response with a session negotiation control of user sessions. The proposed innovation is a combined filtration and prevention security method, whose significance lies in its ability to execute object intrusion and encryption, as well as in the correspondence between the two methods without losing efficiency. The proposed framework focuses on DoS attacks, spoofing detection, and filtration. A new security model layer for SIP is also developed to supplement entire session initiations.

9

A Channel Allocation Scheme Including Migration Concept in Cellular Mobile Environment

Byung-Tae Chun, Seong-Hoon Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.103-112

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

The efficient management and sharing of the radio spectrum among numerous users become an important issue. The frequency channels are a scarce resource in a cellular mobile system. Thus, many schemes have been proposed to assign frequencies to the cells such that the available spectrum is efficiently used. In this paper, we propose a channel allocation mechanism including migration concept using genetic algorithm in cellular mobile computing environments. Our simulation results indicate that the proposed algorithm could reduce a search time for an available channel.

10

Analysis and Design of Railway Communication Control System Based AADL

Yunxiao Li, Lichen Zhang, Minglv Chen

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.113-124

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Aiming at the hugeness and complexity of Communication Based Train Control system, analyzing the characteristics of the system’s functions, the system can be split into four subsystems. Using the Architecture Analysis and Design Language gives the design and modeling of each subsystem with OSATE tools, and defines the interfaces between the subsystems. According to the specific needs of the railroad system, the modeling of each subsystem uses the reasonable AADL components.

11

Development of DWCCS for Chemical Temperature Control of Semiconductor Manufacturing

Hyoung-Keun Park, Keun-Wang Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.125-132

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the semiconductor manufacturing process, many factors lead to lower transference numbers and DT. Especially, this occurs due to the temperature changes of essential chemicals such as acid and solvent and the rate is constantly increasing. Thus, it is required to develop equipment to improve transference numbers and DT properties and the work efficiency of process engineers by maintaining constant temperature of chemicals used in the manufacturing process and by controlling multiple circulators. This study developed DWCCS which engineers operate by remote control with multiple facilities and which maintains constant temperature of chemicals used in semiconductor device manufacturing facilities and processes.

12

The Adaptive Tracking Control of Nonlinear System based on RBFN

Hyun-Seob Cho

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.133-138

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Neural networks are known as kinds of intelligent strategies since they have learning capability. There are various their applications from intelligent control fields, however, their applications have limits from the point that the stability of the intelligent control systems is not usually guaranteed. In this paper we propose an Adaptive Tracking Control of Nonlinear System the radial basis function network (RBFN) that is a kind of neural networks. The learning method involves structural adaptation and parameter adaptation. No prior knowledge of the plant is assumed, and the controller has to begin with exploration of the state space. The exploration versus exploitation dilemma of reinforcement learning is solved through smooth transitions between the two modes. The controller is capable of asymptotically approaching the desired reference trajectory, which is showed in simulation result.

13

Mismatch Analysis between a Piezoelectric Actuator and Half-Length Sensor on a Beam

Young-Sup Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.139-148

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper investigates mismatch problem in the coupled response of the flexural and longitudinal motions between the piezoelectric actuator and half-length sensor on a beam. This problem is important to design a piezo sensor – actuator pair control system in terms of frequency response function. Piezoelectric transducers have been widely used in control of structures in both aspects: an actuator and a sensor. In this study a half-length piezosensor compared to the piezoactuator is considered and it is assumed bonded on the other side of the actuator. The frequency response functions (FRF) are investigated in theory and computer simulation when the mismatch ratios are 0 %, 15 %, 30 % and 50 % respectively between the sensor and the actuator. Ther simulation results show each FRF is quite similar except some frequency ranges. Also the flexural motion gives a big effect to the coupled motion of the sensor-actuator response. This paper could provide a better understanding on the interaction between piezosensor and piezoactuator which are bonded with some mismatch.

14

Stable Hybrid Visual Servo Control by a Weighted Combination of image-based and position-based Algorithms

A. H. Abdul Hafez, Enric Cervera, C.V. Jawahar

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.149-164

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we present a novel stable hybrid vision-based robot control algorithm. This method utilizes probabilistic integration of image-based and position-based visual servo con- trollers to produce an improved vision-based robot control. A probabilistic framework is employed to derive the integration scheme. Appropriate probabilistic importance functions are dened for the basic two algorithms to characterize their suitability in the task. The integrated algorithm has superior performance both in image and Cartesian spaces. Exper- iments validate this claim.

15

A Study on Array Signal Estimation of Desired Target using New Method in Interference and Noise Spatial

Kwan Hyeong Lee

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.165-172

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, DOA estimation is an important research area in array signal processing. The performance of adaptive beamforming methods are known to degrade severly in the presence of uncertainty in the signal sight direction. We propose a novel adaptive beamforming with a Bayesian method. Bayesian method a posterior probability density DOA estimator has been shown to perform excellently. The proposed method is based on clear modeling of unknown in the desired signal array response, which provides sufficiently robustness to unknown in desired DOA, enhances the adaptive array system performance. Simulation results showed that the proposed method appear significantly better than performance as compared with general adaptive beamforming method.

16

Design of Neuro-Fuzzy Networks by Means of Fuzzy Relation Space-Based Rules

Keon-Jun Park, Yong-Kab Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.173-182

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper introduce neuro-fuzzy networks by means of fuzzy relation space-based Rules for pattern recognizer. The proposed neuro-fuzzy networks are realized with the aid of the grid partition of the fuzzy relation input space. The partitioned spaces express the fuzzy rules of the networks. The consequence part of the rules is represented by polynomial functions whose coefficients are learned by the back-propagation algorithm. To optimize the parameters of the proposed networks, we consider real-coded genetic algorithms. The proposed networks are evaluated with the use of numerical experimentation for pattern recognizer. Finally, this paper shows that the proposed networks have the good result.

17

In this paper, a new approach to the super-twisting sliding mode control of uncertain systems is proposed. The idea behind this control scheme is to utilize an adaptive sliding surface function, in which the slope of the surface is updated on-line using a simple single input-single output fuzzy logic inference system so that the sliding surface is rotated in such a direction that the tracking performance of the system under control is improved. Computer simulations are performed on a system with parameter uncertainties and external disturbances. The results are compared with a conventional super twisting sliding mode controller with a fixed sliding surface. The results have shown the improved performance of the proposed control approach in terms of a decrease in the reaching and settling times and robustness to parameter uncertainties and disturbances as compared to the conventional super-twisting sliding mode controller with a fixed sliding surface. Moreover, the proposed control scheme is very simple and easy to implement.

18

A Study on Determinants of Green Supply Chain Management Practice

Byeong-Yun Chang, Yermek Kenzhekhanuly, Byungjoo Park

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.199-208

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Increasing environmental issues all over the world have forced governments and other regulators to produce stricter regulations and pressure companies to implement environmental practices. Furthermore, increased public awareness about the current environmental issues is driving companies to produce more environmentally friendly products. Given this situation, this paper studies the determinants of green supply chain management practice (GSCMP) of companies in Republic of Korea (Korea). We try to find why the companies in Korea implement GSCMP. Toward this goal, extensive literature review has been conducted and the model is developed. To evaluate the model, data are collected from companies in Korea and analyzed.

19

A New Word-Parallel Bit-Serial Normal Basis Multiplier over GF(2m)

Yong Suk Cho, Jae Yeon Choi

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.209-216

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Hardware implementations of finite field arithmetic using normal basis are advantageous due to the fact that the squaring operation can be done at almost no cost. In this paper, a new word-parallel bit-serial finite field multiplier using normal basis is presented. The proposed architecture takes w clock cycles to compute the product bits, where the value for w, 1≤w≤m, can be arbitrarily selected by the designer to set the trade-off between area and speed. It has been shown that the proposed architecture has significantly lower complexity and critical path delay in comparison to the previously proposed architectures.

20

Finite-Time Stabilization of Polynomial Systems

Walid Ben Mabrouk, Chakib Ben Njima, Hassani Messaoud, Germain Garcia

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.217-228

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper finite-time stabilization of nonlinear polynomial systems, is considered. First we provide a formula for a finite time stabilizing state feedback control law, for a second order polynomial system. Then we extend the result to the case of polynomial systems with multiple inputs. Some extensions concerning asymptotic stabilization are also given.

21

Design and Implementation of an Android Based Contact Control Service

Yong Min Ko, Dong Kyun Lim, Byong Seok Min

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.229-238

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In the recent years, as smart phones popularized, the number of people who use IMS (instant messaging service) and SNS (social network service) rapidly has increased as the usage of SMS (short message service) relatively decreased. That is why this thesis suggests a contact control service based on Android. The specifics of this service are as followed; 1) it contains an inducing function that calls acquaintances who were given a score based on the level of familiarity from saved contacts and call logs. 2) it provides an overall ranking of call log in order to grasp frequently-called-people. 3) it syncs with Facebook in order to understand who were interested in what the users have talked about. Lastly, 4) the users do not feel a repulsion since the program fully utilized the Android UI Framework and it was designed with a concern of User Experience and used an approaching method that is easy to use and eidetic. This developed system was tested on Samsung Galaxy S2 and LG Optimus LTE / Android 2.2 which were the main smart phone models.

22

Effects of Surge Protection Devices on Performances of PLC Systems

Sungeon Kim, Taehyun Jeon

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.239-248

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper discusses the application and the effect of the electric surge protection device (SPD) in the power line communication channel. The comparative analysis of the effect is carried out based on the performance of the power line communication (PLC) system. The SPDs used for the laboratory experiment are categorized into different types of classes depending on the surge protection level. Various combinations of the SPD with different classes are tested to accommodate the real field environment. The transmission line length is also considered as a test parameter. The OFDM based data transmission system is assumed for the data throughput performance test for given channel conditions. Experiment results show that the effects on the PLC network vary depending on classes and locations of the installed SPDs as well as the channel length between the transmitter and the receiver end. The result confirms that systematic SPD installation requirements should be set up to maintain the stable performance of the data transmission system and the SPDs which coexist in the same power transmission lines

23

Upper Limb Motion Recognition Based on Two-Step SVM Classification Method of Surface EMG

Yanzhao Chen, Yiqi Zhou, Xiangli Cheng, Yongzhen Mi

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.249-266

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Robot-assisted self-rehabilitation for patients with stroke is significant for their motor recovery. Meanwhile, the surface EMG can reflect human neuromuscular activity and can be used for rehabilitation robot control. In this paper, we propose a Two-Step SVM classification method based on One-versus-One SVM muti-class classification method in order to improve the time efficiency of upper limb motion classification by sEMG, and then promote the real- time control of upper limb rehabilitation robot. A control experiment is done between the Two-Step SVM classification method and the One-versus-One SVM method. Four muscles in human upper limb are chosen to train and six motions are to recognize according to the aim of rehabilitation and the characteristic of people’s daily life. The classifier training and motion recognize times between these two methods are compared. The result shows, the Two-Step SVM classification method proposed is improved in time efficiency, which is meaningful to improve the real time control of the robot during the process of rehabilitation.

24

Study of Engine Oil Replacement Time Estimate Method using Fuzzy and Neural Network Algorithm in Ubiquitous Environment

Chang Duk Jung, Jang Mook Kang, Chan Hyuk Park

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.267-280

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

To improve these unscientific methods, I would like to design a system that automatically tells replacement time of engine oil by fuzzy algorithm. There are ‘time series analysis’ and ‘cause and effect’ analysis in quantitative method. Time series analysis is to forecast the value by choosing one variable with the basis of historical data. All methods of demanding forecasting belong to time series analysis. Cause and effect analysis is the method, which makes a model by the relation between past values of other variables and the particular variable when the variable is influenced by other variables. In the thesis to replace engine oil in optimum time and to be aware of right replacement time of engine oil automatically.

25

LQ-Servo Congestion Control for TCP/AQM System in Wireless Network Environment

Jihoon Yang, Dongkyun Lim, Wongeun Oh

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.281-290

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper presents LQ-Servo controller for congestion control in TCP/AQM wireless networks environment using previously developed controller. A wireless networks link has a capacity which is time-varying. For this, it is modeled by three-state mode for considering the dynamics of wireless links in this paper. And the proposed controller structure is made by augmenting a new state variable to the feed-forward loop.

26

The Path Search Algorithm Utilizing Radio Propagation Characteristics of Ka-band GEO Satellite

No-Uk Park, Jooseok Kim, Ju-Young Lim, Tae-Hyuk Lim, Chang-Hyun Yoo, Kun-Sup Kwon, Kyungseok Kim

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.291-300

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Generally, the path search algorithm based on the shortest distance does not guarantee the provision of stable satellite services. The path search algorithm based on the received radio sensitivity has disadvantage such as the increase of its distance. This paper proposes a compound weight path search algorithm for satisfies the received radio sensitivity. It also prevents the increase of the distance and time. It searches the path according to the change of weight according to the distance and the received radio sensitivity-centered. The algorithm compares the time it takes to move the searched path. The proposed algorithm provides an effective and reliable satellite services.

27

Performance Analysis of Complex Manufacturing Process with Sequence Data Mining Technique

Kittisak Kerdprasop, Nittaya Kerdprasop

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.301-312

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we present a sequence analysis method, which is one of the advanced data mining techniques, to identify and extract unique patterns from wafer manufacturing data. Wafer fabrication in the semiconductor industry is one of the most complex manufacturing processes. For such highly complicated operations, maintaining high yields through the statistical process control as a sole monitoring method for quality control is obviously inefficient. We thus investigate the intelligent and semi-automatic technique to help industrial engineers analyzing their production data. Our proposed method has the ability to induce patterns that can reveal and differentiate low performance processes from the normal ones. We also provide program coding of the proposed sequence analysis method, implemented with the R language, for easy experimental repetition.

28

Efficient Resource Management Method for IMS Services in Hybrid Wireless Networks

Jong-deug Kim, Taehyun Jeon

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.313-320

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This paper proposes an efficient resource management method for the IMS (IP Multimedia Subsystem) related mobile network services. Mobile wireless services associated with the IMS include multimedia telephony (MT), instant messaging (IM) and full browsing. To access those services the subscriber should register on the related system of the mobile wireless network. Even when the usage frequency is low for many cases, resources such as the session and the database are occupied by them. Those usage patterns could incur the overinvestment in the system build-up. Also it gets more important to manage the IMS related resource management especially in the next generation mobile network services. In this paper a cost effective IMS management method is proposed which is necessary for planning the network evolution. To reach an ultimate goal of the All-IP network, it is inevitable to have a transient period including both the circuit and the packet based data network. At the stage of those hybrid networks, it is required to establish them in an efficient manner in terms of resource usage which is deeply related with the TCO (Total Cost Ownership). The multimedia telephony is one of the essential services in the advanced packet based mobile networks. In this paper a cost effective resource management method is proposed for deploying the multimedia telephony service while the legacy network co-exists. Simulation results show that main system elements required for the multimedia telephony and the instant messaging services can be scaled down while maintaining compatible quality of service level.

29

Integration of a Cohesive Multimedia Transmission Scheme for Hierarchical Wireless/Mobile Networks

Ronnie D. Caytiles, Byungjoo Park

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.321-328

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

A number of security issues have been brought by the emergence of mobility that allows devices to move to other networks without losing its connectivity. These security issues have been addressed by deploying different schemes that ensures the network’s confidentiality, authenticity, and integrity. This paper deals with securing the hierarchical mobile Internet Protocol version 6 (HMIPv6) handover by the integration of a cohesive security transmission scheme that includes the implementation of digital signature and key agreement algorithms. The digital signature algorithm is used to authenticate mobile nodes or the messages sent by these mobile nodes. The session key agreement algorithm on the other hand is used to provide a shared secret session key for the two communicating parties that can be used for private key algorithms.

30

Runge-Kutta(5,5) Methods for Robot Arm & Initial Value Problem

Sukumar Senthilkumar, Malrey Lee, Tae-Kyu Kwon

보안공학연구지원센터(IJCA) International Journal of Control and Automation Vol.6 No.3 2013.06 pp.329-336

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

An ultimate aim of this present paper is to solve application problem such as robot arm and initial value problems by applying Runge-Kutta fifth order five stage numerical techniques. The calculated output for robot arm coincides with exact solution which is found to be better, suitable and feasible for solving real time problems.

 
1 2
페이지 저장