Finite-Horizon Tracking Control for Repetitive Systems with Uncertain Initial Conditions
Repetitive systems stand for a kind of systems that
perform a simple task on a fixed pattern repetitively, which are
widely spread in industrial fields. Hence, many researchers have been
interested in those systems, especially in the field of iterative learning
control (ILC). In this paper, we propose a finite-horizon tracking
control scheme for linear time-varying repetitive systems with uncertain
initial conditions. The scheme is derived both analytically
and numerically for state-feedback systems and only numerically for
output-feedback systems. Then, it is extended to stable systems with
input constraints. All numerical schemes are developed in the forms
of linear matrix inequalities (LMIs). A distinguished feature of the
proposed scheme from the existing iterative learning control is that
the scheme guarantees the tracking performance exactly even under
uncertain initial conditions. The simulation results demonstrate the
good performance of the proposed scheme.
Finite time horizon, linear matrix inequality (LMI), repetitive system, uncertain initial condition.
Wafer Fab Operational Cost Monitoring and Controlling with Cost per Equivalent Wafer Out
This paper presents Cost per Equivalent Wafer Out, which we find useful in wafer fab operational cost monitoring and controlling. It removes the loading and product mix effect in the cost variance analysis. The operation heads, therefore, could immediately focus on identifying areas for cost improvement. Without this, they would have to measure the impact of the loading variance and product mix variance between actual and budgeted prior to make any decision on cost improvement. Cost per Equivalent Wafer Out, thereby, increases efficiency in wafer fab operational cost monitoring and controlling.
Cost Control, Cost Variance, Operational Expenditure,Semiconductor.
Estimation of the Spent Fuel Pool Water Temperature at a Loss-of-Pool-Cooling Accident
Accident in spent fuel pool (SFP) of Fukushima
Daiichi Unit 4 showed the importance of continuous monitoring of the
key environmental parameters such as water temperature, water level,
and radiation level in the SFP at accident conditions. Because the SFP
water temperature is one of the key parameters indicating SFP
conditions, its behavior at accident conditions shall be understood to
prepare appropriate measures. This study estimated temporal change
in the SFP water temperature at Kori Unit 1 with 587 MWe for 1 hour
after initiation of a loss-of-pool-cooling accident. For the estimation,
ANSYS CFX 13.0 code was used. The estimation showed that the
increasing rate of the water temperature was 3.90C per hour and the
SFP water temperature could reach 1000C in 25.6 hours after the
initiation of loss-of-pool-cooling accident.
Spent fuel pool, water temperature, Kori Unit 1, a
Geometric Modeling of Illumination on the TFT-LCD Panel using Bezier Surface
In this paper, we propose a geometric modeling of
illumination on the patterned image containing etching transistor. This
image is captured by a commercial camera during the inspection of
a TFT-LCD panel. Inspection of defect is an important process in the
production of LCD panel, but the regional difference in brightness,
which has a negative effect on the inspection, is due to the uneven
illumination environment. In order to solve this problem, we present
a geometric modeling of illumination consisting of an interpolation
using the least squares method and 3D modeling using bezier surface.
Our computational time, by using the sampling method, is shorter
than the previous methods. Moreover, it can be further used to correct
brightness in every patterned image.
Bezier, defect, geometric modeling, illumination, inspection, LCD, panel.
An Experimental Consideration of the Hybrid Architecture Based on the Situated Action Generator
The approaches to make an agent generate intelligent actions in the AI field might be roughly categorized into two ways–the classical planning and situated action system. It is well known that each system have its own strength and weakness. However, each system also has its own application field. In particular, most of situated action systems do not directly deal with the logical problem. This paper first briefly mentions the novel action generator to situatedly extract a set of actions, which is likely to help to achieve the goal at the current situation in the relaxed logical space. After performing the action set, the agent should recognize the situation for deciding the next likely action set. However, since the extracted action is an approximation of the action which helps to achieve the goal, the agent could be caught into the deadlock of the problem. This paper proposes the newly developed hybrid architecture to solve the problem, which combines the novel situated action generator with the conventional planner. The empirical result in some planning domains shows that the quality of the resultant path to the goal is mostly acceptable as well as deriving the fast response time, and suggests the correlation between the structure of problems and the organization of each system which generates the action.
Situated reasoning, situated action, planning, hybrid architecture
Research on the Micro Pattern forming of Spiral Grooves in a Dynamic Thrust Bearing
This paper deals with a novel technique for the
fabrication of Spiral grooves in a dynamic thrust bearing. The main
scheme proposed in this paper is to fabricate the microgrooves using
desktop forming system. This process has advantages compared to the
conventional electro-chemical machining in the viewpoint of a higher
productivity. For this reason, a new testing apparatus is designed and
built for press forming microgrooves on a surface of the thrust bearing.
The material used in this study is sintered Cu-Fe alloy. The effects of
the forming load on the performance of micro press forming are
experimentally investigated. From the experimental results, formed
depths are closed to the target ones with increasing the forming load.
Desktop forming system, Fluid dynamic bearing,
Thrust bearing, Microgroove.
Improve of Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
As the disfunctions of the information society and
social development progress, intrusion problems such as malicious
replies, spam mail, private information leakage, phishing, and
pharming, and side effects such as the spread of unwholesome
information and privacy invasion are becoming serious social
problems. Illegal access to information is also becoming a problem as
the exchange and sharing of information increases on the basis of the
extension of the communication network. On the other hand, as the
communication network has been constructed as an international,
global system, the legal response against invasion and cyber-attack
from abroad is facing its limit. In addition, in an environment where
the important infrastructures are managed and controlled on the basis
of the information communication network, such problems pose a
threat to national security. Countermeasures to such threats are
developed and implemented on a yearly basis to protect the major
infrastructures of information communication. As a part of such
measures, we have developed a methodology for assessing the
information protection level which can be used to establish the
quantitative object setting method required for the improvement of the
information protection level.
Information Security Evaluation Methodology,Critical Information Infrastructure Protection.
Optical Wireless Sensor Networks Based on VLC with PLC-Ethernet Interface
We present a white LED-based optical wireless
communication systems for indoor ubiquitous sensor networks. Each
sensor node could access to the server through the PLC (Power Line
Communication)-Ethernet interface. The proposed system offers a
full-duplex wireless link by using different wavelengths to reduce the
inter-symbol interference between uplink and downlink. Through the
1-to-n optical wireless sensor network and PLC modem, the mobile
terminals send a temperature data to server. The data transmission
speed and distance are 115.2kbps and about 60cm, respectively.
Visible light communications, LED lighting, powerline communications, ubiquitous sensor networks, full-duplex links
Dataset Analysis Using Membership-Deviation Graph
Classification is one of the primary themes in
computational biology. The accuracy of classification strongly
depends on quality of a dataset, and we need some method to
evaluate this quality. In this paper, we propose a new graphical
analysis method using 'Membership-Deviation Graph (MDG)' for
analyzing quality of a dataset. MDG represents degree of
membership and deviations for instances of a class in the dataset. The
result of MDG analysis is used for understanding specific feature and
for selecting best feature for classification.
feature, classification, machine learning algorithm.
Study of Measures to Secure Video Phone Service Safety through a Preliminary Evaluationof the Information Security of the New IT Service
The rapid advance of communication technology is
evolving the network environment into the broadband convergence
network. Likewise, the IT services operated in the individual network
are also being quickly converged in the broadband convergence
network environment. VoIP and IPTV are two examples of such new
services. Efforts are being made to develop the video phone service,
which is an advanced form of the voice-oriented VoIP service.
However, the new IT services will be subject to stability and reliability
vulnerabilities if the relevant security issues are not answered during
the convergence of the existing IT services currently being operated in
individual networks within the wider broadband network
environment. To resolve such problems, this paper attempts to analyze
the possible threats and identify the necessary security measures
before the deployment of the new IT services. Furthermore, it
measures the quality of the encryption algorithm application example
to describe the appropriate algorithm in order to present security
technology that will have no negative impact on the quality of the
video phone service.
BcN, Security Measures, Video Phone.
Target Concept Selection by Property Overlap in Ontology Population
An ontology is widely used in many kinds of applications as a knowledge representation tool for domain knowledge. However, even though an ontology schema is well prepared by domain experts, it is tedious and cost-intensive to add instances into the ontology. The most confident and trust-worthy way to add instances into the ontology is to gather instances from tables in the related Web pages. In automatic populating of instances, the primary task is to find the most proper concept among all possible concepts within the ontology for a given table. This paper proposes a novel method for this problem by defining the similarity between the table and the concept using the overlap of their properties. According to a series of experiments, the proposed method achieves 76.98% of accuracy. This implies that the proposed method is a plausible way for automatic ontology population from Web tables.
Ontology population, domain knowledge consolidation, target concept selection, property overlap.
The Effects of Perceived Organizational Support, Abusive Supervision, and Exchange Ideology on Employees- Task Performance
Employee-s task performance has been recognized as a
core contributor to overall organizational effectiveness. Hence,
verifying the determinants of task performance is one of the most
important research issues. This study tests the influence of perceived
organizational support, abusive supervision, and exchange ideology
on employee-s task performance. We examined our hypotheses by
collecting self-reported data from 413 Korean employees in different
organizations. Our all hypotheses gained support from the results.
Implications for research and directions for future research are
Abusive supervision, exchange ideology, perceived organizational support, task performance.
A GPU Based Texture Mapping Technique for 3D Models Using Multi-View Images
Previous the 3D model texture generation from multi-view images and mapping algorithms has issues in the texture chart generation which are the self-intersection and the concentration of the texture in texture space. Also we may suffer from some problems due to the occluded areas, such as inside parts of thighs. In this paper we propose a texture mapping technique for 3D models using multi-view images on the GPU. We do texture mapping directly on the GPU fragment shader per pixel without generation of the texture map. And we solve for the occluded area using the 3D model depth information. Our method needs more calculation on the GPU than previous works, but it has shown real-time performance and previously mentioned problems do not occur.
Texture Mapping, Multi-view Images, Camera
Calibration, GPU Shader.
Fault Detection of Pipeline in Water Distribution Network System
Water pipe network is installed underground and once equipped, it is difficult to recognize the state of pipes when the leak or burst happens. Accordingly, post management is often delayed
after the fault occurs. Therefore, the systematic fault management system of water pipe network is required to prevent the accident and
minimize the loss. In this work, we develop online fault detection system of water pipe network using data of pipes such as flow rate
or pressure. The transient model describing water flow in pipelines
is presented and simulated using MATLAB. The fault situations such
as the leak or burst can be also simulated and flow rate or pressure data when the fault happens are collected. Faults are detected using
statistical methods of fast Fourier transform and discrete wavelet transform, and they are compared to find which method shows the
better fault detection performance.
fault detection, water pipeline model, fast Fourier transform, discrete wavelet transform.
Evaluation Method for Information Security Levels of CIIP (Critical Information Infrastructure Protection)
As the information age matures, major social
infrastructures such as communication, finance, military and energy,
have become ever more dependent on information communication
systems. And since these infrastructures are connected to the Internet,
electronic intrusions such as hacking and viruses have become a new
security threat. Especially, disturbance or neutralization of a major
social infrastructure can result in extensive material damage and social
disorder. To address this issue, many nations around the world are
researching and developing various techniques and information
security policies as a government-wide effort to protect their
infrastructures from newly emerging threats. This paper proposes an
evaluation method for information security levels of CIIP (Critical
Information Infrastructure Protection), which can enhance the security
level of critical information infrastructure by checking the current
security status and establish security measures accordingly to protect
Information Security Evaluation Methodology,Critical Information Infrastructure Protection.
An Overview of the Factors Affecting Microbial-Induced Calcite Precipitation and its Potential Application in Soil Improvement
Microbial-induced calcite precipitation (MICP) is a
relatively green and sustainable soil improvement technique. It
utilizes biochemical process that exists naturally in soil to improve
engineering properties of soils. The calcite precipitation process is
uplifted by the mean of injecting higher concentration of urease
positive bacteria and reagents into the soil. The main objective of this
paper is to provide an overview of the factors affecting the MICP in
soil. Several factors were identified including nutrients, bacteria type,
geometric compatibility of bacteria, bacteria cell concentration,
fixation and distribution of bacteria in soil, temperature, reagents
concentration, pH, and injection method. These factors were found to
be essential for promoting successful MICP soil treatment.
Furthermore, a preliminary laboratory test was carried out to
investigate the potential application of the technique in improving the
shear strength and impermeability of a residual soil specimen. The
results showed that both shear strength and impermeability of
residual soil improved significantly upon MICP treatment. The
improvement increased with increasing soil density.
Bacteria, biocementation, bioclogging, calcite
precipitation, soil improvement.
An Efficient Key Management Scheme for Secure SCADA Communication
A SCADA (Supervisory Control And Data
Acquisition) system is an industrial control and monitoring system for
national infrastructures. The SCADA systems were used in a closed
environment without considering about security functionality in the
past. As communication technology develops, they try to connect the
SCADA systems to an open network. Therefore, the security of the
SCADA systems has been an issue. The study of key management for
SCADA system also has been performed. However, existing key
management schemes for SCADA system such as SKE(Key
establishment for SCADA systems) and SKMA(Key management
scheme for SCADA systems) cannot support broadcasting
communication. To solve this problem, an Advanced Key
Management Architecture for Secure SCADA Communication has
been proposed by Choi et al.. Choi et al.-s scheme also has a problem
that it requires lots of computational cost for multicasting
communication. In this paper, we propose an enhanced scheme which
improving computational cost for multicasting communication with
considering the number of keys to be stored in a low power
communication device (RTU).
SCADA system, SCADA communication, Key
management, Distributed networks.
Integrated Simulation and Optimization for Carbon Capture and Storage System
CO2 capture and storage/sequestration (CCS) is a key technology for addressing the global warming issue. This paper proposes an integrated model for the whole chain of CCS, from a power plant to a reservoir. The integrated model is further utilized to determine optimal operating conditions and study responses to various changes in input variables.
CCS, Caron Dioxide, Carbon Capture and Storage, Simulation, Optimization.
Study on Network-Based Technology for Detecting Potentially Malicious Websites
Cyber terrors against specific enterprises or countries have been increasing recently. Such attacks against specific targets are called advanced persistent threat (APT), and they are giving rise to serious social problems. The malicious behaviors of APT attacks mostly affect websites and penetrate enterprise networks to perform malevolent acts. Although many enterprises invest heavily in security to defend against such APT threats, they recognize the APT attacks only after the latter are already in action. This paper discusses the characteristics of APT attacks at each step as well as the strengths and weaknesses of existing malicious code detection technologies to check their suitability for detecting APT attacks. It then proposes a network-based malicious behavior detection algorithm to protect the enterprise or national networks.
Advanced Persistent Threat, Malware, Network Security, Network Packet, Exploit Kits.
Sliding Mode Position Control for Permanent Magnet Synchronous Motors Based On Passivity Approach
In this paper, a sliding mode control method based on the passivity approach is proposed to control the position of surface-mounted permanent magnet synchronous motors (PMSMs). Firstly, the dynamics of a PMSM was proved to be strictly passive. The position controller with an adaptive law was used to estimate the load torque to eliminate the chattering effects associated with the conventional sliding mode controller. The stability analysis of the overall position control system was carried out by adopting the passivity theorem instead of Lyapunov-type arguments. Finally, experimental results were provided to show that the good position tracking can be obtained, and exhibit robustness in the variations of the motor parameters and load torque disturbances.
Adaptive law, passivity theorem, permanent magnet synchronous motor, sliding mode control.
Effects of Dietary Protein and Lipid Levels on Growth and Body Composition of Juvenile Fancy Carp, Cyprinus carpio var. Koi
A feeding experiment was conducted to determine the
optimum dietary protein and lipid levels for juvenile fancy carp. Eight
experimental diets were formulated to contain four protein levels (200,
300, 400 and 500 g kg-1) with two lipid levels (70 and 140 g kg-1).
Triplicate groups of fish (initial weight, 12.1±0.2 g fish-1) were
hand-fed the diets to apparent satiation for 8 weeks. Fish growth
performance, feed utilization and feed intake were significantly
(P<0.0001) affected by dietary protein level, but not by dietary lipid
level (P>0.05). Weight gain and feed efficiency ratio tended to
increase as dietary protein level increased up to 400 and 500 g kg-1,
respectively. Daily feed intake of fish decreased with increasing
dietary protein level and that of fish fed diet contained 500 g kg-1
protein was significantly lower than other fish groups. The protein
efficiency ratio of fish fed 400 and 500 g kg-1 protein was lower than
that of fish fed 200 and 300 g kg-1 protein. Moisture, crude protein and
crude lipid contents of muscle and liver were significantly affected by
dietary protein, but not by dietary lipid level (P>0.05). The increase in
dietary lipid level resulted in an increase in linoleic acid in liver and
muscle paralleled with a decrease in n-3 highly unsaturated fatty acids
content in muscle of fish. In considering these results, it was concluded
that the diet containing 400 g kg-1 protein with 70 g kg-1 lipid level is
optimal for growth and efficient feed utilization of juvenile fancy carp.
Fancy carp, Dietary protein, Dietary lipid, Fatty acid.
Optimal Maintenance and Improvement Policies in Water Distribution System: Markov Decision Process Approach
The Markov decision process (MDP) based
methodology is implemented in order to establish the optimal
schedule which minimizes the cost. Formulation of MDP problem
is presented using the information about the current state of pipe,
improvement cost, failure cost and pipe deterioration model. The
objective function and detailed algorithm of dynamic programming
(DP) are modified due to the difficulty of implementing the
conventional DP approaches. The optimal schedule derived from
suggested model is compared to several policies via Monte
Carlo simulation. Validity of the solution and improvement in
computational time are proved.
Markov decision processes, Dynamic Programming, Monte Carlo simulation, Periodic replacement, Weibull distribution.
Finite Element Analysis of Ball-Joint Boots under Environmental and Endurance Tests
Ball joints support and guide certain automotive parts that move relative to the frame of the vehicle. Such ball joints are covered and protected from dust, mud, and other interfering materials by ball-joint boots made of rubber—a flexible and near-incompressible material. The boots may experience twisting and bending deformations because of the motion of the joint arm. Thus, environmental and endurance tests of ball-joint boots apply both bending and twisting deformations. In this study, environmental and endurance testing was simulated via the finite element method performed by using a commercial software package. The ranges of principal stress and principal strain values that are known to directly affect the fatigue lives of the parts were sought. By defining these ranges, the number of iterative tests and modifications of the materials and dimensions of the boot can be decreased. Therefore, instead of performing actual part tests, manufacturers can perform standard fatigue tests in trials of different materials by applying only the defined range of stress or strain values.
Boot, endurance tests, rubber, FEA.
Numerical Simulation of Effect of Various Rib Configurations on Enhancing Heat Transfer of Matrix Cooling Channel
The matrix cooling channel was used for gas turbine blade cooling passage. The matrix cooling structure is useful for the structure stability however the cooling performance of internal cooling channel was not enough for cooling. Therefore, we designed the rib configurations in the matrix cooling channel to enhance the cooling performance. The numerical simulation was conducted to analyze cooling performance of rib configured matrix cooling channel. Three different rib configurations were used which are vertical rib, angled rib and c-type rib. Three configurations were adopted in two positions of matrix cooling channel which is one fourth and three fourth of channel. The result shows that downstream rib has much higher cooling performance than upstream rib. Furthermore, the angled rib in the channel has much higher cooling performance than vertical rib. This is because; the angled rib improves the swirl effect of matrix cooling channel more effectively. The friction factor was increased with the installation of rib. However, the thermal performance was increased with the installation of rib in the matrix cooling channel.
Matrix cooling, rib, heat transfer, gas turbine.
Preliminary Evaluation of Decommissioning Wastes for the First Commercial Nuclear Power Reactor in South Korea
The commercial nuclear power reactor in South Korea, Kori Unit 1, which was a 587 MWe pressurized water reactor that started operation since 1978, was permanently shut down in June 2017 without an additional operating license extension. The Kori 1 Unit is scheduled to become the nuclear power unit to enter the decommissioning phase. In this study, the preliminary evaluation of the decommissioning wastes for the Kori Unit 1 was performed based on the following series of process: firstly, the plant inventory is investigated based on various documents (i.e., equipment/ component list, construction records, general arrangement drawings). Secondly, the radiological conditions of systems, structures and components (SSCs) are established to estimate the amount of radioactive waste by waste classification. Third, the waste management strategies for Kori Unit 1 including waste packaging are established. Forth, selection of the proper decontamination and dismantling (D&D) technologies is made considering the various factors. Finally, the amount of decommissioning waste by classification for Kori 1 is estimated using the DeCAT program, which was developed by KEPCO-E&C for a decommissioning cost estimation. The preliminary evaluation results have shown that the expected amounts of decommissioning wastes were less than about 2% and 8% of the total wastes generated (i.e., sum of clean wastes and radwastes) before/after waste processing, respectively, and it was found that the majority of contaminated material was carbon or alloy steel and stainless steel. In addition, within the range of availability of information, the results of the evaluation were compared with the results from the various decommissioning experiences data or international/national decommissioning study. The comparison results have shown that the radioactive waste amount from Kori Unit 1 decommissioning were much less than those from the plants decommissioned in U.S. and were comparable to those from the plants in Europe. This result comes from the difference of disposal cost and clearance criteria (i.e., free release level) between U.S. and non-U.S. The preliminary evaluation performed using the methodology established in this study will be useful as a important information in establishing the decommissioning planning for the decommissioning schedule and waste management strategy establishment including the transportation, packaging, handling, and disposal of radioactive wastes.
Characterization, classification, decommissioning, decontamination and dismantling, Kori 1, radioactive waste.
Design of Membership Ranges for Fuzzy Logic Control of Refrigeration Cycle Driven by a Variable Speed Compressor
Design of membership function ranges in fuzzy logic control (FLC) is presented for robust control of a variable speed refrigeration system (VSRS). The criterion values of the membership function ranges can be carried out from the static experimental data, and two different values are offered to compare control performance. Some simulations and real experiments for the VSRS were conducted to verify the validity of the designed membership functions. The experimental results showed good agreement with the simulation results, and the error change rate and its sampling time strongly affected the control performance at transient state of the VSRS.
Variable speed refrigeration system, Fuzzy logic control, membership function range, control performance.