http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
이승범(Seungbeom Lee),백석흠(Seokheum Baek),권영석(Youngseok Kwon),노의동(Euidong Ro),이창훈(Changhoon Lee) 한국자동차공학회 2011 한국자동차공학회 학술대회 및 전시회 Vol.2011 No.11
This paper proposes a design optimization approach for core of solenoid actuators by combining optimization techniques with the finite element method (FEM). A solenoid is an important element part which hydraulically controls a transmission system, etc. The demanded feature of the solenoid is that it performs an electromagnetic force output being constant regardless of the stroke and being proportional to coil current. The plunger compresses a spring with a minimum force of 11 N over an 1.7 ㎜ travel. Compromise decision support problems (CDSP) are used to model engineering decisions involving multiple trade-offs. The approach utilizes a orthogonal polynomial model, the compromise decision support problem, which is a multi-objective formulation based on goal programming. The methodology is demonstrated as a CDSP tool for the design of a solenoid valve core.
이승범(Seungbeom Lee),이주원(Joowon Lee),심형보(Hyungbo Shim) 제어로봇시스템학회 2021 제어·로봇·시스템학회 논문지 Vol.27 No.3
As attack strategies towards networks and digital controllers of cyber-physical systems (CPSs) develop, it has become difficult to ensure the security of physical plants such as factory facilities and power plants. Accordingly, encryption schemes have been adopted to enhance the security of CPSs, and among them, HE (Homomorphic Encryption) enables homomorphic operations between messages in encrypted state. Due to this nature of HE, there have been several approaches to encrypting controllers of CPSs. An encrypted controller refers to a controller which operates on entirely encrypted data including its states, parameters, and plant output, returning an encrypted control input. In this paper, we survey the properties and classification of HE and presents the advantages of encrypting controllers through HE. Moreover, we introduce various HE schemes such as Paillier cryptosystem, LWE-based scheme, and the cutting-edge scheme called HEAAN. Then, few examples of applying these schemes to control systems are introduced.