論文検索サイト

システム/制御/情報 Vol. 37 (2024), No. 4

ISIJ International
belloff
オンライン版ISSN: 2185-811X
冊子版ISSN: 1342-5668
発行機関: THE INSTITUTE OF SYSTEMS, CONTROL AND INFORMATION ENGINEERS (ISCIE)

Backnumber

  1. Vol. 37 (2024)

  2. Vol. 36 (2023)

  3. Vol. 35 (2022)

  4. Vol. 34 (2021)

  5. Vol. 33 (2020)

  6. Vol. 32 (2019)

  7. Vol. 31 (2018)

  8. Vol. 30 (2017)

  9. Vol. 29 (2016)

  10. Vol. 28 (2015)

  11. Vol. 27 (2014)

  12. Vol. 26 (2013)

  13. Vol. 25 (2012)

  14. Vol. 24 (2011)

  15. Vol. 23 (2010)

  16. Vol. 22 (2009)

  17. Vol. 21 (2008)

  18. Vol. 20 (2007)

  19. Vol. 19 (2006)

  20. Vol. 18 (2005)

  21. Vol. 17 (2004)

  22. Vol. 16 (2003)

  23. Vol. 15 (2002)

  24. Vol. 14 (2001)

  25. Vol. 13 (2000)

  26. Vol. 12 (1999)

  27. Vol. 11 (1998)

  28. Vol. 10 (1997)

  29. Vol. 9 (1996)

  30. Vol. 8 (1995)

  31. Vol. 7 (1994)

  32. Vol. 6 (1993)

  33. Vol. 5 (1992)

  34. Vol. 4 (1991)

  35. Vol. 3 (1990)

  36. Vol. 2 (1989)

  37. Vol. 1 (1988)

システム/制御/情報 Vol. 37 (2024), No. 4

ベイズ最適化を用いたホイールローダの掘削動作設計

村中 宏明, 小山 幹, 石川 将人

pp. 91-98

抄録

A wheel loader is a construction machine that consists of a four-wheel driving mechanism and a two-degree-of-freedom working mechanism of boom and bucket. This is mainly used to excavate sediment and crushed stones and load them into a dump truck. Currently, at civil engineering and quarry sites where construction machines are used, problems such as manpower shortages and worker hazards have made automation and remote operation of construction equipment desirable. Against this background, the objective of this study is to design an efficient excavation motion based on mathematical optimization, aiming at the automation of excavation by construction machinery. In particular, we used a Bayesian optimization approach that alternates modeling and optimization of experimental and input-output data. Based on the idea that it may be possible to tolerate deviation from the designed target trajectory and actively utilize “weak” tracking, we propose a flexible excavate operation strategy. Based on the above policy, the excavation motion design problem for a wheel loader is formulated as follows: the design variables are the parameters of the parametrized trajectory and the tracking accuracy of each drive element with respect to the reference trajectory, and the objective function is a linear combination of excavation volume and workload with a certain weight. Then, we investigated the effectiveness of this method by comparing it with track following control using an excavation simulation. As a result, we found that the proposed method can improve the excavation volume and workload depending on the conditions.

ブックマーク

SNSによる共有

論文タイトル

ベイズ最適化を用いたホイールローダの掘削動作設計

機械学習を用いた個別空調設備の自動制御システムの開発

山崎 高弘, 宮坂 房千加

pp. 99-105

抄録

In individual air conditioning environments, automatic control of air conditioning has not been implemented until now, and control has been manually conducted based on individual sensations like feeling hot or cold. This has become a problem in terms of both comfort for all occupants and energy consumption. In this research, we aim to create a comfortable thermal environment based on data obtained from a group of IoT devices, such as room temperature. By utilizing machine learning, we will develop a system that estimates the state in which occupants feel comfortable and automatically controls the air conditioning environment.

ブックマーク

SNSによる共有

論文タイトル

機械学習を用いた個別空調設備の自動制御システムの開発

半側空間無視評価のための没入型VRシステムを用いたマルチモーダルセンシング

関口 拓郎, 大保 武慶, 松田 雅弘, 久保田 直行

pp. 106-108

ブックマーク

SNSによる共有

論文タイトル

半側空間無視評価のための没入型VRシステムを用いたマルチモーダルセンシング

有限オートマトンと経路探索に基づくサイバー攻撃発生時の回復動作の導出

池田 佳輝, 澤田 賢治, 藤田 淳也, 小倉 貴志, 阪田 恒晟

pp. 109-118

抄録

As the frequency and types of cyber-attacks on control systems are increasing, it is important to recover from cyber-attacks in addition to detecting and preventing cyber-attacks. The objective of this paper is to design the sequence of operations to return the control system to a normal state as recovery control in the event of cyber-attacks. Representing control system behaviors in terms of finite automata, this paper recasts the design of recovery operations as a path finding problem. In this case, it is important to avoid secondary damages due to the obtained recovery operation, such as collisions between field devices. Then, this paper also considers the safety of the recovery operation. The basic idea of the safety is the specification of the normal control in which the collisions are avoid. The proposed method evaluates whether the recovery operation satisfies the specification of the normal control.

ブックマーク

SNSによる共有

論文タイトル

有限オートマトンと経路探索に基づくサイバー攻撃発生時の回復動作の導出

この機能はログイン後に利用できます。
下のボタンをクリックしてください。

詳細検索

論文タイトル

著者

抄録

ジャーナル名

出版日を西暦で入力してください(4桁の数字)。

検索したいキーワードを入力して下さい