[카테고리:] 미분류
-
The Elements of Presentation
The Elements of Presentation
-
2010 전자전기공학과 학위기 전달식
♦ 2010 전자전기공학과 학위기 전달식
– 일시 : 2011. 2. 11(금) 13:00~14:00
– 장소 : LG연구동 로비
♦학위수여자
•박사:38명
•석사:42명
•학부:59명 -
대학원 신입생 오리엔테이션
대학원 신입생 오리엔테이션
■ 일 시: 2011. 1. 6(목) 14:00 ~ 16:10
■ 장 소: LG동 101호 강당
■ 대 상 자: 68명 (2011 대학원 1~3차전형 합격자 및 2010.9월 조기입학자)
■ 세부 시간 계획시 간
내 용
비 고
14:00 ~ 14:05(5‘)
환영인사
주임교수
14:05 ~ 14:10(5‘)
학과 행정실 소개
학과 과장
14:10 ~ 14:30(20‘)
학사 행정 소개
학사 담당자
14:30 ~ 14:40(10‘)
연구(출장), 구매, BK
구매(자산) 담당자
14:40 ~ 15:00(20‘)
실험실 안전관리
기술/실험 담당자
15:00 ~ 15:10(10′)
Break Time
15:10 ~ 16:10(60′)
학술정보관 이용 소개
학술정보 담당
-
Energy-Bounding Approaches for Robustly Stable Haptic Interaction, Bilateral Teleoperation, & Robot Contact Control
▣ Title : Energy-Bounding Approaches for Robustly Stable Haptic Interaction,
Bilateral Teleoperation, & Robot Contact Control
▣ Speaker : Prof. Jeha Ryu (GIST)
▣ Date & Time : Friday, October 5 (14:00pm ~ 15:30pm)
▣ Place : LG Research Building, Room #101
▣ Host : Prof. Sangchul Won (Tel. 2221)
BK21 Educational Institute of Future Information Technology
▣ Abstract : Haptic or force feedback can provide useful information to the operator when interacting with virtual, augmented, and real environments through haptic sensations. In these systems, stability is a key issue in haptic interaction control since haptic interaction has a bidirectional energy flow, unlike visual or auditory displays. Instability in haptic systems can significantly deteriorate haptic sensations and may even harm human users or cause damage to the haptic interfaces. Besides stability, high quality force feedback must be provided while guaranteeing interaction stability in order to deliver a transparent haptic sensation to the user. This seminar presents the EBA (Energy Bounding Approaches) for the robustly stable and transparent haptic interaction, haptic teleoperation, and general robot contact controls. The proposed approaches are almost the same for the above three systems. Moreover, the controller is very simple and so robust against the time delays and uncertainties in the system. Real experimental results including intercontinental haptic teleoperation will be presented. Finally, real haptic teleoperation from POSTECH to GIST will be demonstrated at site. -
2010 대학원 체육대회
◇제10회 전자전기공학과 대학원 체육대회 종합 결과
ㅇ 일시 : 2010년 11월 05일 10:00~17:30
ㅇ 장소 : 축구장
ㅇ 날씨 : 맑음
ㅇ 체육대회 결과
우 승 : 제어 그룹 (상금 40만원, 우승기)
준우승 : 반도체그룹 (상금 20만원)
종목별 MVP응원상: 통신/컴퓨터, RF/신호처리
축구왕 슛돌이상: 이일민 (아날로그집적회로 연구실)
농구왕 강백호상: 최찬호 (통신연구실)
지붕뚫고 하이킥상: 백상훈 (지능제어 및 시스템 연구실)
피구왕 통키상: 김보미 (통신 및 정보시스템 연구실)
씨름왕 천하장사상: 서지혜 (신호처리 및 제어 연구실)
달려라 하니상: 김재환 (아날로그 집적회로 연구실)
맥주빨리마시기 대회 우승: 최두철 (지능제어 및 시스템 연구실),신재욱 (신호처리 및 제어 연구실)
참석해 주신 대학원생 여러분과 수고하신 임원단들과 조승재(사진촬영)님께 감사 드립니다.
모두 수고하셨습니다.
*사진이 필요하신 분은 전자과 자치위원장에게 문의 부탁드립니다. -
Coordination in Mobile-manipulators
▣ Title : Coordination in Mobile-manipulators
▣ Speaker : 이장명 교수 (부산대학교) / Prof. Jang Myung Lee (Pusan University)
▣ Time : 4. 20(금) 오후 2:00~3:30 / pm14:00~15:30, April 20 (Fri)
▣ Place : LG동 강당 (101호) / Room #101, LG Research Bldg.
▣ Hosted by : 원상철 교수 (T. 279-2221) / Prof. Sang Chul won (T. 279-2221)
BK21 미래정보기술사업단 / BK21 Educational Institute of Future Information Technology
▣ Abstract :
The coordination between the mobile robot and manipulators have been discussed in detail.
Through the visual feedback, the end-effector of the manipulator can be controlled to the desired position with a desired configuration.
While it is moving there are several factors to be considered: energy, torque, time, and efficiency. All those factors are combined to select an optimal posture for the manipulators for a given task.
The control of the mobile robot needs to be concerned with the configuration of the manipulators to keep the balance.
The coordination between the mobile robot and the manipulators is required to cope with these requirements.
Some preliminary experimental results will be demonstrated. -
Trends of Radar technologies and development process
▣ Title : Trends of Radar technologies and development process
▣ Speaker : Soo Hong Kim, Director (LIG Nex1 ISR Research Center)
▣ Time : Friday, May 25, 2012 (2:00pm-3:30pm)
▣ Place : Room #101, LG Research Bldg.
▣ Hosted by : Prof. Kyung-Tae Kim (Tel. 279-2381)
▣ Abstract : In this presentation, I will introduce two topics about radar system development. In the first topic, the basic concept of radar system and required technologies are presented. The radar transmits high power microwave signal to space, receives echo signal from target, and extract information of targets. The technology characteristics of radar system include big antenna, high power of amplifier, high dynamic range of a receiver, and high speed signal processing. He talks also new trends and technology about radar. The second is how we can develop radar systems. Radar is very complex system and radar development is not simple. Technologies are very important, but there are more things for radar development, such as time schedule, budget, performance, trade-off issue, and/or people management problem. I will introduce system engineering (SE) and the radar development process with some examples based on the experience of radar development program in LIG Nex1. -
On the Design of Secure Codes at Finite Lengths for Wiretap Channel
▣ Title : On the Design of Secure Codes at Finite Lengths for Wiretap Channel
▣ Speaker : Prof. Jeongseok Ha (KAIST)
▣ Time : Friday, September 14, 2012 (2:00pm-3:30pm)
▣ Place : Room #101, LG Research Bldg.
▣ Hosted by : Prof. Bumman Kim (Tel. 279-2231)
▣ Abstract : Ozarow and Wyner proposed a secrecy code design scheme using a linear code and its cosets. It was shown that when a wiretap channel has a noiseless main channel and an eavesdropper taps a subset of coded bits through a wiretapper’s channel, the eavesdropper’s equivocation is readily obtained by analyzing a parity-check matrix of the linear code. However, for wiretap codes at finite lengths, the complexity to find the equivocation grows rapidly and becomes prohibitive with the increasing length of codewords. In this talk, we introduce a tight lower bound on the equivocation that can be available by simple manipulations when a secrecy code is transmitted over a perfect-BEC wiretap channel of type-I. The lower bound provides a guaranteed secrecy performance for various linear codes at any lengths over perfect-BEC wiretap channels of type-I. It will be demonstrated that the lower bound can be applied to design of secrecy codes for wiretap channels of type-I with Gaussian main and wiretapper’s channels.
In this talk, we also discuss a binary erasure wiretap channel of type II in which the number of eavesdropped bits becomes available a posteriori. We aim at achieving perfect secrecy over such a channel model. The most appropriate application is a secret key agreement scheme. We present a secret key agreement scheme that adopts the formulation S = HX of Wyner-Ozarows’s linear coset coding. The scheme is based on the following simple observation: even if some information on a secret message S leaked out, it is still possible to have perfect secrecy for some subsequence of S. Our secret key agreement scheme achieves perfect secrecy by taking only those subsequences that are independent of the eavesdropped bits. Our secret key agreement scheme naturally leads to defining a security measure D for parity-check matrices such that the eavesdropper gets zero information on the subsequence as long as the length of the subsequence is less than the security measure D. Possible applications of the key agreement scheme will also be introduce. -
(한해욱 교수님)(Nano-THz Bio Photonics 연구실) 첨부자료 참조
자료 첨부하였습니다.