• Title/Summary/Keyword: 경로 탐색 알고리즘

Search Result 516, Processing Time 0.022 seconds

Programming Model for SODA-II: a Baseband Processor for Software Defined Radio Systems (SDR용 기저대역 프로세서를 위한 프로그래밍 모델)

  • Lee, Hyun-Seok;Yi, Joon-Hwan;Oh, Hyuk-Jun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.7
    • /
    • pp.78-86
    • /
    • 2010
  • This paper discusses the programming model of SODA-II that is a baseband processor for software defined radio (SDR) systems. Signal processing On-Demand Architecture Ⅱ (SODA-II) is an on-chip multiprocessor architecture consisting of four processor cores and each core has both an wide SIMD datapath and a scalar datapath. This architecture is appropriate for baseband processing that is a mixture of vector computations and scalar computations. The programming model of the SODA-II is based on C library routines. Because the library routines hide the details of complex SIMD datapath control procedures, end users can easily program the SODA-II without deep understanding on its architecture. In this paper, we discuss the details of library routines and how these routines are exploited in the implementation of baseband signal processing algorithms. As application examples, we show the implementation result of W-CDMA multipath searcher and OFDM demodulator on the SODA-II.

A Stochastic Transit Assignment Model for Intercity Rail Network (지역간 철도의 확률적 통행배정모형 구측 연구)

  • Kwon, Yong-Seok;Kim, Kyoung-Tae;Lim, Chong-Hoon
    • Journal of the Korean Society for Railway
    • /
    • v.12 no.4
    • /
    • pp.488-498
    • /
    • 2009
  • The characteristics of intercity rail network are different from those of public transit network in urban area. In this paper, we proposed a new transit assignment model which is generalized form of deterministic assignment model by introducing line selection probability on route section. This model consider various characteristics of intercity rail and simplify network expansion for appling search algorithms developed in road assignment model. We showed the model availability by comparing with existing models using virtual networks. The tests on a small scale network show that this model is superior to existing models for predicting intercity rail demand.

Intelligent evacuation systems for accidents aboard a ship (선박 재난 환경을 고려한 지능형 대피유도 시스템)

  • Kang, Moo-Bin;Joo, Yang-Ick
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.824-829
    • /
    • 2016
  • Passenger casualties in the case of ship accidents have increased because of the increase in size and complexity of current ships (such as cruise ships). Therefore, in recent years, emergency evacuation systems are receiving increased interest so as to ensure the safety of passengers. Currently, there are only basic instructions provided, such as announcements regarding the situation, alarms, and exit signs; however, no guidance toward a proper escape route has yet been provided. To solve this problem, several emergency guiding schemes have been proposed. However, these systems ignore some of the realities of ship accidents and are impractical because various risk factors are not considered. Therefore, this paper proposes an optimal route guiding system based on an $A^*$ algorithm for emergency escape during disaster situations. This system takes into account various possible risk factors. Performance evaluation using computer simulations showed that the proposed scheme is effective and leads to safe escape routes.

An Efficient Routing Algorithm for Balanced Energy Consumption in Wireless Ad-hoc Network Environments (무선 ad-hoc 네트워크 환경에서 균형화된 에너지 소비를 위한 효율적인 라우팅 알고리즘)

  • Kim, Hyun-Ho;Kim, Jung-Hee;Kang, Yong-Hyeog;Eom, Young-Ik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1120-1129
    • /
    • 2006
  • It is very important to maximize the battery durability of mobile host in wireless ad-hoc network environments, because it extends the durability and Performance of the system. Since mobile hosts play a routing role, the network structure and the location of mobile hosts create a difference of energy consumption of mobile hosts. In this paper, each mobile host maintains energy tree and evaluates the amount of the energy of the neighboring mobile hosts by using message tree packet by periods. When mobile host sets up a routing path to send a packet, it selects the most proper path in order to consume energy effectively by using energy tree and breadth first search. In this paper, we suggest that, in wireless ad-hoc network environments, if each mobile host consumes balanced energy, mobile hosts of which energy capacity is limited can work as long as it can. Therefore, the durability and performance of the system can be extended.

ZigBee Network Formation based on Trust Model and Trustworthiness Measurement (신뢰모델기반의 ZigBee 네트워크 구성 및 신뢰성 측정)

  • Hwang, Jae-Woo;Park, Ho-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1284-1294
    • /
    • 2010
  • The ZigBee is one of the most important technologies for composing USN. It is one of the IEEE 802.15.4 standards to support personal area networks. It uses a hierarchical routing or an on-demand route discovery strategy as an address allocation method. A hierarchical routing doesn't use a routing table but only uses a child node or a parent node as an intermediate node for data delivery. Therefore, the ZigBee network's topology greatly affects the overall network performance. In this paper, we propose a more trustworthy algorithm than only using the depth and widely variable LQI during network formation, and moreover we propose an algorithm to measure network's trustworthiness. We simulate our algorithm using the NS-2 and implement our network using the MG2400 ZigBee module for verifying performance.

A Methodology on System Implementation for Road Monitoring and Management Based on Automated Driving Hazard Levels (위험도 기반 도로 모니터링 및 관리 시스템 구축 방안)

  • Kyuok Kim;Sang Soo Lee;SunA Cho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.6
    • /
    • pp.299-310
    • /
    • 2022
  • The ability of an automated driving system is based on vehicle sensors, judgment and control algorithms, etc. The safety of automated driving system is highly related to the operational status of the road network and compliant road infrastructure. The safe operation of automated driving necessitates continuous monitoring to determine if the road and traffic conditions are suitable and safe. This paper presents a node and link system to build a road monitoring system by considering the ODD(Operational Design Domain) characteristics. Considering scalability, the design is based on the existing ITS standard node-link system, and a method for expressing the monitoring target as a node and a link is presented. We further present a technique to classify and manage hazard risk into five levels, and a method to utilize node and link information when searching for and controlling the optimal route. Furthermore, we introduce an example of system implementation based on the proposed node and link system for Sejong City.

Optimum Design of Reinforced Concrete Outrigger Wall Opening Using Piecewise Linear Interpolation (구간선형보간법을 이용한 철근콘크리트 아웃리거 벽체 개구부의 최적설계)

  • Lee, Hye-Lym;Kim, Han-Soo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.4
    • /
    • pp.217-224
    • /
    • 2020
  • In this study, a framework for optimizing the opening in an outrigger wall is proposed. To solve a constrained bounded optimization problem, an in-house finite element program and SQP algorithm in Python SciPy library are utilized. The openings of the outrigger wall are located according to the strut-tie behavior of the outrigger wall deep beam. A linear interpolation method is used to obtain differentiable continuous functions required for optimization, whereas a database is used for the efficiency of the optimization program. By comparing the result of the two-variable optimization through the moving path of the search algorithm, it is confirmed that the algorithm efficiently determines the optimized result. When the size of each opening is set to individual variables rather than the same width of all openings, the value of the objective function is minimized to obtain better optimization results. It was confirmed that the optimization time can be effectively reduced when using the database in the optimization process.

Low Complexity MIMO System Using Minimum Distance Searching Algorithm (MDSA) with Linear Receiver (최소거리탐지 알고리즘(MDSA)을 이용한 ML 탐지 MIMO 시스템 연구)

  • Kwon, Oh-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4C
    • /
    • pp.462-467
    • /
    • 2007
  • This paper proposes Minimum Distance Searching Algorithm (MDSA) which reduces the computational complexity (CC) of the ML, the kind of Spatial Multiplexing (SM) MIMO system. The MDSA searchs candidate symbols with a starting symbol, which is called reference bits. We used the linear receiver of MIMO techniques to find a starting symbol. The MDSA searchs the shortest path to a transmitted symbol using reference bits and Minimum Distance(MD) concept. The CC of MDSA is reduced to the 0.21% to the ML as the transmit antennas is 4 in 16QAM. The simulation result shows the BER of MDSA is nearly same to the BER of ML as the transmit antennas is 2 and the receive antennas is 3 in 16QAM and slightly degraded to the BER of ML as the transmit antennas is 4 and the receive antennas is 6 in QPSK.

An Economic Ship Routing System by Optimizing Outputs of Engine-Power based on an Evolutionary Strategy (전화전략기반 엔진출력 최적화를 통한 선박경제운항시스템)

  • Jang, Ho-Seop;Kwon, Yung-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4B
    • /
    • pp.412-421
    • /
    • 2011
  • An economic ship routing means to sail a ship with a goal of minimizing the fuel consumption by utilizing weather forecast information, and many such systems have been recently developed. Most of them assume that sailing is carried out with a constraint like a fixed output of engine-power or a fixed sailing speed. However, if the output of engine-power is controlled, it is possible to reduce the fuel consumption by sailing a ship under a relatively good weather condition. In this paper, we propose a novel economic ship routing system which can search optimal outputs of the engine-power for each part of a path by employing an evolutionary strategy. In addition, we develope an $A^*$ algorithm to find the shortest path and a method to enhance the degree of curve representation. These make the proposed system applicable to an arbitrary pair of departure and destination points. We compared our proposed system with another existing system not controlling output of the engine-power over 36 scenarios in total, and observed that the former reduced the estimated fuel consumption than the latter by 1.3% on average and the maximum 5.6% with little difference of estimated time of arrival.

X-tree Diff: An Efficient Change Detection Algorithm for Tree-structured Data (X-tree Diff: 트리 기반 데이터를 위한 효율적인 변화 탐지 알고리즘)

  • Lee, Suk-Kyoon;Kim, Dong-Ah
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.683-694
    • /
    • 2003
  • We present X-tree Diff, a change detection algorithm for tree-structured data. Our work is motivated by need to monitor massive volume of web documents and detect suspicious changes, called defacement attack on web sites. From this context, our algorithm should be very efficient in speed and use of memory space. X-tree Diff uses a special ordered labeled tree, X-tree, to represent XML/HTML documents. X-tree nodes have a special field, tMD, which stores a 128-bit hash value representing the structure and data of subtrees, so match identical subtrees form the old and new versions. During this process, X-tree Diff uses the Rule of Delaying Ambiguous Matchings, implying that it perform exact matching where a node in the old version has one-to one corrspondence with the corresponding node in the new, by delaying all the others. It drastically reduces the possibility of wrong matchings. X-tree Diff propagates such exact matchings upwards in Step 2, and obtain more matchings downwsards from roots in Step 3. In step 4, nodes to ve inserted or deleted are decided, We aldo show thst X-tree Diff runs on O(n), woere n is the number of noses in X-trees, in worst case as well as in average case, This result is even better than that of BULD Diff algorithm, which is O(n log(n)) in worst case, We experimented X-tree Diff on reat data, which are about 11,000 home pages from about 20 wev sites, instead of synthetic documets manipulated for experimented for ex[erimentation. Currently, X-treeDiff algorithm is being used in a commeercial hacking detection system, called the WIDS(Web-Document Intrusion Detection System), which is to find changes occured in registered websites, and report suspicious changes to users.