• Title/Summary/Keyword: Check path algorithm

Search Result 45, Processing Time 0.024 seconds

Performance Evaluation for Multi-Level Configuration Space for the Development of an Efficient Mobile Robot Path Planner (모바일 로봇을 위한 다단계 형태 공간 생성 방법에 대한 성능 검증)

  • Park, Jung-Soo;So, Byung-Chul;Jung, Jin-Woo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.1
    • /
    • pp.36-41
    • /
    • 2011
  • Configuration space(C-space) including configuration obstacle(C-obstacle) is one of the most important concepts in mobile robot path planning. Using C-space and C-obstacles, the robot with different shapes and moving mechanisms can be considered as a point in the C-space. And, as a result, the collision-free path for the robot can be easily achieved. To make C-space including C-obstacle, many researchers used circular approximation method for the efficient caluculation time. This method can help us to save our time by approximating the shape of a robot as the minimum sized circle which can cover all the area of robot. But, by using the circle larger than the robot, more space are considered as the part of robot and, as a result, some obstacles which are very near each other may be considered as a combined one obstacle. To solve this problem, multi-level configuration space is proposed by this paper. This multi-level method also use the circular approximation method as the initial step. But, after finding the initial path, it will check how many obstacles are combined. And then, for each combined obstacle, more accurate C-space generation will be continued. To check the efficiency of the proposed algorithm, time for c-space generation are compared with the well-known accurate C-space generation method using various types of robot shape.

A Study on the Avoidance of Tool Interference in Analytic Compound Surface Machining (해석적 복합 곡면 가공에 있어서의 공구 간섭 방지에 관한 연구)

  • Kang, S.G.;Cho, S.W.;Ko, S.L.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.9
    • /
    • pp.156-164
    • /
    • 1996
  • Tool interference is one of the most critical problems in machining die cavities and punches. When machining concave or convex regions of cavities with large radius tool in rough cutting, the tool easily overcuts or undercuts the portions of the surface, which result in machining inaccuracy. So the generation of interference-free tool path must be required for more efficient rough cutting. In this paper, we present a method for modeling die cavities which consist of simple surface or analytic compoyund surfaces and present an algorithm for checking and removing the tool interference occurred in machining the die cavities. Using these algorithms, we can represent a die cavity, and check the interfer- ence regions, and then remove these interferences. Especially we focus on the side interference in the sides of analytic elements and base surface boundary.

  • PDF

Development of Mobile Robot for CAS inspection of Oil Tanker (유조선의 상태평가계획 검사를 위한 이동로봇의 개발)

  • Lee, Seung-Heui;Son, Chang-Woo;Eum, Yong-Jae;Lee, Min-Cheol
    • The Journal of Korea Robotics Society
    • /
    • v.2 no.2
    • /
    • pp.161-167
    • /
    • 2007
  • It is dangerous that an inspector overhauls defects and condition of the inner parts of an oil tanker because of many harmful gases, complex structures, and etc. However, these inspections are necessary to many oil tankers over old years. In this study, we proposed the design of mobile robot for inspection of CAS in oil tanker. The developed CAS inspection mobile robot has four modules, a measurement module of oil tanker's thickness, a corrosion inspection module, a climbing module of the surface on a wall, and a monitoring module. In order to get over at a check position, the driving control algorithm was developed. Magnetic wheels are used to move on the surface of a wall. This study constructed a communication network and the monitoring program to operate the developed mobile robot from remote sites. In order to evaluate the inspection ability, the experiments about performance of CAS inspection using the developed mobile robot have been carried out.

  • PDF

Detection of Illegal U-turn Vehicles by Optical Flow Analysis (옵티컬 플로우 분석을 통한 불법 유턴 차량 검지)

  • Song, Chang-Ho;Lee, Jaesung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.948-956
    • /
    • 2014
  • Today, Intelligent Vehicle Detection System seeks to reduce the negative factors, such as accidents over to get the traffic information of existing system. This paper proposes detection algorithm for the illegal U-turn vehicles which can cause critical accident among violations of road traffic laws. We predicted that if calculated optical flow vectors were shown on the illegal U-turn path, they would be cause of the illegal U-turn vehicles. To reduce the high computational complexity, we use the algorithm of pyramid Lucas-Kanade. This algorithm only track the key-points likely corners. Because of the high computational complexity, we detect center lane first through the color information and progressive probabilistic hough transform and apply to the around of center lane. And then we select vectors on illegal U-turn path and calculate reliability to check whether vectors is cause of the illegal U-turn vehicles or not. Finally, In order to evaluate the algorithm, we calculate process time of the type of algorithm and prove that proposed algorithm is efficiently.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

Development of a radiological emergency evacuation model using agent-based modeling

  • Hwang, Yujeong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.53 no.7
    • /
    • pp.2195-2206
    • /
    • 2021
  • In order to mitigate the damage caused by accidents in nuclear power plants (NPPs), evacuation strategies are usually managed on the basis of off-site effects such as the diffusion of radioactive materials and evacuee traffic simulations. However, the interactive behavior between evacuees and the accident environment has a significant effect on the consequential gap. Agent-based modeling (ABM) is a method that can control and observe such interactions by establishing agents (i.e., the evacuees) and patches (i.e., the accident environments). In this paper, a radiological emergency evacuation model is constructed to realistically check the effectiveness of an evacuation strategy using NetLogo, an ABM toolbox. Geographic layers such as radiation sources, roads, buildings, and shelters were downloaded from an official geographic information system (GIS) of Korea, and were modified into respective patches. The dispersion model adopted from the puff equation was also modified to fit the patches on the geographic layer. The evacuees were defined as vehicle agents and a traffic model was implemented by combining the shortest path search (determined by an A * algorithm) and a traffic flow model incorporated in the Nagel-Schreckenberg cellular automata model. To evaluate the radiological harm to the evacuees due to the spread of radioactive materials, a simple exposure model was established to calculate the overlap fraction between the agents and the dispersion patches. This paper aims to demonstrate that the potential of ABM can handle disaster evacuation strategies more realistically than previous approaches.

Lightweight Loop Invariant Code Motion for Java Just-In-Time Compiler on Itanium (Itanium상의 자바 적시 컴파일러를 위한 가벼운 루프 불변 코드 이동)

  • Yu Jun-Min;Choi Hyung-Kyu;Moon Soo-Mook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.3
    • /
    • pp.215-226
    • /
    • 2005
  • Loop invariant code motion (LICM) optimization includes relatively heavy code analyses, thus being not readily applicable to Java Just-In-Time (JIT) compilation where the JIT compilation time is part of the whole running time. 'Classical' LICM optimization first analyzes the code and constructs both the def-use chains and the use-def chains. which are then used for performing code motions. This paper proposes a light-weight LICM algorithm, which requires only the def-use chains of loop invariant code (without use-def chains) by exploiting the fact that the Java virtual machine is based on a stack machine, hence generating code with simpler patterns. We also propose two techniques that allow more code motions than classical LICM techniques. First, unlike previous JIT techniques that uses LICM only in single-path loops for simplicity, we apply LICM to multi-path loops (natural loops) safely for partially redundant code. Secondly, we move loop-invariant, partially-redundant null pointer check code via predication support in Itanium. The proposed techniques were implemented in a JIT compiler for Itanium processor on ORP (Open Runtime Platform) Java virtual machine of Intel. On SPECjvrn98 benchmarks, the proposed technique increases the JIT compilation overhead by the geometric mean of 1.3%, yet it improves the total running time by the geometric mean of 2.2%.

Motion Based Serious Game Using Spatial Information of Game and Web-cam (웹캠과 공간정보를 이용한 체감형 기능성게임)

  • Lee, Young-Jae;Lee, Dae-Ho;Yi, Sang-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.9
    • /
    • pp.1795-1802
    • /
    • 2009
  • Motion based serious game is a new style of game and exercise using hands, arms, head and whole body. At that time gamer's reachable movement space is an important game space and interaction happening place. We propose efficient game spatial division and analysis algorithm that gives special information for collision avoidance of game objects. We devide into 9 parts of game space and check the enemy position and upper, down, left and right side movement information of gamer and calculate optimal path for collide avoidance of the enemy. To evaluate the method, we implemented a motion base serious game that consists of a web cam, a player, an enemy, and we obtained some valid results of our method for the collision avoidance. The resole demonstrated that the proposed approach is robust. If movement information is in front of enemy, then the enemy waits and finds the place and runs to avoid collision. This algorithm can be used basic development of level control and effective interaction method for motion based serious game.

An Enhanced AODV based Energy-aware Routing Protocol for Route Maintenance in MANET (배터리 용량을 고려한 개선된 AODV 라우팅 알고리즘)

  • Kim Kwan-Woong;Lee Jeong-Soo;Pan Ce;Chung Kyung-Taek;Chon Byoung-Sil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.4 s.346
    • /
    • pp.22-30
    • /
    • 2006
  • In this paper, the goal of our proposed algorithm is to reduce link -failure and route failure caused by dead nodes which consume all of the battery life. I propose an algorithm which provides a ability of changing mutes to neighbor nodes before some of intermediate nodes be shutting don to get the stable route maintenance. To achieve this goal, The proposed routing algerian uses additional new messages to check energy status for monitoring energy of neighbor nodes and to change the path to a neighbor node. From extensive simulations, results show that possibility of cut-offs and time-delay cause of packet-loss have been decreased and also the improvement of transmission effectiveness.

Proposal of USN Configuratation and Routing Scheme Inside a Ship (선박 내 센서 노드 구성 및 라우팅 제안)

  • Lee, Seong Ro;Jeong, Min-A;Kim, Yeongeun;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.660-666
    • /
    • 2014
  • In this paper, we consider a classification criteria of sensor nodes based on equipment function, and propose a routing search algorithm between node when an IP-USN is applied inside a ship. whereas a tree-type routing algorithm is applied to the limited mobile enviroment, such as engine room or machine room, a mesh-type routing alogrithm is to free mobile enviroment, such as passager corridor liviing quarters or restanrats areas. For mesh-type routing, it is necessary to maintain a seamless route path between a sink node and sensor nodes for which we consider a novel message exchange periodically. We proposed a new message, RDES message, which is issued periodically to update the topology of sensor node and check a connectivity between nodes.