• 제목/요약/키워드: General Graph

검색결과 249건 처리시간 0.03초

일반 그래프 최적화를 활용한 그래프 기반 SLAM 구현 (The Implementation of Graph-based SLAM Using General Graph Optimization)

  • 고낙용;정준혁;정다빈
    • 한국전자통신학회논문지
    • /
    • 제14권4호
    • /
    • pp.637-644
    • /
    • 2019
  • 본 논문은 일반 그래프 최적화(g2o, General Graph Optimization)를 사용하여 그래프 기반 SLAM을 구현한 결과를 기술한다. 일반 그래프 최적화는 SLAM을 노드와 엣지의 그래프를 통하여 표현한다. 노드는 시간에 따른 로봇의 위치를 나타내며, 엣지는 노드들 사이의 구속 조건을 나타낸다. 구속 조건은 센서에 의한 측정값에 의해 결정된다. 일반 그래프 최적화는 구속 조건에 의해 결정되는 성능지표를 최적화하여 SLAM 문제를 해결한다. 실현된 일반 그래프 최적화 방법을 SLAM 방법의 성능 시험용으로 공개된 실험 데이터를 사용하여 검증하였다.

유향 그래프의 최대 경로 길이를 제한하는 최소 노드 집합을 구하는 알고리즘 (Determining Minimal Set of Vertices Limiting The Maximum Path Length in General Directed Graphs)

  • Lee Dong Ho
    • 전자공학회논문지B
    • /
    • 제32B권1호
    • /
    • pp.11-20
    • /
    • 1995
  • A new graph problem is formulated to limit the maximum path length of a general directed graph when a minimal set of vertices together with their incident edges are removed from the graph. An optimal algorithm and a heuristic algorithm are proposed and the proposed heuristic algorithm is shown to be effective through experiments using a collection of graphs obtained from large sequential circuits. The heuristic algorithm is based on a feedback vertex set algorithm based on graph reduction.

  • PDF

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • 제15권4호
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

표준본드선도: 본드선도에 의한 동적시스템의 일반모델 (Bond Gragh Prototypes: A General Model for Dynamic Systems in Terms of Bond Graphs)

  • 박전수;김종식
    • 대한기계학회논문집A
    • /
    • 제21권9호
    • /
    • pp.1414-1421
    • /
    • 1997
  • This paper examines the physics and mechanics governing the dynamic interaction between physical systems and suggests the four structures of bond graph prototypes, considered as a general model that can promise their dynamic behavior physically resonable. The bond graph prototypes originating from the paper are more realistic junction structures than those used to model dynamic systems conventionally by bond graph standards in whether physical constraints are involved or not when the energy exchange between two dynamic components arises. It is shown that the bond graph prototypes are dynamic or energetic in their describing equations compared to the bond graph standards, and connectivity and causality are properties of dynamic systems upon which the steps developed in this paper for the bond graph prototypes are wholly based and their definitions an concepts are highly emphasized all through the paper.

An AND-OR Graph Search Algorithm Under the Admissibility Condition Relaxed

  • Lee, Chae-Y.
    • 한국경영과학회지
    • /
    • 제14권1호
    • /
    • pp.27-35
    • /
    • 1989
  • An algorithm that searches the general AND-OR graph is proposed. The convergence and the efficiency of the algorithm is examined and compared with an existing algorithm for the AND-OR graph. It is proved that the proposed algorithm is superior to the existing method both in the quality of the solution and the number of node expansions.

  • PDF

Graph Database Solution for Higher Order Spatial Statistics in the Era of Big Data

  • Sabiu, Cristiano G.;Kim, Juhan
    • 천문학회보
    • /
    • 제44권1호
    • /
    • pp.79.1-79.1
    • /
    • 2019
  • We present an algorithm for the fast computation of the general N-point spatial correlation functions of any discrete point set embedded within an Euclidean space of ${\mathbb{R}}n$. Utilizing the concepts of kd-trees and graph databases, we describe how to count all possible N-tuples in binned configurations within a given length scale, e.g. all pairs of points or all triplets of points with side lengths < rmax. Through benchmarking we show the computational advantage of our new graph-based algorithm over more traditional methods. We show that all 3-point configurations up to and beyond the Baryon Acoustic Oscillation scale (~200 Mpc in physical units) can be performed on current Sloan Digital Sky Survey (SDSS) data in reasonable time. Finally we present the first measurements of the 4-point correlation function of ~0.5 million SDSS galaxies over the redshift range 0.43< z <0.7. We present the publicly available code GRAMSCI (GRAph Made Statistics for Cosmological Information; bitbucket.org/csabiu/gramsci), under a GNU General Public License.

  • PDF

THE COMPETITION NUMBERS OF HAMMING GRAPHS WITH DIAMETER AT MOST THREE

  • Park, Bo-Ram;Sano, Yoshio
    • 대한수학회지
    • /
    • 제48권4호
    • /
    • pp.691-702
    • /
    • 2011
  • The competition graph of a digraph D is a graph which has the same vertex set as D and has an edge between x and y if and only if there exists a vertex v in D such that (x, v) and (y, v) are arcs of D. For any graph G, G together with sufficiently many isolated vertices is the competition graph of some acyclic digraph. The competition number k(G) of a graph G is defined to be the smallest number of such isolated vertices. In general, it is hard to compute the competition number k(G) for a graph G and it has been one of important research problems in the study of competition graphs. In this paper, we compute the competition numbers of Hamming graphs with diameter at most three.

선로그래프를 이용한 철도망 위상 표현방법 (Representation Method of Track Topologies using Railway Graph)

  • 조동영
    • 한국멀티미디어학회논문지
    • /
    • 제5권1호
    • /
    • pp.114-119
    • /
    • 2002
  • 철도선로망 제어시스템에서 신속한 철도선로의 배정은 실시간 선로배정의 중요한 요소인데, 이 문제의 해결을 위해서는 먼저 철도 선로망의 위상을 정확하게 표현해야 한다. 그래프는 망 구조를 표현하는데 적절한 자료구조이지만 철도 선로망을 표현하는 데에는 부적절하다. 이 논문에서는 철도 선로망의 위상구조를 정확하게 표현할 수 있는 새로운 자료구조인 선로그래프(railway graph) 개념을 정의한다. 그리고 정의된 선로그래프에서의 경로탐색 알고리즘과 선로그래프를 이용한 하향식 철도 선로망 모델링 방법을 설명한다.

  • PDF

NONDEGENERATE AFFINE HOMOGENEOUS DOMAIN OVER A GRAPH

  • Choi, Yun-Cherl
    • 대한수학회지
    • /
    • 제43권6호
    • /
    • pp.1301-1324
    • /
    • 2006
  • The affine homogeneous hypersurface in ${\mathbb{R}}^{n+1}$, which is a graph of a function $F:{\mathbb{R}}^n{\rightarrow}{\mathbb{R}}$ with |det DdF|=1, corresponds to a complete unimodular left symmetric algebra with a nondegenerate Hessian type inner product. We will investigate the condition for the domain over the homogeneous hypersurface to be homogeneous through an extension of the complete unimodular left symmetric algebra, which is called the graph extension.

Evolution and Maintenance of Proxy Networks for Location Transparent Mobile Agent and Formal Representation By Graph Transformation Rules

  • Kurihara, Masahito;Numazawa, Masanobu
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2001년도 The Pacific Aisan Confrence On Intelligent Systems 2001
    • /
    • pp.151-155
    • /
    • 2001
  • Mobile agent technology has been the subject of much attention in the last few years, mainly due to the proliferation of distributed software technologies combined with the distributed AI research field. In this paper, we present a design of communication networks of agents that cooperate with each other for forwarding messages to the specific mobile agent in order to make the overall system location transparent. In order to make the material accessible to general intelligent system researchers, we present the general ideas abstractly in terms of the graph theory. In particular, a proxy network is defined as a directed acyclic graph satisfying some structural conditions. In turns out that the definition ensures some kind of reliability of the network, in the sense that as long as at most one proxy agent is abnormal, there agent exists a communication path, from every proxy agent to the target agent, without passing through the abnormal proxy. As the basis for the implementation of this scheme, an appropriate initial proxy network is specified and the dynamic nature of the network is represented by a set of graph transformation rules. It is shown that those rules are sound, in the sense that all graphs created from the initial proxy network by zero or more applications of the rules are guaranteed to be proxy networks. Finally, we will discuss some implementation issues.

  • PDF