• Title/Summary/Keyword: Generic Algorithm

Search Result 151, Processing Time 0.022 seconds

Design and Realization of Precise Indoor Localization Mechanism for Wi-Fi Devices

  • Su, Weideng;Liu, Erwu;Auge, Anna Calveras;Garcia-Villegas, Eduard;Wang, Rui;You, Jiayi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5422-5441
    • /
    • 2016
  • Despite the abundant literature in the field, there is still the need to find a time-efficient, highly accurate, easy to deploy and robust localization algorithm for real use. The algorithm only involves minimal human intervention. We propose an enhanced Received Signal Strength Indicator (RSSI) based positioning algorithm for Wi-Fi capable devices, called the Dynamic Weighted Evolution for Location Tracking (DWELT). Due to the multiple phenomena affecting the propagation of radio signals, RSSI measurements show fluctuations that hinder the utilization of straightforward positioning mechanisms from widely known propagation loss models. Instead, DWELT uses data processing of raw RSSI values and applies a weighted posterior-probabilistic evolution for quick convergence of localization and tracking. In this paper, we present the first implementation of DWELT, intended for 1D location (applicable to tunnels or corridors), and the first step towards a more generic implementation. Simulations and experiments show an accuracy of 1m in more than 81% of the cases, and less than 2m in the 95%.

Design of FNN architecture based on HCM Clustering Method (HCM 클러스터링 기반 FNN 구조 설계)

  • Park, Ho-Sung;Oh, Sung-Kwun
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2821-2823
    • /
    • 2002
  • In this paper we propose the Multi-FNN (Fuzzy-Neural Networks) for optimal identification modeling of complex system. The proposed Multi-FNNs is based on a concept of FNNs and exploit linear inference being treated as generic inference mechanisms. In the networks learning, backpropagation(BP) algorithm of neural networks is used to updata the parameters of the network in order to control of nonlinear process with complexity and uncertainty of data, proposed model use a HCM(Hard C-Means)clustering algorithm which carry out the input-output dat a preprocessing function and Genetic Algorithm which carry out optimization of model The HCM clustering method is utilized to determine the structure of Multi-FNNs. The parameters of Multi-FNN model such as apexes of membership function, learning rates, and momentum coefficients are adjusted using genetic algorithms. An aggregate performance index with a weighting factor is proposed in order to achieve a sound balance between approximation and generalization abilities of the model. NOx emission process data of gas turbine power plant is simulated in order to confirm the efficiency and feasibility of the proposed approach in this paper.

  • PDF

Effective Admission Policy for Multimedia Traffic Connections over Satellite DVB-RCS Network

  • Pace, Pasquale;Aloi, Gianluca
    • ETRI Journal
    • /
    • v.28 no.5
    • /
    • pp.593-606
    • /
    • 2006
  • Thanks to the great possibilities of providing different types of telecommunication traffic to a large geographical area, satellite networks are expected to be an essential component of the next-generation internet. As a result, issues concerning the designing and testing of efficient connection-admission-control (CAC) strategies in order to increase the quality of service (QoS) for multimedia traffic sources, are attractive and at the cutting edge of research. This paper investigates the potential strengths of a generic digital-video-broadcasting return-channel-via-satellite (DVB-RCS) system architecture, proposing a new CAC algorithm with the aim of efficiently managing real-time multimedia video sources, both with constant and high variable data rate transmission; moreover, the proposed admission strategy is compared with a well-known iterative CAC mainly designed for the managing of real-time bursty traffic sources in order to demonstrate that the new algorithm is also well suited for those traffic sources. Performance analysis shows that, both algorithms guarantee the agreed QoS to real-time bursty connections that are more sensitive to delay jitter; however, our proposed algorithm can also manage interactive real-time multimedia traffic sources in high load and mixed traffic conditions.

  • PDF

A Study on Mouth Features Detection in Face using HMM (HMM을 이용한 얼굴에서 입 특징점 검출에 관한 연구)

  • Kim, Hea-Chel;Jung, Chan-Ju;Kwag, Jong-Se;Kim, Mun-Hwan;Bae, Chul-Soo;Ra, Snag-Dong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.04a
    • /
    • pp.647-650
    • /
    • 2002
  • The human faces do not have distinct features unlike other general objects. In general the features of eyes, nose and mouth which are first recognized when human being see the face are defined. These features have different characteristics depending on different human face. In this paper, We propose a face recognition algorithm using the hidden Markov model(HMM). In the preprocessing stage, we find edges of a face using the locally adaptive threshold scheme and extract features based on generic knowledge of a face, then construct a database with extracted features. In training stage, we generate HMM parameters for each person by using the forward-backward algorithm. In the recognition stage, we apply probability values calculated by the HMM to input data. Then the input face is recognized by the euclidean distance of face feature vector and the cross-correlation between the input image and the database image. Computer simulation shows that the proposed HMM algorithm gives higher recognition rate compared with conventional face recognition algorithms.

  • PDF

A Study on the Development of Search Algorithm for Identifying the Similar and Redundant Research (유사과제파악을 위한 검색 알고리즘의 개발에 관한 연구)

  • Park, Dong-Jin;Choi, Ki-Seok;Lee, Myung-Sun;Lee, Sang-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.54-62
    • /
    • 2009
  • To avoid the redundant investment on the project selection process, it is necessary to check whether the submitted research topics have been proposed or carried out at other institutions before. This is possible through the search engines adopted by the keyword matching algorithm which is based on boolean techniques in national-sized research results database. Even though the accuracy and speed of information retrieval have been improved, they still have fundamental limits caused by keyword matching. This paper examines implemented TFIDF-based algorithm, and shows an experiment in search engine to retrieve and give the order of priority for similar and redundant documents compared with research proposals, In addition to generic TFIDF algorithm, feature weighting and K-Nearest Neighbors classification methods are implemented in this algorithm. The documents are extracted from NDSL(National Digital Science Library) web directory service to test the algorithm.

Improvement of F-GCRA Algorithm for ATM-GFR Service (ATM-GFR 서비스를 위한 F-GCRA 알고리즘 개선)

  • Park, In-Yong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.889-896
    • /
    • 2006
  • ATM Forum has defined a guaranteed frame rate (GFR) service to serve Internet traffic efficiently. The GFR service provides virtual connections (VCs) for minimum cell rate (MCR) guarantees and allows them to fairly share the residual bandwidth. And ATM Forum has recommended a frame-based generic cell rate algorithm (F-GCRA) as a frame classifier, which determines whether an Am cell is eligible to use the guaranteed bandwidth in a frame level. An ATM switch accommodates cells in its buffer or drops them in a frame level according to current buffer occupancy. A FIFO shared buffer has so simple structure as to be feasibly implemented in switches, but has not been able to provide an MCR guarantee for each VC without buffer management based on per-VC accounting. In this paper, we enhance the F-GCRA frame classifier to guarantee an MCR of each VC without buffer management based on per-VC accounting. The enhanced frame classifier considers burstness of TCP traffic caused by congestion control algorithm so as to enable each VC to use its reserved bandwidth sufficiently. In addition, it is able to alleviate the unfairness problem in usage of the residual bandwidth. Simulation results show that the enhanced frame classifier satisfies quality of services (QoSs) of the GFR service for the TCP traffic.

A New Image Completion Method Using Hierarchical Priority Belief Propagation Algorithm (계층적 우선순위 BP 알고리즘을 이용한 새로운 영상 완성 기법)

  • Kim, Moo-Sung;Kang, Hang-Bong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.5
    • /
    • pp.54-63
    • /
    • 2007
  • The purpose of this study is to present a new energy minimization method for image completion with hierarchical approach. The goal of image completion is to fill in missing part in a possibly large region of an image so that a visually plausible outcome is obtained. An exemplar-based Markov Random Field Modeling(MRF) is proposed in this paper. This model can deal with following problems; detection of global features, flexibility on environmental changes, reduction of computational cost, and generic extension to other related domains such as image inpainting. We use the Priority Belief Propagation(Priority-BP) which is a kind of Belief propagation(BP) algorithms for the optimization of MRF. We propose the hierarchical Priority-BP that reduces the number of nodes in MRF and to apply hierarchical propagation of messages for image completion. We show that our approach which uses hierarchical Priority-BP algorithm in image completion works well on a number of examples.

The usage of convergency technology for ROGA algorithm application on step walking of biped robot (이족 로봇의 계단 보행에서 Real-Coded Genetic Algorithm 의 융합 기술의 사용)

  • Lee, Jeong-Ick
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.175-182
    • /
    • 2020
  • The calculation of the optimal trajectory of the stepped top-down robot was made using a genetic algorithm and a computational torque controller. First, the total energy efficiency was minimized using the Red-Cold Generic Algorithm (RCGA) consisting of reproductive, cross, and mutation. The reproducibility condition related to the position assembly of the start and end of the stride and the joints, angles, and angular velocities are linear constraints. Next, the unequal constraint accompanies the condition for preventing the collision of the swing leg at the corner with the outer surface of the stairs, the condition of the knee joint for preventing kinematic peculiarity, and the condition of no moment in safety in the traveling direction. Finally, the angular trajectory of each joint is defined by fourth-order polynomial whose coefficient is to approximate chromosomes. This is to approximate walking. In this study, the energy efficiency of the optimal trajectory was analyzed by computer simulation through a biped robot with seven degrees of freedom composed of seven links.

Development and Distribution of an Educational Synthetic Aperture Radar(eSAR) Processor (교육용 합성구경레이더 프로세서(eSAR Processor)의 개발과 공개)

  • Lee, Hoon-Yol
    • Korean Journal of Remote Sensing
    • /
    • v.21 no.2
    • /
    • pp.163-171
    • /
    • 2005
  • I have developed a processor for synthetic aperture radar (SAR) raw data compression using range-doppler algorithm for educational purpose. The program realized a generic SAR focusing algorithm so that it can deal with any SAR system if the specification is known. It can run efficiently on a low-cost computer by selecting minimum size out of a whole dataset, and can produce intermediate images during the process. Especially, the program is designed for educational purpose in such a way that Doppler centroid and azimuth ambiguity can be determined graphically by the user. By distributing the source code and the algorithm to public, I intend to maximize the educational effect on understanding and utilizing SAR data. This paper introduces the principle of SAR focusing algorithm embedded on the eSAR processor and shows an example of data processing using ERS-1 raw data.

Implementation of Quantum Gates for Binary Field Multiplication of Code based Post Quantum Cryptography (부호 기반 양자 내성 암호의 이진 필드 상에서 곱셈 연산 양자 게이트 구현)

  • Choi, Seung-Joo;Jang, Kyong-Bae;Kwon, Hyuk-Dong;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1044-1051
    • /
    • 2020
  • The age of quantum computers is coming soon. In order to prepare for the upcoming future, the National Institute of Standards and Technology has recruited candidates to set standards for post quantum cryptography to establish a future cryptography standard. The submitted ciphers are expected to be safe from quantum algorithm attacks, but it is necessary to verify that the submitted algorithm is safe from quantum attacks using quantum algorithm even when it is actually operated on a quantum computer. Therefore, in this paper, we investigate an efficient quantum gate implementation for binary field multiplication of code based post quantum cryptography to work on quantum computers. We implemented the binary field multiplication for two field polynomials presented by Classic McEliece and three field polynomials presented by ROLLO in generic algorithm and Karatsuba algorithm.