• Title/Summary/Keyword: I-graph

Search Result 326, Processing Time 0.028 seconds

Side Scan Sonar based Pose-graph SLAM (사이드 스캔 소나 기반 Pose-graph SLAM)

  • Gwon, Dae-Hyeon;Kim, Joowan;Kim, Moon Hwan;Park, Ho Gyu;Kim, Tae Yeong;Kim, Ayoung
    • The Journal of Korea Robotics Society
    • /
    • v.12 no.4
    • /
    • pp.385-394
    • /
    • 2017
  • Side scanning sonar (SSS) provides valuable information for robot navigation. However using the side scanning sonar images in the navigation was not fully studied. In this paper, we use range data, and side scanning sonar images from UnderWater Simulator (UWSim) and propose measurement models in a feature based simultaneous localization and mapping (SLAM) framework. The range data is obtained by echosounder and sidescanning sonar images from side scan sonar module for UWSim. For the feature, we used the A-KAZE feature for the SSS image matching and adjusting the relative robot pose by SSS bundle adjustment (BA) with Ceres solver. We use BA for the loop closure constraint of pose-graph SLAM. We used the Incremental Smoothing and Mapping (iSAM) to optimize the graph. The optimized trajectory was compared against the dead reckoning (DR).

The Line n-sigraph of a Symmetric n-sigraph-V

  • Reddy, P. Siva Kota;Nagaraja, K.M.;Geetha, M.C.
    • Kyungpook Mathematical Journal
    • /
    • v.54 no.1
    • /
    • pp.95-101
    • /
    • 2014
  • An n-tuple ($a_1,a_2,{\ldots},a_n$) is symmetric, if $a_k$ = $a_{n-k+1}$, $1{\leq}k{\leq}n$. Let $H_n$ = {$(a_1,a_2,{\ldots},a_n)$ ; $a_k$ ${\in}$ {+,-}, $a_k$ = $a_{n-k+1}$, $1{\leq}k{\leq}n$} be the set of all symmetric n-tuples. A symmetric n-sigraph (symmetric n-marked graph) is an ordered pair $S_n$ = (G,${\sigma}$) ($S_n$ = (G,${\mu}$)), where G = (V,E) is a graph called the underlying graph of $S_n$ and ${\sigma}$:E ${\rightarrow}H_n({\mu}:V{\rightarrow}H_n)$ is a function. The restricted super line graph of index r of a graph G, denoted by $\mathcal{R}\mathcal{L}_r$(G). The vertices of $\mathcal{R}\mathcal{L}_r$(G) are the r-subsets of E(G) and two vertices P = ${p_1,p_2,{\ldots},p_r}$ and Q = ${q_1,q_2,{\ldots},q_r}$ are adjacent if there exists exactly one pair of edges, say $p_i$ and $q_j$, where $1{\leq}i$, $j{\leq}r$, that are adjacent edges in G. Analogously, one can define the restricted super line symmetric n-sigraph of index r of a symmetric n-sigraph $S_n$ = (G,${\sigma}$) as a symmetric n-sigraph $\mathcal{R}\mathcal{L}_r$($S_n$) = ($\mathcal{R}\mathcal{L}_r(G)$, ${\sigma}$'), where $\mathcal{R}\mathcal{L}_r(G)$ is the underlying graph of $\mathcal{R}\mathcal{L}_r(S_n)$, where for any edge PQ in $\mathcal{R}\mathcal{L}_r(S_n)$, ${\sigma}^{\prime}(PQ)$=${\sigma}(P){\sigma}(Q)$. It is shown that for any symmetric n-sigraph $S_n$, its $\mathcal{R}\mathcal{L}_r(S_n)$ is i-balanced and we offer a structural characterization of super line symmetric n-sigraphs of index r. Further, we characterize symmetric n-sigraphs $S_n$ for which $\mathcal{R}\mathcal{L}_r(S_n)$~$\mathcal{L}_r(S_n)$ and $$\mathcal{R}\mathcal{L}_r(S_n){\sim_=}\mathcal{L}_r(S_n)$$, where ~ and $$\sim_=$$ denotes switching equivalence and isomorphism and $\mathcal{R}\mathcal{L}_r(S_n)$ and $\mathcal{L}_r(S_n)$ are denotes the restricted super line symmetric n-sigraph of index r and super line symmetric n-sigraph of index r of $S_n$ respectively.

INJECTIVELY DELTA CHOOSABLE GRAPHS

  • Kim, Seog-Jin;Park, Won-Jin
    • Bulletin of the Korean Mathematical Society
    • /
    • v.50 no.4
    • /
    • pp.1303-1314
    • /
    • 2013
  • An injective coloring of a graph G is an assignment of colors to the vertices of G so that any two vertices with a common neighbor receive distinct colors. A graph G is said to be injectively $k$-choosable if any list $L(v)$ of size at least $k$ for every vertex $v$ allows an injective coloring ${\phi}(v)$ such that ${\phi}(v){\in}L(v)$ for every $v{\in}V(G)$. The least $k$ for which G is injectively $k$-choosable is the injective choosability number of G, denoted by ${\chi}^l_i(G)$. In this paper, we obtain new sufficient conditions to be ${\chi}^l_i(G)={\Delta}(G)$. Maximum average degree, mad(G), is defined by mad(G) = max{2e(H)/n(H) : H is a subgraph of G}. We prove that if mad(G) < $\frac{8k-3}{3k}$, then ${\chi}^l_i(G)={\Delta}(G)$ where $k={\Delta}(G)$ and ${\Delta}(G){\geq}6$. In addition, when ${\Delta}(G)=5$ we prove that ${\chi}^l_i(G)={\Delta}(G)$ if mad(G) < $\frac{17}{7}$, and when ${\Delta}(G)=4$ we prove that ${\chi}^l_i(G)={\Delta}(G)$ if mad(G) < $\frac{7}{3}$. These results generalize some of previous results in [1, 4].

Application of Graph Theory for Analyzing the Relational Location Features of Cave as Tourists Attraction(I): focused on the structural analysis of network (동굴관광지의 관계적 입지특성 분석을 위한 그래프이론의 적용(I): 네트워크분석 기법의 적용을 중심으로)

  • Hong, Hyun-Cheol
    • Journal of the Speleological Society of Korea
    • /
    • no.86
    • /
    • pp.8-15
    • /
    • 2008
  • This study is about the efficiency of graph theory that can be applied as the research analysis method in order to identify the relational location features of the caves favored as the ecological tourists attraction. Creating network with traffic nodes and surrounding tourists attractions in a certain space including the caves as the tourists attraction and structural analysis on the overall network using various kinds of index will be very useful method to identify the relational location features and benefits from linking the caves as the tourists attractions. In particular, it can be applied to set the spatial scope in the tourism development plan including the caves as the tourists attractions.

PACKING TREES INTO COMPLETE K-PARTITE GRAPH

  • Peng, Yanling;Wang, Hong
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.2
    • /
    • pp.345-350
    • /
    • 2022
  • In this work, we confirm a weak version of a conjecture proposed by Hong Wang. The ideal of the work comes from the tree packing conjecture made by Gyárfás and Lehel. Bollobás confirms the tree packing conjecture for many small tree, who showed that one can pack T1, T2, …, $T_{n/\sqrt{2}}$ into Kn and that a better bound would follow from a famous conjecture of Erdős. In a similar direction, Hobbs, Bourgeois and Kasiraj made the following conjecture: Any sequence of trees T1, T2, …, Tn, with Ti having order i, can be packed into Kn-1,[n/2]. Further Hobbs, Bourgeois and Kasiraj [3] proved that any two trees can be packed into a complete bipartite graph Kn-1,[n/2]. Motivated by the result, Hong Wang propose the conjecture: For each k-partite tree T(𝕏) of order n, there is a restrained packing of two copies of T(𝕏) into a complete k-partite graph Bn+m(𝕐), where $m={\lfloor}{\frac{k}{2}}{\rfloor}$. Hong Wong [4] confirmed this conjecture for k = 2. In this paper, we prove a weak version of this conjecture.

Graph-Based Word Sense Disambiguation Using Iterative Approach (반복적 기법을 사용한 그래프 기반 단어 모호성 해소)

  • Kang, Sangwoo
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.2
    • /
    • pp.102-110
    • /
    • 2017
  • Current word sense disambiguation techniques employ various machine learning-based methods. Various approaches have been proposed to address this problem, including the knowledge base approach. This approach defines the sense of an ambiguous word in accordance with knowledge base information with no training corpus. In unsupervised learning techniques that use a knowledge base approach, graph-based and similarity-based methods have been the main research areas. The graph-based method has the advantage of constructing a semantic graph that delineates all paths between different senses that an ambiguous word may have. However, unnecessary semantic paths may be introduced, thereby increasing the risk of errors. To solve this problem and construct a fine-grained graph, in this paper, we propose a model that iteratively constructs the graph while eliminating unnecessary nodes and edges, i.e., senses and semantic paths. The hybrid similarity estimation model was applied to estimate a more accurate sense in the constructed semantic graph. Because the proposed model uses BabelNet, a multilingual lexical knowledge base, the model is not limited to a specific language.

Merge Algorithm of Maximum weighted Independent Vertex Pair at Maximal Weighted Independent Set Problem (최대 가중치 독립집합 문제의 최대 가중치 독립정점 쌍 병합 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.171-176
    • /
    • 2020
  • This paper proposes polynomial-time algorithm for maximum weighted independent set(MWIS) problem that is well known as NP-hard. The known algorithms for MWIS problem are polynomial-time to specialized in particular graph type, distributed, or clustering method. But there is no unified algorithm is suitable to all kinds of graph types. Therefore, this paper suggests unique polynomial-time algorithm that is suitable to all kinds of graph types. The proposed algorithm merges the maximum weighted vertex vi and maximum weighted vertex vj that is not adjacent to vi. As a result of apply to undirected graphs and trees, this algorithm can be get the optimal solution. This algorithm improves previously known solution to new optimal solution.

The Effect of Graphical Formats on Computer-Based Idea Generation Performance

  • Jung, Joung-Ho
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.153-169
    • /
    • 2018
  • Purpose Since human brains catch images faster than texts or numbers, infographics has been widely used in business in the form of "information dashboard" to enhance the efficiency of decision-making. Groupware, however, has neglected the adoption and use of infographics, in particular, in the idea generation process. Given that an overall performance of groupware-based idea generation is no better than that of the (paper-and-pencil-based) Nominal Group Technique, Jung et al. (2010) adopted the notion of infographics in the form of performance feedback to solve the productivity paradox. With the consistent results, which demonstrate beneficial effects of infographics on performance enhancement, an interesting observation that groups with the bar chart treatment performed better than groups with the dot chart treatment was made. The main purpose of this study was to find if there were a performance consistency between the outcomes from the previous study and the outcomes from the current study. Design/methodology/approach In experiment 1, we employed the same system used in the previous study (i.e., Jung et al., 2010). As individuals' contributions accumulated, the mechanism visually displayed individuals' performances two-dimensionally in the form of a bar chart or a dot chart. Then, we compared the performance outcomes from this study to the outcomes from previous study (i.e., Jung et al., 2010). In experiment 2, we modified the performance graph to test the effect of "playfulness" on performance by converting dots to car images. Then, we compared the performance outcome from experiment 2 to the outcomes from experiment 1. Findings Just like our interesting (and unexpected) finding in Jung et al.'s study (2010), the outcome confirmed a consistent superior performance of a bar chart. This implies that a bar chart is a better choice when stimulating performance with a visual aid in the context of groupware-based idea generation. Although a bar chart was criticized in a way that errors of length-area judgments are 40 ~ 250% greater than those of positional judgments along a common scale, such illusion turned out to be facilitating upward performance comparison better. Regarding Experiment 2, the outcome showed that the revised-dot graph is as good as the bar graph in terms of quantity and quality score of ideas. We attribute the performance enhancement of the resized-dot to the interaction between the motivational characteristic and the situational characteristic of playfulness because individuals in the revised-dot graph treatment performed better than individuals in the dot graph treatment. Given the order of performance (Bar >= Revised Dot > Dot) that the revised-dot treatment performed the same as (or lower than) the bar treatment, an additional research is warranted to reach to a consistent outcome.

Efficient method for finding patched vulnerability with code filtering in Apple iOS (코드 필터링 기법을 이용한 iOS 환경에서의 패치 분석 방법론)

  • Jo, Je-gyeong;Ryou, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1021-1026
    • /
    • 2015
  • Increasing of damage by phishing, government and organization response more rapidly. So phishing use malware and vulnerability for attack. Recently attack that use patch analysis is increased when Microsoft announce patches. Cause of that, researcher for security on defense need technology of patch analysis. But most patch analysis are develop for Microsoft's product. Increasing of mobile environment, necessary of patch analysis on mobile is increased. But ordinary patch analysis can not use mobile environment that there is many file and small size. So we suggest this research that use code filtering instead of Control Flow Graph and Abstract Syntax Tree.

ON ERDŐS CHAINS IN THE PLANE

  • Passant, Jonathan
    • Bulletin of the Korean Mathematical Society
    • /
    • v.58 no.5
    • /
    • pp.1279-1300
    • /
    • 2021
  • Let P be a finite point set in ℝ2 with the set of distance n-chains defined as ∆n(P) = {(|p1 - p2|, |p2 - p3|, …, |pn - pn+1|) : pi ∈ P}. We show that for 2 ⩽ n = O|P|(1) we have ${\mid}{\Delta}_n(P){\mid}{\gtrsim}{\frac{{\mid}P{\mid}^n}{{\log}^{\frac{13}{2}(n-1)}{\mid}P{\mid}}}$. Our argument uses the energy construction of Elekes and a general version of Rudnev's rich-line bound implicit in [28], which allows one to iterate efficiently on intersecting nested subsets of Guth-Katz lines. Let G is a simple connected graph on m = O(1) vertices with m ⩾ 2. Define the graph-distance set ∆G(P) as ∆G(P) = {(|pi - pj|){i,j}∈E(G) : pi, pj ∈ P}. Combining with results of Guth and Katz [17] and Rudnev [28] with the above, if G has a Hamiltonian path we have ${\mid}{\Delta}_G(P){\mid}{\gtrsim}{\frac{{\mid}P{\mid}^{m-1}}{\text{polylog}{\mid}P{\mid}}}$.