• Title/Summary/Keyword: Information Avoiding

Search Result 517, Processing Time 0.042 seconds

RLS Adaptive IIR Filters Based on Equation Error Methods Considering Additive Noises

  • Muneyasu, Mitsuji;Kamikawa, Hidefumi;Hinamoto, Takao
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.215-218
    • /
    • 2000
  • In this paper, a new algorithm for adaptive IIR filters based on equation error methods using the RLS algorithm is proposed. In the proposed algorithm, the concept of feedback of the scaled output error proposed by tin and Unbehauen is employed and the forgetting factor is varied in adaptation process for avoiding the accumulation of the estimation error for additive noise . The proposed algorithm has the good convergence property without the parameter estimation error under the existence of mea-surement noise.

  • PDF

Development of Algorithm for the Decision of Ship's Strong Wind Warning Levels

  • Shouhu, Hu;Moon, Serng-Bae
    • Journal of Navigation and Port Research
    • /
    • v.42 no.5
    • /
    • pp.317-322
    • /
    • 2018
  • Marine weather information provided for vessels is mainly offered by radio devices such as NAVTEX, Weather Fax., and others. However, the information is too general for large areas, and lacks more detail. So, many seafarers are disinclined to use the information to initiate proper readiness of vessels' safety, avoiding marine accidents such as grounding, hull and cargo damage, but cannot develop an optimal and economical navigation plan, considering the inadequate level of low precision weather information. The purpose of this paper is to develop a strong wind warning system, based on the digital anemometer installed on the bridge. This study analyzed the data on 10-minutes average wind speed, when the vessel's grounding accidents happened in Korean ports. Results reveal that the vessel's strong wind warning algorithm, can estimate the growing of wind speed two-three hours in advance.

Proposal of worm Self-Defense technologies avoiding Behavior-based detection (행동기반 탐지를 우회하는 웜 자기방어 기법 제안)

  • Kwon, O-Chul;Cho, Jae-Ik;Moon, Jong-Sub
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.27-30
    • /
    • 2007
  • 초기의 웜은 감염 및 확산의 신속성을 중요시하였으나, 생존성은 고려하진 않았다. 하지만 보안도구(Anti-worm)의 발달에 따라 2004년 이후 대규모의 웜 확산에 의한 피해가 보고되지 않고 있다. 이에 웜도 보안도구를 회피하는 자기방어(Self-Defense) 기법을 개발하여 생존성을 증가시키면서 진화하고 있다. 본 논문은 현존하는 웜 자기방어 기법과 그 한계를 분석한 후 행동기반 탐지 기법을 우회하는 자기방어 기법을 제안하도록 하겠다.

  • PDF

Virtual Reality and Internet GIS for Highway Simulation Based on the ASE

  • Choi Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.21 no.5
    • /
    • pp.433-443
    • /
    • 2005
  • This paper show that, without installation of expensive VR (Virtual Reality) program, the sharing information is possible through posting three-dimensional road structures on the web, and avoiding the conventional top-down decision making method, fast bottom-up communication is possible base on the Virtual GIS (Geographic Information System). In this paper, using Viewpoint Scene Builder, internet-based software, the transformation was conducted to give pertinent type for web posting. In order to use the completed route at the scene builder, the output with ASCII Export is required, and ASE (ASCII Scene Export) contains the property information including the coordinate and frame of mesh vertex. Through in advance recognition of the problems regarding route design and petition due to environmental rights infringement, the time and cost due to design alteration can be reduced. It's difficult to provide VR based on the internet because file that embodied with internet GIS was complicated and its capacity comes to scores of mega-bites. But, this study provides VR with internet according to a basis by simplification of files.

Design of System for Avoiding Identical-Data Upload using SA Hash Algorithm (SA 해쉬 알고리즘을 이용한 동일 데이터 업로드 방지 시스템 설계)

  • Hwang, Sung-Min;Seok, Ho-Jun;Kim, Seog-Gyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.17-19
    • /
    • 2011
  • 본 논문은 클라이언트에서 서버로 파일을 전송할 때, 클라이언트가 보내고자 하는 파일이 서버에 동일한 파일로 있다면 업로드를 받지 않고, 서버의 파일을 재사용함으로써 트래픽을 감소시킬 수 있을뿐더러, 스토리지 용량 또한 절약할 수 있는 시스템 설계이다. 본 논문에서 제안하는 해쉬(Hash) 함수 SA를 사용하여 파일에 해쉬 코드를 생성함으로써 다른 해쉬 함수 보다 키 값의 길이가 길어지고 빠른 속도로 해쉬 값을 얻을 수가 있다. SA Hash Algorithm을 통해 얻어진 해쉬 값을 서버로 전송하여 서버에 동일한 파일이 있다면 클라이언트에서 파일을 전송 받지 않고, 서버 내부의 파일을 사용하는 것으로 자원 절감 효과를 낼 수 있다. 서버에서의 파일 관리도 기존의 날짜, 아이디 등 구별 방식이 아닌 SA Hash Algorithm으로 생성된 해쉬 값으로 파일을 관리 할 수 있음으로 파일 관리의 편의성뿐만이 아니라 빠른 속도로 파일을 접근할 수 있다.

  • PDF

Sinusoidal Map Jumping Gravity Search Algorithm Based on Asynchronous Learning

  • Zhou, Xinxin;Zhu, Guangwei
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.332-343
    • /
    • 2022
  • To address the problems of the gravitational search algorithm (GSA) in which the population is prone to converge prematurely and fall into the local solution when solving the single-objective optimization problem, a sine map jumping gravity search algorithm based on asynchronous learning is proposed. First, a learning mechanism is introduced into the GSA. The agents keep learning from the excellent agents of the population while they are evolving, thus maintaining the memory and sharing of evolution information, addressing the algorithm's shortcoming in evolution that particle information depends on the current position information only, improving the diversity of the population, and avoiding premature convergence. Second, the sine function is used to map the change of the particle velocity into the position probability to improve the convergence accuracy. Third, the Levy flight strategy is introduced to prevent particles from falling into the local optimization. Finally, the proposed algorithm and other intelligent algorithms are simulated on 18 benchmark functions. The simulation results show that the proposed algorithm achieved improved the better performance.

A 3D GUI System for Controlling Agent Robots

  • Hyunsik Ahn;Kang, Chang-Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.848-851
    • /
    • 2002
  • Recently, there are lots of concerning on the integration of robot and virtual reality with the trends of the research of intelligent robot and mined reality. In this paper, a 3D GUI system is proposed based on Internet for remote controlling and monitoring of agent robot working for itself. The proposed system is consists of a manager ordering a new position and displaying the motion of robot, an agent robot moving to the destination according to the indication, a positioning module detecting the current position of robot, and a geographical information module. A user can order the robot agent move to a new position in a virtual space and watch the real images captured from the real sites of the robot. Then, the agent robot moves to the position automatically with avoiding collision by using range finding and a path detection algorithm. We demonstrate the proposed 3D GUI system is supporting a more convenient remote control means far the robots.

  • PDF

Provably Secure Certificate-Based Signcryption Scheme without Pairings

  • Lu, Yang;Li, Jiguo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2554-2571
    • /
    • 2014
  • Certificate-based cryptography is a new cryptographic paradigm that provides an interesting balance between identity-based cryptography and traditional public key cryptography. It not only simplifies the complicated certificate management problem in traditional public key cryptography, but also eliminates the key escrow problem in identity-based cryptography. As an extension of the signcryption in certificate-based cryptography, certificate-based signcryption provides the functionalities of certificate-based encryption and certificate-based signature simultaneously. However, to the best of our knowledge, all constructions of certificate-based signcryption in the literature so far have to be based on the costly bilinear pairings. In this paper, we propose a certificate-based signcryption scheme that does not depend on the bilinear pairings. The proposed scheme is provably secure in the random oracle model. Due to avoiding the computationally-heavy paring operations, the proposed scheme significantly reduces the cost of computation and outperforms the previous certificate-based signcryption schemes.

A trust evaluation method for improving nodes utilization for wireless sensor networks

  • Haibo, Shen;Kechen, Zhuang;Hong, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1113-1135
    • /
    • 2018
  • Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate trust value of nodes, but the nodes' energy saving problem was ignored. Especially when there are a few malicious nodes in a network, the overall trust value calculation for all nodes would waste lots of energy. Beside that, the network failure caused by nodes death was also not considered. In this paper, we proposed a method for avoiding energy hole which applied trust evaluation models and a trust evaluation method based on information entropy, so as to achieve the purpose of improving nodes utilization. Simulation results show that the proposed method can effectively improve nodes utilization, and it has reasonable detection rate and lower false alert rate compared to other classical methods.

Proposal of Virtual Sensor Technique for Quadruped Robot using Backpropagation Neural Network (Back propagation 신경망이론을 이용한 4 족 보행로봇의 가상 센서 기술 제안)

  • Kim, Wan-Soo;Yu, Seung-Nam;Han, Chang-Soo
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.894-899
    • /
    • 2008
  • Measured sensor datum from a quadruped robotics is commonly used for recognizing physical environment information which controls the posture of robotics. We can advance the ambulation with this sensed information and need to synthesize various sensors for obtaining accurate data, but most of these sensors are expensive and require excessive load for the operation. Those defects can be serious problem when it comes to the prototype's practicality and mass production, and maintenance of the system. This paper suggests virtual sensor technology for avoiding previous defects and presents ways to apply a theory to a walking robotics through virtual sensor information which is trained with several kinds of actual sensor information from the prototype system; the general algorithm is initially based on the neural network theory of back propagation. In specific, we verified a possibility of replacing the virtual sensor with the actual one through a reaction force measurement experiment.

  • PDF