• Title/Summary/Keyword: Iterative Design Algorithm

Search Result 238, Processing Time 0.024 seconds

Computations of Wave Energy by Stream Function Wave Theory (흐름함수파이론에 의한 파랑 에너지의 계산)

  • Lee, Jung Lyul;Pyun, Chong Kun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.6 no.2
    • /
    • pp.67-75
    • /
    • 1986
  • This paper introduces the nonlinear Stream Function Wave Theory for design waves efficiently to compute the wave energy and energy transport quantities and to analyze the effects of nonlinearities on them. The Stream Function Wave Theory was developed by Dean for case of the observed waves with assymmetric wave profiles and of the design waves with symmetric theoretical wave profiles. Dalrymple later improved the computational procedure by adding two Lagrangian constraints so that more efficient convergence of the iterative numerical method to a specified wave height and to a zero mean free surface displacement resulted. And the Stream Function coefficients are computed numerically by the improved Marquardt algorithm developed for this study. As the result of this study the effects of nonlinearities on the wave quantities of the average potential energy density, the average kinetic energy density result in overestimation by linear wave theory compared to the Stream Function Wave Theory and increase monotonically with decreasing $L^*/L_O$ and with increasing $H/H_B$. The effects of nonlinearities on the group velocity and the wavelength quantities result in underestimation by linear wave theory and increase monotonically with increasing $H/H_B$. Finally the effect of nonlinearity on the average total energy flux results in overestimation for shallow water waves and underestimation for deep water waves by linear wave theory.

  • PDF

A Study on Intelligent Control of Real-Time Working Motion Generation of Bipped Robot (2족 보행로봇의 실시간 작업동작 생성을 위한 지능제어에 관한 연구)

  • Kim, Min-Seong;Jo, Sang-Young;Koo, Young-Mok;Jeong, Yang-Gun;Han, Sung-Hyun
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.19 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • In this paper, we propose a new learning control scheme for various walk motion control of biped robot with same learning-base by neural network. We show that learning control algorithm based on the neural network is significantly more attractive intelligent controller design than previous traditional forms of control systems. A multi layer back propagation neural network identification is simulated to obtain a dynamic model of biped robot. Once the neural network has learned, the other neural network control is designed for various trajectory tracking control with same learning-base. The biped robots have been received increased attention due to several properties such as its human like mobility and the high-order dynamic equation. These properties enable the biped robots to perform the dangerous works instead of human beings. Thus, the stable walking control of the biped robots is a fundamentally hot issue and has been studied by many researchers. However, legged locomotion, it is difficult to control the biped robots. Besides, unlike the robot manipulator, the biped robot has an uncontrollable degree of freedom playing a dominant role for the stability of their locomotion in the biped robot dynamics. From the simulation and experiments the reliability of iterative learning control was illustrated.

Design of High Speed Binary Arithmetic Encoder for CABAC Encoder (CABAC 부호화기를 위한 고속 이진 산술 부호화기의 설계)

  • Park, Seungyong;Jo, Hyungu;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.774-780
    • /
    • 2017
  • This paper proposes an efficient binary arithmetic encoder hardware architecture for CABAC encoding, which is an entropy coding method of HEVC. CABAC is an entropy coding method that is used in HEVC standard. Entropy coding removes statistical redundancy and supports a high compression ratio of images. However, the binary arithmetic encoder causes a delay in real time processing and parallel processing is difficult because of the high dependency between data. The operation of the proposed CABAC BAE hardware structure is to separate the renormalization and process the conventional iterative algorithm in parallel. The new scheme was designed as a four-stage pipeline structure that can reduce critical path optimally. The proposed CABAC BAE hardware architecture was designed with Verilog HDL and implemented in 65nm technology. Its gate count is 8.07K and maximum operating speed of 769MHz. It processes the four bin per clock cycle. Maximum processing speed increased by 26% from existing hardware architectures.

Piecewise exact solution for analysis of base-isolated structures under earthquakes

  • Tsai, C.S.;Chiang, Tsu-Cheng;Chen, Bo-Jen;Chen, Kuei-Chi
    • Structural Engineering and Mechanics
    • /
    • v.19 no.4
    • /
    • pp.381-399
    • /
    • 2005
  • Base isolation technologies have been proven to be very efficient in protecting structures from seismic hazards during experimental and theoretical studies. In recent years, there have been more and more engineering applications using base isolators to upgrade the seismic resistibility of structures. Optimum design of the base isolator can lessen the undesirable seismic hazard with the most efficiency. Hence, tracing the nonlinear behavior of the base isolator with good accuracy is important in the engineering profession. In order to predict the nonlinear behavior of base isolated structures precisely, hundreds even thousands of degrees-of-freedom and iterative algorithm are required for nonlinear time history analysis. In view of this, a simple and feasible exact formulation without any iteration has been proposed in this study to calculate the seismic responses of structures with base isolators. Comparison between the experimental results from shaking table tests conducted at National Center for Research on Earthquake Engineering in Taiwan and the analytical results show that the proposed method can accurately simulate the seismic behavior of base isolated structures with elastomeric bearings. Furthermore, it is also shown that the proposed method can predict the nonlinear behavior of the VCFPS isolated structure with accuracy as compared to that from the nonlinear finite element program. Therefore, the proposed concept can be used as a simple and practical tool for engineering professions for designing the elastomeric bearing as well as sliding bearing.

Autonomous exploration for radioactive sources localization based on radiation field reconstruction

  • Xulin Hu;Junling Wang;Jianwen Huo;Ying Zhou;Yunlei Guo;Li Hu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1153-1164
    • /
    • 2024
  • In recent years, unmanned ground vehicles (UGVs) have been used to search for lost or stolen radioactive sources to avoid radiation exposure for operators. To achieve autonomous localization of radioactive sources, the UGVs must have the ability to automatically determine the next radiation measurement location instead of following a predefined path. Also, the radiation field of radioactive sources has to be reconstructed or inverted utilizing discrete measurements to obtain the radiation intensity distribution in the area of interest. In this study, we propose an effective source localization framework and method, in which UGVs are able to autonomously explore in the radiation area to determine the location of radioactive sources through an iterative process: path planning, radiation field reconstruction and estimation of source location. In the search process, the next radiation measurement point of the UGVs is fully predicted by the design path planning algorithm. After obtaining the measurement points and their radiation measurements, the radiation field of radioactive sources is reconstructed by the Gaussian process regression (GPR) model based on machine learning method. Based on the reconstructed radiation field, the locations of radioactive sources can be determined by the peak analysis method. The proposed method is verified through extensive simulation experiments, and the real source localization experiment on a Cs-137 point source shows that the proposed method can accurately locate the radioactive source with an error of approximately 0.30 m. The experimental results reveal the important practicality of our proposed method for source autonomous localization tasks.

Implementation of High-Throughput SHA-1 Hash Algorithm using Multiple Unfolding Technique (다중 언폴딩 기법을 이용한 SHA-1 해쉬 알고리즘 고속 구현)

  • Lee, Eun-Hee;Lee, Je-Hoon;Jang, Young-Jo;Cho, Kyoung-Rok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.4
    • /
    • pp.41-49
    • /
    • 2010
  • This paper proposes a new high speed SHA-1 architecture using multiple unfolding and pre-computation techniques. We unfolds iterative hash operations to 2 continuos hash stage and reschedules computation timing. Then, the part of critical path is computed at the previous hash operation round and the rest is performed in the present round. These techniques reduce 3 additions to 2 additions on the critical path. It makes the maximum clock frequency of 118 MHz which provides throughput rate of 5.9 Gbps. The proposed architecture shows 26% higher throughput with a 32% smaller hardware size compared to other counterparts. This paper also introduces a analytical model of multiple SHA-1 architecture at the system level that maps a large input data on SHA-1 block in parallel. The model gives us the required number of SHA-1 blocks for a large multimedia data processing that it helps to make decision hardware configuration. The hs fospeed SHA-1 is useful to generate a condensed message and may strengthen the security of mobile communication and internet service.

Distributed Throughput-Maximization Using the Up- and Downlink Duality in Wireless Networks (무선망에서의 상하향 링크 쌍대성 성질을 활용한 분산적 수율 최대화 기법)

  • Park, Jung-Min;Kim, Seong-Lyun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11A
    • /
    • pp.878-891
    • /
    • 2011
  • We consider the throughput-maximization problem for both the up- and downlink in a wireless network with interference channels. For this purpose, we design an iterative and distributive uplink algorithm based on Lagrangian relaxation. Using the uplink power prices and network duality, we achieve throughput-maximization in the dual downlink that has a symmetric channel and an equal power budget compared to the uplink. The network duality we prove here is a generalized version of previous research [10], [11]. Computational tests show that the performance of the up- and downlink throughput for our algorithms is close to the optimal value for the channel orthogonality factor, ${\theta}{\in}$(0.5, 1]. On the other hand, when the channels are slightly orthogonal (${\theta}{\in}$(0, 0.5]), we observe some throughput degradation in the downlink. We have extended our analysis to the real downlink that has a nonsymmetric channel and an unequal power budget compared to the uplink. It is shown that the modified duality-based approach is thoroughly applied to the real downlink. Considering the complexity of the algorithms in [6] and [18], we conclude that these results are quite encouraging in terms of both performance and practical applicability of the generalized duality theorem.

Double Encryption of Digital Hologram Based on Phase-Shifting Digital Holography and Digital Watermarking (위상 천이 디지털 홀로그래피 및 디지털 워터마킹 기반 디지털 홀로그램의 이중 암호화)

  • Kim, Cheol-Su
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2017
  • In this Paper, Double Encryption Technology Based on Phase-Shifting Digital Holography and Digital Watermarking is Proposed. For the Purpose, we First Set a Logo Image to be used for Digital Watermark and Design a Binary Phase Computer Generated Hologram for this Logo Image using an Iterative Algorithm. And Random Generated Binary Phase Mask to be set as a Watermark and Key Image is Obtained through XOR Operation between Binary Phase CGH and Random Binary Phase Mask. Object Image is Phase Modulated to be a Constant Amplitude and Multiplied with Binary Phase Mask to Generate Object Wave. This Object Wave can be said to be a First Encrypted Image Having a Pattern Similar to the Noise Including the Watermark Information. Finally, we Interfere the First Encrypted Image with Reference Wave using 2-step PSDH and get a Good Visible Interference Pattern to be Called Second Encrypted Image. The Decryption Process is Proceeded with Fresnel Transform and Inverse Process of First Encryption Process After Appropriate Arithmetic Operation with Two Encrypted Images. The Proposed Encryption and Decryption Process is Confirmed through the Computer Simulations.