• Title/Summary/Keyword: Listed Modern Building

Search Result 4, Processing Time 0.021 seconds

Observation Likelihood Function Design and Slippage Error Compensation Scheme for Indoor Mobile Robots (실내용 이동로봇을 위한 위치추정 관측모델 설계 및 미끄러짐 오차 보상 기법 개발)

  • Moon, Chang-Bae;Kim, Kyoung-Rok;Song, Jae-Bok;Chung, Woo-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.11
    • /
    • pp.1092-1098
    • /
    • 2007
  • A mobile robot localization problem can be classified into following three sub-problems as an observation likelihood model, a motion model and a filtering technique. So far, we have developed the range sensor based, integrated localization scheme, which can be used in human-coexisting real environment such as a science museum and office buildings. From those experiences, we found out that there are several significant issues to be solved. In this paper, we focus on three key issues, and then illustrate our solutions to the presented problems. Three issues are listed as follows: (1) Investigation of design requirements of a desirable observation likelihood model, and performance analysis of our design (2) Performance evaluation of the localization result by computing the matching error (3) The semi-global localization scheme to deal with localization failure due to abrupt wheel slippage In this paper, we show the significance of each concept, developed solutions and the experimental results. Experiments were carried out in a typical modern building environment, and the results clearly show that the proposed solutions are useful to develop practical and integrated localization schemes.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

Documentation of the History of Ok-Cheon Catholic Church by standardized 2D CAD and 3D Digital Modeling (표준화된 2D CAD와 3D Digital Modeling을 이용한 옥천천주교회의 연혁 기록)

  • Kim, Myung-Sun;Choi, Soon-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.523-528
    • /
    • 2011
  • Ok-Cheon catholic church has been changed 4 times since it's first construction in 1955. Prior three changes were small ones of windows, doors, roof finish etc. but the last alteration was the extension of it's plan from 一 shape to long cross shape and along with it the size, structure and form of it changed. This history of the church has not been recorded in drawing but only in text with indistinct features not documented. This study makes a new 2D CAD files using layers matched the changes and 3D digital models, these have not only present information but also change informations of the church. They are useful data for effective management, conservation restoration or possible reuse of it.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.