• 제목/요약/키워드: Listed Modern Building

검색결과 4건 처리시간 0.018초

실내용 이동로봇을 위한 위치추정 관측모델 설계 및 미끄러짐 오차 보상 기법 개발 (Observation Likelihood Function Design and Slippage Error Compensation Scheme for Indoor Mobile Robots)

  • 문창배;김경록;송재복;정우진
    • 제어로봇시스템학회논문지
    • /
    • 제13권11호
    • /
    • pp.1092-1098
    • /
    • 2007
  • A mobile robot localization problem can be classified into following three sub-problems as an observation likelihood model, a motion model and a filtering technique. So far, we have developed the range sensor based, integrated localization scheme, which can be used in human-coexisting real environment such as a science museum and office buildings. From those experiences, we found out that there are several significant issues to be solved. In this paper, we focus on three key issues, and then illustrate our solutions to the presented problems. Three issues are listed as follows: (1) Investigation of design requirements of a desirable observation likelihood model, and performance analysis of our design (2) Performance evaluation of the localization result by computing the matching error (3) The semi-global localization scheme to deal with localization failure due to abrupt wheel slippage In this paper, we show the significance of each concept, developed solutions and the experimental results. Experiments were carried out in a typical modern building environment, and the results clearly show that the proposed solutions are useful to develop practical and integrated localization schemes.

The Usage of Modern Information Technologies for Conducting Effective Monitoring of Quality in Higher Education

  • Oseredchuk, Olga;Nikolenko, Lyudmyla;Dolynnyi, Serhii;Ordatii, Nataliia;Sytnik, Tetiana;Stratan-Artyshkova, Tatiana
    • International Journal of Computer Science & Network Security
    • /
    • 제22권1호
    • /
    • pp.113-120
    • /
    • 2022
  • Information technologies in higher education are the basis for solving the tasks set by monitoring the quality of higher education. The directions of aplying information technologies which are used the most nowadays have been listed. The issues that should be addressed by monitoring the quality of higher education with the use of information technology have been listed. The functional basis for building a monitoring system is the cyclical stages: Observation; Orientation; Decision; Action. The monitoring system's considered cyclicity ensures that the concept of independent functioning of the monitoring system's subsystems is implemented.. It also ensures real-time task execution and information availability for all levels of the system's hierarchy of vertical and horizontal links, with the ability to restrict access. The educational branch uses information and computer technologies to monitor research results, which are realized in: scientific, reference, and educational output; electronic resources; state standards of education; analytical materials; materials for state reports; expert inferences on current issues of education and science; normative legal documents; state and sectoral programs; conference recommendations; informational, bibliographic, abstract, review publications; digests. The quality of Ukrainian scientists' scientific work is measured using a variety of bibliographic markers. The most common is the citation index. In order to carry out high-quality systematization of information and computer monitoring technologies, the classification has been carried out on the basis of certain features: (processual support for implementation by publishing, distributing and using the results of research work). The advantages and disadvantages of using web-based resources and services as information technology tools have been discussed. A set of indicators disclosed in the article evaluates the effectiveness of any means or method of observation and control over the object of monitoring. The use of information technology for monitoring and evaluating higher education is feasible and widespread in Ukrainian education, and it encourages the adoption of e-learning. The functional elements that stand out in the information-analytical monitoring system have been disclosed.

표준화된 2D CAD와 3D Digital Modeling을 이용한 옥천천주교회의 연혁 기록 (Documentation of the History of Ok-Cheon Catholic Church by standardized 2D CAD and 3D Digital Modeling)

  • 김명선;최순용
    • 한국산학기술학회논문지
    • /
    • 제12권1호
    • /
    • pp.523-528
    • /
    • 2011
  • 옥천천주교회는 1955년 건립된 이후 4차례에 걸쳐 변형되었다. 앞의 세 차례 변화는 창호와 지붕재료의 간단한 변경이었다면, 1991년 증축이 가장 큰 규모로 일(一)자형 평면에서 장십자형 평면으로 변경되면서 규모 구조 형태에 변화가 생겼다. 현재 이러한 건물연혁은 텍스트로만 정리되어 있을 뿐 시각자료로 구축되어 있지 않다. 이 연구는 옥천천주교회의 시기별 건물 연혁을 내장한 표준화된 2D CAD 도면을 작성하고 3D Digital Modeling을 통해 건물연혁 및 현재 상태를 쉽게 판별할 수 있는 3차원 시각자료를 구축하였다. 이를 통해 등록문화재로 지정된 이 교회의 연혁이 시각자료로 통합되었다. 이 자료는 건물의 보존 및 관리에 효과적으로 이용되며 향후 변경이나 증축, 복원이나 재활용 등에도 기초로 활용될 것이다.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제16권1호
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.