• Title/Summary/Keyword: Mathematics Platform

Search Result 50, Processing Time 0.023 seconds

Path Following Control of Mobile Robot Using Lyapunov Techniques and PID Cntroller

  • Jin, Tae-Seok;Tack, Han-Ho
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.1
    • /
    • pp.49-53
    • /
    • 2011
  • Path following of the mobile robot is one research hot for the mobile robot navigation. For the control system of the wheeled mobile robot(WMR) being in nonhonolomic system and the complex relations among the control parameters, it is difficult to solve the problem based on traditional mathematics model. In this paper, we presents a simple and effective way of implementing an adaptive following controller based on the PID for mobile robot path following. The method uses a non-linear model of mobile robot kinematics and thus allows an accurate prediction of the future trajectories. The proposed controller has a parallel structure that consists of PID controller with a fixed gain. The control law is constructed on the basis of Lyapunov stability theory. Computer simulation for a differentially driven nonholonomic mobile robot is carried out in the velocity and orientation tracking control of the nonholonomic WMR. The simulation results of wheel type mobile robot platform are given to show the effectiveness of the proposed algorithm.

$MAP1, MAP2/G/1 FINITE QUEUES WITH SERVICE SCHEDULING FUNCTION DEPENDENT UPON QUEUE LENGTHS

  • Choi, Doo-Il;Lee, Sang-Min
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.673-689
    • /
    • 2009
  • We analyze $MAP_1,\;MAP_2$/G/1 finite queues with service scheduling function dependent upon queue lengths. The customers are classified into two types. The arrivals of customers are assumed to be the Markovian Arrival Processes (MAPs). The service order of customers in each buffer is determined by a service scheduling function dependent upon queue lengths. Methods of embedded Markov chain and supplementary variable give us information for queue length of two buffers. Finally, the performance measures such as loss probability and mean waiting time are derived. Some numerical examples also are given with applications in telecommunication networks.

A study on a FPGA based implementation of the 2 dimensional discrete wavelet transform using a fast lifting scheme algorithm for the JPEG2000 image compression (JPEG2000 영상압축을 위한 리프팅 설계 알고리즘을 이용한 2차원 이산 웨이블릿 변환 프로세서의 FPGA 구현에 대한 연구)

  • 송영규;고광철;정제명
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.2315-2318
    • /
    • 2003
  • The Wavelet Transform has been applied in mathematics and computer sciences. Numerous studies have proven its advantages in image processing and data compression, and have made it a basic encoding technique in data compression standards like JPEG2000 and MPEG-4. Software implementations of the Discrete Wavelet Transform (DWT) appears to be the performance bottleneck in real-time systems in terms of performance. And hardware implementations are not flexible. Therefore, FPGA implementations of the DWT has been a topic of recent research. The goal of this thesis is to investigate of FPGA implementations of the DWT Processor for image compression applications. The DWT processor design is based on the Lifting Based Wavelet Transform Scheme, which is a fast implementation of the DWT The design uses various techniques. The DWT Processor was simulated and implemented in a FLEX FPGA platform of Altera

  • PDF

Efficient Masking Methods Appropriate for the Block Ciphers ARIA and AES

  • Kim, Hee-Seok;Kim, Tae-Hyun;Han, Dong-Guk;Hong, Seok-Hie
    • ETRI Journal
    • /
    • v.32 no.3
    • /
    • pp.370-379
    • /
    • 2010
  • In this paper, we propose efficient masking methods for ARIA and AES. In general, a masked S-box (MS) block can be constructed in different ways depending on the implementation platform, such as hardware and software. However, the other components of ARIA and AES have less impact on the implementation cost. We first propose an efficient masking structure by minimizing the number of mask corrections under the assumption that we have an MS block. Second, to make a secure and efficient MS block for ARIA and AES, we propose novel methods to solve the table size problem for the MS block in a software implementation and to reduce the cost of a masked inversion which is the main part of the MS block in the hardware implementation.

NFT-Based Ticket Ownership Booking And Trading Platform (NFT 기반의 티켓 소유권 예매 및 거래 플랫폼)

  • Lee, Kyung-Yong;Ryu, Sang-Uk;Lee, Seung-Bin;Shin, Young-Min
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.734-736
    • /
    • 2022
  • 티켓은 우리의 문화생활을 위한 필수 불가결한 요소이다. 그러나 기존의 티켓 시스템에 대한 소비자들의 불만과 악의적인 범죄 피해가 늘어가는 상황에서 새로운 대안의 필요성이 커졌다. 이를 해결하고자 Klaytn 기반의 NFT 시스템으로 티켓을 NFT화하여 수수료 및 환불에 대한 소비자들의 피해와 불만을 해소하고, 티켓 거래의 투명성을 제고하는 티켓 예매 및 거래 플랫폼 방안을 제시한다.

A Self-Service Business Intelligence System for Recommending New Crops (재배 작물 추천을 위한 셀프서비스 비즈니스 인텔리전스 시스템)

  • Kim, Sam-Keun;Kim, Kwang-Chae;Kim, Hyeon-Woo;Jeong, Woo-Jin;Ahn, Jae-Geun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.527-535
    • /
    • 2021
  • Traditional business intelligence (BI) systems have been used widely as tools for better decision-making on time. On the other hand, building a data warehouse (DW) for the efficient analysis of rapidly growing data is time-consuming and complex. In particular, the ETL (Extract, Transform, and Load) process required to build a data warehouse has become much more complex as the BI platform moves to a cloud environment. Various BI solutions based on the NoSQL database, such as MongoDB, have been proposed to overcome these ETL issues. Decision-makers want easy access to data without the help of IT departments or BI experts. Recently, self-service BI (SSBI) has emerged as a way to solve these BI issues. This paper proposes a self-service BI system with farming data using the MongoDB cloud as DW to support the selection of new crops by return-farmers. The proposed system includes functions to provide insights to decision-makers, including data visualization using MongoDB charts, reporting for advanced data search, and monitoring for real-time data analysis. Decision makers can access data directly in various ways and can analyze data in a self-service method using the functions of the proposed system.

Paid Peering: Pricing and Adoption Incentives

  • Courcoubetis, Costas;Sdrolias, Kostas;Weber, Richard
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.975-988
    • /
    • 2016
  • Large access providers (ISPs) are seeking for new types of business agreements and pricing models to manage network costs and monetize better the provision of last-mile services. A typical paradigm of such new pricing norms is the proliferation of paid peering deals between ISPs and content providers (CPs), while on top of this, some ISPs are already experimenting with usage-based tariffs, usually through data-plans, instead of the typical fixed-based charging. In this work we define as common platform, the infrastructure in which a single ISP transacts with several CPs through peering agreements. In this context, we examine whether, and under which market conditions, the profitability of the involved stakeholders improves when the establishment of this platform is accompanied by a monetary compensation from the CPs to the ISP (paid peering), v.s. a scenario where their deal is a typical settlement-free one. In both cases, we assume that the ISP implements a usage-based access pricing scheme, implying that end-users will pay more for higher transaction rates with the CPs. Our framework captures some of the most important details of the current market, such as the various business models adopted by the CPs, the end-users' evaluation towards the ISP's and CPs' level of investments and the traffic rates per transaction for the offered services. By analysing the equilibrium derived by a leader-follower game, it turns out (among other practical takeaways) that whether or not the profitability of a CP improves, it highly depends on whether its business model is to sell content, or if it obtains its revenue from advertisements. Finally, we extract that consumer surplus is considerably higher under paid peering, which in turn implies improved levels of social welfare.

Design and modelling of pre-cast steel-concrete composites for resilient railway track slabs

  • Mirza, Olivia;Kaewunruen, Sakdirat;Kwok, Kenny;Griffin, Dane W.P.
    • Steel and Composite Structures
    • /
    • v.22 no.3
    • /
    • pp.537-565
    • /
    • 2016
  • Australian railway networks possess a large amount of aging timber components and need to replace them in excess of 280 thousands $m^3$ per year. The relatively high turnover of timber sleepers (crossties in a plain track), bearers (skeleton ties in a turnout), and transoms (bridge cross beams) is responsible for producing greenhouse gas emissions 6 times greater than an equivalent reinforced concrete counterparts. This paper presents an innovative solution for the replacement of aging timber transoms installed on existing railway bridges along with the incorporation of a continuous walkway platform, which is proven to provide environmental, safety and financial benefits. Recent developments for alternative composite materials to replace timber components in railway infrastructure construction and maintenance demonstrate some compatibility issues with track stiffness as well as structural and geometrical track systems. Structural concrete are generally used for new railway bridges where the comparatively thicker and heavier fixed slab track systems can be accommodated. This study firstly demonstrates a novel and resilient alterative by incorporating steel-concrete composite slab theory and combines the capabilities of being precast and modulated, in order to reduce the depth, weight and required installation time relative to conventional concrete direct-fixation track slab systems. Clear benefits of the new steel-concrete composites are the maintainability and constructability, especially for existing railway bridges (or brown fields). Critical considerations in the design and finite element modelling for performance benchmarking of composite structures and their failure modes are highlighted in this paper, altogether with risks, compatibilities and compliances.

Text-independent Speaker Identification by Bagging VQ Classifier

  • Kyung, Youn-Jeong;Park, Bong-Dae;Lee, Hwang-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.2E
    • /
    • pp.17-24
    • /
    • 2001
  • In this paper, we propose the bootstrap and aggregating (bagging) vector quantization (VQ) classifier to improve the performance of the text-independent speaker recognition system. This method generates multiple training data sets by resampling the original training data set, constructs the corresponding VQ classifiers, and then integrates the multiple VQ classifiers into a single classifier by voting. The bagging method has been proven to greatly improve the performance of unstable classifiers. Through two different experiments, this paper shows that the VQ classifier is unstable. In one of these experiments, the bias and variance of a VQ classifier are computed with a waveform database. The variance of the VQ classifier is compared with that of the classification and regression tree (CART) classifier[1]. The variance of the VQ classifier is shown to be as large as that of the CART classifier. The other experiment involves speaker recognition. The speaker recognition rates vary significantly by the minor changes in the training data set. The speaker recognition experiments involving a closed set, text-independent and speaker identification are performed with the TIMIT database to compare the performance of the bagging VQ classifier with that of the conventional VQ classifier. The bagging VQ classifier yields improved performance over the conventional VQ classifier. It also outperforms the conventional VQ classifier in small training data set problems.

  • PDF

Formalizing the Design, Evaluation, and Analysis of Quality of Protection in Wireless Networks

  • Lim, Sun-Hee;Yun, Seung-Hwan;Lim, Jong-In;Yi, Ok-Yeon
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.634-644
    • /
    • 2009
  • A diversity of wireless networks, with rapidly evolving wireless technology, are currently in service. Due to their innate physical layer vulnerability, wireless networks require enhanced security components. WLAN, WiBro, and UMTS have defined proper security components that meet standard security requirements. Extensive research has been conducted to enhance the security of individual wireless platforms, and we now have meaningful results at hand. However, with the advent of ubiquitous service, new horizontal platform service models with vertical crosslayer security are expected to be proposed. Research on synchronized security service and interoperability in a heterogeneous environment must be conducted. In heterogeneous environments, to design the balanced security components, quantitative evaluation model of security policy in wireless networks is required. To design appropriate evaluation method of security policies in heterogeneous wireless networks, we formalize the security properties in wireless networks. As the benefit of security protocols is indicated by the quality of protection (QoP), we improve the QoP model and evaluate hybrid security policy in heterogeneous wireless networks by applying to the QoP model. Deriving relative indicators from the positive impact of security points, and using these indicators to quantify a total reward function, this paper will help to assure the appropriate benchmark for combined security components in wireless networks.