• Title/Summary/Keyword: Random fixed point

Search Result 62, Processing Time 0.023 seconds

Design of Quantitative Feedback Control System for the Three Axes Hydraulic Road Simulator (3축 유압 도로 시뮬레이터의 정량적 피드백 제어 시스템 설계)

  • Kim, Jin-Wan;Xuan, Dong-Ji;Kim, Young-Bae
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.32 no.3
    • /
    • pp.280-289
    • /
    • 2008
  • This paper presents design of the quantitative feedback control system of the three axes hydraulic road simulator with respect to the dummy wheel for uncertain multiple input-output(MIMO) feedback systems. This simulator has the uncertain parameters such as fluid compressibility, fluid leakage, electrical servo components and nonlinear mechanical connections. This works have reproduced the random input signal to implement the real road vibration's data in the lab. The replaced $m^2$ MISO equivalent control systems satisfied the design specifications of the original $m^*m$ MIMO control system and developed the mathematical method using quantitative feedback theory based on schauder's fixed point theorem. This control system illustrates a tracking performance of the closed-loop controller with low order transfer function G(s) and pre-filter F(s) having the minimum bandwidth for parameters of uncertain plant. The efficacy of the designed controller is verified through the dynamic simulation with combined hydraulic model and Adams simulator model. The Matlab simulation results to connect with Adams simulator model show that the proposed control technique works well under uncertain hydraulic plant system. The designed control system has satisfied robust performance with stability bounds, tracking bounds and disturbance. The Hydraulic road simulator consists of the specimen, hydraulic pump, servo valve, hydraulic actuator and its control equipments

Development of Machine Learning based Flood Depth and Location Prediction Model (머신러닝을 이용한 침수 깊이와 위치예측 모델 개발)

  • Ji-Wook Kang;Jong-Hyeok Park;Soo-Hee Han;Kyung-Jun Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.1
    • /
    • pp.91-98
    • /
    • 2023
  • With the increasing flood damage by frequently localized heavy rains, flood prediction research are being conducted to prevent flooding damage in advance. In this paper, we present a machine-learning scheme for developing a flooding depth and location prediction model using real-time rainfall data. This scheme proposes a dataset configuration method using the data as input, which can robustly configure various rainfall distribution patterns and train the model with less memory. These data are composed of two: valid total data and valid local. The one data that has a significant effect on flooding predicted the flooding location well but tended to have different values for predicting specific rainfall patterns. The other data that means the flood area partially affects flooding refers to valid local data. The valid local data was well learned for the fixed point method, but the flooding location was not accurately indicated for the arbitrary point method. Through this study, it is expected that a lot of damage can be prevented by predicting the depth and location of flooding in a real-time manner.

Intensity estimation with log-linear Poisson model on linear networks

  • Idris Demirsoy;Fred W. Hufferb
    • Communications for Statistical Applications and Methods
    • /
    • v.30 no.1
    • /
    • pp.95-107
    • /
    • 2023
  • Purpose: The statistical analysis of point processes on linear networks is a recent area of research that studies processes of events happening randomly in space (or space-time) but with locations limited to reside on a linear network. For example, traffic accidents happen at random places that are limited to lying on a network of streets. This paper applies techniques developed for point processes on linear networks and the tools available in the R-package spatstat to estimate the intensity of traffic accidents in Leon County, Florida. Methods: The intensity of accidents on the linear network of streets is estimated using log-linear Poisson models which incorporate cubic basis spline (B-spline) terms which are functions of the x and y coordinates. The splines used equally-spaced knots. Ten different models are fit to the data using a variety of covariates. The models are compared with each other using an analysis of deviance for nested models. Results: We found all covariates contributed significantly to the model. AIC and BIC were used to select 9 as the number of knots. Additionally, covariates have different effects such as increasing the speed limit would decrease traffic accident intensity by 0.9794 but increasing the number of lanes would result in an increase in the intensity of traffic accidents by 1.086. Conclusion: Our analysis shows that if other conditions are held fixed, the number of accidents actually decreases on roads with higher speed limits. The software we currently use allows our models to contain only spatial covariates and does not permit the use of temporal or space-time covariates. We would like to extend our models to include such covariates which would allow us to include weather conditions or the presence of special events (football games or concerts) as covariates.

Verification of Stereotactic Target Point Achieved by Acquisition of MR Image in Actual Treatment Position of Radiosurgery (정위적 방사선 수술시 치료위치에서의 정위적 표적점 확인을 통한 자기공명영상 획득의 정확도 연구)

  • Kim Sang Hwan;Ryu Ji Ok;Kim Baek Kyu;Kim Yong ho
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.11 no.1
    • /
    • pp.43-48
    • /
    • 1999
  • Purpose : For practical application of the MR image for stereotactic radiosurgery, the target point achieved by acquisition of MR image in a relatively homogeneous phantom has to agree with the actual isocenter of irradiation in real radiosurgery and the amount of distortion of the MR image should be known. Materials and Methods : A dosimetric film with a random target point was inserted into a radish vertically and horizontally on axis Z and they were fixed with a headring. After image acquisition by stereotactic radiosurgery planning system, we achieved stereotactic coordinate of the target point and examined irradiation using the coordinate acquired as isocenter. After the irradiation, the film in the radish was developed and processed and the degree of coincidence between the target point marked on the film and the center of the radiation distribution. In order to measure the degree of distortion of the MR image in a different way, an acryl phantom was made and punctures were made at intervals of 1 cm and a drop of oil was dropped into it. Then, it was inserted into the radish vertically and horizontally on axis Z to acquire the MR image. Each coordinate was achieved and the estimation of distortion of MR image was made both in vertical and horizontal directions Results : The film from the radio was developed and for the one inserted vertically on axis Z, there was a good coincidence in the discrepancy between the target point marked on the film and the center of the radiation distribution. For the one inserted horizontally, the discrepancy between them was under 0.5 mm. As a result of estimating distortion of MR image using acryl, the discrepancy was under 0.45 mm in the case of the phantom inserted vertically on axis Z, and that of the one inserted horizontally was 1.4 mm. Conclusion : We were able to confirm good coincidence in homogeneous phantom in actual treatment position of radiosurgery using the MR image and the discrepancy measured in the analysis of distortion of the MR image did not exceed the permissible level. Therefore, it was evident the system of the hospital is suitable for radiosurgery using MR image.

  • PDF

A Study on the Secure Double Pipe Hash Function (안전한 이중 파이프 해쉬함수에 관한 연구)

  • Kim, Hie-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.201-208
    • /
    • 2010
  • The classical iterated hash function is vulnerable to a multi-collision attack. Gauravaram et al. proposed 3C and 3C+ hash functions, in which an accumulation chain is added to usual Merkle-Damgard changing. Their goal is to design composition schemes resistant to generic attacks of Joux's type, but Joscak and Tuma have shown that 3C and 3C+ schemes are not better than Merkle-Damgard scheme in term of security against multi-collision attacks under some mild assumptions. In this dissertation, in order to increase security of 3C hash function, we proposed secure double pipe hash function which was effectively using XOR and XNOR operations per blocks of message. We seek to improve on the work of Lucks in a way. Proposed secure double pipe hash function takes resistance to multi-block collision, fixed point and pre-image attacks.

Embedding Method of Secret Data using Error-Diffusion (오차 확산법을 이용한 기밀 데이터 합성법)

  • 박영란;이혜주;박지환
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.2
    • /
    • pp.155-165
    • /
    • 1999
  • Because the encrypted data is random, there is a possibility of threat that attacker reveals the secret data. On the other hand, as the image steganogrphy is to embed the secret data into cover image and to transmit the embedded image to receiver, an attacker could not know the existence of secret data even though he/she sees the embedded image, therefore the sender may reduce the threat of attack. In the image steganography, the secret data is embedded by modifying value of pixels as a form of noise. If the secret data is embedded into gray image, the degradation of image quality results from the modifications of image due to noise. Therefore many methods have been proposed to embed the secret data while dethering the gray image, but the existing method using error-diffusion has a problem that any patterns such as a diagonal lines or vertical take place due to embedding the secret data at the fixed interval. To solve this problem and to improve the existing method, we proposed the new method that embeds the secret data at changed point with respect to 1's run-length or at the position where has the minimum difference with the original dithered value. We evaluated the performance of the proposed method by computer simulation.

  • PDF

Extended Slack Stealing Algorithm for Improve Response Time of Aperiodic Tasks (비주기 태스트의 응답시간을 개선하기 위해 확장한 슬랙 스틸링 알고리즘)

  • Choi, Man-Uk;Han, Dae-Man;Koo, Yong-Wan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2229-2237
    • /
    • 2000
  • This paper intends to improve the problems of the slack stealing algorithm scheduling for periodic tasks with fixed priority and aperiodic tasks which occur dynamically. The Slack stealing algorithm reduces unnecessary waiting time by making the service possible immediately when the slack stealing server gives suitable priority to aperiodic tasks according to the status of aperiodic tasks arrivals at runtime. But no performs the slack stealing, we must calculate execution time of periodic tasks till the point of random. And, execution time of periodic tasks is being repeatedly every hours while the slack algorithm is applied. We show time complexity hen is used as to O(n) if the nubmer of tasks which is applied to the calculation is n. In this appear, due to stored in tables slack times and the execution times of the scheduled periodic tasks, the complexity of aperiodic tasks which is occurring dynamically reduced to O(log n) and improves the responses times. We prove the algorithm proposed in this paper through the simulation.

  • PDF

Real-Time Implementation of Wideband Adaptive Multi Rate (AMR-WB) Speech Codec Using TMS32OC6201 (TMS320C6201을 이용한 적응 다중 전송율을 갖는 광대역 음성부호화기의 실시간 구현)

  • Lee, Seung-Won;Bae, Keun-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.9C
    • /
    • pp.1337-1344
    • /
    • 2004
  • This paper deals with analysis and real-time Implementation of a wide band adaptive multirate speech codec (AMR-WB) using a fixed-point DSP of TI's TMS320C6201. In the AMR-WB codec, input speech is divided into two frequency bands, lower and upper bands, and processed independently. The lower band signal is encoded based on the ACELP algorithm and the upper band signal is processed using the random excitation with a linear prediction synthesis filter. The implemented AMR-WB system used 218 kbytes of program memory and 92 kbytes of data memory. And its proper operation was confirmed by comparing a decoded speech signal sample-by-sample with that of PC-based simulation. Maximum required time of 5 75 ms for processing a frame of 20 ms of speech validates real-time operation of the Implemented system.

Electric Arc Furnace Voltage Flicker Mitigation by Applying a Predictive Method with Closed Loop Control of the TCR/FC Compensator

  • Kiyoumarsi, Arash;Ataei, Mohhamad;Hooshmand, Rahmat-Allah;Kolagar, Arash Dehestani
    • Journal of Electrical Engineering and Technology
    • /
    • v.5 no.1
    • /
    • pp.116-128
    • /
    • 2010
  • Modeling of the three phase electric arc furnace and its voltage flicker mitigation are the purposes of this paper. For modeling of the electric arc furnace, at first, the arc is modeled by using current-voltage characteristic of a real arc. Then, the arc random characteristic has been taken into account by modulating the ac voltage via a band limited white noise. The electric arc furnace compensation with static VAr compensator, Thyristor Controlled Reactor combined with a Fixed Capacitor bank (TCR/FC), is discussed for closed loop control of the compensator. Instantaneous flicker sensation curves, before and after accomplishing compensation, are measured based on IEC standard. A new method for controlling TCR/FC compensator is proposed. This method is based on applying a predictive approach with closed loop control of the TCR/FC. In this method, by using the previous samples of the load reactive power, the future values of the load reactive power are predicted in order to consider the time delay in the compensator control. Also, in closed loop control, two different approaches are considered. The former is based on voltage regulation at the point of common coupling (PCC) and the later is based on enhancement of power factor at PCC. Finally, in order to show the effectiveness of the proposed methodology, the simulation results are provided.

Estimating the Determinants of foreign direct investment of korea : A Panel Data Model Approach (페널 데이터모형을 적용한 한국의 해외 직접투자 결정요인 추정에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Dae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.4
    • /
    • pp.231-240
    • /
    • 2008
  • In respect complication, group and period, the foreign direct investment of korea is composed of various factors. This paper studies focus on estimating the determinants of foreign direct investment of korea. The region of analysis consist of 7 groups, that is, Asia, Europe, Central and South America, Oceania, Africa, Middle East. Analyzing period be formed over a 67 point(2002. 6${\sim}$2007. 12). In this paper dependent variable setting up an amount of foreign direct investment, explanatory(independent) variables composed of gross domestic product, a balance of current accounts, the foreign exchange rate, employment to population ratio, an average of the rate of operation(the manufacturing industry), consumer price index, the amount of export, wages(a service industry). For an actual proof analysis, LIMDEP 8.0 software, analysis model is random effect in TWECR The result of estimating the determinants of foreign direct investment of korea provides empirical evidences of significance positive relationships between employment to population ratio and wages(a service industry). However this study provides empirical evidences of significance negative relationships between the foreign exchange rate, censurer price index and the amount of export. The explanatory variables, that is, an average of the rate of operation(the manufacturing industry), gross domestic product and a balance of current accounts, are non-significance variables.

  • PDF