• Title/Summary/Keyword: Robust algorithm

Search Result 2,732, Processing Time 0.036 seconds

Solving Probability Constraint in Robust Optimization by Minimizing Percent Defective (불량률 최소화를 통한 강건 최적화의 확률제한조건 처리)

  • Lee, Kwang Ki;Park, Chan Kyoung;Kim, Geun Yeon;Lee, Kwon Hee;Han, Sang Wook;Han, Seung Ho
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.8
    • /
    • pp.975-981
    • /
    • 2013
  • A robust optimization is only one of the ways to minimize the effects of variances in design variables on the objective functions at the preliminary design stage. To predict the variances and to formulate the probabilistic constraints are the most important procedures for the robust optimization formulation. Though several methods such as the process capability index and the six sigma technique were proposed for the prediction and formulation of the variances and probabilistic constraints, respectively, there are few attempts using a percent defective which has been widely applied in the quality control of the manufacturing process for probabilistic constraints. In this study, the robust optimization for a lower control arm of automobile vehicle was carried out, in which the design space showing the mean and variance sensitivity of weight and stress was explored before robust optimization for a lower control arm. The 2nd order Taylor expansion for calculating the standard deviation was used to improve the numerical accuracy for predicting the variances. Simplex algorithm which does not use the gradient information in optimization was used to convert constrained optimization into unconstrained one in robust optimization.

Optimization of Side Airbag Release Algorithm by Genetic Algorithm (유전알고리듬을 이용한 측면 에어백 전개 알고리듬의 최적화)

  • 김권희;홍철기
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.6 no.5
    • /
    • pp.45-54
    • /
    • 1998
  • For proper release of side airbags, the onset of crash should be detected first. After crash detection, the algorithm has to make a decision whether the side airbag deployment is necessary. If the deployment is necessary, proper timing has to be provided for the maximum protection of driver or passenger. The side airbag release algorithm should be robust against the statistical deviations which are inherent to experimental crash test data. Deterministic optimization algorithms cannot be used for the side aribag release algorithm since the objective function cannot be expressed in a closed form. From this background, genetic algorithm has been used for the optimization. The optimization requires moderate amount of computation and gives satisfactory results.

  • PDF

Noise-Robust Algorithm for PPG Signal Measurement (동잡음에 강건한 PPG 신호 측정 방안)

  • Kim, Minho;Kim, Taewook;Jang, Sunghwan;Ban, Dahee;Min, Byungseok;Kwon, Sungoh
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.12
    • /
    • pp.1085-1094
    • /
    • 2013
  • In this paper, we propose a methods to eliminate PPG sensor noise resulted from user motion during measurement. Measured PPG signals require approperiate signal processing methods since various types of noises such as a motion noise by user movement and signal noises occurred from the change of measuring environments. This paper suggests a signal processing method that eliminates motion noises by measuring several PPG channels that are based on the stable patterns of the practical users. The PPG signals are measured by the two channels in this experiment. When the individual error rates are 20%, the proposed algorithm reduces the errors to 9.56%.

Optimal Design of Robust Quantitative Feedback Controllers Using Linear Programming and Genetic Algorithms

  • Bokharaie, Vaheed S.;Khaki-Sedigh, Ali
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.428-432
    • /
    • 2003
  • Quantitative Feedback Theory (QFT) is one of most effective methods of robust controller design and can be considered as a suitable method for systems with parametric uncertainties. Particularly it allows us to obtain controllers less conservative than other methods like $H_{\infty}$ and ${\mu}$-synthesis. In QFT method, we transform all the uncertainties and desired specifications to some boundaries in Nichols chart and then we have to find the nominal loop transfer function such that satisfies the boundaries and has the minimum high frequency gain. The major drawback of the QFT method is that there is no effective and useful method for finding this nominal loop transfer function. The usual approach to this problem involves loop-shaping in the Nichols chart by manipulating the poles and zeros of the nominal loop transfer function. This process now aided by recently developed computer aided design tools proceeds by trial and error and its success often depends heavily on the experience of the loop-shaper. Thus for the novice and First time QFT user, there is a genuine need for an automatic loop-shaping tool to generate a first-cut solution. In this paper, we approach the automatic QFT loop-shaping problem by using an algorithm involving Linear Programming (LP) techniques and Genetic Algorithm (GA).

  • PDF

A Four-Layer Robust Storage in Cloud using Privacy Preserving Technique with Reliable Computational Intelligence in Fog-Edge

  • Nirmala, E.;Muthurajkumar, S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3870-3884
    • /
    • 2020
  • The proposed framework of Four Layer Robust Storage in Cloud (FLRSC) architecture involves host server, local host and edge devices in addition to Virtual Machine Monitoring (VMM). The goal is to protect the privacy of stored data at edge devices. The computational intelligence (CI) part of our algorithm distributes blocks of data to three different layers by partially encoded and forwarded for decoding to the next layer using hash and greed Solomon algorithms. VMM monitoring uses snapshot algorithm to detect intrusion. The proposed system is compared with Tiang Wang method to validate efficiency of data transfer with security. Hence, security is proven against the indexed efficiency. It is an important study to integrate communication between local host software and nearer edge devices through different channels by verifying snapshot using lamport mechanism to ensure integrity and security at software level thereby reducing the latency. It also provides thorough knowledge and understanding about data communication at software level with VMM. The performance evaluation and feasibility study of security in FLRSC against three-layered approach is proven over 232 blocks of data with 98% accuracy. Practical implications and contributions to the growing knowledge base are highlighted along with directions for further research.

A Study on Environment Parameter Compensation Method for Robust Speech Recognition (잡음에 강인한 음성 인식을 위한 환경 파라미터 보상에 관한 연구)

  • Hong, Mi-Jung;Lee, Ho-Woong
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.5 no.2 s.10
    • /
    • pp.1-10
    • /
    • 2006
  • In this paper, VTS(Vector Taylor Series) algorithm, which was proposed by Moreno at Carnegie Mellon University in 1996, is analyzed and simulated. VTS is considered to be one of the robust speech recognition techniques where model parameter conversion technique is adapted. To evaluation performance of the VTS algorithm, We used CMN(Cepstral Mean Normalization) technique which is one of the well-known noise processing methods. And the recognition rate is evaluated when white gaussian and street noise are employed as background noise. Also, the simulation result is analyzed in order to be compared with the previous one which was performed by Moreno.

  • PDF

Facial Shape Recognition Using Self Organized Feature Map(SOFM)

  • Kim, Seung-Jae;Lee, Jung-Jae
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.104-112
    • /
    • 2019
  • This study proposed a robust detection algorithm. It detects face more stably with respect to changes in light and rotation forthe identification of a face shape. The proposed algorithm uses face shape asinput information in a single camera environment and divides only face area through preprocessing process. However, it is not easy to accurately recognize the face area that is sensitive to lighting changes and has a large degree of freedom, and the error range is large. In this paper, we separated the background and face area using the brightness difference of the two images to increase the recognition rate. The brightness difference between the two images means the difference between the images taken under the bright light and the images taken under the dark light. After separating only the face region, the face shape is recognized by using the self-organization feature map (SOFM) algorithm. SOFM first selects the first top neuron through the learning process. Second, the highest neuron is renewed by competing again between the highest neuron and neighboring neurons through the competition process. Third, the final top neuron is selected by repeating the learning process and the competition process. In addition, the competition will go through a three-step learning process to ensure that the top neurons are updated well among neurons. By using these SOFM neural network algorithms, we intend to implement a stable and robust real-time face shape recognition system in face shape recognition.

Multi Modal Sensor Training Dataset for the Robust Object Detection and Tracking in Outdoor Surveillance (MMO (Multi Modal Outdoor) Dataset) (실외 경비 환경에서 강인한 객체 검출 및 추적을 위한 실외 멀티 모달 센서 기반 학습용 데이터베이스 구축)

  • Noh, DongKi;Yang, Wonkeun;Uhm, Teayoung;Lee, Jaekwang;Kim, Hyoung-Rock;Baek, SeungMin
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.8
    • /
    • pp.1006-1018
    • /
    • 2020
  • Dataset is getting more import to develop a learning based algorithm. Quality of the algorithm definitely depends on dataset. So we introduce new dataset over 200 thousands images which are fully labeled multi modal sensor data. Proposed dataset was designed and constructed for researchers who want to develop detection, tracking, and action classification in outdoor environment for surveillance scenarios. The dataset includes various images and multi modal sensor data under different weather and lighting condition. Therefor, we hope it will be very helpful to develop more robust algorithm for systems equipped with difference kinds of sensors in outdoor application. Case studies with the proposed dataset are also discussed in this paper.

The Control of SFFS in the Office Environments and It's Integration

  • Kim, Jung-Su;Lee, Min-Cheol;Lee, Won-Hee;Kim, Dong-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.2164-2169
    • /
    • 2005
  • SFFS(Solid Freeform Fabrication System) can quickly makes models and prototype parts from 3D computer-aided design (CAD) data. Three dimensional printing(3DP) is a kind of the solid freeform fabrication. The 3DP process slices the modeling data into the 50-200um along to z axis. And we pile the powder and make the manufactures. A manufacture is made by the SFFS has the precision of the 50um. Therefore the x-y table of SFFS to move a printhead must be the system that has a high speed and accuracy. So we proposed the SMCSPO algorithm for SFFS. The major contribution is the design of a robust observer for estimating the state and the perturbation of the timing belt system, which is combined with a robust controller. The control performance of the proposed algorithm is compared with PD control by the simulation and the experiment. The control algorithm of the SFFS is presented in the office environment. The system between control system and printhead for the SFFS is also integrated

  • PDF

A Robust Wavelet-Based Digital Watermarking Using Statistical Characteristic of Image and Human Visual System

  • Kim, Bong-Seok;Kwon, Kee-Koo;Kwon, Seong-Geun;Park, Kyung-Nam
    • Proceedings of the IEEK Conference
    • /
    • 2002.07b
    • /
    • pp.1019-1022
    • /
    • 2002
  • The current paper proposes a wavelet-based digital watermarking algorithm using statistical characteristic of image and human visual system (HVS). The original image is decomposed into 4-level using a discrete wavelet transform (DWT), then the watermark is embedded into the perceptually significant coefficients (PSCs) of the image. In general, the baseband of a wavelet-decomposed image includes most of the energy of the original image, thereby having a crucial effect on the image quality. As such, to retain invisibility, the proposed algorithm does not utilize the baseband. Plus, the wavelet coefficients on the lowest level are also excluded in the watermark-embedding step, because these coefficients call be easily eliminated and modified by lossy compression and common signal processing. As such, the PSCs are selected from all subbands, except for the baseband and subbands on the lowest level. Finally, using the selected PSCs, the watermark is then embedded based on spatial masking of the wavelet coefficients so as to provide invisibility and robustness. Computer simulation results confirmed that the proposed watermarking algorithm was more invisible and robust than conventional algorithms.

  • PDF