• Title/Summary/Keyword: dual space

Search Result 617, Processing Time 0.023 seconds

Along-Track Position Error Bound Estimation using Kalman Filter-Based RAIM for UAV Geofencing

  • Gihun, Nam;Junsoo, Kim;Dongchan, Min;Jiyun, Lee
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.1
    • /
    • pp.51-58
    • /
    • 2023
  • Geofencing supports unmanned aerial vehicle (UAV) operation by defining stay-in and stay-out regions. National Aeronautics and Space Administration (NASA) has developed a prototype of the geofencing function, SAFEGUARD, which prevents stayout region violation by utilizing position estimates. Thus, SAFEGUARD depends on navigation system performance, and the safety risk associated with the navigation system uncertainty should be considered. This study presents a methodology to compute the safety risk assessment-based along-track position error bound under nominal and Global Navigation Satellite Systems (GNSS) failure conditions. A Kalman filter system using pseudorange measurements as well as pseudorange rate measurements is considered for determining the position uncertainty induced by velocity uncertainty. The worst case pseudorange and pseudorange rate fault-based position error bound under the GNSS failure condition are derived by applying a Receiver Autonomous Integrity Monitor (RAIM). Position error bound simulations are also conducted for different GNSS fault hypotheses and constellation conditions with a GNSS/INS integrated navigation system. The results show that the proposed along-track position error bounds depend on satellite geometries caused by UAV attitude change and are reduced to about 40% of those of the single constellation case when using the dual constellation.

A Study on the Implementation of Digital Filters with Reduced Memory Space and Dual Impulse Response Types (기억용량 절약과 순회방식 선택이 가능한 디지털 필터의 구성에 관한 연구)

  • Park, In Jung;Rhee, Tae Won
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.23 no.6
    • /
    • pp.950-956
    • /
    • 1986
  • In this paper, a direct addressing mode of a microprocessor is introduced to save memory capacity, and also a dedicated digital filter is constructed to speed up the filter processing and to enable an easy selection of the impulse response types. A theoretical analysis has been conducted on the errors caused by the finite word klength, rounding-off and multiplication procedures. The digital filter designed by the proposed method is made into a module which can function as a 7th-order recursive or a 14-order nonrecursive type with a simples witch operation. The proposed filter is implemented on a printed-circuit board. The frequency characteristics of this filter can be controlled by the multiplication values stored in ROMs. A low-pass, a high-pass and a band-pass filter have been designed and their frequency characteristics are verified by actual measurements. For a order higher filer, two filter modules have been cascaded into an integrated filter of 23rd-order non-recursive low-pass type and a 12th-order recursive multiband type. Their frequency characteirstics have been found to agree with the theory.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

Resource allocation algorithm for space-based LEO satellite network based on satellite association

  • Baochao Liu;Lina Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1638-1658
    • /
    • 2024
  • As a crucial development direction for the sixth generation of mobile communication networks (6G), Low Earth Orbit (LEO) satellite networks exhibit characteristics such as low latency, seamless coverage, and high bandwidth. However, the frequent changes in the topology of LEO satellite networks complicate communication between satellites, and satellite power resources are limited. To fully utilize resources on satellites, it is essential to determine the association between satellites before power allocation. To effectively address the satellite association problem in LEO satellite networks, this paper proposes a satellite association-based resource allocation algorithm. The algorithm comprehensively considers the throughput of the satellite network and the fairness associated with satellite correlation. It formulates an objective function with logarithmic utility by taking the logarithm and summing the satellite channel capacities. This aims to maximize the sum of logarithmic utility while promoting the selection of fewer associated satellites for forwarding satellites, thereby enhancing the fairness of satellite association. The problems of satellite association and power allocation are solved under constraints on resources and transmission rates, maximizing the logarithmic utility function. The paper employs an improved Kuhn-Munkres (KM) algorithm to solve the satellite association problem and determine the correlation between satellites. Based on the satellite association results, the paper uses the Lagrangian dual method to solve the power allocation problem. Simulation results demonstrate that the proposed algorithm enhances the fairness of satellite association, optimizes resource utilization, and effectively improves the throughput of LEO satellite networks.

Graphic system analysis on the Chil Sung Hwa(seven stars picture) (칠성화(七星畵)의 그래픽체계 분석)

  • 나윤화
    • Archives of design research
    • /
    • v.11
    • /
    • pp.22-29
    • /
    • 1995
  • I have to find standpoint of sight moulding of Chi I Sung Hwa(seven stars picture) analysis of graphic systems of a symbol sight native to our nation. And I will comprehend emotion of folkways by simple and graphic lines and colors in mathematical Grid of which ancestor had expressed in gauge moulding consciousness. This papers aim is to make a contribution to lead by on part of communication design. About structural analysis of pictorial graphic side. I) Mathematical thought of the Orient and space constitution are first basically the Orient expressed number notion of mathematics of unlimitedness and notion of zero so called space and empty second can analigize a diagonal expansion method by development of symmetry notion to basic the dual principle of the negative and positive by degrees development expressed space division method by direction notion. 2) About the proportion analysis it based the golden section globularity and in modern layout it takes vision center of position, after appointing the brow of sacred image of Chil Sung Hwa as center point of proportion and applied to the point proportion and so analigized the posibility of established. Rule in union of each elements and rule of forms about picture image. 3) Mathematical structure analysis to search a unified principle at the balanced arrangement and rule of forms it analigized the standard the rule of forms. it analigized the standard the rule of forms to body module of basic movement of protagonist and follower above basic forms of grid that is the basis of design system.

  • PDF

The influence of fitness and type of luting agents on bonding strength of fiber-reinforced composite resin posts (섬유강화 복합레진 포스트의 결합강도에 대한 포스트 공간 적합도 및 접착 시멘트의 영향)

  • Kkot-Byeol Bae;Hye-Yoon Jung;Yun-Chan Hwang;Won-Mann Oh;In-Nam Hwang
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.39 no.4
    • /
    • pp.187-194
    • /
    • 2023
  • Purpose: A mismatched size in the post and post space is a common problem during post-fixation. Since this discordance affects the bonding strength of the fiber-reinforced composite resin post (FRC Post), a corresponding luting agent is required. The aim of this study was to evaluate the bonding strength of the FRC post according to the fitness of the fiber post and the type of luting agent. Materials and Methods: Thirty mandibular premolar were endodontic-treated and assigned to two groups according to their prepared post space: Fitting (F) and Mismatching (M). These groups were further classified into three subgroups according to their luting agent: RelyX Unicem (ReX), Luxacore dual (Lux), and Duolink (Duo). A push-out test was performed to measure the push-out bond strengths. The fractured surfaces of each cross-section were then examined, and the fracture modes were classified. Results: In the ReX and Duo subgroups, the F group had a higher mean bond strength; however, the Lux subgroup had no significant difference between the F and M groups. In the analysis of the failure modes, the ReX subgroup had only adhesive failures between the cement and dentin. Conclusion: The result of this study showed that the bond strength of an FRC post was influenced by the type of luting agent and the mismatch between the diameter of the prepared post space and that of the post.

Gender Roles, Accessibility, and Gendered Spatiality (성역할, 접근성, 그리고 젠더화된 공간성)

  • Kim, Hyun-Mi
    • Journal of the Korean Geographical Society
    • /
    • v.42 no.5
    • /
    • pp.808-834
    • /
    • 2007
  • This study attempts to elucidate manifold dimensions of gendered accessibility experiences. How gender roles(household responsibilities) differentiate accessibility experiences between women and men is explored through the comparison of married dual-earner couples' parental status, using the US Portland activity-travel diary dataset with GIS-based geocomputation results of(time-geography based) space-time accessibility. First, this study shows how gender division of labor within the household still permeates current society, despite the widespread belief of the social change toward a gender-egalitarian society. Then, the study pays special attention to the way gender roles structure individual accessibility experiences of women and men differently, and, in turn, the way such accessibility experiences take a form of gendered spatiality. Gendered spatiality is examined through the analysis of accessibility space as well as activity space in order to ascertain women's home-attached and spatially entrapped characteristics. More household responsibilities throughout a day and, even more, the time constraint of picking up children at the daycare centers after work lead women's possible activity space to be more home-centered. The analysis of the spatio-temporal context of accessibility space makes gendered spatiality visible. However, the findings suggest that behavioral outcomes should be understood with an explicit awareness of constraints individuals face. It is because the revealed activity spaces can be not only an outcome of constraint but also an outcome of choice. Behavioral outcomes should not be treated as a straightforward expression of the level of constraints. It is problematic to expect that behavioral outcomes directly mirror the level of constraints. It is also problematic to suppose that the level of constraints can be straightforwardly elicited from revealed behavioral outcomes.

A Study on Coimmobilized Glucose Oxidase-Catalase System (Glucose Oxidase-Catalase동시 고정화 효소계의 반응)

  • Lee, Suk-Hee;Lee, Sang-Yeol;Uhm, Tai-Boong;Kim, Woo-Jung;Byun, Si-Myung
    • Korean Journal of Food Science and Technology
    • /
    • v.17 no.1
    • /
    • pp.37-40
    • /
    • 1985
  • The reactor performance of a coimmobilized glucose oxidase and catalase enzyme system was investigated. In the determination of efficiencies of glucose oxidase and catalase of dual, mixed and soluble systems, the dual type immobilized one was superior to either the soluble or to the mixed system. In the continuous plugflow bed reactor system of glucose oxidase and catalase, $k-d$, deactivation rare constant of glucose oxidase only and catalase/glucose oxidase = 10 were $1.12\;{\times}\;10^{-2}\;and\;2.17\;{\times}10^{-3}\;hr^{-1}$, respectively. In the effect of ${\tau}$, space time, the point of $O_2$ limitation is $5.5\;g{\cdot}hr/l$ in both catalase/glucose oxidase = 1 and 10. In the effect of $O_2$ concentration to reduce the $O_2$ diffusion limitation, it appeared that ${\tau}\;=\;8.3g{\cdot}r/l$ is the maximum point of $O_2$ concentration in both catalase/glucose oxidase = 1 and 10.

  • PDF

Continuous Query Processing in Data Streams Using Duality of Data and Queries (데이타와 질의의 이원성을 이용한 데이타스트림에서의 연속질의 처리)

  • Lim Hyo-Sang;Lee Jae-Gil;Lee Min-Jae;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.33 no.3
    • /
    • pp.310-326
    • /
    • 2006
  • In this paper, we deal with a method of efficiently processing continuous queries in a data stream environment. We classify previous query processing methods into two dual categories - data-initiative and query-initiative - depending on whether query processing is initiated by selecting a data element or a query. This classification stems from the fact that data and queries have been treated asymmetrically. For processing continuous queries, only data-initiative methods have traditionally been employed, and thus, the performance gain that could be obtained by query-initiative methods has been overlooked. To solve this problem, we focus on an observation that data and queries can be treated symmetrically. In this paper, we propose the duality model of data and queries and, based on this model, present a new viewpoint of transforming the continuous query processing problem to a multi-dimensional spatial join problem. We also present a continuous query processing algorithm based on spatial join, named Spatial Join CQ. Spatial Join CQ processes continuous queries by finding the pairs of overlapping regions from a set of data elements and a set of queries defined as regions in the multi-dimensional space. The algorithm achieves the effects of both of the two dual methods by using the spatial join, which is a symmetric operation. Experimental results show that the proposed algorithm outperforms earlier methods by up to 36 times for simple selection continuous queries and by up to 7 times for sliding window join continuous queries.

INFLUENCE OF POST TYPES AND SIZES ON FRACTURE RESISTANCE IN THE IMMATURE TOOTH MODEL (미성숙 치아 모델에서 포스트의 종류와 크기가 치아의 파절 저항성에 미치는 영향에 관한 연구)

  • Kim, Jong-Hyun;Park, Sung-Ho;Park, Jeong-Won;Jung, Il-Young
    • Restorative Dentistry and Endodontics
    • /
    • v.35 no.4
    • /
    • pp.257-266
    • /
    • 2010
  • The purpose of this study was to determine the effect of post types and sizes on fracture resistance in immature tooth model with various restorative techniques. Bovine incisors were sectioned 8 mm above and 12 mm below the cementoenamel junction to simulate immature tooth model. To compare various post-and-core restorations, canals were restored with gutta-percha and resin core, or reinforced dentin wall with dual-cured resin composite, followed by placement of D.T. LIGHT-POST, ParaPost XT, and various sizes of EverStick Post individually. All of specimens were stored in the distilled water for 72 hours and underwent 6,000 thermal cycles. After simulation of periodontal ligament structure with polyether impression material, compressive load was applied at 45 degrees to the long axis of the specimen until fracture was occurred. Experimental groups reinforced with post and composite resin were shown significantly higher fracture strength than gutta-percha group without post placement (p < 0.05). Most specimens fractured limited to cervical third of roots. Post types did not influence on fracture resistance and fracture level significantly when cement space was filled with dual-cured resin composite. In addition, no statistically significant differences were seen between customized and standardized glass fiber posts, which cement spaces were filled with resin cement or composite resin individually. Therefore, root reinforcement procedures as above in immature teeth improved fracture resistance regardless of post types and sizes.