• 제목/요약/키워드: standard algorithm

Search Result 2,739, Processing Time 0.03 seconds

Wireless Repeating Interference Cancellation Using Singed-DLMS Adaptive Algorithm (Signed-DLMS 적응 알고리즘을 이용한 무선 중계 간섭 제거기)

  • Yoo, Tae-Hoon;Woo, Dae-Ho;Kim, Ju-Wan;Ha, Sung-Hee;Van, Ji-Hun;Lee, Jong-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.343-344
    • /
    • 2007
  • In this paper, we study the signed-DLMS adaptive algorithm of wireless repeater for solving shadow region due to propagation between base station and mobile station. The the signed-DLMS algorithm reduces interference signals from multipath and solves the oscillation problem of repeater by estimation and cancellation. To efficiently reject interference signal, the signed-DLMS adaptive algorithm is applied. The computational complexities of the signed-DLMS are reduced verse standard LMS algorithm. Wireless ICS repeater based on signed-DLMS reduces the cost and is able to increase channel capacities.

  • PDF

Optimization of the fuzzy model using the clustering and hybrid algorithms (클러스터링 및 하이브리드 알고리즘을 이용한 퍼지모델의 최적화)

  • Park, Byoung-Jun;Yoon, Ki-Chan;Oh, Sung-Kwun;Jang, Seong-Whan
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.2908-2910
    • /
    • 1999
  • In this paper, a fuzzy model is identified and optimized using the hybrid algorithm and HCM clustering method. Here, the hybrid algorithm is carried out as the structure combined with both a genetic algorithm and the improved complex method. The one is utilized for determining the initial parameters of membership function, the other for obtaining the fine parameters of membership function. HCM clustering algorithm is used to determine the confined region of initial parameters and also to avoid overflow phenomenon during auto-tuning of hybrid algorithm. And the standard least square method is used for the identification of optimum consequence parameters of fuzzy model. Two numerical examples are shown to evaluate the performance of the proposed model.

  • PDF

Modification of ground motions using wavelet transform and VPS algorithm

  • Kaveh, A.;Mahdavi, V.R.
    • Earthquakes and Structures
    • /
    • v.12 no.4
    • /
    • pp.389-395
    • /
    • 2017
  • In this paper a simple approach is presented for spectral matching of ground motions utilizing the wavelet transform and a recently developed metaheuristic optimization technique. For this purpose, wavelet transform is used to decompose the original ground motions to several levels, where each level covers a special range of frequency, and then each level is multiplied by a variable. Subsequently, the vibrating particles system (VPS) algorithm is employed to calculate the variables such that the error between the response and target spectra is minimized. The application of the proposed method is illustrated through modifying 12 sets of ground motions. The results achieved by this method demonstrate its capability in solving the problem. The outcomes of the VPS algorithm are compared to those of the standard colliding bodies optimization (CBO) to illustrate the importance of the enhancement of the algorithm.

Modified Gaussian Filter based on Fuzzy Membership Function for AWGN Removal in Digital Images

  • Cheon, Bong-Won;Kim, Nam-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.1
    • /
    • pp.54-60
    • /
    • 2021
  • Various digital devices were supplied throughout the Fourth Industrial Revolution. Accordingly, the importance of data processing has increased. Data processing significantly affects equipment reliability. Thus, the importance of data processing has increased, and various studies have been conducted on this topic. This study proposes a modified Gaussian filter algorithm based on a fuzzy membership function. The proposed algorithm calculates the Gaussian filter weight considering the standard deviation of the filtering mask and computes an estimate according to the fuzzy membership function. The final output is calculated by adding or subtracting the Gaussian filter output and estimate. To evaluate the proposed algorithm, simulations were conducted using existing additive white Gaussian noise removal algorithms. The proposed algorithm was then analyzed by comparing the peak signal-to-noise ratio and differential image. The simulation results show that the proposed algorithm has superior noise reduction performance and improved performance compared to the existing method.

Research on detecting moving targets with an improved Kalman filter algorithm

  • Jia quan Zhou;Wei Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2348-2360
    • /
    • 2023
  • As science and technology evolve, object detection of moving objects has been widely used in the context of machine learning and artificial intelligence. Traditional moving object detection algorithms, however, are characterized by relatively poor real-time performance and low accuracy in detecting moving objects. To tackle this issue, this manuscript proposes a modified Kalman filter algorithm, which aims to expand the equations of the system with the Taylor series first, ignoring the higher order terms of the second order and above, when the nonlinear system is close to the linear form, then it uses standard Kalman filter algorithms to measure the situation of the system. which can not only detect moving objects accurately but also has better real-time performance and can be employed to predict the trajectory of moving objects. Meanwhile, the accuracy and real-time performance of the algorithm were experimentally verified.

SwiftQ: A Time-Efficient RFID Collision Arbitration Algorithm for Gen2-Based RFID Systems

  • Donghwan Lee;Wonjun Lee
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.307-316
    • /
    • 2024
  • In the realm of large-scale identification deployments, the EPCglobal Class-1 Generation-2 (Gen2) standard serves as a cornerstone, facilitating rapid processing of numerous passive RFID tags. The Q-Algorithm has garnered considerable attention for its potential to markedly enhance the efficiency of Gen2-based RFID systems with minimal adjustments. This paper introduces a groundbreaking iteration of the Q-Algorithm, termed Time-Efficient Q-Algorithm (SwiftQ), specifically designed to push the boundaries of time efficiency within Gen2-based RFID systems. Through exhaustive simulations, our study substantiates that SwiftQ outperforms existing algorithms by a significant margin, demonstrating exceptional expediency that positions it as a formidable contender in the landscape of large-scale identification environments. By prioritizing time efficiency, SwiftQ offers a promising solution to meet the escalating demands of contemporary Internet of Things applications, underscoring its potential to catalyze advancements in RFID technology for diverse industrial and logistical contexts.

Implementation of Anti-Collision Algorithm based on RFID System using FPGA (FPGA를 이용한 RFID 시스템 기반 충돌 방지 알고리즘 구현)

  • Lee, Woo-Gyeong;Kim, Sun-Hyung;Lim, Hae-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.413-420
    • /
    • 2006
  • In this thesis, a RFID baseband system is implemented based on the international standard ISO/IEC 18000-6 Type-B using FPCA, and also anti-collision algorithm is implemented to improve the system performance. We compares the performance of the proposed anti-collision algorithm with that binary tree algorithm and bit-by-bit algorithm, and also validated analytic results using OPNET simulation. The proposed algorithm for Type-B transmission protocol and collision prohibition was designed using ISE7.1i which is a FPGA design-tool of Xilinx and implemented with Spartan2 chip which is a FPGA device.

Optimal Design for Steam-turbine Rotor-bearing System Using Combined Genetic Algorithm (조합 유전 알고리듬을 이용한 증기 터빈 회전체-베어링 시스템의 최적설계)

  • Kim, Young-Chan;Choi, Seong-Pil;Yang, Bo-Suk
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.12 no.5
    • /
    • pp.380-388
    • /
    • 2002
  • This paper describes the optimum design for low-pressure steam turbine rotor of 1,000 MW nuclear power plant by using a combined genetic algorithm, which uses both a genetic algorithm and a local concentrate search algorithm (e.g. simplex method). This algorithm is not only faster than the standard genetic algorithm but also supplies a more accurate solution. In addition, this algorithm can find the global and local optimum solutions. The objective is to minimize the resonance response (Q factor) and total weight of the shaft, and to separate the critical speeds as far from the operating speed as possible. These factors play very important roles in designing a rotor-bearing system under the dynamic behavior constraint. In the present work, the shaft diameter, the bearing length, and clearance are used as the design variables. The results show that the proposed algorithm can improve the Q factor and reduce the weight of the shaft and the 1st critical speed.

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

  • Jie, Yan;Yu, Lu;Li-yun, Chen;Wei, Nie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.897-913
    • /
    • 2016
  • Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.