• Title/Summary/Keyword: Changing algorithm

Search Result 1,015, Processing Time 0.027 seconds

Emergent damage pattern recognition using immune network theory

  • Chen, Bo;Zang, Chuanzhi
    • Smart Structures and Systems
    • /
    • v.8 no.1
    • /
    • pp.69-92
    • /
    • 2011
  • This paper presents an emergent pattern recognition approach based on the immune network theory and hierarchical clustering algorithms. The immune network allows its components to change and learn patterns by changing the strength of connections between individual components. The presented immune-network-based approach achieves emergent pattern recognition by dynamically generating an internal image for the input data patterns. The members (feature vectors for each data pattern) of the internal image are produced by an immune network model to form a network of antibody memory cells. To classify antibody memory cells to different data patterns, hierarchical clustering algorithms are used to create an antibody memory cell clustering. In addition, evaluation graphs and L method are used to determine the best number of clusters for the antibody memory cell clustering. The presented immune-network-based emergent pattern recognition (INEPR) algorithm can automatically generate an internal image mapping to the input data patterns without the need of specifying the number of patterns in advance. The INEPR algorithm has been tested using a benchmark civil structure. The test results show that the INEPR algorithm is able to recognize new structural damage patterns.

3D Printing Watermarking Method Based on Radius Curvature of 3D Triangle

  • Pham, Ngoc-Giao;Song, Ha-Joo;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1951-1959
    • /
    • 2017
  • Due to the fact that 3D printing is applied to many areas of life, 3D printing models are often used illegally without any permission from the original providers. This paper presents a novel watermarking algorithm for the copyright protection and ownership identification for 3D printing based on the radius curvature of 3D triangle. 3D triangles are extracted and classified into groups based on radius curvature by the clustering algorithm, and then the mean radius curvature of each group will be computed for watermark embedding. The watermark data is embedded to the groups of 3D triangle by changing the mean radius curvature of each group. In each group, we select a 3D triangle which has the nearest radius curvature with the changed mean radius curvature. Finally, we change the vertices of the selected facet according to the changed radius curvature has been embedded watermark. In experiments, the distance error between the original 3D printing model and the watermarked 3D printing model is approximate zero, and the Bit Error Rate is also very low. From experimental results, we verify that the proposed algorithm is invisible and robustness with geometric attacks rotation, scaling and translation.

Effective Elimination of False Alarms by Variable Section Size in CFAR Algorithm (CFAR 적용시 섹션 크기 가변화를 이용한 오표적의 효율적 제거)

  • Roh, Ji-Eun;Choi, Beyung-Gwan;Lee, Hee-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.1
    • /
    • pp.100-105
    • /
    • 2011
  • Generally, because received signals from radar are very bulky, the data are divided into manageable size called section, and sections are distributed into several digital signal processors. And then, target detection algorithms are applied simultaneously in each processor. CFAR(Constant False Alarm Rate) algorithm, which is the most popular target detection algorithm, can estimate accurate threshold values to determine which signals are targets or noises within center-cut of section allocated to each processor. However, its estimation precision is diminished in section edge data because of insufficient surrounding data to be referred. Especially this edge problem of CFAR is too serious if we have many sections to be processed, because it causes many false alarms in most every section edges. This paper describes false alarm issues on MCA(Minimum Cell Average)-CFAR, and proposes a false alarm elimination method by changing section size alternatively. Real received data from multi-function radar were used to evaluate a proposed method, and we show that our method drastically decreases false alarms without missing real targets, and improves detection performance.

B-snake Based Lane Detection with Feature Merging and Extrinsic Camera Parameter Estimation (특징점 병합과 카메라 외부 파라미터 추정 결과를 고려한 B-snake기반 차선 검출)

  • Ha, Sangheon;Kim, Gyeonghwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.215-224
    • /
    • 2013
  • This paper proposes a robust lane detection algorithm for bumpy or slope changing roads by estimating extrinsic camera parameters, which represent the pose of the camera mounted on the car. The proposed algorithm assumes that two lanes are parallel with the predefined width. The lane detection and the extrinsic camera parameter estimation are performed simultaneously by utilizing B-snake in motion compensated and merged feature map with consecutive sequences. The experimental results show the robustness of the proposed algorithm in various road environments. Furthermore, the accuracy of extrinsic camera parameter estimation is evaluated by calculating the distance to a preceding car with the estimated parameters and comparing to the radar-measured distance.

Parameter Optimization of Controllers for Forward Converters Using Genetic Algorithms (유전자 알고리즘을 이용한 포워드 컨버터 제어기의 파라메터 최적화)

  • Choi, Young-Kiu;Woo, Dong-Young;Park, Jin-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.177-182
    • /
    • 2010
  • The forward convener is one of power supplies used widely. This paper presents parameter tuning methods to obtain optimal circuit element values for the forward converter to minimize the output voltage variation under various load changing environments. The conventional method using the concept of the phase margin is extended to have optimal phase margin that gives slightly improved performance in the output voltage response. For this, the phase margin becomes the tuning parameter and is optimized with the genetic algorithm. Next, the circuit element values are directly chosen as the tuning parameters and also optimized using the genetic algorithm to have very improved performance in the output voltage control of the forward converter.

Memory BIST Circuit Generator System Design Based on Fault Model (고장 모델 기반 메모리 BIST 회로 생성 시스템 설계)

  • Lee Jeong-Min;Shim Eun-Sung;Chang Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.2 s.332
    • /
    • pp.49-56
    • /
    • 2005
  • In this paper, we propose a memory BIST Circuit Creation System which creates BIST circuit based on user defined fault model and generates the optimized march test algorithm. Traditional tools have some limit that regenerates BIST circuit after changing the memory type or test algorithm. However, this proposed creation system can automatically generate memory BIST circuit which is suitable in the various memory type and apply algorithm which is required by user. And it gets more efficient through optimizing algorithms for fault models which is selected randomly according to proposed nile. In addition, it support various address width and data and consider interface of IEEE 1149.1 circuit.

The Accuracy Design of LM Guide System in Machine Tools (공작기계 직선 베어링 안내면의 정도 설계에 관한 연구)

  • 김경호;박천홍;송창규;이후상;김승우
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2000.05a
    • /
    • pp.692-695
    • /
    • 2000
  • This paper is concerned with Accuracy Design of LM Guide System in Machine Tools. Elastic deformation of bearing is calculated by Hertz contact theory and motion error of LM block is analyzed. A new algorithm using block stiffness is proposed fur the analysis of motion accuracy of the table. The best advantage of this algorithm is fast analysis speed because it isn't necessary iteration processes for satisfying equilibrium equation of the table. Motion errors of the table analyzed under artificial form error of rail theoretically and experimentally. Only one of two rails is bent by putting a thickness gauge into horizontal direction. This form error of rail is measured by gap sensor against the other rail. Then, motion errors of the table are predicted by proposed new algorithm theoretically and measured by laser interferometer. Measurements are carried out by changing the preload and thickness. The results show that the table motion errors are reduced from 1/2 to 1/60 times than form error of rail according to its height and width. And the effect of preloading is almost negligible.

  • PDF

On-line Fussy Performance Management of Profibus Networks

  • Lee, Kyung-Chang;Song Kang;Kim, Dong-Wook;Lee, Suk
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.1 no.2
    • /
    • pp.5-13
    • /
    • 2000
  • Most networks for automation are tuned to an expected traffic condition ar their design stage. During their actual operations, however, the networks experience considerable changes in traffic from time to time. These traffic changes caused by common events like machine failure and production schedule change may adversely affect th network performance and, in turn , the performance of the connected devices. This paper presents experimental results for performance management of a Profibus-FMS network. The performance management aims to maintain a uniform level of network performance at all stations under changing network traffic. The performance management algorithm monitors the performance of individual network stations and commands the stations to change their timer values in order to have comparable performance at all stations. In order to determine the amount of timer change, the algorithm employs a set of fuzzy rules. The algorithm has been evaluated on a Profibus network.

  • PDF

Load Sharing Control by Following Average Torque Current in Continuous Casting (연속 주조 공정에서 평균 토크전류 추종에 의한 인발력 분배 제어)

  • Chun, Chang-Keun;Kim, Cheul-U
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.3
    • /
    • pp.74-80
    • /
    • 2004
  • If the withdrawal force of strand driven roll which is controlled with predetermined speed isn't distributed regularly in continuous casting process, mold level is changed cyclically and slab quality is not good. In this paper, both casting speed control and load sharing control algorithm of strand driven roll according to ratio which is set up by operator at same time is proposed. The proposed algorithm is to share the withdrawal force by following torque current of each driven roll as average torque current by changing speed reference of each driven roll motor. The load sharing control with anti-wind up for improvement transient state is adopted and the proposed algorithm is implemented in POSCO pilot caster.

Performance Analysis of STBC Concatenated Convolutional Code for Improvement of Transmission Reliability (STBC의 전송 신뢰성 향상을 위한 컨볼루션 코드 연계 시스템)

  • Shin, Hyun-jun;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.586-589
    • /
    • 2013
  • In this paper, the proposed scheme is STBC system combined with convolutional code to ensure the reliability of data transmission for a high rate wireless communication. In addition, this scheme uses a modified viterbi algorithm in order to get a high system gain when data is transmitted. Because we combine STBC and comvolutional code, the proposed scheme can get a diversity gain of STBC and coding gain of convolutional code at the same time. Unlike existing viterbi docoding algorithm using Hamming distance in order to calculate branch matrix, the modified viterbi algorithm uses Euclidean distance value between received symbol and reference symbol. To analyze the system proposed, it was simulated by changing the constraint length of the convolutional code and the number of transmit and receive antennas of STBC.

  • PDF