• Title/Summary/Keyword: Changing algorithm

Search Result 1,015, Processing Time 0.039 seconds

A study on the algorithm for extending the usage time of a stand-alone street light LED using the BFS algorithm (BFS 알고리즘을 적용한 독립형 가로등 LED 사용시간 연장 알고리즘 연구)

  • Kim, Jaejin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • In this paper, to expand the use of standalone street lights, an algorithm for controlling LED energy consumption was proposed. The proposed method uses an LED module of a standalone street light divided into n zones. This is a method of reducing total power consumption by preventing the increase in power consumption due to high heat generation by weakly operating the entire LED according to the illuminance. When the amount of sunlight decreases, the whole LED operates weakly and then brightens, and unlike streetlight that act as streetlight, a method of dividing LEDs by area and limiting the number of LEDs operating according to illumination intensity was proposed. This is a way to use a lot of time with limited battery capacity by reducing the generation of heat that consumes the most power in streetlight. It is also a method of continuously changing the initial usage area to improve the total usage time of the LED substrate. As a result of the experiment, it was found that the proposed method extends the service time because it generates less heat than the conventional stand-alone streetlight.

Numerical Research on Suppression of Thermally Induced Wavefront Distortion of Solid-state Laser Based on Neural Network

  • Liu, Hang;He, Ping;Wang, Juntao;Wang, Dan;Shang, Jianli
    • Current Optics and Photonics
    • /
    • v.6 no.5
    • /
    • pp.479-488
    • /
    • 2022
  • To account for the internal thermal effects of solid-state lasers, a method using a back propagation (BP) neural network integrated with a particle swarm optimization (PSO) algorithm is developed, which is a new wavefront distortion correction technique. In particular, by using a slab laser model, a series of fiber pumped sources are employed to form a controlled array to pump the gain medium, allowing the internal temperature field of the gain medium to be designed by altering the power of each pump source. Furthermore, the BP artificial neural network is employed to construct a nonlinear mapping relationship between the power matrix of the pump array and the thermally induced wavefront aberration. Lastly, the suppression of thermally induced wavefront distortion can be achieved by changing the power matrix of the pump array and obtaining the optimal pump light intensity distribution combined using the PSO algorithm. The minimal beam quality β can be obtained by optimally distributing the pumping light. Compared with the method of designing uniform pumping light into the gain medium, the theoretically computed single pass beam quality β value is optimized from 5.34 to 1.28. In this numerical analysis, experiments are conducted to validate the relationship between the thermally generated wavefront and certain pumping light distributions.

A Hierarchical Bilateral-Diffusion Architecture for Color Image Encryption

  • Wu, Menglong;Li, Yan;Liu, Wenkai
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.59-74
    • /
    • 2022
  • During the last decade, the security of digital images has received considerable attention in various multimedia transmission schemes. However, many current cryptosystems tend to adopt a single-layer permutation or diffusion algorithm, resulting in inadequate security. A hierarchical bilateral diffusion architecture for color image encryption is proposed in response to this issue, based on a hyperchaotic system and DNA sequence operation. Primarily, two hyperchaotic systems are adopted and combined with cipher matrixes generation algorithm to overcome exhaustive attacks. Further, the proposed architecture involves designing pixelpermutation, pixel-diffusion, and DNA (deoxyribonucleic acid) based block-diffusion algorithm, considering system security and transmission efficiency. The pixel-permutation aims to reduce the correlation of adjacent pixels and provide excellent initial conditions for subsequent diffusion procedures, while the diffusion architecture confuses the image matrix in a bilateral direction with ultra-low power consumption. The proposed system achieves preferable number of pixel change rate (NPCR) and unified average changing intensity (UACI) of 99.61% and 33.46%, and a lower encryption time of 3.30 seconds, which performs better than some current image encryption algorithms. The simulated results and security analysis demonstrate that the proposed mechanism can resist various potential attacks with comparatively low computational time consumption.

Software Effort Estimation in Rapidly Changing Computng Environment

  • Eung S. Jun;Lee, Jae K.
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.133-141
    • /
    • 2001
  • Since the computing environment changes very rapidly, the estimation of software effort is very difficult because it is not easy to collect a sufficient number of relevant cases from the historical data. If we pinpoint the cases, the number of cases becomes too small. However is we adopt too many cases, the relevance declines. So in this paper we attempt to balance the number of cases and relevance. Since many researches on software effort estimation showed that the neural network models perform at least as well as the other approaches, so we selected the neural network model as the basic estimator. We propose a search method that finds the right level of relevant cases for the neural network model. For the selected case set. eliminating the qualitative input factors with the same values can reduce the scale of the neural network model. Since there exists a multitude of combinations of case sets, we need to search for the optimal reduced neural network model and corresponding case, set. To find the quasi-optimal model from the hierarchy of reduced neural network models, we adopted the beam search technique and devised the Case-Set Selection Algorithm. This algorithm can be adopted in the case-adaptive software effort estimation systems.

  • PDF

Uncertainty Evaluation of Baseflow Separation Filter methods: A Case Study of the Urmia Lake Basin in Iran

  • Nezhad, Somayeh Moghimi;Jun, Changhyun;Parisouj, Peiman;Narimani, Roya
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.135-135
    • /
    • 2022
  • In this study, we evaluated uncertainties in baseflow separation filter methods focusing on changes in recession constant (𝛼) values, which include Lynie & Holick (LH) algorithm, Chapman algorithm, Eckhardt filter, and EWMA filter. Here, we analyzed daily streamflow data at 14 stations in the Urmia Lake basin, Iran, from 2015 to 2019. The 𝛼 values were computed using three different approaches from calculating the slope of a recession curve by averaging the flow over all seasons, a correlation method, and a mean value of the ratio of Qt+1 to Qt. In addition to the 𝛼 values, the BFImax (maximum value of the baseflow index (BFI)) was determined for the Eckhardt filter through the backward filter method. As results, it indicates that the estimated baseflow is dependent upon the selection of filter methods, their parameters, and catchment characteristics at different stations. In particular, the EWMA filter showed the least changes in estimating the baseflow value by changing the 𝛼 value, and the Eckhardt filter and LH algorithm showed the highest sensitivity to this parameter at different stations.

  • PDF

Optimum solar energy harvesting system using artificial intelligence

  • Sunardi Sangsang Sasmowiyono;Abdul Fadlil;Arsyad Cahya Subrata
    • ETRI Journal
    • /
    • v.45 no.6
    • /
    • pp.996-1006
    • /
    • 2023
  • Renewable energy is promoted massively to overcome problems that fossil fuel power plants generate. One popular renewable energy type that offers easy installation is a photovoltaic (PV) system. However, the energy harvested through a PV system is not optimal because influenced by exposure to solar irradiance in the PV module, which is constantly changing caused by weather. The maximum power point tracking (MPPT) technique was developed to maximize the energy potential harvested from the PV system. This paper presents the MPPT technique, which is operated on a new high-gain voltage DC/DC converter that has never been tested before for the MPPT technique in PV systems. Fuzzy logic (FL) was used to operate the MPPT technique on the converter. Conventional and adaptive perturb and observe (P&O) techniques based on variables step size were also used to operate the MPPT. The performance generated by the FL algorithm outperformed conventional and variable step-size P&O. It is evident that the oscillation caused by the FL algorithm is more petite than variables step-size and conventional P&O. Furthermore, FL's tracking speed algorithm for tracking MPP is twice as fast as conventional P&O.

Classification and Improvement Directions for Mobile Crane Path Planning Algorithms: A Comprehensive Review

  • Sangmin Park;Maxwell Fordjour Antwi-Afari;SangHyeok Han;Sungkon Moon
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.18-24
    • /
    • 2024
  • Efficient path planning for mobile crane lifting operations in the construction industry is essential for ensuring smooth machinery operation, worker safety, and the timely completion of projects. The inherently complex construction sites, characterized by dynamic environments, constantly changing conditions, and numerous static and mobile obstacles, underscore the necessity for advanced algorithms capable of generating optimal paths under various constraints. Mobile crane path planning algorithms have been researched extensively and possess the potential to resolve the challenges presented by construction sites. However, the application of these algorithms in actual construction sites is rare, suggesting a need for ongoing research and development in this field. This paper begins by systematically identifying and analyzing relevant research papers using predetermined keywords, providing a comprehensive review of the current state of mobile crane path planning algorithms. Specifically, it categorizes mobile crane path planning algorithms into four main groups: Graph search-based algorithms, Sampling-based algorithms, Nature-inspired algorithms, and Newly developed algorithms. It performs a critical analysis of each category, offering guidance to researchers exploring path planning solutions suitable for the dynamic and complex environments of construction sites. Through this review, we affirm the need for continued interest and attempts at new methodologies in mobile crane path planning, suggesting improvements for further research and practical application of these algorithms.

Design and Implementation of a Security Program for Supersafe Document Using Ancient and Modern Cryptography (고대 및 현대 암호 방식을 결합한 초안전 문서 보안 프로그램의 설계 및 구현)

  • You, Yeonsoo;Lee, Samuel Sangkon
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.12
    • /
    • pp.1913-1927
    • /
    • 2017
  • Encryption technology is to hide information in a cyberspace built using a computer and to prevent third parties from changing it. If a malicious user accesses unauthorized device or application services on the Internet of objects, it may be exposed to various security threats such as data leakage, denial of service, and privacy violation. One way to deal with these security threats is to encrypt and deliver the data generated by a user. Encrypting data must be referred to a technique of changing data using a complicated algorithm so that no one else knows the content except for those with special knowledge. As computers process computations that can be done at a very high speed, current cryptographic techniques are vulnerable to future computer performance improvements. We designed and implemented a new encryption program that combines ancient and modern cryptography so that the user never knows about data management, and transmission. The significance of this paper is that it is the safest method to combine various kinds of encryption methods to secure the weaknesses of the used cryptographic algorithms.

Quality Assessment and Predistortion Evaluation of the Multi-channel Audio Codec according to the bitrate changing (압축율 변화에 따른 멀티채널 오디오의 품질 및 Predistortion 의 영향 평가)

  • Cha, Kyung-Hwan;Jang, Dae-Young;Kim, Sung-Han;Kim, Chun-Duck
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.55-60
    • /
    • 1996
  • This paper describes the subjective assessment of the multi-channel audio quality according to the bitrate changing and evaluates the predistortion effect to avoid the unmasked noise after matrixing/dematrxing process in transmission and regeneration of the multi-channel audio. The simulation is processed by the perceptual coding that is MPEG-2 Audio layer II algorithm. We evaluate the quality improvement about predistortion using or not by 384, 320, 256, 128kbps. As the result of the double blind subjective assessment, 5 Grade-Impairment Scale is scored under minus one to 320kbps and so audio quality is evaluated to be perceptible, but not annoying in 3/2 channel. The effect of the predistortion is improved one level in 128kbps and especially speech test material I better improved than music test materials.

  • PDF

Design of Fuzzy Controller for the Improvement of Auto-Vehicle's Comfortability (무인 자동차의 승차감 개선을 위한 퍼지제어기의 설계)

  • Cho, H.R.;Kang, G.M.;Bae, J.I.;Jo, B.K.;Kim, Y.S.;Yang, S.Y.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07b
    • /
    • pp.678-680
    • /
    • 1998
  • Based on fuzzy logic algorithm this paper constructed fuzzy logic controller for automated vehicles. For passenger's convenience especially comfortability controller need to reduce the frequency of input variable's changing. So we established membership functions for comfortability as mil as speed following. It made possible to control comfortability directly. To demonstration the efficiency of fuzzy logic controller, we carried out simulation with a Automobile's transfer function. First, we designed the PID controller by using Ziegler-Nichols tunning method. Second, we calculated time response for each controller, then we compared the speed patterns of fuzzy controlled system and PID controlled system. Also we compared the difference of input variable. By comparing two controller's response, we can confirm the merit of fuzzy controller about comfortability. Fuzzy controller can reduce input changing frequency.

  • PDF