• Title/Summary/Keyword: Complexity measure

Search Result 312, Processing Time 0.026 seconds

An Approach to a Speed Estimation Method to Remove Speed Sensor of Underwater Robot's AC Drive Systems (수중로봇용 AC구동시스템의 속도센서 제거를 위한 속도추정법 연구)

  • 전봉환;임용곤;이판묵
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1998.05a
    • /
    • pp.371-376
    • /
    • 1998
  • This paper describes an approach to a speed estimation method to remove speed sensor of underwater robot's AC drive systems. AC motors have been widely used in the field of underwater robot's manipulator or propulsion system. Most of these AC motors for underwater use have usually filled oil to compensate the high pressure in deep-sea operation, where a resolver is adopted to feed back the speed of rotor But this kind of speed feedback devices gives rise to some defects arising from their mechanical complexity and numerous signal lines; a resolver needs 6 or 7 signal lines for proper operation. This paper presents a speed estimation method to improve these problems of induction motor, which is adopted as a prototype of AC motor. The proposed speed estimation method is based on the RFO(rotor flux orientation) vector control method of voltage-fed AC drives. Using the controller of voltage-fed AC drives, it is unnecessary to measure the voltage for the estimation of rotor speed, which reduces the effects of measurement error Numerical simulation is carried out to investigate the validity of the method and the effects of rotors resistance variation.

  • PDF

Quantitative Analyses of System Level Performance of Dynamic Memory Allocation In Embedded Systems (내장형 시스템 동적 메모리 할당 기법의 시스템 수준 성능에 관한 정량적 분석)

  • Park, Sang-Soo;Shin, Heon-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.6
    • /
    • pp.477-487
    • /
    • 2005
  • As embedded system grows in size and complexity, the importance of the technique for dynamic memory allocation has increased. The objective of this paper is to measure the performance of dynamic memory allocation by varying both hardware and software design parameters for embedded systems. Unlike torrent performance evaluation studies that have presumed the single threaded system with single address spate without OS support, our study adopts realistic environment where the embedded system runs on Linux OS. This paper contains the experimental performance analyses of dynamic memory allocation method by investigating the effects of each software layer and some hardware design parameters. Our quantitative results tan be used to help system designers design high performance, low power embedded systems.

A Study on Digital Image Processing Algorithm for Area Measurement of an Object Image by the Hierarchical Angle-Distance Graphs (계층적 각-거리 그래프를 이용한 물체 면적 측정을 위한 디지털 영상처리 알고리즘에 관한 연구)

  • Kim Woong-Ki;Ra Sung-Woong;Lee Jung-Won
    • The KIPS Transactions:PartB
    • /
    • v.13B no.2 s.105
    • /
    • pp.83-88
    • /
    • 2006
  • Digital image processing algorithm was proposed to measure the area inside of an object image using angle-distance graph used to analyze the pattern of an object in the digital image processing techniques. The first angle-distance graph is generated from a point inside of an object area. The second angle-distance graphs are generated for the areas missed in the first graph by extracting the positions with large gradient in the first angle-distance graph. The order of the graph increases according to the complexity of an object pattern. Size of the area inside of an object boundary is measured by integrating square of distance multiplied by angle for each area from the hierarchical angie-distance graphs.

DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing

  • Zhou, Zhen-Ji;Wu, Li-Fa;Hong, Zheng;Xu, Ming-Fei;Pan, Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.305-325
    • /
    • 2014
  • In cloud computing infrastructure, current virtual machine trust measurement methods have many shortcomings in dynamism, security and concurrency. In this paper, we present a new method to measure the trust of virtual machine. Firstly, we propose "behavior trace" to describe the state of virtual machine. Behavior trace is a sequence of behaviors. The measurement of behavior trace is conducted on the basis of anticipated trusted behavior, which not only ensures security of the virtual machine during runtime stage but also reduces complexity of the trust measurement. Based on the behavior trace, we present a Dynamic Tree Style Trust Measurement Model (DTSTM). In this model, the measurement of system domain and user domain is separated, which enhances the extensibility, security and concurrency of the measurement. Finally, based on System Call Interceptor (SCI) and Virtual Machine Introspection (VMI) technology, we implement a DTSTM prototype system for virtual machine trust measurement. Experimental results demonstrate that the system can effectively verify the trust of virtual machine and requires a relatively low performance overhead.

A Lifetime-Preserving and Delay-Constrained Data Gathering Tree for Unreliable Sensor Networks

  • Li, Yanjun;Shen, Yueyun;Chi, Kaikai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3219-3236
    • /
    • 2012
  • A tree routing structure is often adopted for many-to-one data gathering and aggregation in sensor networks. For real-time scenarios, considering lossy wireless links, it is an important issue how to construct a maximum-lifetime data gathering tree with delay constraint. In this work, we study the problem of lifetime-preserving and delay-constrained tree construction in unreliable sensor networks. We prove that the problem is NP-complete. A greedy approximation algorithm is proposed. We use expected transmissions count (ETX) as the link quality indicator, as well as a measure of delay. Our algorithm starts from an arbitrary least ETX tree, and iteratively adjusts the hierarchy of the tree to reduce the load on bottleneck nodes by pruning and grafting its sub-tree. The complexity of the proposed algorithm is $O(N^4)$. Finally, extensive simulations are carried out to verify our approach. Simulation results show that our algorithm provides longer lifetime in various situations compared to existing data gathering schemes.

Spanning Tree Aggregation Using Attribute of Service Boundary Line (서비스경계라인 속성을 이용한 스패닝 트리 집단화)

  • Kwon, So-Ra;Jeon, Chang-Ho
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.441-444
    • /
    • 2011
  • In this study, we present a method for efficiently aggregating network state information. It is especially useful for aggregating links that have both delay and bandwidth in an asymmetric network. Proposed method reduces the information distortion of logical link by integration process after similar measure and grouping of logical links in multi-level topology transformation to reduce the space complexity. It is applied to transform the full mesh topology whose Service Boundary Line (SBL) serves as its logical link into a spanning tree topology. Simulation results show that aggregated information accuracy and query response accuracy are higher than that of other known method.

Robust Image Watermarking via Perceptual Structural Regularity-based JND Model

  • Wang, Chunxing;Xu, Meiling;Wan, Wenbo;Wang, Jian;Meng, Lili;Li, Jing;Sun, Jiande
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1080-1099
    • /
    • 2019
  • A better tradeoff between robustness and invisibility will be realized by using the just noticeable (JND) model into the quantization-based watermarking scheme. The JND model is usually used to describe the perception characteristics of human visual systems (HVS). According to the research of cognitive science, HVS can adaptively extract the structure features of an image. However, the existing JND models in the watermarking scheme do not consider the structure features. Therefore, a novel JND model is proposed, which includes three aspects: contrast sensitivity function, luminance adaptation, and contrast masking (CM). In this model, the CM effect is modeled by analyzing the direction features and texture complexity, which meets the human visual perception characteristics and matches well with the spread transform dither modulation (STDM) watermarking framework by employing a new method to measure edge intensity. Compared with the other existing JND models, the proposed JND model based on structural regularity is more efficient and applicable in the STDM watermarking scheme. In terms of the experimental results, the proposed scheme performs better than the other watermarking scheme based on the existing JND models.

Factors Affecting an Application of Environmental Management Accounting: A Case Study of the Automobile Industry in Vietnam

  • TRAN, Ngoc Hung;NGUYEN, Thi Thuy Hanh;NGUYEN, Thi Phuong
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.7
    • /
    • pp.509-516
    • /
    • 2021
  • This study aims to find out and measure the level of factors affecting the applicability of environmental management accounting (EMA) in Vietnamese automobile industry enterprises. Data was collected using both quantitative and qualitative methods. First, in general research, qualitative methodology was used to find out factors (variables) that can impact the possibility of implementing EMA in Vietnamese automobile enterprises. Second, in detailed research, all variables are measured using a quantitative method by collecting data through sampling and sending questionnaires. 500 questionnaires were sent to automobile enterprise managers and only 352 questionnaires met the criteria for the data analysis. The study used a mixed research design approach- a procedure for collecting, analyzing, and "mixing" both quantitative and qualitative research and methods in a single study to understand the research problem. Results show that 7 factors affect the possibility of implementing EMA in Vietnamese automobile industry enterprises. These factors are coercive pressure, normative pressure, mimetic pressure, business environmental uncertainty, environmental strategy, benefits when applying EMA, and task complexity. Based on the results of the study, promoting EMA in the automotive industry should depend mainly on the role of governmental departments.

Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

  • Ahamad, Shahanawaj
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.232-240
    • /
    • 2022
  • To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

A Study on the Fuzzy Evaluation Algorithm for Large Scale Hierarchical MADM Problem -Centering on the Identification of Fuzzy Measure- (대규모 다계층 MADM 문제의 퍼지평가 알고리즘에 관한 연구 - 퍼지측도의 동정을 중심으로 -)

  • Lim, B.T.;Yang, W.;Lee, C.Y.
    • Journal of Korean Port Research
    • /
    • v.12 no.1
    • /
    • pp.9-17
    • /
    • 1998
  • The evaluation structure of complex problems is composed of multi-attributes and hierarchy. A many studies were existed on this problems, but that based on the assumption that the evaluation elements were independent. The actual evaluation problems have the complexity, ambiguity and interlinkage among the elements. In this situation, the fuzzy evaluation process is very effective in settling the complex problems. For evaluation of large scale hierarchical MADM problem, the fuzzy evaluation algorithm is developed in this paper, and that is centering on the identification of fuzzy measures. In this study, we newly identified the weight and interaction among the evaluation attributes. The results of this study are as follows: we can identified the hierarchical structure of the evaluation problem which is composed of the evaluation structure, function and hierarchy; we improved the existed weighting method which could be accomplished by normalizing process, considering the uncertainty and new weight integrating method which come from Dempster-Shafer theory. And we take into account the interaction properties among more than 3 evaluation attributes, which can be compared with the existed studies in which only 2 evaluation attributes taked into account.

  • PDF