• Title/Summary/Keyword: General Graph

Search Result 249, Processing Time 0.026 seconds

The Implementation of Graph-based SLAM Using General Graph Optimization (일반 그래프 최적화를 활용한 그래프 기반 SLAM 구현)

  • Ko, Nak-Yong;Chung, Jun-Hyuk;Jeong, Da-Bin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.4
    • /
    • pp.637-644
    • /
    • 2019
  • This paper describes an implementation of a graph-based simultaneous localization and mapping(SLAM) method called the General Graph Optimization. The General Graph Optimization formulates the SLAM problem using nodes and edges. The nodes represent the location and attitude of a robot in time sequence, and the edge between the nodes depict the constraint between the nodes. The constraints are imposed by sensor measurements. The General Graph Optimization solves the problem by optimizing the performance index determined by the constraints. The implementation is verified using the measurement data sets which are open for test of various SLAM methods.

Determining Minimal Set of Vertices Limiting The Maximum Path Length in General Directed Graphs (유향 그래프의 최대 경로 길이를 제한하는 최소 노드 집합을 구하는 알고리즘)

  • Lee Dong Ho
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.1
    • /
    • pp.11-20
    • /
    • 1995
  • A new graph problem is formulated to limit the maximum path length of a general directed graph when a minimal set of vertices together with their incident edges are removed from the graph. An optimal algorithm and a heuristic algorithm are proposed and the proposed heuristic algorithm is shown to be effective through experiments using a collection of graphs obtained from large sequential circuits. The heuristic algorithm is based on a feedback vertex set algorithm based on graph reduction.

  • PDF

A Label Graph Based Verifiable Secret Sharing Scheme for General Access Structures

  • Hsu, Ching-Fang;Zeng, Bing;Cheng, Qi
    • Journal of Communications and Networks
    • /
    • v.15 no.4
    • /
    • pp.407-410
    • /
    • 2013
  • Secret sharing is that a dealer distributes a piece of information (called a share) about a secret to each participant such that authorized subsets of participants can reconstruct the secret but unauthorized subsets of participants cannot determine the secret. In this paper, an access structure can be represented by a label graph G, where a vertex denotes a participant and a complete subgraph of G corresponds to a minimal authorized subset. The vertices of G are labeled into distinct vectors uniquely determined by the maximum prohibited structure. Based on such a label graph, a verifiable secret sharing scheme realizing general access structures is proposed. A major advantage of this scheme is that it applies to any access structure, rather than only structures representable as previous graphs, i.e., the access structures of rank two. Furthermore, verifiability of the proposed scheme can resist possible internal attack performed by malicious participants, who want to obtain additional shares or provide a fake share to other participants.

Bond Gragh Prototypes: A General Model for Dynamic Systems in Terms of Bond Graphs (표준본드선도: 본드선도에 의한 동적시스템의 일반모델)

  • Park, Jeon-Soo;Kim, Jong-Shik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.21 no.9
    • /
    • pp.1414-1421
    • /
    • 1997
  • This paper examines the physics and mechanics governing the dynamic interaction between physical systems and suggests the four structures of bond graph prototypes, considered as a general model that can promise their dynamic behavior physically resonable. The bond graph prototypes originating from the paper are more realistic junction structures than those used to model dynamic systems conventionally by bond graph standards in whether physical constraints are involved or not when the energy exchange between two dynamic components arises. It is shown that the bond graph prototypes are dynamic or energetic in their describing equations compared to the bond graph standards, and connectivity and causality are properties of dynamic systems upon which the steps developed in this paper for the bond graph prototypes are wholly based and their definitions an concepts are highly emphasized all through the paper.

An AND-OR Graph Search Algorithm Under the Admissibility Condition Relaxed

  • Lee, Chae-Y.
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.14 no.1
    • /
    • pp.27-35
    • /
    • 1989
  • An algorithm that searches the general AND-OR graph is proposed. The convergence and the efficiency of the algorithm is examined and compared with an existing algorithm for the AND-OR graph. It is proved that the proposed algorithm is superior to the existing method both in the quality of the solution and the number of node expansions.

  • PDF

Graph Database Solution for Higher Order Spatial Statistics in the Era of Big Data

  • Sabiu, Cristiano G.;Kim, Juhan
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.79.1-79.1
    • /
    • 2019
  • We present an algorithm for the fast computation of the general N-point spatial correlation functions of any discrete point set embedded within an Euclidean space of ${\mathbb{R}}n$. Utilizing the concepts of kd-trees and graph databases, we describe how to count all possible N-tuples in binned configurations within a given length scale, e.g. all pairs of points or all triplets of points with side lengths < rmax. Through benchmarking we show the computational advantage of our new graph-based algorithm over more traditional methods. We show that all 3-point configurations up to and beyond the Baryon Acoustic Oscillation scale (~200 Mpc in physical units) can be performed on current Sloan Digital Sky Survey (SDSS) data in reasonable time. Finally we present the first measurements of the 4-point correlation function of ~0.5 million SDSS galaxies over the redshift range 0.43< z <0.7. We present the publicly available code GRAMSCI (GRAph Made Statistics for Cosmological Information; bitbucket.org/csabiu/gramsci), under a GNU General Public License.

  • PDF

THE COMPETITION NUMBERS OF HAMMING GRAPHS WITH DIAMETER AT MOST THREE

  • Park, Bo-Ram;Sano, Yoshio
    • Journal of the Korean Mathematical Society
    • /
    • v.48 no.4
    • /
    • pp.691-702
    • /
    • 2011
  • The competition graph of a digraph D is a graph which has the same vertex set as D and has an edge between x and y if and only if there exists a vertex v in D such that (x, v) and (y, v) are arcs of D. For any graph G, G together with sufficiently many isolated vertices is the competition graph of some acyclic digraph. The competition number k(G) of a graph G is defined to be the smallest number of such isolated vertices. In general, it is hard to compute the competition number k(G) for a graph G and it has been one of important research problems in the study of competition graphs. In this paper, we compute the competition numbers of Hamming graphs with diameter at most three.

Representation Method of Track Topologies using Railway Graph (선로그래프를 이용한 철도망 위상 표현방법)

  • 조동영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.114-119
    • /
    • 2002
  • Realtime assignment of railways is an important component in the railway control systems. To solve this problem, we must exactly represent the track topology. Graph is a proper data structure for representing general network topologies, but not Proper for track topologies. In this paper, we define a new data structure, railway graph, which can exactly represent topologies of railway networks. And we describe a path search algorithm in the defined railway graph, and a top-down approach for designing railway network by the Proposed graph.

  • PDF

NONDEGENERATE AFFINE HOMOGENEOUS DOMAIN OVER A GRAPH

  • Choi, Yun-Cherl
    • Journal of the Korean Mathematical Society
    • /
    • v.43 no.6
    • /
    • pp.1301-1324
    • /
    • 2006
  • The affine homogeneous hypersurface in ${\mathbb{R}}^{n+1}$, which is a graph of a function $F:{\mathbb{R}}^n{\rightarrow}{\mathbb{R}}$ with |det DdF|=1, corresponds to a complete unimodular left symmetric algebra with a nondegenerate Hessian type inner product. We will investigate the condition for the domain over the homogeneous hypersurface to be homogeneous through an extension of the complete unimodular left symmetric algebra, which is called the graph extension.

Evolution and Maintenance of Proxy Networks for Location Transparent Mobile Agent and Formal Representation By Graph Transformation Rules

  • Kurihara, Masahito;Numazawa, Masanobu
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.151-155
    • /
    • 2001
  • Mobile agent technology has been the subject of much attention in the last few years, mainly due to the proliferation of distributed software technologies combined with the distributed AI research field. In this paper, we present a design of communication networks of agents that cooperate with each other for forwarding messages to the specific mobile agent in order to make the overall system location transparent. In order to make the material accessible to general intelligent system researchers, we present the general ideas abstractly in terms of the graph theory. In particular, a proxy network is defined as a directed acyclic graph satisfying some structural conditions. In turns out that the definition ensures some kind of reliability of the network, in the sense that as long as at most one proxy agent is abnormal, there agent exists a communication path, from every proxy agent to the target agent, without passing through the abnormal proxy. As the basis for the implementation of this scheme, an appropriate initial proxy network is specified and the dynamic nature of the network is represented by a set of graph transformation rules. It is shown that those rules are sound, in the sense that all graphs created from the initial proxy network by zero or more applications of the rules are guaranteed to be proxy networks. Finally, we will discuss some implementation issues.

  • PDF