• Title/Summary/Keyword: Kun's Algorithm

Search Result 66, Processing Time 0.03 seconds

A Lane-Departure Identification Based on Linear Regression and Symmetry of Lane-Related Parameters (차선관련 파라미터의 대칭성과 선형회귀에 기반한 차선이탈 인식)

  • Yi Un-Kun;Lee Joon-Woong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.5
    • /
    • pp.435-444
    • /
    • 2005
  • This paper presents a lane-departure identification (LDI) algorithm for a traveling vehicle on a structured road. The algorithm makes up for the weak points of the former method based on EDF[1] by introducing a Lane Boundary Pixel Extractor (LBPE), the well known Hough transform, and liner regression. As a filter to extract pixels expected to be on lane boundaries, the LBPE plays an important role in enhancing the robustness of LDI. Utilizing the pixels from the LBPE the Hough transform provides the lane-related parameters composed of orientation and distance, which are used in the LDI. The proposed LDI is based on the fact the lane-related parameters of left and right lane boundaries are symmetrical as for as the optical axis of a camera mounted on a vehicle is coincident with the center of lane; as the axis deviates from the center of lane, the symmetrical property is correspondingly lessened. In addition, the LDI exploits a linear regression of the lane-related parameters of a series of successive images. It plays the key role of determining the trend of a vehicle's traveling direction and minimizing the noise effect. Except for the two lane-related parameters, the proposed algorithm does not use other information such as lane width, a curvature, time to lane crossing, and of feet between the center of a lane and the optical axis of a camera. The system performed successfully under various degrees of illumination and on various road types.

A Study on Calculation of RCS Using MUSIC Algorithm (MUSIC 알고리즘에 의한 레이더 반사단면적 계산법에 관한 연구)

  • Pang Tian Ting;Jeong Jung-Sik;Park Sung-Hyeon;Nam Taek-Kun;Yim Jeong-Bin;Aim Young-sup
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2005.10a
    • /
    • pp.43-46
    • /
    • 2005
  • The detectability of radar depends on RCS(radar cross section). The RCS for complex radar targets may be only approximately calculated by using low-frequency or high-frequency scattering methods, while the RCS for simple rob targets can be exactly obtained by applying an eigen-function method. However, the conventional methods for calculation of RCS are computationally complex. We propose an approximation method for RCS calculation by MUSIC algorithm In this research, it is assumed toot the radar target is considered as a ring of scatterers. The amplitudes of scatterers may be statistically distributed. As the result, the radar signal model is proposed to use MUSIC, and the RCS is calculated by a simple linear algebraic method.

  • PDF

Improvement of GPON MAC Protocol for IP TV Service (IPTV 서비스를 위한 GPON 핵심 MAC 기술 개발)

  • Lee, Seung-Kun;Jang, Jong-Wook;Bae, Moon-Han
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.51-54
    • /
    • 2008
  • PON(Passive Optical Network) is the promising technology applicable to TPS(Triple Play Service). To improve process the packet, MAC(Multiple Access Control) is the most important technology in the PON. The core of MAC is DBA(Dynamic Bandwidth Assignment), it classifies SR-DBA(Status Report DBA) and NSR-DBA(Non Status Report DBA). But GPON DBA is using BPON's DBA, so it's bad in network efficiency. This study develop BR(Borrow-Refund)-DBA for improve network efficiency and prompt process. For take the gauge of performance evaluation, estimate about throughput, fairness and queue delay in SR-DBA and NSR-DBA environment

  • PDF

A Policy to Find All Siphons using Transitive Matrix (추이적 행렬을 이용한 사이폰 감지 정책)

  • Kim, Oe-Yeong;Lee, Jong-Kun
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.67-75
    • /
    • 2010
  • Deadlock usually appears in contain subsystem which is run in parallel and resources share modules. Siphons and traps have been well introduced to characterize deadlocks of Petri nets. Siphon concept be well used for proposing the detect and prevent deadlock by the pleasure researchers. But it's need many times and efforts to detect all siphon sub-nets in the Petri model. Since transitive matrix could explain all relations between the place and transitions in Petri nets, we propose an algorithm to detect all siphon sub-nets after analyzed the transitive matrix's properties. Examples are givens to illustrate the method.

Hierarchical Image Segmentation Based on HVS Characteristic for Region-Based Very Low Bit Rate Coding (영역기반 초저속 부호화를 위한 인간 시각 체계에 기반한 계층적 영상 분할)

  • Song, Kun-Woen;Park, Young-Sik;Han, Kyu-Phil;Nam, Jae-Yeal;Ha, Yeong-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.1
    • /
    • pp.70-80
    • /
    • 1999
  • In this paper, a new hierarchical image segmentation algorithm based on human visual system(HVS) characteristic is proposed which can efficiently reduce and control transmission information quantity without the degradation of the subjective and objective image quality. It consists of image segmentation based on mathematical morphology and region merging considering HVS characteristic for the pairs of two adjacent regions at each level of the hierarchy. Image segmentation is composed of 3-level hierarchical structure. In the region merging structure of each level, we extract the pairs of two adjacent regions which human vision can't discriminate, and then merge them. The proposed region merging method extracts pairs of two neighbor regions to be merged and performs region merging according to merging priority based on HVS characteristics. The merging priority for each adjacent pair is determined by the proposed merging priority function(MPF). First of all, the highest priority pair is merged. The information control factor is used to regulate the transmission information at each level. The proposed segmentation algorithm can efficiently improve bottleneck problem caused by excessive contour information at region-based very low bit rate coding. And it shows that it is more flexible structure than that of conventional method. In experimental results, though PSNR and the subjective image quality by the proposed algorithm is similar to that of conventional method, the contour information quantity to be transmitted is reduced considerably. Therefore it is an efficient image segmentation algorithm for region-based very low bit rate coding.

  • PDF

Effect by the application of the Verlet Neighboring list in a Molecular Dynamics Simulation (분자동역학법에 있어 인접분자 리스트의 영향)

  • Choi Hyun-Kue;Kim Hae-min;Choe Soon-Youl;Kim Kyung-Kun;Choi Soon-Ho
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.29 no.1
    • /
    • pp.60-67
    • /
    • 2005
  • Generally. in the molecular dynamics simulations. the Verlet neighboring list algorithm is used for the reduction of a simulation time On the other hand. the application of the Verlet neighboring list forces the time evolution of a simulation system to follow an unrealistic path in a phase space. In equilibrium state, it does not matter with the simulation results because the individual molecule's motion is originally random and any effect due to a small deviation from a real time evolution can be completely ignored. However, if an unsteady state is involved. such a deviation may significantly affect to the results. That is, there is a Possibility that the simulation results Provide ones with any misleading data In this study we evaluated the effect due to the Verlet neighboring list in performing the simulation of a non-equilibrium state and suggested the method to avoid it.

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

FPGA Implementation of Doppler Invarient Low Power BFSK Receiver Using CORDIC (CORDIC을 이용한 도플러 불변 저전력 BFSK 수신기의 FPGA구현)

  • Byon, Kun-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1488-1494
    • /
    • 2008
  • This paper is to design and implement a low power noncoherent BFSK receiver intended for future deep space communication using Xilinx System generator. The receiver incorporates a 16 point Fast Fourier Transform(FFT) for symbol detection. The design units of the receiver are digital design for better efficiency and reliability. The receiver functions on one bit data processing and supports main data rate 10kbps. In addition CORDIC algorithm is used for avoiding complex multiplications while computing FFT and multiplication of twiddle factor for low power is substituted by rotators. The design and simulation of the receiver is carried out in Simulink then the Simulink model is translated to the hardware model to implement FPGA using Xilinx System Generator and to verify performance.

Optimized Simulation Framework for the Analysis in Battle systems (전투실험 분석을 위한 최적화 시뮬레이션 프레임워크)

  • Kang, Jong-Gu;Lee, Minkyu;Kim, Sunbum;Hwang, Kun-Chul;Lee, Donghoon
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.2
    • /
    • pp.1-9
    • /
    • 2015
  • The tactical employment is a critical factor to win the war in the modern battlefield. To apply optimized tactics, it needs analyses related to a battle system. Normally, M&S (Modeling & Simulation) has been studied to analyze data in general problems. However, this method is not suitable for military simulations because there are many variables which make complex interaction in the system. For this reason, we suggested the optimized simulation framework based on the M&S by using DPSO (Discrete binary version of PSO) algorithm. This optimized simulation framework makes the best tactical employment to reduce the searching time compared with the normal M&S used by Monte Carlo search method. This paper shows an example to find the best combination of anti-torpedo scenario in a short searching time. From the simulation example, the optimized simulation framework presents the effectiveness.