• Title/Summary/Keyword: Single Time Schemes

Search Result 137, Processing Time 0.038 seconds

A new scheme for discrete implicit adaptive observer and controller (이산형 적응관측자 및 제어기의 새로운 구성)

  • 고명삼;허욱열
    • 전기의세계
    • /
    • v.30 no.12
    • /
    • pp.822-831
    • /
    • 1981
  • Many different schemes of the adaptive observer and controller have been developed for both continuous and discrete systems. In this paper we have presented a new scheme of the reduced order adaptive observer for the single input discrete linear time invariant plant. The output equation of the plant, is transformed into the bilinear form in terms of system parameters and the states of the state variable filters. Using the plant output equation the discrete implicit adaptive observer based on the similar philosophy to Nuyan and Carroll is derived and the parameter adaptation algorithm is derived based on the exponentially weighted least square method. The adaptive model following control system is also constructed according to the proposed observer scheme. The proposed observer and controller are rather than simple structure and have a fast adaptive algorithm, so it may be expected that the scheme is suitable to the practical application of control system design. The effectiveness of the algorithm and structure is illustrated by the computer simulation of a third order system. The simulation results show that the convergence speed is proportinal to the increasing of weighting factor alpha, and that the full order and reduced order observer have similar convergence characteristics.

  • PDF

Application of Directional Wavelet to Ocean Wave Image Analysis (방향 웨이브렛을 적용한 해양파 이미지 분석)

  • Kwon S. H.;Lee H. S.;Park J. S.;Ha M. K.
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.377-380
    • /
    • 2002
  • This paper presents the results of a study investigating methods of interpretation of wave directionality based on wavelet transforms. Two-dimensional discrete wavelet was used for the analysis. The proposed scheme utilizes a single frame of ocean waves to detect their directionality. This fact is striking considering the fact that traditional methods require long time histories of ocean wave elevation measured at various locations. The developed schemes were applied to the data generated from numerical simulations and video images to test the efficiency of the proposed scheme in detecting the directionality of ocean waves.

  • PDF

LIVELOCK-THIN LOCKING PROTOCOL FOR TRANSACTION SCHEDULING IN DISTRIBUTED DATA NETWORK MANAGEMENT (분산망 거래관리를 위한 기아현상 극소화 잠금규약)

  • 이혜경;김응모
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1891-1898
    • /
    • 1999
  • Traditional syntax-oriented serializability notions are considered to be not enough to handle in particular various types of transaction in terms of duration of execution. To deal with this situation, altruistic locking has attempted to reduce delay effect associated with lock release moment by use of the idea of donation. An improved form of altruism has also been deployed in extended altruistic locking in a way that scope of data to be early released is enlarged to include even data initially not intended to be donated. In this paper, we first of all investigated limitations inherent in both altruistic schemes from the perspective of alleviating starvation occasions for transactions in particular of short-lived nature. The idea of two-way donation locking(2DL) has then been experimented to see the effect of more than single donation in distributed database systems. Simulation experiments shows that 2DL outperforms the conventional two-phase locking in terms of the degree of oncurrency and average transaction waiting time.

  • PDF

A MULTIPATH CONGESTION CONTROL SCHEME FOR HIGH-QUALITY MULTIMEDIA STREAMING

  • Lee, Sunghee;Chung, Kwangsue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.414-435
    • /
    • 2017
  • As network adaptive streaming technology becomes increasingly common, transport protocol also becomes important in guaranteeing the quality of multimedia streaming. At the same time, because of the appearance of high-quality video such as Ultra High Definition (UHD), preventing buffering as well as preserving high quality while deploying a streaming service becomes important. The Internet Engineering Task Force recently published Multipath TCP (MPTCP). MPTCP improves the maximum transmission rate by simultaneously transmitting data over different paths with multiple TCP subflows. However, MPTCP cannot preserve high quality, because the MPTCP subflows slowly increase the transmission rate, and upon detecting a packet loss, drastically halve the transmission rate. In this paper, we propose a new multipath congestion control scheme for high-quality multimedia streaming. The proposed scheme preserves high quality of video by adaptively adjusting the increasing parameter of subflows according to the network status. The proposed scheme also increases network efficiency by providing load balancing and stability, and by supporting fairness with single-flow congestion control schemes.

Balancing Inter-Ring Loads on SONET Dual-Ring without Demand Splitting

  • Lee, Chae-Y.;Moon, Jung-H.
    • IE interfaces
    • /
    • v.9 no.3
    • /
    • pp.64-71
    • /
    • 1996
  • In the survivability and simplicity aspect, SONET Self-healing Ring(SHR) is one of the most important schemes for the high-speed telecommunication networks. Since the ring capacity requirement is defined by the largest STS-1 cross-section in the ring, load balancing is the key issue in the design of SONET SHR. Recently, most of the research on load balancing problem have been concentrated on the SONET single-ring case. However, in certain applications, multiple-ring configuration is necessary because of the geographical limitations or the need for extra bandwidth. In this paper, the load balancing problem for SONET dual-ring is considered by assuming symmetric inter-ring demands. We present a linear programming based formulation of the problem. Initial solution and improvement procedures are presented, which solves the routing and interconnection between the two rings for each demand. Computational experiments are performed on various size of networks with randomly generated demand sets. Results show that the proposed algorithm is excellent in both the solution quality and the computational time requirement. The average error bound of the solutions obtained is 0.26% of the optimum.

  • PDF

Half-Cycle-Waveform-Inversed Single-Carrier Seven-level Sinusoidal Modulation

  • Wu, Fengjiang;Sun, Bo;Zhang, Lujie;Sun, Li
    • Journal of Power Electronics
    • /
    • v.13 no.1
    • /
    • pp.86-93
    • /
    • 2013
  • A half-cycle-waveform inversion based three reference modulations seven-level SPWM (TRM-SPWM) scheme with one carrier is proposed in this paper. To keep the same comparison logics for the modulations and carrier during the negative half cycle and the positive one for the modulations, in the negative half cycle of the modulations, the DC offsets related to the amplitude of the carrier are set on the three modulations, respectively. The seven-level SPWM waveform with dead time thereby is implemented with only one Digital Signal Processor (DSP) without any other attached logic circuit. The basis principle of the proposed TRM-SPWM is analyzed in detail, and the frequency spectrums of the conventional and the proposed schemes are derived and compared with each other through simulation. The DSP based implementation is presented and detailed experimental waveforms verify the accuracy and feasibility of the proposed TRM-SPWM scheme.

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

Novel FFT Acquisition Scheme with Baseband Resampling for Multi-GNSS Receivers

  • Jinseok, Kim;Sunyong, Lee;Hung Seok, Seo
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.1
    • /
    • pp.59-65
    • /
    • 2023
  • A GNSS receiver must perform signal acquisition to estimate the code phase and Doppler frequency of the incoming satellite signals, which are essential information for baseband signal processing. Modernized GNSS signals have different modulation schemes and long PRN code lengths from legacy signals, which makes it difficult to acquire the signals and increases the computational complexity and time. This paper proposes a novel FFT/Inverse-FFT with baseband resampling to resolve the aforementioned challenges. The suggested algorithm uses a single block only for the FFT and thereby requires less hardware resources than conventional structures such as Double Block Zero Padding (DBZP). Experimental results based on a MATLAB simulation show this algorithm can successfully acquire GPS L1C/A, GPS L2C, Galileo E1OS, and GPS L5.

A Privacy-preserving Image Retrieval Scheme in Edge Computing Environment

  • Yiran, Zhang;Huizheng, Geng;Yanyan, Xu;Li, Su;Fei, Liu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.450-470
    • /
    • 2023
  • Traditional cloud computing faces some challenges such as huge energy consumption, network delay and single point of failure. Edge computing is a typical distributed processing platform which includes multiple edge servers closer to the users, thus is more robust and can provide real-time computing services. Although outsourcing data to edge servers can bring great convenience, it also brings serious security threats. In order to provide image retrieval while ensuring users' data privacy, a privacy preserving image retrieval scheme in edge environment is proposed. Considering the distributed characteristics of edge computing environment and the requirement for lightweight computing, we present a privacy-preserving image retrieval scheme in edge computing environment, which two or more "honest but curious" servers retrieve the image quickly and accurately without divulging the image content. Compared with other traditional schemes, the scheme consumes less computing resources and has higher computing efficiency, which is more suitable for resource-constrained edge computing environment. Experimental results show the algorithm has high security, retrieval accuracy and efficiency.

The use of linear stochastic estimation for the reduction of data in the NIST aerodynamic database

  • Chen, Y.;Kopp, G.A.;Surry, D.
    • Wind and Structures
    • /
    • v.6 no.2
    • /
    • pp.107-126
    • /
    • 2003
  • This paper describes a simple and practical approach through the application of Linear Stochastic Estimation (LSE) to reconstruct wind-induced pressure time series from the covariance matrix for structural load analyses on a low building roof. The main application of this work would be the reduction of the data storage requirements for the NIST aerodynamic database. The approach is based on the assumption that a random pressure field can be estimated as a linear combination of some other known pressure time series by truncating nonlinear terms of a Taylor series expansion. Covariances between pressure time series to be simulated and reference time series are used to calculate the estimation coefficients. The performance using different LSE schemes with selected reference time series is demonstrated by the reconstruction of structural load time series in a corner bay for three typical wind directions. It is shown that LSE can simulate structural load time series accurately, given a handful of reference pressure taps (or even a single tap). The performance of LSE depends on the choice of the reference time series, which should be determined by considering the balance between the accuracy, data-storage requirements and the complexity of the approach. The approach should only be used for the determination of structural loads, since individual reconstructed pressure time series (for local load analyses) will have larger errors associated with them.