• Title/Summary/Keyword: Transpose Network

Search Result 7, Processing Time 0.022 seconds

COMPUTATION OF SOMBOR INDICES OF OTIS(BISWAPPED) NETWORKS

  • Basavanagoud, B.;Veerapur, Goutam
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.35 no.3
    • /
    • pp.205-225
    • /
    • 2022
  • In this paper, we derive analytical closed results for the first (a, b)-KA index, the Sombor index, the modified Sombor index, the first reduced (a, b)-KA index, the reduced Sombor index, the reduced modified Sombor index, the second reduced (a, b)-KA index and the mean Sombor index mSOα for the OTIS biswapped networks by considering basis graphs as path, wheel graph, complete bipartite graph and r-regular graphs. Network theory plays a significant role in electronic and electrical engineering, such as signal processing, networking, communication theory, and so on. A topological index (TI) is a real number associated with graph networks that correlates chemical networks with a variety of physical and chemical properties as well as chemical reactivity. The Optical Transpose Interconnection System (OTIS) network has recently received increased interest due to its potential uses in parallel and distributed systems.

Force Controller of the Redundant Manipulator using Seural Network (Redundant 매니퓰레이터의 force 제어를 위한 신경 회로망 제어기)

  • 이기응;조현찬;전홍태;이홍기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.13-17
    • /
    • 1990
  • In this paper we propose the force controller using a neural network for a redundant manipulator. Jacobian transpose matrix of a redundant manipulator constructed by a neural network is trained by using a feedback torque as an error signal. If the neural network is sufficiently trained well, the kinematic inaccuracy of a manipulator is automatically compensated. The effectiveness of the proposed controller is demonstrated by computer simulation using a three-link planar robot.

  • PDF

2-D DCT/IDCT Processor Design Reducing Adders in DA Architecture (DA구조 이용 가산기 수를 감소한 2-D DCT/IDCT 프로세서 설계)

  • Jeong Dong-Yun;Seo Hae-Jun;Bae Hyeon-Deok;Cho Tae-Won
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.3 s.345
    • /
    • pp.48-58
    • /
    • 2006
  • This paper presents 8x8 two dimensional DCT/IDCT processor of adder-based distributed arithmetic architecture without applying ROM units in conventional memories. To reduce hardware cost in the coefficient matrix of DCT and IDCT, an odd part of the coefficient matrix was shared. The proposed architecture uses only 29 adders to compute coefficient operation in the 2-D DCT/IDCT processor, while 1-D DCT processor consists of 18 adders to compute coefficient operation. This architecture reduced 48.6% more than the number of adders in 8x8 1-D DCT NEDA architecture. Also, this paper proposed a form of new transpose network which is different from the conventional transpose memory block. The proposed transpose network block uses 64 registers with reduction of 18% more than the number of transistors in conventional memory architecture. Also, to improve throughput, eight input data receive eight pixels in every clock cycle and accordingly eight pixels are produced at the outputs.

Hybrid position/force controller design of the robot manipulator using neural network (신경 회로망을 이용한 로보트 매니퓰레이터의 Hybrid 위치/힘 제어기의 설계)

  • 조현찬;전홍태;이홍기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1990.10a
    • /
    • pp.24-29
    • /
    • 1990
  • In this paper ,ie propose a hybrid position/force controller of a robot manipulator using double-layer neural network. Each layer is constructed from inverse dynamics and Jacobian transpose matrix, respectively. The weighting value of each neuron is trained by using a feedback force as an error signal. If the neural networks are sufficiently trained it does not require the feedback-loop with error signals. The effectiveness of the proposed hybrid position/force controller is demonstrated by computer simulation using a PUMA 560 manipulator.

  • PDF

A Matrix-Based Genetic Algorithm for Structure Learning of Bayesian Networks

  • Ko, Song;Kim, Dae-Won;Kang, Bo-Yeong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.3
    • /
    • pp.135-142
    • /
    • 2011
  • Unlike using the sequence-based representation for a chromosome in previous genetic algorithms for Bayesian structure learning, we proposed a matrix representation-based genetic algorithm. Since a good chromosome representation helps us to develop efficient genetic operators that maintain a functional link between parents and their offspring, we represent a chromosome as a matrix that is a general and intuitive data structure for a directed acyclic graph(DAG), Bayesian network structure. This matrix-based genetic algorithm enables us to develop genetic operators more efficient for structuring Bayesian network: a probability matrix and a transpose-based mutation operator to inherit a structure with the correct edge direction and enhance the diversity of the offspring. To show the outstanding performance of the proposed method, we analyzed the performance between two well-known genetic algorithms and the proposed method using two Bayesian network scoring measures.

Nationalizing Transnationalism: A Comparative Study of the "Comfort Women" Social Movement in China, Taiwan, and South Korea

  • Alvarez, Maria del Pilar
    • Journal of Contemporary Eastern Asia
    • /
    • v.19 no.1
    • /
    • pp.8-30
    • /
    • 2020
  • Most literature on the "comfort women" social movement focuses on the case of Korea. These works tend to transpose the meanings generated by South Korean organizations onto the transnational network, assuming certain homogeneity of repertoires and identities among the different social actors that comprise this network. Even though there is some degree of consensus about demands, repertoires, and advocacy strategies at the international level, does this same uniformity exist at the national level? In each country, what similarities and differences are present in the laboratories of ideas, relationships, and identities of social actors in the network? Symbolically and politically, do they challenge their respective societies in the same way? This article compares this social movement in South Korea, China, and Taiwan. My main argument is that the constitutive base for this transnational network is the domestic actions of these organizations. It is in the domestic sphere that these social actors reinforce their agendas, reinvent their repertoires, transform their identities, and expand their submerged networks, allowing national movements to retain their latency and autonomy. Following Melucci's relational approach to the study of social movements, this research is based on a qualitative analysis of institutional documents, participant observation, and open-ended interviews with members of the main social actors.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.