• 제목/요약/키워드: Transpose Network

검색결과 7건 처리시간 0.028초

COMPUTATION OF SOMBOR INDICES OF OTIS(BISWAPPED) NETWORKS

  • Basavanagoud, B.;Veerapur, Goutam
    • 충청수학회지
    • /
    • 제35권3호
    • /
    • pp.205-225
    • /
    • 2022
  • In this paper, we derive analytical closed results for the first (a, b)-KA index, the Sombor index, the modified Sombor index, the first reduced (a, b)-KA index, the reduced Sombor index, the reduced modified Sombor index, the second reduced (a, b)-KA index and the mean Sombor index mSOα for the OTIS biswapped networks by considering basis graphs as path, wheel graph, complete bipartite graph and r-regular graphs. Network theory plays a significant role in electronic and electrical engineering, such as signal processing, networking, communication theory, and so on. A topological index (TI) is a real number associated with graph networks that correlates chemical networks with a variety of physical and chemical properties as well as chemical reactivity. The Optical Transpose Interconnection System (OTIS) network has recently received increased interest due to its potential uses in parallel and distributed systems.

Redundant 매니퓰레이터의 force 제어를 위한 신경 회로망 제어기 (Force Controller of the Redundant Manipulator using Seural Network)

  • 이기응;조현찬;전홍태;이홍기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1990년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 26-27 Oct. 1990
    • /
    • pp.13-17
    • /
    • 1990
  • In this paper we propose the force controller using a neural network for a redundant manipulator. Jacobian transpose matrix of a redundant manipulator constructed by a neural network is trained by using a feedback torque as an error signal. If the neural network is sufficiently trained well, the kinematic inaccuracy of a manipulator is automatically compensated. The effectiveness of the proposed controller is demonstrated by computer simulation using a three-link planar robot.

  • PDF

DA구조 이용 가산기 수를 감소한 2-D DCT/IDCT 프로세서 설계 (2-D DCT/IDCT Processor Design Reducing Adders in DA Architecture)

  • 정동윤;서해준;배현덕;조태원
    • 대한전자공학회논문지SD
    • /
    • 제43권3호
    • /
    • pp.48-58
    • /
    • 2006
  • 본 논문은 가산기 기반 DA(Distributed Arithmetic: 분산 산술연산)구조로서 ROM과 같은 일반적인 메모리가 사용되지 않는 8x8의 2차원 DCT(Discrete Cosine Transform)/IDCT(Inverse DCT) 프로세서를 제안 설계하였다. 제안된 논문은 DCT와 IDCT의 계수 행렬에서 하드웨어를 줄이기 위해 계수 행렬의 홀수 부분을 공유하였고, 2차원 DCT/IDCT 프로세서의 계수 연산을 위해 단지 29개의 가산기만을 사용하였다. 이는 8x8 1차원 DCT NEDA(NEw DA)구조에서의 가산기 수 보다 48.6%를 감소 시켰다. 또한, 기존의 전치메모리와는 다른 새로운 전치네트워크 구조를 제안하였다. 제안된 전치네트워크 구조에서는 전치메모리 블록 대신 하드웨어를 줄이기 위해 레지스터 형태의 새로운 레지스터 블록 전치네트워크 형태를 제안하였다. 제안된 전치네트워크 블록은 64개의 레지스터를 사용하며, 이는 일반적인 메모리를 사용하는 기존의 전치메모리 구조에 사용된 트랜지스터 수 보다 18%가 감소하였다. 또한 처리율 향상을 위해 새롭게 적용되고 있는 방식으로, 입력 데이터에 대해 매 클럭 주기마다 8개의 화소데이터를 받아서 8개의 화소데이터를 처리하도록 하여 출력하는 비트 병렬화 구조로 설계하였다.

신경 회로망을 이용한 로보트 매니퓰레이터의 Hybrid 위치/힘 제어기의 설계 (Hybrid position/force controller design of the robot manipulator using neural network)

  • 조현찬;전홍태;이홍기
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1990년도 한국자동제어학술회의논문집(국내학술편); KOEX, Seoul; 26-27 Oct. 1990
    • /
    • pp.24-29
    • /
    • 1990
  • In this paper ,ie propose a hybrid position/force controller of a robot manipulator using double-layer neural network. Each layer is constructed from inverse dynamics and Jacobian transpose matrix, respectively. The weighting value of each neuron is trained by using a feedback force as an error signal. If the neural networks are sufficiently trained it does not require the feedback-loop with error signals. The effectiveness of the proposed hybrid position/force controller is demonstrated by computer simulation using a PUMA 560 manipulator.

  • PDF

A Matrix-Based Genetic Algorithm for Structure Learning of Bayesian Networks

  • Ko, Song;Kim, Dae-Won;Kang, Bo-Yeong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제11권3호
    • /
    • pp.135-142
    • /
    • 2011
  • Unlike using the sequence-based representation for a chromosome in previous genetic algorithms for Bayesian structure learning, we proposed a matrix representation-based genetic algorithm. Since a good chromosome representation helps us to develop efficient genetic operators that maintain a functional link between parents and their offspring, we represent a chromosome as a matrix that is a general and intuitive data structure for a directed acyclic graph(DAG), Bayesian network structure. This matrix-based genetic algorithm enables us to develop genetic operators more efficient for structuring Bayesian network: a probability matrix and a transpose-based mutation operator to inherit a structure with the correct edge direction and enhance the diversity of the offspring. To show the outstanding performance of the proposed method, we analyzed the performance between two well-known genetic algorithms and the proposed method using two Bayesian network scoring measures.

Nationalizing Transnationalism: A Comparative Study of the "Comfort Women" Social Movement in China, Taiwan, and South Korea

  • Alvarez, Maria del Pilar
    • Journal of Contemporary Eastern Asia
    • /
    • 제19권1호
    • /
    • pp.8-30
    • /
    • 2020
  • Most literature on the "comfort women" social movement focuses on the case of Korea. These works tend to transpose the meanings generated by South Korean organizations onto the transnational network, assuming certain homogeneity of repertoires and identities among the different social actors that comprise this network. Even though there is some degree of consensus about demands, repertoires, and advocacy strategies at the international level, does this same uniformity exist at the national level? In each country, what similarities and differences are present in the laboratories of ideas, relationships, and identities of social actors in the network? Symbolically and politically, do they challenge their respective societies in the same way? This article compares this social movement in South Korea, China, and Taiwan. My main argument is that the constitutive base for this transnational network is the domestic actions of these organizations. It is in the domestic sphere that these social actors reinforce their agendas, reinvent their repertoires, transform their identities, and expand their submerged networks, allowing national movements to retain their latency and autonomy. Following Melucci's relational approach to the study of social movements, this research is based on a qualitative analysis of institutional documents, participant observation, and open-ended interviews with members of the main social actors.

A Secure Method for Color Image Steganography using Gray-Level Modification and Multi-level Encryption

  • Muhammad, Khan;Ahmad, Jamil;Farman, Haleem;Jan, Zahoor;Sajjad, Muhammad;Baik, Sung Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1938-1962
    • /
    • 2015
  • Security of information during transmission is a major issue in this modern era. All of the communicating bodies want confidentiality, integrity, and authenticity of their secret information. Researchers have presented various schemes to cope with these Internet security issues. In this context, both steganography and cryptography can be used effectively. However, major limitation in the existing steganographic methods is the low-quality output stego images, which consequently results in the lack of security. To cope with these issues, we present an efficient method for RGB images based on gray level modification (GLM) and multi-level encryption (MLE). The secret key and secret data is encrypted using MLE algorithm before mapping it to the grey-levels of the cover image. Then, a transposition function is applied on cover image prior to data hiding. The usage of transpose, secret key, MLE, and GLM adds four different levels of security to the proposed algorithm, making it very difficult for a malicious user to extract the original secret information. The proposed method is evaluated both quantitatively and qualitatively. The experimental results, compared with several state-of-the-art algorithms, show that the proposed algorithm not only enhances the quality of stego images but also provides multiple levels of security, which can significantly misguide image steganalysis and makes the attack on this algorithm more challenging.