• 제목/요약/키워드: additional information

Search Result 4,957, Processing Time 0.032 seconds

Advances in Nonlinear Predictive Control: A Survey on Stability and Optimality

  • Kwon, Wook-Hyun;Han, Soo-Hee;Ahn, Choon-Ki
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.1
    • /
    • pp.15-22
    • /
    • 2004
  • Some recent advances in stability and optimality for the nonlinear receding horizon control (NRHC) or the nonlinear model predictive control (NMPC) are assessed. The NRHCs with terminal conditions are surveyed in terms of a terminal state equality constraint, a terminal cost, and a terminal constraint set. Other NRHCs without terminal conditions are surveyed in terms of a control Lyapunov function (CLF) and cost monotonicity. Additional approaches such as output feedback, fuzzy, and neural network are introduced. This paper excludes the results for linear receding horizon controls and concentrates only on the analytical results of NRHCs, not including applications of NRHCs. Stability and optimality are focused on rather than robustness.

Development of a Translator based on AP 209 for the Integrated Data transfer among Commercial Structural Analysis Programs (상용해석프로그램간 데이터 통합운용을 위한 AP 209기반의 변환기 개발)

  • Jeong Dong-Gyun;Jeong Yeon-Suk;Lee Sang-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2005.04a
    • /
    • pp.712-718
    • /
    • 2005
  • In this study, a translator for transferring structural analysis data among commercial structural analysis programs was developed. The translator adopted the neutral format type based on ISO standard STEP AP 209 not only for the international standardization and robustness but also for the efficient management of structural analysis data Additional load entity is developed and added to AP 209 for the prevention of loss of information in retrieving exact loading condition. A modulization which is needed for efficient management and extension of the translator was made for the encapsulation of file format of each commercial code. Pilot tests peformed with 3-D frame analysis data of Sung-su bridge show that the developed translator guarantees the integrated management of analysis information as well as the exact transferring and retrieving of analysis data and related information.

  • PDF

Block-Based Predictive Watershed Transform for Parallel Video Segmentation

  • Jang, Jung-Whan;Lee, Hyuk-Jae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.2
    • /
    • pp.175-185
    • /
    • 2012
  • Predictive watershed transform is a popular object segmentation algorithm which achieves a speed-up by identifying image regions that are different from the previous frame and performing object segmentation only for those regions. However, incorrect segmentation is often generated by the predictive watershed transform which uses only local information in merge-split decision on boundary regions. This paper improves the predictive watershed transform to increase the accuracy of segmentation results by using the additional information about the root of boundary regions. Furthermore, the proposed algorithm is processed in a block-based manner such that an image frame is decomposed into blocks and each block is processed independently of the other blocks. The block-based approach makes it easy to implement the algorithm in hardware and also permits an extension for parallel execution. Experimental results show that the proposed watershed transform produces more accurate segmentation results than the predictive watershed transform.

FIDO Universal Authentication System Based on Blockchain (블록체인 기반의 FIDO 범용 인증 시스템)

  • Kim, S.H.;Huh, S.Y.;Cho, Y.S.;Cho, S.R.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.33 no.1
    • /
    • pp.34-44
    • /
    • 2018
  • In this paper, we describe a FIDO universal authentication system based on a Blockchain that can share the user's FIDO authentication information between the application services of multiple domains without the use of a server. In addition we provide a method to query the FIDO authentication information of the user recorded in the Blockchain using only the user's service ID. Therefore, even if the user executes the FIDO registration process only once, the user can use the FIDO authentication service of another application service without repeating an additional FIDO registration procedure, and the service provider can securely share and utilize the FIDO authentication information of the user without the use of a trusted third party, thereby lowering the deployment and maintenance costs of the FIDO server.

A Development of Service Systems Model from Business Model Approach (비즈니스 모델을 기반으로 서비스 시스템 모델 개발에 관한 연구)

  • Yim, Myung-Seong;Jeong, Tae-Seok;Moon, Yong-Eun
    • The Journal of Information Systems
    • /
    • v.19 no.4
    • /
    • pp.1-24
    • /
    • 2010
  • Over the past three decades, services have become the largest part of most industrialized nations' economies but it is the least-studied part of the economy. One approach is to develop a general theory of service with well-defined questions, tools, methods, and practical implications of society. The purpose of this study was to propose a service systems model to systematically approach a service research. For this purpose, we conducted literature review about business model and extant service systems researches. Based on a literature review, we propose a service systems model that comprises value proposition, participants, shared information/knowledge, organizational capability, value network, and technology. Implications for practice and recommendations for additional research were discussed.

Biological Object Downloader (BOD) Service for Easy Download and Management of Biological Databases

  • Park, Dae-Ui;Lee, Jung-Woo;Yoon, Gi-Seok;Gong, Sung-Sam;Bhak, Jong
    • Genomics & Informatics
    • /
    • v.5 no.4
    • /
    • pp.196-199
    • /
    • 2007
  • BOD is an FTP service management tool on the Internet. It was developed for biological researchers in South Korea. It enables easier and faster access of bioinformation without having to go through foreign FTP sites. BOD includes an automatic downloader with a management and email alert service from which the user can easily select and schedule any biological database. Once listed in BOD, the user can check and modify the download status and data from an additional email alert service.

Sensor Information Filter for Enhancing the Indoor Pedestrian Localization Accuracy (보행자의 실내 위치 추정 정확도 향상을 위한 다양한 센서 정보 필터)

  • Kim, Jooyoung;Lee, Sooyong
    • The Journal of Korea Robotics Society
    • /
    • v.7 no.4
    • /
    • pp.276-283
    • /
    • 2012
  • Due to the low localization accuracy and the requirement of special infrastructure, current LBS(Localization Based Service) is limited to show P.O.I.(Point of Interest) nearby. Improvement of IMU(Inertial Measurement Unit) based deadreckoning is presented in this paper. Additional sensors such as the magnetic compass and magnetic flux sensors are used as well as the accelerometer and the gyro for getting more information of movement. Based on the pedestrian movement, appropriate sensor information is selected and the complementary filter is used in order to enhance the accuracy of the localization.

Influences of Consumer Perceived Risks and Valence of Word of Mouth Information on Purchase Intention in Social Commerce (소셜 커머스의 소비자 지각된 위험과 구전 방향성이 구매의도에 미치는 영향)

  • Shim, E Seok;Rhee, Hyong Jae
    • Journal of Information Technology Services
    • /
    • v.12 no.3
    • /
    • pp.73-93
    • /
    • 2013
  • This paper is a research on perceived risk of social commerce which has influence on purchase intention. This study uses a 3-dimension concept of perceived risk and then, deals with influencing a purchase intention. In addition, to search other influential variable to purchase intention, this study adds a variable with expected moderating effect. This study proposes several hypothesis and processes an experiment to test and attest these hypothesis. This study attempts to analyze the effect that perceived risk in social commerce has on purchase intention. By the results of data analysis, all dimensions of perceived risk are found to have significant negative effects on purchase intention. In addition, this study proves moderating roles of valence of WOM Information on purchase intention. Additional managerial implications are also discussed.

Request Deduplication Scheme in Cache-Enabled 5G Network Using PON

  • Jung, Bokrae
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.2
    • /
    • pp.100-105
    • /
    • 2020
  • With the advent of the 5G era, the rapid growth in demand for mobile content services has increased the need for additional backhaul investment. To meet this demand, employing a content delivery network (CDN) and optical access solution near the last mile has become essential for the configuration of 5G networks. In this paper, a cache-enabled architecture using the passive optical network (PON) is presented to serve video on demand (VoD) for users. For efficient use of mobile backhaul, I propose a request deduplication scheme (RDS) that can provide all the requested services missed in cache with minimum bandwidth by eliminating duplicate requests for movies within tolerable range of the quality of service (QoS). The performance of the proposed architecture is compared with and without RDS in terms of the number of requests arriving at the origin server (OS), hit ratio, and improvement ratio according to user requests and cache sizes.

Realization of a Scalable and Reliable Multicast Transport Protocol for Many-to-Many Sessions

  • Lee, Seung-Ik;Ko, Yang-Woo;Lee, Dong-Man
    • ETRI Journal
    • /
    • v.29 no.6
    • /
    • pp.745-754
    • /
    • 2007
  • In this paper, we present the Enhanced Communication Transport Protocol-Part 5 (ECTP-5), which provides scalable and reliable multicast communication service for many-to-many applications by constructing high quality recovery trees from two-layer logical trees and repairing the losses via unicast automatic repeat request-based error control. In order to realize the protocol, we developed feasible protocol architectures and building blocks including additional functions which deal with engineering details, such as membership dynamics and sender coordination. Experimental results show that ECTP-5 scales well with various session sizes and packet loss rates in terms of control overhead and recovery latency.

  • PDF