• Title/Summary/Keyword: combined systems

Search Result 2,639, Processing Time 0.03 seconds

Designing Circuits for Low Power using Genetic Algorithms (유전자 알고리즘을 이용한 저전력 회로 설계)

  • 김현규;오형철
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.10 no.5
    • /
    • pp.478-486
    • /
    • 2000
  • This paper proposes a design method that can minimize the power dissipation of CMOS digital circuits without affecting their optimal operation speeds. The proposed method is based on genetic algorithms(GAs) combined to the retiming technique, a circuit transformation technique of repositioning flip-flops. The proposed design method consists of two phases: the phase of retiming for optimizing clock periods and the phase of GA retiming for minimizing power dissipation. Experimental results using Synopsys Design Analyzer show that the proposed design method can reduce the critical path delay of example circuits by about 30-50% and improve the dynamic power performance of the circuits by about 1.4~18.4%.

  • PDF

An Interference Avoidance Method Using Two Dimensional Genetic Algorithm for Multicarrier Communication Systems

  • Huynh, Chuyen Khoa;Lee, Won Cheol
    • Journal of Communications and Networks
    • /
    • v.15 no.5
    • /
    • pp.486-495
    • /
    • 2013
  • In this article, we suggest a two-dimensional genetic algorithm (GA) method that applies a cognitive radio (CR) decision engine which determines the optimal transmission parameters for multicarrier communication systems. Because a CR is capable of sensing the previous environmental communication information, CR decision engine plays the role of optimizing the individual transmission parameters. In order to obtain the allowable transmission power of multicarrier based CR system demands interference analysis a priori, for the sake of efficient optimization, a two-dimensionalGA structure is proposed in this paper which enhances the computational complexity. Combined with the fitness objective evaluation standard, we focus on two multi-objective optimization methods: The conventional GA applied with the multi-objective fitness approach and the non-dominated sorting GA with Pareto-optimal sorting fronts. After comparing the convergence performance of these algorithms, the transmission power of each subcarrier is proposed as non-interference emission with its optimal values in multicarrier based CR system.

A Study of the performance test method of DCS for a large industrial plant (분산제어시스템 기능점검 방법에 관한 연구)

  • Ma, B.R.;Lee, J.H.;Jung, M.S.
    • Proceedings of the KIEE Conference
    • /
    • 1999.07b
    • /
    • pp.883-886
    • /
    • 1999
  • Recently, with the development of computer technology, field instrument and control system using in industrial fields have changed from mechanical, electrical systems to digital electronic systems. Distributed control system(DCS), control functions are dispersed for grading up reliability and informations are combined fur effective management has been developed and sold. As this system has been enlarged and complicated, it is difficult to testing the system and very important to verifing functions systematically. In this report, function test procedure which is performed spontaneously by domestic or foreign DCS manufacturer was searched and analyzed. As its results, the test procedure of DCS functions were proposed. The proposed procedure was applied to DCS being used for a thermal power plant. The function test for DCS requires continuous and dynamic input/output signals, therefore we proposed the method to compose virtual plant which simulate the DCS functions with. And we suggested the test procedure of each DCS function.

  • PDF

Invariant Iris Key Generation Method Robust To Stolen Token Scenario (ID 도난 시나리오에 강인한 불변 홍채 키 생성 방법)

  • Lee, Youn-Joo;Kim, Jai-Hie
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.959-960
    • /
    • 2008
  • Recently, biometric authentication mechanism has been used to provide high level of security in cryptographic systems. In this paper, we propose an efficient method of generating invariant iris key to be applied in cryptographic systems. In order to generate iris key and improve the performance at the stolen token scenario, multiple random projection technique was combined with multiple linear transformation methods. From the experimental results, we proved that invariant iris keys were generated and the proposed method was robust to stolen token scenario.

  • PDF

A Robust Correlation-based Video Tracking (강인한 상관방식 추적기를 이용한 움직이는 물체 추적)

  • Park Dong-Jo;Cho Jae-Soo
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.7
    • /
    • pp.587-594
    • /
    • 2005
  • In this paper, a robust correlation-based video tracking is proposed to track a moving object in correlated image sequences. A correlation-based video tracking algorithm seeks to align the incoming target image with the reference target block image, but has critical problems, so called a false-peak problem and a drift phenomenon (correlator walk-off. The false-peak problem is generally caused by highly correlated background pixels with similar intensity of a moving target and the drift phenomenon occurs when tracking errors accumulate from frame to frame because of the nature of the correlation process. At first, the false-peaks problem for the ordinary correlation-based video tracking is investigated using a simple mathematical analysis. And, we will suggest a robust selective-attention correlation measure with a gradient preprocessor combined by a drift removal compensator to overcome the walk-off problem. The drift compensator adaptively controls the template block size according to the target size of interest. The robustness of the proposed method for practical application is demonstrated by simulating two real-image sequences.

An Eeffective Mesh Generation Algorithm Using Singular Shape Functions

  • Yoo, Hyeong Seon;Jang, Jun Hwan;Pyun, Soo Bum
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.3 no.4
    • /
    • pp.268-271
    • /
    • 2001
  • In this paper, we propose a simplified pollution adaptive mesh generation algorithm using singular elements. The algorithm based on the element pollution error indicator concentrate on boundary nodes. The automatic mesh generation method is followed by either a node-relocation or a node-insertion method. The boundary node relocation phase is introduced to reduce pollution error estimates without increasing the boundary nodes. The node insertion phase greatly improves the error and the factor with the cost of increasing the node numbers. It is shown that the suggested r-h version algorithm combined with singular elements converges more quickly than the conventional one.

  • PDF

Energy constraint control in numerical simulation of constrained dynamic system

  • 윤석준
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.376-382
    • /
    • 1991
  • In the analysis of constrained holonomic systems, the Lagange multiplier method yields a system of second-order ordinary differential equations of motion and algebraic constraint equations. Conventional holonomic or nonholonomic constraints are defined as geometric constraints in this paper. Previous works concentrate on the geometric constraints. However, if the total energy of a dynamic system can be computed from the initial energy plus the time integral of the energy input rate due to external or internal forces, then the total energy can be artificially treated as a constraint. The violation of the total energy constraint due to numerical errors can be used as information to control these errors. It is a necessary condition for accurate simulation that both geometric and energy constraints be satisfied. When geometric constraint control is combined with energy constraint control, numerical simulation of a constrained dynamic system becomes more accurate. A new convenient and effective method to implement energy constraint control in numerical simulation is developed based on the geometric interpretation of the relation between constraints in the phase space. Several combinations of energy constraint control with either Baumgarte's Constraint Violation Stabilization Method (CVSM) are also addressed.

  • PDF

Motion Control of an Outdoor Patrol Robot using a Single Laser Range Finder (야외 순찰로봇을 위한 단일 레이저거리센서 기반 충돌 회피 주행 제어기법 개발)

  • Hong, Seung-Bohm;Shin, You-Jin;Chung, Woo-Jin
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.4
    • /
    • pp.361-367
    • /
    • 2010
  • This paper reports the development of a mobile robot for patrol using a single laser range finder. A Laser range finder is useful for outdoor environment regardless of illumination change or various weather conditions. In this paper we combined the motion control of the mobile robot and the algorithm for detecting the outdoor environment. For obstacle avoidance, we adopted the Vector Field Histogram algorithm. A laser range finder is mounted on the mobile robot and looking down the road with a small tilt angle. We propose an algorithm for detecting the surface of the road. The outdoor patrol robot platform is equipped with a DGPS system, a gyro-compass sensor, and a laser range finder. The proposed obstacle avoidance and road detection algorithms were experimentally tested in success.

An Efficient Adaptive Modulation Scheme for Wireless OFDM Systems

  • Lee, Chang-Wook;Jeon, Gi-Joon
    • ETRI Journal
    • /
    • v.29 no.4
    • /
    • pp.445-451
    • /
    • 2007
  • An adaptive modulation scheme is presented for multiuser orthogonal frequency-division multiplexing systems. The aim of the scheme is to minimize the total transmit power with a constraint on the transmission rate for users, assuming knowledge of the instantaneous channel gains for all users using a combined bit-loading and subcarrier allocation algorithm. The subcarrier allocation algorithm identifies the appropriate assignment of subcarriers to the users, while the bit-loading algorithm determines the number of bits given to each subcarrier. The proposed bit-loading algorithm is derived from the geometric progression of the additional transmission power required by the subcarriers and the arithmetic-geometric means inequality. This algorithm has a simple procedure and low computational complexity. A heuristic approach is also used for the subcarrier allocation algorithm, providing a trade-off between complexity and performance. Numerical results demonstrate that the proposed algorithms provide comparable performance with existing algorithms with low computational cost.

  • PDF

Protein subcellular localization classification from multiple subsets of amino acid pair compositions

  • Tung, Thai Quang;Lim, Jong-Tae;Lee, Kwang-Hyung;Lee, Do-Heon
    • Proceedings of the Korean Society for Bioinformatics Conference
    • /
    • 2004.11a
    • /
    • pp.101-106
    • /
    • 2004
  • Subcellular localization is a key functional char acteristic of proteins. With the number of sequences entering databanks rapidly increasing, the importance of developing a powerful tool to identify protein subcellular location has become self-evident. In this paper, we introduce a novel method for predic ting protein subcellular locations from protein sequences. The main idea was motivated from the observation that amino acid pair composition data is redundant. By classifying from multiple feature subsets and using many kinds of amino acid pair composition s, we forced the classifiers to make uncorrelated errors. Therefore when we combined the predictors using a voting scheme, the prediction accuracy c ould be improved. Experiment was conducted on several data sets and significant improvement has been achieve d in a jackknife test.

  • PDF