• Title/Summary/Keyword: discrete scheme

Search Result 595, Processing Time 0.026 seconds

Robust Control of Robot Manipulator using Self-Tuning Adaptive Control (자기동조 적응제어기법에 의한 로봇 매니퓰레이터의 강인제어)

  • 뱃길호
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1996.10a
    • /
    • pp.150-155
    • /
    • 1996
  • This paper presents a new approach to the design of self-tuning adaptive control system that is robust to the changing dynamic configuration as well as to the load variation factors using digital signal processors for robot manipulators. TMS3200C50 is used in implementing real-time adaptive control algorithms provide advanced performance for robot manipulator. In this paper an adaptive control scheme is proposed in order to design the pole-placement self-tuning controller which can reject the offset due to any load disturbance without a detailed description of robot dynamics. parameters of discrete-time difference model are estimated by the recursive least-square identification algorithm and controller parameters are detemined by the pole-placement method. Performance of self-tuning adaptive controller is illusrated by the simulation and experiment for a SCARA robot.

  • PDF

The Error Concealment Scheme Using DCT Based Image Coding for Mobile Network (무선 네트워크를 위한 DCT 기반의 오류 은닉 기법)

  • 양승준;박성찬;이귀상
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.89-92
    • /
    • 2000
  • The wireless network has bursty and high error rates. Due to the quite limited bandwidth in wireless networks, images are usually transmitted as a compressed version with VLC(variable length coding). Loss of coded data can affect a decoded image to a large extent, making concealment of errors caused by data loss an important issue. This paper presents a error concealment technique for DCT(Discrete Cosine Transform) based image coding. First, a method to estimate the missing DC coefficients of a JPEG coded image which is required for decoding the compressed image, is suggested and evaluated. Second, the missing data is interpolated by exploiting the probability of being nonzero and the correlation between adjacent blocks. In addition, since the these technique is computational efficient, it conserves system resources and power consumption, which are restrictive in mobile computers.

  • PDF

A Cost-Effective Rate Control for Streaming Video for Wireless Portable Devices

  • Hong, Youn-Sik;Park, Hee-Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.6
    • /
    • pp.1147-1165
    • /
    • 2011
  • We present a simple and cost effective rate control scheme for streaming video over a wireless channel by using the information of mobile devices' buffer level. To prevent buffer fullness and emptiness at receivers, the server should be able to adjust sending rate according to receivers' buffer status. We propose methods to adjust sending rate based on the buffer level and discrete derivative of the buffer occupancy. To be compatible with existing network protocols, we provide methods to adjust sending rate by changing the inter-packet delay (IPD) at the server side. At every round-trip time, adjustments of sending rate are made in order to achieve responsiveness to sudden changes of buffer availabilities. A series of simulations and the prototype system showed that the proposed methods did not cause buffer overflows and it can maintain smoother rate control and react to bandwidth changes promptly.

Precision shape modeling by z-map model

  • Park, Jung-Whan;Chung, Yun-Chan;Choi, Byoung-Kyn
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.3 no.1
    • /
    • pp.49-56
    • /
    • 2002
  • The Z-map is a special farm of discrete non-parametric representation in which the height values at grid points on the xy-plane are stored as a 2D array z[ij]. While the z-map is the simplest farm of representing sculptured surfaces and is the most versatile scheme for modeling non-parametric objects, its practical application in industry (eg, tool-path generation) has aroused much controversy over its weaknesses, namely its inaccuracy, singularity (eg, vertical wall), and some excessive storage needs. Much research or the application of the z-map can be found in various articles, however, research on the systematic analysis of sculptured surface shape representation via the z-map model is rather rare. Presented in this paper are the following: shape modeling power of the simple z-map model, exact (within tolerance) z-map representation of sculptured surfaces which have some feature-shapes such as vertical-walls and real sharp-edges by adopting some complementary z-map models, and some application examples.

A Study on Way-Point Tracking of AUV using State Feedback (상태 궤환을 사용한 AUV의 경우점 추적 연구)

  • Kwon, Soon-Tae;Baek, Woon-Kyung;Kang, In-Pil;Choi, Hyeung-Sik;Joo, Moon-G.
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.12
    • /
    • pp.1266-1272
    • /
    • 2011
  • For way-point tracking of an autonomous underwater vehicle, a state feedback controller was designed by using pole placement scheme in discrete time domain. In the controller, 4 state variables were used for regulating the depth of the vehicle in z direction, and 3 state variables, for steering the vehicle in xy plane. Assuming constant speed of AUV, we simplified the design of the way-point tracking system. The proposed controller was simulated by MATLAB/Simulink using 6 degree-of-freedom nonlinear model and its performance of way point tracking was shown to be fulfilled within 1 m, nevertheless the proposed controller is quite simple and easy to implement compared to sliding mode controller.

A Multiresolution Digital Watermarking Based on Image Statistics (영상의 통계적 특성에 기반한 다해상도 디지털 워터마킹)

  • 한성현
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.2
    • /
    • pp.25-32
    • /
    • 2000
  • Digital watermarking has been recently proposed as the means of intellectual property right protection of multimedia data. We present a novel watermarking scheme to hide a copyright information in a digital image. The method Is based on the 2D DWT(Discrete Wavelet Transform) and image statistics. Gaussian and Laplacian noises as the watermarks are added to the large wavelet coefficients at the high and middle frequency bands in the wavelet domain. Experimental results show that the proposed Laplacian watermark is stronger to several common image distortions, such as noises, JPEG coding as different qualities, Gaussian blurring, and edge enhancement.

  • PDF

Novel Quasi-Sliding Mode Speed Controller for Induction Motor (유도전동기 속도제어를 위한 개선된 근사 슬라이딩 모드 제어기)

  • Cha, Jung-Hwa;Kim, Sang-Woo;Kim, Jun-Hwan;Moon, Hak-Yong;Jeon, Hee-Jong
    • Proceedings of the KIEE Conference
    • /
    • 1997.11a
    • /
    • pp.512-514
    • /
    • 1997
  • In this paper, a quasi-sliding mode (QSM) control with load observer is discussed for field-oriented induction motor speed drive. The proposed QSM control, which is defined in the discrete time domain and act with the load torque observer eliminating impacted load torque, restricts the bound of chattering within specified band. With this strategy, we can obtain fast dynamics without overshoot and robustness to parameter variation and disturbance. The proposed scheme is verified by digital simulation.

  • PDF

Security of Generalized Patchwork Algorithm for Audio Signal (오디오 신호에 적용된 Generalized Patchwork Algorithm의 안전성)

  • Kim Ki-Seob;Kim Hyoung-Joong;;Yang Jae-Soo
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.219-222
    • /
    • 2006
  • In this paper we present a cryptanalysis of the generalized patchwork algorithm under the assumption that the attacker possesses only a single copy of the watermarked audio. In the scheme, watermark is inserted by modifying randomly chosen DCT values in each block of the original audio. Towards the attack we first fit low degree polynomials (which minimize the mean square error) on the data available from each block of the watermarked content. Then we replace the corresponding DCT data of the at-tacked audio by the available data from the polynomials to construct an attacked audio. The technique nullifies the modification achieved during watermark embedding. Experimental results show that recovery of the watermark becomes difficult after the attack.

  • PDF

ON EFFICIENT TWO-FLOW ZERO-KNOWLEDGE IDENTIFICATION AND SIGNATURE

  • Lee, Young-Whan
    • Journal of applied mathematics & informatics
    • /
    • v.29 no.3_4
    • /
    • pp.869-877
    • /
    • 2011
  • In this paper, we propose an efficient two-flow zero-knowledge blind identification protocol on the elliptic curve cryptographic (ECC) system. A. Saxena et al. first proposed a two-flow blind identification protocol in 2005. But it has a weakness of the active-intruder attack and uses the pairing operation that causes slow implementation in smart cards. But our protocol is secure under such attacks because of using the hash function. In particular, it is fast because we don't use the pairing operation and consists of only two message flows. It does not rely on any underlying signature or encryption scheme. Our protocol is secure assuming the hardness of the Discrete-Logarithm Problem in bilinear groups.

THE STUDY OF AERO-ACOUSTICS CHARACTERISTICS BY THE BOUNDARY CONDITIONS OF HIGH ORDER SCHEME (고해상도 수치기법의 경계조건에 따른 공력음향 특성에 관한 연구)

  • Lee, S.S.;Kim, J.S.
    • Journal of computational fluids engineering
    • /
    • v.14 no.3
    • /
    • pp.25-32
    • /
    • 2009
  • The present paper focuses on the analysis of aero-acoustics characteristic by appling different four boundary conditions. The high-order and high-resolution numerical schemes are used for discrete accurate computation of compressible flow. The four boundary conditions include extrapolation, characteristic boundary condition, zonal characteristic boundary condition. These boundary conditions are applied to the computation of two dimensional circular cylinder flows with Mach number of 0.3 and Reynolds number of 400. The computation results are validated against measurement data and other computation results for the Strouhal frequency of vortex shedding, the mean drag coefficient and root-mean-square lift for the unsteady periodic flow regime. The characteristics of secondary frequency is predicted by three kinds of boundary conditions.