• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.03 seconds

Multi-Robot Localization based on Bayesian Multidimensional Scaling

  • Je, Hong-Mo;Kim, Dai-Jin
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2007.11a
    • /
    • pp.357-361
    • /
    • 2007
  • This paper presents a multi-robot localization based on Bayesian Multidimensional Scaling (BMDS). We propose a robust MDS to handle both the incomplete and noisy data, which is applied to solve the multi-robot localization problem. To deal with the incomplete data, we use the Nystr${\ddot{o}}$m approximation which approximates the full distance matrix. To deal with the uncertainty, we formulate a Bayesian framework for MDS which finds the posterior of coordinates of objects by means of statistical inference. We not only verify the performance of MDS-based multi-robot localization by computer simulations, but also implement a real world localization of multi-robot team. Using extensive empirical results, we show that the accuracy of the proposed method is almost similar to that of Monte Carlo Localization(MCL).

  • PDF

Performance Analysis of A Protocol Converter Between X. 25 and SDLC (X. 25와 SDLC간 Protocol Converter의 성능 분석에 관한 연구)

  • Chung, Hae;Un, Chong-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.9
    • /
    • pp.828-837
    • /
    • 1991
  • 본 논문에서는 CCITT에서 채택된 X.2.5 network과 IBM이 채택한 System network architecture(SNA)의 synchronous data link control(SDLC)간의 protocol converter의 성능 분석을 한다. 여기서 protocol converter의 link level map-ping method를 사용하여 구현 되었다고 가정한다. 성능 분석을 통하여 각종 parameter에 대한 throughput과 mean waiting time을 구하며, 다양한 paramerter에 대하여 최적의 값을 조사한다. 특히 converter가 추정한 SDLC frame이 X.25. network packetizing과 규정한 최대 data packet size 보다 더 클 경우에 frame을 분할하게 되는데. 분할방식에 있어서 full and remainder packetzing과 equal packetizing 도입하여 서로간의 성능을 비교한다. message를 분할 할 때 조격으로 나누는 것이 frame의 오류를 줄일 수 있기 때문에 전자보다 후자가 성능면에서 우수함을 알 수 있다.

  • PDF

A Study on HLR technology in the IMT-2000 (IMT-2000의 HLR(Home Location Register)에 관한 연구)

  • 박태진;이상준
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.99-108
    • /
    • 2002
  • Users location management and handoff management is constructed more effective for giving satisfaction to QoS of multimedia service in Mobility network. For this, We have the HLR of IMT-2000, difference of the HLR of PCS, and connectivity Artificial Intelligent network and to provide data service of packet that is analyze to effect on the HLR. We have a study on effective for satisfaction of QoS, that is the VHE of full concepts for provide of service in the IMT-2000, packet data service for internet connectivity, for satisfaction of QoS on basis mobility network technologies of the 2nd generation.

  • PDF

Performance Comparison of Closed Source-Based Virtual Machines (클로즈드 소스 기반 가상 머신의 성능 비교)

  • Lee, Hyuk-Jun;Kim, Sung-Ki;Choi, Jae-Yeong;Min, Byoung-Joon
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.121-124
    • /
    • 2012
  • 가상화 기술은 물리적인 컴퓨팅 자원을 논리적으로 분할하여 여러 사용자에게 제공함으로써 자원 효율성 및 관리 측면에서 큰 이점을 갖고 있을 뿐만 아니라 클라우드 기술의 핵심으로 그 중요성이 나날이 높아지고 있다. 이에 맞춰 가상 머신의 성능 측정 방법 및 성능 비교 역시 활발하게 진행되어야 하나, 실제로는 서버 가상화 위주의 벤더 종속적인 성능 비교가 진행되어 왔다. 본 논문에서는 기존의 가상 머신 성능 측정 방법에 대해 연구하고 운영체제에서 제공하는 유틸리티를 이용하여 성능 측정 방법을 제안한다. 전가상화(Full Virtualization)방식의 클로즈드 소스 기반(Closed Source Based)의 가상화 솔루션들을 선정하여 윈도우즈와 리눅스 운영체제 상에서 각각 성능 측정 방법 및 요소를 정의하고 성능 측정 후 비교하였다. 그 결과로 각 가상화 솔루션의 성능 비교 지표를 통하여 가상 머신의 실행과 가상 머신상의 응용 프로그램이 호스트 운영체제에 미치는 부하를 분석하였다.

Facial Data Visualization for Improved Deep Learning Based Emotion Recognition

  • Lee, Seung Ho
    • Journal of Information Science Theory and Practice
    • /
    • v.7 no.2
    • /
    • pp.32-39
    • /
    • 2019
  • A convolutional neural network (CNN) has been widely used in facial expression recognition (FER) because it can automatically learn discriminative appearance features from an expression image. To make full use of its discriminating capability, this paper suggests a simple but effective method for CNN based FER. Specifically, instead of an original expression image that contains facial appearance only, the expression image with facial geometry visualization is used as input to CNN. In this way, geometric and appearance features could be simultaneously learned, making CNN more discriminative for FER. A simple CNN extension is also presented in this paper, aiming to utilize geometric expression change derived from an expression image sequence. Experimental results on two public datasets (CK+ and MMI) show that CNN using facial geometry visualization clearly outperforms the conventional CNN using facial appearance only.

Grid Voltage-sensorless Current Control of LCL-filtered Grid-connected Inverter based on Gradient Steepest Descent Observer

  • Tran, Thuy Vi;Kim, Kyeong-Hwa
    • Proceedings of the KIPE Conference
    • /
    • 2019.07a
    • /
    • pp.380-381
    • /
    • 2019
  • This paper presents a grid voltage-sensorless current control design for an LCL-filtered grid-connected inverter with the purpose of enhancing the reliability and reducing the total cost of system. A disturbance observer based on the gradient steepest descent method is adopted to estimate the grid voltages with high accuracy and light computational burden even under distorted grid conditions. The grid fundamental components are effectively extracted from the estimated gird voltages by means of a least-squares algorithm to facilitate the synchronization process without using the conventional phase-locked loop. Finally, the estimated states of inverter system obtained by a discrete current-type full state observer are utilized in the state feedback current controller to realize a stable voltage-sensorless current control scheme. The effectiveness of the proposed scheme is validated through the simulation results.

  • PDF

An intelligent fuzzy theory for ocean structure system analysis

  • Chen, Tim;Cheng, C.Y.J.;Nisa, Sharaban Tahura;Olivera, Jonathan
    • Ocean Systems Engineering
    • /
    • v.9 no.2
    • /
    • pp.179-190
    • /
    • 2019
  • This paper deals with the problem of the global stabilization for a class of ocean structure systems. It is well known that, in general, the global asymptotic stability of the ocean structure subsystems does not imply the global asymptotic stability of the composite closed-loop system. The classical fuzzy inference methods cannot work to their full potential in such circumstances because given knowledge does not cover the entire problem domain. However, requirements of fuzzy systems may change over time and therefore, the use of a static rule base may affect the effectiveness of fuzzy rule interpolation due to the absence of the most concurrent (dynamic) rules. Designing a dynamic rule base yet needs additional information. In this paper, we demonstrate this proposed methodology is a flexible and general approach, with no theoretical restriction over the employment of any particular interpolation in performing interpolation nor in the computational mechanisms to implement fitness evaluation and rule promotion.

Improved Multi-layer Authentication Scheme by Merging One-time Password with Voice Biometric Factor

  • ALRUWAILI, Amal;Hendaoui, Saloua
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.346-353
    • /
    • 2021
  • In this proposal, we aim to enhance the security of systems accounts by improving the authentication techniques. We mainly intend to enhance the accuracy of the one-time passwords via including voice biometric and recognition techniques. The recognition will be performed on the server to avoid redirecting voice signatures by hackers. Further, to enhance the privacy of data and to ensure that the active user is legitimate, we propose to periodically update the activated sessions using a user-selected biometric factor. Finally, we recommend adding a pre-transaction re-authentication which will guarantee enhanced security for sensitive operations. The main novelty of this proposal is the use of the voice factor in the verification of the one-time password and the various levels of authentications for a full-security guarantee. The improvement provided by this proposal is mainly designed for sensitive applications. From conducted simulations, findings prove the efficiency of the proposed scheme in reducing the probability of hacking users' sessions.

Improve object recognition using UWB SAR imaging with compressed sensing

  • Pham, The Hien;Hong, Ic-Pyo
    • Journal of IKEEE
    • /
    • v.25 no.1
    • /
    • pp.76-82
    • /
    • 2021
  • In this paper, the compressed sensing basic pursuit denoise algorithm adopted to synthetic aperture radar imaging is investigated to improve the object recognition. From the incomplete data sets for image processing, the compressed sensing algorithm had been integrated to recover the data before the conventional back- projection algorithm was involved to obtain the synthetic aperture radar images. This method can lead to the reduction of measurement events while scanning the objects. An ultra-wideband radar scheme using a stripmap synthetic aperture radar algorithm was utilized to detect objects hidden behind the box. The Ultra-Wideband radar system with 3.1~4.8 GHz broadband and UWB antenna were implemented to transmit and receive signal data of two conductive cylinders located inside the paper box. The results confirmed that the images can be reconstructed by using a 30% randomly selected dataset without noticeable distortion compared to the images generated by full data using the conventional back-projection algorithm.

3GPP 5G Core Network: An Overview and Future Directions

  • Husain, Syed;Kunz, Andreas;Song, JaeSeung
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.1
    • /
    • pp.8-15
    • /
    • 2022
  • The new 5G radio technology (NR) can provide ultra-reliable low latency communications. The supporting 5G network infrastructure will move away from the previous point-to-point network architecture to a service-based architecture. 5G can provide three new things, i.e., wider channels, lower latency and more bandwidth. These will allow 5G to support three main types of connected services, including enhanced mobile broadband, mission-critical communications, and the massive Internet of Things (IoT). In 2015, the 5th generation (5G) mobile communication was officially approved by the International Telecommunication Union (ITU) as IMT-2020. Since then, 3GPP, the international organization responsible for 5G standards, is actively developing specifications for 5G technologies. 3GPP Release 15 provides the first full set of 5G standards, and the evolution and expansion of 5G are now being standardized in Release 16 and 17, respectively. This paper provides an overview of 3GPP 5G technologies and key services.