• Title/Summary/Keyword: realize the algorithm

Search Result 453, Processing Time 0.023 seconds

Scenario-based 3D Objects Reuse Algorithm Scheme (시나리오 기반의 3D 객체 재사용 알고리즘)

  • Kang, Mi-Young;Lee, Hyung-Ok;Son, Seung-Chul;Heo, Kwon;Kim, Bong-Tae;Nam, Ji-Seung
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.11
    • /
    • pp.302-309
    • /
    • 2006
  • This paper propose a practical algorithm to reuse and expand the objects. This algorithm is based on the Motion Path Modification rules. We focus on reusing of the existing motions for synthesizing new motions for the objects. Both the linear and the nonlinear curve-fitting algorithm are applied to modify an animation by keyframe interpolation and to make the motion appear realistic. We also proposes a framework of the scenario-based 3D image synthesizing system that allows common users, who envision a scenario in their minds, to realize it into segments of a cool animation. The framework is useful in building a 3D animation in game programming with a limited set of 3D objects.

  • PDF

Integral Sliding-based Dynamic Control Method using Genetic Algorithm on an Omnidirectional Mobile Robot (전방향 모바일 로봇에서 유전알고리즘을 이용한 적분 슬라이딩 기반 동적 제어 기법)

  • Park, Jin-Hyun;Choi, Young-Kiu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1817-1825
    • /
    • 2021
  • Omnidirectional mobile robots can be mobile in any direction without changing the robot's direction, making them easy to apply in many applications and providing excellent maneuverability. Omnidirectional mobile robots have non-linear dynamic components such as friction, making them difficult to model accurately. In this paper, we linearize the mobile robot system using the mobile robot's inverse dynamics and integral sliding mode control method to remove these nonlinear components. And the position and velocity gains are optimized using a genetic algorithm to realize the optimal performance of the proposed system control method. As a result of the performance evaluation, the genetic algorithm's control method showed superior performance than the control method with an arbitrary gain. And the proposed inverse dynamic and integral sliding mode control method can be applied to other control methods. It can be beneficial for designing a linear control system.

Multiple-image Encryption and Multiplexing Using a Modified Gerchberg-Saxton Algorithm in Fresnel-transform Domain and Computational Ghost Imaging

  • Peiming Zhang;Yahui Su;Yiqiang Zhang;Leihong Zhang;Runchu Xu;Kaimin Wang;Dawei Zhang
    • Current Optics and Photonics
    • /
    • v.7 no.4
    • /
    • pp.362-377
    • /
    • 2023
  • Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg-Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize "one code, one key"; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.

Development of the Goods Recommendation System using Association Rules and Collaborating Filtering (연관규칙과 협업적 필터링을 이용한 상품 추천 시스템 개발)

  • Kim, Ji-Hye;Park, Doo-Soon
    • The Journal of Korean Association of Computer Education
    • /
    • v.9 no.1
    • /
    • pp.71-80
    • /
    • 2006
  • As e-commerce developing rapidly, it is becoming a research focus about how to find customer's behavior patterns and realize commerce intelligence by use of Web mining technology. One of the most successful and widely used technologies for building personalization and goods recommendation system is collaborating filtering. However, collaborative filtering have serious data sparsity problem. Traditional association rule does not consider user's interests or preferences to provide a user with specific personalized service.In this paper, we propose an goods recommendation system, which is integrated an collaborative filtering algorithm with item-to-item corelation and an improved Apriori algorithm. This system has user's interests or preferences ro provide a user with specific personalized service.

  • PDF

A Instructional Method Design of Copyright Education using Game-Themed Programming in Elementary School Computer Class (초등컴퓨터 교육에서 게임소재 프로그래밍 학습과정을 통한 저작권 교수방법 설계)

  • Rim, Hwa-Kyung;Cho, Yong-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.121-130
    • /
    • 2011
  • In this paper, we designed instructional method through process that make digital work for active copyright education. This design composed by game-themed programming. We made students realize the effort of creation in algorithm and flow chart, coding progress. And, expressed the effort as copyright sign and cost. Also, we evaluate mutually and did so that confirm value. We applied proposed method to class. And, analyzed effect observing change of inside of students.

Public Key based LR-WPAN Security Algorithm (공개키 방식의 LR-WPAN 보안 알고리즘)

  • Kim, Jin-Cheol;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.54-67
    • /
    • 2006
  • Low Rate WPAN (Wireless Personal Area Network) designed for low power and low cost wireless communication is an important technology to realize ubiquitous environment. IEEE 802.15.4 and ZigBee Alliance recommend the SKKE (Symmetric-Key Key Establishment) protocol for key establishment and management. The SKKE algorithm has security weakness such as the absence of authentication process or electric signature in key generation and exchange when devices join the role of coordinators. In this paper, we propose new key establishment and security algorithm based on public key encryption to solve low rate WPAN security problems. Also, to improve PLC AMR system's weaknesses in communication reliability and security, we propose a new AMR system model based on IEEE 802.15.4 and we apply our security algorithm to AMR profile for security enhancement.

Educational Method of Algorithm based on Creative Computing Outputs (창의적 컴퓨팅 산출물 기반 알고리즘 교육 방법)

  • Hur, Kyeong
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.49-56
    • /
    • 2018
  • Various types of SW education are being operated by universities for non-major undergraduates. And most of them focus on educating computational thinking. Following this computing education, there is a need for an educational method that implements and evaluates creative computing outcomes for each student. In this paper, we propose a method to realize SW education based on creative computing artifacts. To do this, we propose an educational method for students to implement digital logic circuit devices creatively and design SW algorithms that implement the functions of their devices. The proposed training method teaches a simple LED logic circuit using an Arduino board as an example. Students creatively design and implement two pairs of two input logic circuit devices, and design algorithms that represent patterns of implemented devices in various forms. And they design the functional extension and extended algorithm using the input device. By applying the proposed method, non-major students can gain the concept and necessity of algorithm design through creative computing artifacts.

A Hierarchical Deficit Round-Robin Algorithm for Packet Scheduling (패킷 스케쥴링을 위한 결손 보완 계층적 라운드로빈 알고리즘)

  • Pyun Kihyun;Cho Sung-Ik;Lee Jong-Yeol
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.147-155
    • /
    • 2005
  • For the last several decades, many researches have been performed to distribute bandwidth fairly between sessions. In this problem, the most important challenge is to realize a scalable implementation and high fairness simultaneously. Here high fairness means that bandwidth is distributed fairly even in short time intervals. Unfortunately, existing scheduling algorithms either are lack of scalable implementation or can achieve low fairness. In this paper, we propose a scheduling algorithm that can achieve feasible fairness without losing scalability. The proposed algorithm is a Hierarchical Deficit Round-Robin (H-DRR). While H-DRR requires a constant time for implementation, the achievable fairness is similar to that of Packet-by-Packet Generalized Processor Sharing(PGPS) algorithm. PGPS has worse scalability since it uses a sorted-priority queue requiring O(log N) implementation complexity where N is the number of sessions.

A Study on the Diagnosis of Appendicitis using Fuzzy Neural Network (퍼지 신경망을 이용한 맹장염진단에 관한 연구)

  • 박인규;신승중;정광호
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2000.04a
    • /
    • pp.253-257
    • /
    • 2000
  • the objective of this study is to design and evaluate a methodology for diagnosing the appendicitis in a fuzzy neural network that integrates the partition of input space by fuzzy entropy and the generation of fuzzy control rules and learning algorithm. In particular the diagnosis of appendicitis depends on the rule of thumb of the experts such that it associates with the region, the characteristics, the degree of the ache and the potential symptoms. In this scheme the basic idea is to realize the fuzzy rle base and the process of reasoning by neural network and to make the corresponding parameters of the fuzzy control rules be adapted by back propagation learning rule. To eliminate the number of the parameters of the rules, the output of the consequences of the control rules is expressed by the network's connection weights. As a result we obtain a method for reducing the system's complexities. Through computer simulations the effectiveness of the proposed strategy is verified for the diagnosis of appendicitis.

  • PDF

Development of Road Profile Realization Software (로드 프로파일 재현 소프트웨어 개발)

  • 류신호;정상화;김우영;나윤철
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.10a
    • /
    • pp.265-268
    • /
    • 1997
  • In the recent day, fatigue life prediction techniques play a major role in the design of components in the ground vehicle industry. Full scale durability testing in the laboratory is an essential of any fatigue life evaluation of components or structures of the automotwe vehicle. Component testing is part~cularly important in today's highly competitive industries where the design to reduce weight and production costs must be balanced with the necessity to avoid expensive service failure. Generally, multi-axial road simulator is used to carry out the fatigue test and the vibration test. In this paper, the algorithm and software to realize the real road profile are developed. The validity of the software are verified by applying the belgian road, the city road, the highway, and the gravel road. The results of the above experiment show that the real road profiles are realized well after loth iteration.

  • PDF