• Title/Summary/Keyword: 강인성 분석

Search Result 465, Processing Time 0.043 seconds

An Application of LTR Method in a DUOX System to Control a MDOF Structure Subjected to the Seismic Excitations (루프전달회복법(Loop Transfer Recovery: LTR)을 이용한 다자유도 DUOX 시스템의 지진동 제어)

  • Lee, Jin-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.12 no.5
    • /
    • pp.65-73
    • /
    • 2008
  • Retaining large stability margin is essential in designing a feedback control system to deal with the uncertainties inherently existing in the mathematical model and the control apparatus. The LQG controller in general loses the stability margin due to the embed Kalman filter. The performance of a control system called LTR with a DUOX structure(LTR/DOUX) to overcome the demerit of LQG controller is to be investigated from the responses in both the time and the frequency domain. The results indicated that the LTR/DOUX recovered the gain margin of 30dB approximately 20 times more than that of LQG/DOUX, resulting in a robust stable control system.

Query Context Information-Based Translation Models for Korean-Japanese Cross-Language Informal ion Retrieval (한-일 교차언어검색에서의 질의 문맥 정보를 이용한 대역어 변환 확률 모델)

  • Lee, Gyu-Chan;Kang, In-Su;Na, Seung-Hoon;Lee, Jong-Hyeok
    • Annual Conference on Human and Language Technology
    • /
    • 2005.10a
    • /
    • pp.97-104
    • /
    • 2005
  • 교차언어 검색 과정에서는 질의나 문서의 언어를 일치시키기 위한 변환 과정이 필수적이며, 이런 변환 과정에서 어휘의 중의성으로 인해 하나의 어휘에 대응하는 다수의 대역어가 생성됨으로써 사용자의 정보 욕구를 왜곡시켜 검색의 성능을 저하시킬 수 있다. 본 논문에서는 어휘 중의성 문제를 해결하기 위해서 질의의 문맥 정보를 이용하여 변환 질의의 확률을 구함으로써 중의성을 해소하는 방식을 제시하고, 질의의 길이, 중의도, 중의성을 가진 어휘의 비율 등에 따라서 성능이 어떻게 변하는지 비교함으로써 이 방법의 장점과 단점을 분석한다. 또한 현재의 단점을 보완하기 위한 차후 연구 방향을 제시한다.

  • PDF

A Study on the Formal Analysis of Safety Property of Security Models (보안모델의 안전성 분석에 관한 연구)

  • Kang, Mi-Young;Kim, Il-Gon;Choi, Jin-Young;Kang, In-Hye;Kang, Pil-Yong;Yi, Wan S.;Zegzhda, Dmitry P.
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.1233-1236
    • /
    • 2004
  • 보안 시스템에서 접근 통제 모델을 사용하는 가장 중요한 목적은 시스템 및 사용자에 대한 안정성을 보장하기 위해서이다. 본 논문에서 다루고 있는, SPR은 보안 시스템의 행위를 유한 상태 기계(FSM) 기반의 보안모델로 표현한 후, 보안 모델에 대한 초기 상태의 안전성을 검사하고 초기 상태에서 다음 상태로 전이가 존재할 경우에 그 상태들에 대응하는 모든 상태들에 대해서 보안기준을 만족하는지 검증하는 도구이다. 본 논문에서는 SPR를 사용하여 현재 많은 사람들이 이용하는 Windows 운영 체제의 NTFS에 기반을 둔 보안모델의 안전성을 검증하는 방법을 소개한다

  • PDF

Data Cleansing Algorithm for reducing Outlier (데이터 오·결측 저감 정제 알고리즘)

  • Lee, Jongwon;Kim, Hosung;Hwang, Chulhyun;Kang, Inshik;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.342-344
    • /
    • 2018
  • This paper shows the possibility to substitute statistical methods such as mean imputation, correlation coefficient analysis, graph correlation analysis for the proposed algorithm, and replace statistician for processing various abnormal data measured in the water treatment process with it. In addition, this study aims to model a data-filtering system based on a recent fractile pattern and a deep learning-based LSTM algorithm in order to improve the reliability and validation of the algorithm, using the open-sourced libraries such as KERAS, THEANO, TENSORFLOW, etc.

  • PDF

Query-based User Emotion Prediction (질의 기반 사용자 감정상태 예측)

  • Min, Hye-Jin;Kang, Inho
    • Annual Conference on Human and Language Technology
    • /
    • 2014.10a
    • /
    • pp.211-214
    • /
    • 2014
  • 본 연구에서는 질의를 기반으로 사용자의 감정상태를 예측하는 방법을 제안한다. 제안방법은 자극-감정 규칙베이스 구축, 규칙확률 값 기반 질의 랭킹, 질의 랭킹 기반 사용자 감정예측의 단계로 구성된다. 방법의 적절성을 검증하기 위하여 힘들다와 심심하다에 대한 결과로 사용자평가를 실시하였다. 힘들다의 결과에서는 힘들다 정도에 대한 점수가 높은 질의들을 지속적으로 검색하는 사용자들을 힘들다라고 판단할 수 있다고 분석되었다. 심심하다의 결과에서는 방법 간 유의미한 차이를 보이지 않았으나, 특정 개별질의의 지속적인 패턴을 분석하는 것이 좀 더 높은 점수를 얻은 것으로 평가되었다.

  • PDF

Design of Face Recognition System for Authentication of Internet Banking User (인터넷 뱅킹의 사용자 인증을 위한 얼굴인식 시스템의 설계)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.3
    • /
    • pp.193-205
    • /
    • 2003
  • In this paper, we suggest user authentication and authorization system for internet banking by face recognition. The system is one of Biometrics technology to verify and authorize personnel identification and is more unobtrusive than the other technologies, because they use physiological characteristics such as fingerprint, hand geometry, iris to their system that people have to touch it. Also, the face recognition system requires only a few devices such as a camera and keypad, so it is easy to apply it to the real world. The face recognition algorithms open to the public are separated by their analysis method differ from what characteristic of the human face use. There are PCA (principal Component Analysis), ICA (Independent Component Analysis), FDA (Fisher Discriminant Analysis). Among these, physiological data of encrypted form is translated utilizing PCA which is the most fundamental algorithm that analyze face feature, and we suggests design method of user authentication system that can do send-receive fast and exactly.

  • PDF

Robust Method of Updating Reference Background Image in Unstable Illumination Condition (불안정한 조명 환경에 강인한 참조 배경 영상의 갱신 기법)

  • Ji, Young-Suk;Han, Young-Joon;Hahn, Hern-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.1
    • /
    • pp.91-102
    • /
    • 2010
  • It is very difficult that a previous surveillance system and vehicle detection system find objects on a limited and unstable illumination condition. This paper proposes a robust method of adaptively updating a reference background image for solving problems that are generated by the unstable illumination. The first input image is set up as the reference background image, and is divided into three block categories according to an edge component. Then a block state analysis, which uses a rate of change of the brightness, a stability, a color information, and an edge component on each block, is applied to the input image. On the reference background image, neighbourhood blocks having the same state of a updated block are merged as a block. The proposed method can generate a robust reference background image because it distinguishes a moving object area from an unstable illumination. The proposed method very efficiently updates the reference background image from the point of view of the management and the processing time. In order to demonstrate the superiority of the proposed stable manner in situation that an illumination quickly changes.

A Predictive Model of Health Promotion Behavior in Nursing Students (간호대학생의 건강증진행위 예측모형)

  • Oh, Jae-Woo;Moon, Young-Sook
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.391-403
    • /
    • 2014
  • This study seeks to carry out a literary review of preceding studies and the health improvement model of Pender(1987) on university students majoring in nursing to explain the health improvement behaviors and identify the factors that affect their activities to provide a framework for developing a more effective nursing mediation method that promotes health improvement behaviors. The study subjects were 204 university students majoring in nursing who have had clinical practice experience. The period for data collection was from April 1to May 30, 2014 and a total of 204 copies of the questionnaire were used for analysis. For the collected data, frequency analysis, percentage, ANOVA, t-test and correlation analysis were conducted using SPSS, LISREL, and path analyss was done for hypothesis testing. The overall index of hypothesis model showed a good congruence as ${\chi}^2=.06$(p=.812), df=1, ${\chi}^2(df)=.000$, GFI=0.97, AGFI=1.0, SRMR=.002, NFI=0.947, NNFI=0.957, RMSEA=0.016, CN=266. Looking at the verification of the hypothesis presented in the model, the variables that affect health improvement behaviors were perceived disability, perceived self-efficacy, perceived social support, while stress from clinical practice, perceived health status, persistence and perceived benefits did not affect health improvement behaviors.

Formal Specification for Real-Time Systems Using TSCR (TSCR를 이용한 실시간 시스템의 정형 명세)

  • 최수진;강인혜;양승민
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.04a
    • /
    • pp.531-533
    • /
    • 2000
  • 실시간 시스템은 신뢰성이 중요하므로 실시간 시스템을 설계하는데 있어서 각 태스크의 기능적인 정확성의 검증은 물론 모든 태TM크에 대한 시간적인 요구사항들을 보장해야만 한다. 본 논문에서는 이러한 조건 즉, 실시간 시스템의 정확성과 시간성 보장을 위하여 기존의 객체 지향적 모델을 기반으로 하는 실시간 시스템을 위한 정형명세 언어인 TSC(Timed State Chart)에 자원(resource)의 개념을 추가한 TSCR(Timed State Chart with Resource)를 제안한다. TSCR을 통하여 실시간 시스템의 다양한 요구 사항을 명세하며, 태스크들의 시간성 보장을 위한 스케줄링 가능성 분석(schedulability analysis)을 할 수 있다. 실시간 시스템의 대표적인 예로 철도 건널목 제어 시스템을 TSCR를 이용하여 명세한다.

  • PDF

Vision-based Vehicle Detection and Inter-Vehicle Distance Estimation (영상 기반의 차량 검출 및 차간 거리 추정 방법)

  • Kim, Gi-Seok;Cho, Jae-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.3
    • /
    • pp.1-9
    • /
    • 2012
  • In this paper, we propose a vision-based robust vehicle detection and inter-vehicle distance estimation algorithm for driving assistance system. We use the haar-like features of car rear-shadows, as well as the edge features for detecting of vehicles. The use of additional vehicle edge features greatly reduces the false-positive errors in the vehicle detection. And, after analyzing the conventional two inter-vehicle distance estimation methods: the location-based and the vehicle width-based, an improved inter-vehicle distance estimation algorithm which has the advantage of both method is proposed. Several experimental results show the effectiveness of the proposed method.