• Title/Summary/Keyword: 임의변수

Search Result 455, Processing Time 0.025 seconds

Derivation of Galois Switching Functions by Lagrange's Interpolation Method (Lagrange 보간법에 의한 Galois 스윗칭함수 구성)

  • 김흥수
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.15 no.5
    • /
    • pp.29-33
    • /
    • 1978
  • In this paper, the properties of Galois fields defined over any finite field are analysed to derive Galois switching functions and the arithmetic operation methods over any finite field are showed. The polynomial expansions over finite fields by Lagrange's interpolation method are derived and proved. The results are applied to multivalued single variable logic networks.

  • PDF

Study on Estimation of Optimal Parameters for Tank Model by Using SCE-UA (SCE-UA를 이용한 Tank 모형의 최적 매개변수 추정 방안)

  • Shin, Sang-Hoon;Jung, Il-Won;Bae, Deg-Hyo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.1530-1535
    • /
    • 2010
  • 본 연구에서는 SCE-UA(Shuffled Complex Evolution-University Arizona) 매개변수 최적화 기법을 이용하여 TANK 모형의 매개변수를 추정할 경우 SCE-UA 기법의 적용성을 검토하고 실제 관측유량에 대해 적용하고자 한다. 이를 위해 임의매개변수를 4단 TANK 모형의 유출결과를 관측치로 가정하고 역으로 SCE-UA 기법을 이용하여 전역 최적해 추정 능력을 검증하였다. 또한 실제 유역에 대한 적용성 평가를 위해 소양강 댐 상류 유역을 대상유역으로 선정 하였으며 관측유량을 보정과 검정기간으로 나누어 추정된 매개변수의 정확도를 평가하였다. 향후 수문성분 분리 과정을 통해 각 유출 성분별 매개변수 최적화를 수행하고자 하며 이러한 결과는 유출 성분자료가 부족한 우리나라에서 보다 정확한 수자원 관리를 위한 기초자료로 활용될 수 있을 것으로 판단된다.

  • PDF

Reliability-Based Topology Optimization Using Performance Measure Approach (성능함수법을 이용한 신뢰성기반 위상 최적설계)

  • Ahn, Seung-Ho;Cho, Seon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.23 no.1
    • /
    • pp.37-43
    • /
    • 2010
  • In this paper, a reliability-based design optimization is developed for the topology design of linear structures using a performance measure approach. Spatial domain is discretized using three dimensional Reissner-Mindlin plate elements and design variable is taken as the material property of each element. A continuum based adjoint variable method is employed for the efficient computation of sensitivity with respect to the design and random variables. The performance measure approach of RBDO is employed to evaluate the probabilistic constraints. The topology optimizationproblem is formulated to have probabilistic displacement constraints. The uncertainties such as material property and external loads are considered. Numerical examples show that the developed topology optimization method could effectively yield a reliable design, comparing with the other methods such as deterministic, safety factor, and worst case approaches.

Structural and Parametric Analysis for a Motorcycle Rear Frame using Co-rotational Shell Elements (Co-rotational Shell 요소를 이용한 모터사이클 후방프레임 구조 해석 및 설계변수해석)

  • Ryeom, Jewan;Kang, Seung-Hoon;Shin, Sang-Joon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.4
    • /
    • pp.209-216
    • /
    • 2020
  • In this paper, parametric structural analysis is presented utilizing the co-rotational(CR) shell analysis utilizing EDISON. CR shell analysis shows faster convergence than the commercial software, NASTRAN, does. The 1st natural frequency of the rear frame is obtained, which is close to that of the engine during high speed cruise. Three cases under two design variables are presented and analyzed. Gusset is shown to be more effective among those which feature the same weight change. The results presented in this paper will be applicable for further researches to improve the durability of a motorcycle rear frame.

MAC Protocol for Multimedia Services in Wireless ATM Networks based on TDMA/TDD (TDMA/TDD 기반 무선 ATM망에서 멀티미디어 서비스를 위한 MAC 프로토콜)

  • 임인택
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.899-906
    • /
    • 2003
  • In this paper, a channel access control algorithm and a slot allocation algorithm are proposed as MAC protocol for multimedia services in TDMA/TDD-based wireless ATM networks. In the proposed protocol, VBR terminals that require real-time services transmit a reservation request through a random access minislot. VBR terminals, which are successfully transmitted the reservation request, transmits the dynamic parameters through a dynamic parameter minislot without contention. On the other hand, ABR terminals transmit a reservation request with contention basis whenever a non-real-time traffic burst is generated. Based on the received dynamic parameters and the number of requested slots, the base station scheduler allocates a dynamic parameter minislot as well as uplink data slots into VBR terminals. Also the scheduler allocates uplink data slots into ABR terminals in proportion to the number of requested slots.

Composites Fatigue Life Evaluation based on non-linear fatigue damage model (비선형 피로손상 모델을 이용한 복합재 피로수명 평가)

  • 김성준;황인희
    • Composites Research
    • /
    • v.16 no.1
    • /
    • pp.13-18
    • /
    • 2003
  • Prediction of composite fatigue life is not a straightforward matter, depending on various failure modes and their interactions. In this paper, a methodology is presented to predict fatigue life and residual strength of composite materials based on Phenomenological Model(non-linear fatigue damage model). It is assumed that the residual strength is a monotonically decreasing function of the number of loading cycles and applied fatigue stress ratio and the model parameters(strength degradation parameter and fatigue shape parameter) are assumed as function of fatigue life. Then S-N curve is used to extract model parameters that are required to characterize the stress levels comprising a randomly-ordered load spectrum. Different stress ratios (${\sigma}_{min}/{\;}{\sigma}_{max}$) are handled with Goodman correction approach(fatigue envelope) and the residual strength after an arbitrary load cycles is represented by two parameter weibull functions.

An Index-Building Method for Boundary Matching that Supports Arbitrary Partial Denoising (임의의 부분 노이즈제거를 지원하는 윤곽선 매칭의 색인 구축 방법)

  • Kim, Bum-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1343-1350
    • /
    • 2019
  • Converting boundary images to time-series makes it feasible to perform boundary matching even on a very large image database, which is very important for interactive and fast matching. In recent research, there has been an attempt to perform fast matching considering partial denoising by converting the boundary image into time series. In this paper, to improve performance, we propose an index-building method considering all possible arbitrary denoising parameters for removing arbitrary partial noises. This is a challenging problem since the partial denoising boundary matching must be considered for all possible denoising parameters. We propose an efficient single index-building algorithm by constructing a minimum bounding rectangle(MBR) according to all possible denoising parameters. The results of extensive experiments conducted show that our index-based matching method improves the search performance up to 46.6 ~ 4023.6 times.

Analysis of medical panel binary data using marginalized models (주변화 모형을 이용한 의료 패널 이진 데이터 분석)

  • Chaeyoung Oh;Keunbaik Lee
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.4
    • /
    • pp.467-484
    • /
    • 2024
  • Longitudinal data are measured repeatedly over time from the same subject, so there is a correlation from the repeated outcomes. Therefore, when analyzing this correlation, both serial correlation and between-subject variation must be considered in longitudinal data analysis. In this paper, we will focus on the marginalized models to estimate the population average effect of covariates among models for analyzing longitudinal binary data. Marginalized models for longitudinal binary data include marginalized random effects models, marginalized transition models, and marginalized transition random effect models, and in this paper, these models are first reviewed, and simulations are conducted using complete data and missing data to compare the performance of the models. When there were missing values in the data, there is a difference in performance depending on the model in which the data was generated. We analyze Korea Health Panel data using marginalized models. The Korean Medical Panel data considers subjective unhealthy responses as response variables as binary variables, compares models with several explanatory variables, and presents the most suitable model.

An Enhanced Fuzzy ART Algorithm for The Identifier Recognition from Shipping Container Image (운송 컨테이너 영상의 식별자 인식을 위한 개선된 퍼지 ART 알고리즘)

  • 류재욱;김태경;김광백
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.12a
    • /
    • pp.365-369
    • /
    • 2002
  • 퍼지 ART 알고리즘에서 경계 변수는 패턴들을 클러스터링하는데 있어서 반지름 값이 되며 임의의 패턴과 저장된 패턴과의 불일치(mismatch) 허용도를 결정한다. 이 경계 변수가 크면 입력 벡터와 기대 벡터 사이에 약간의 차이가 있어도 새로운 카테고리(category)로 분류하게 핀다. 반대로 경계 변수가 작으면 입력 벡터와 기대 벡터 사이에 많은 차이가 있더라도 유사성이 인정되어 입력 벡터들을 대략적으로 분류한다. 따라서 영상 인식에 적용하기 위해서는 경험적으로 경계 변수를 설정해야 단점이 있다. 그리고 연결 가중치를 조정하는 과정에서 저장된 패턴들의 정보들이 손실되는 경우가 발생하여 인식율을 저하시킨다. 된 논문에서는 퍼지 ART 알고리즘의 문제점을 개선하기 위하여 퍼지 논리 접속 연산자를 이용하여 경계 변수를 동적으로 조정하고 저장 패턴들과 학습 패턴간의 실제적인 왜곡 정도를 충분히 고려하여 승자 노드로 선택된 빈도수를 가중치 조정에 적용한 개선된 퍼지 ART 알고리즘을 제안하였다. 제안된 방법의 성능을 확인하기 위해서 실제 운송 컨테이너 영상들을 대상으로 실험한 결과, 기존의 ART2 알고리즘이나 퍼지 ART 알고리즘보다 클러스터의 수가 적게 생성되었고 인식 성능도 기존의 방법들보다 우수한 성능이 있음을 확인하였다.

Random Noise Addition for Detecting Adversarially Generated Image Dataset (임의의 잡음 신호 추가를 활용한 적대적으로 생성된 이미지 데이터셋 탐지 방안에 대한 연구)

  • Hwang, Jeonghwan;Yoon, Ji Won
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.629-635
    • /
    • 2019
  • In Deep Learning models derivative is implemented by error back-propagation which enables the model to learn the error and update parameters. It can find the global (or local) optimal points of parameters even in the complex models taking advantage of a huge improvement in computing power. However, deliberately generated data points can 'fool' models and degrade the performance such as prediction accuracy. Not only these adversarial examples reduce the performance but also these examples are not easily detectable with human's eyes. In this work, we propose the method to detect adversarial datasets with random noise addition. We exploit the fact that when random noise is added, prediction accuracy of non-adversarial dataset remains almost unchanged, but that of adversarial dataset changes. We set attack methods (FGSM, Saliency Map) and noise level (0-19 with max pixel value 255) as independent variables and difference of prediction accuracy when noise was added as dependent variable in a simulation experiment. We have succeeded in extracting the threshold that separates non-adversarial and adversarial dataset. We detected the adversarial dataset using this threshold.