• Title/Summary/Keyword: Analysis Algorithm

Search Result 12,267, Processing Time 0.042 seconds

A Study for Development of Integrated DC Railway System Analysis Algorithm (도시철도 급완행 통합해석 알고리즘 개발에 관한 연구)

  • Jang, Dong Uk;Kim, Moo Sun;Hong, Jae Sung;Lee, Hansang
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.64 no.4
    • /
    • pp.646-652
    • /
    • 2015
  • Increasing needs for rapid driving vehicles during rush hour, there are various researches how to operate or allocate rapid driving vehicles with the existing normal driving vehicles. In the aspect of power system, it should be preceded by an analysis for power equipment capacity. Also, it should be studied whether the added rapid driving vehicles gives a bad effects for stable operation of railway systems or not. In order to derive the results for these analysis processes, this paper suggest a novel analysis algorithm which can implement integrated analysis including rapid and normal driving railway vehicles simultaneously. This algorithm has been verified using Seoul Metro 7 Line data.

A Study on the Support location Optimizations of the Beams using the Genetic Algorithm and the Sensitivity Analysis. (민감도가 고려된 유전 알고리듬을 이용한 보 구조물의 지지점 최적화에 관한 연구)

  • 이재관;신효철
    • Journal of KSNVE
    • /
    • v.10 no.5
    • /
    • pp.783-791
    • /
    • 2000
  • This describes a study on the support location optimizations of the beams using the genetic algorithm and the sensitivity analysis. The genetic algorithm is a probabilistic method searching the optimum at several points simultaneously and requiring only the values of the object and constraint functions. It has therefore more chances to find the global solution and can be applied to the various problems. Nevertheless, it has such a shortcoming that it takes too many calculations, because it is ineffective in local search. While the traditional method using sensitivity analysis is of great advantage in searching the near optimum. thus the combination of the two techniques will make use of the individual advantages, that is, the superiority in global searching form the genetic algorithm and that in local searching form the sensitivity analysis. In this thesis, for the practical applications, the analysis is conducted by FEB ; and as the shapes of structures are taken as the design variation, it requires re-meshing for every analysis. So if it is not properly controlled, the result of the analysis is affected and the optimized solution amy not be the real one. the method is efficiently applied to the problems which the traditional methods are not working properly.

  • PDF

Advanced Congestion Control Algorithm Using Change of Queue Length in ATM ABR Service (ATM ABR 서비스에서 큐 길이 변화를 이용한 개선된 폭주 제어 알고리즘)

  • 김체훤;강현철;곽지영;남지승
    • Proceedings of the IEEK Conference
    • /
    • 2000.06c
    • /
    • pp.109-112
    • /
    • 2000
  • The EPRCA(Enhanced Proportional Rate Control Algorithm) is one of the explicit rate control algorithm recommended by the ATM forum. EPRCA algorithm is using only two threshold to buffer change is not considered for calculating ER value. In this paper to cover the shortage, two more variables are added for considering increase of buffer quantity. So calculating proper ER would avoid before getting into the congestion situation. To analysis the affect, EPRCA and proposed algorithm are compared through simulation by analysis of change of buffer length and ACR change

  • PDF

Analysis of Asynchronous IMT-2000 (W-CDMA) Systems Using Channel Estimation Algorithm (채널 추정 알고리즘을 이용한 비동기식 IMT-2000 (W-CDMA) 시스템의 성능 분석)

  • 김병기;나인학;전준수;김철성
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.77-80
    • /
    • 2002
  • In this paper, we analyze a physical layer of W-CDMA .system and design a transmitter and receiver by using ADS (Advanced Design System). Also, we simulated a link level performance with different channel estimation algorithm in Jakes fading channel environment. For the channel estimator, we used the WMSA(Weighted Multi-Slot Averaging) algorithm, EGE(Equal Gain Estimation) algorithm and SSE(Symbol-to-Symbol Estimation) algorithm. This study will be useful in the analysis and design of W-CDMA system.

  • PDF

Driver Adaptive Control Algorithm for Intelligent Vehicle (운전자 주행 특성 파라미터를 고려한 지능화 차량의 적응 제어)

  • Min, Suk-Ki;Yi, Kyong-Su
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.7
    • /
    • pp.1146-1151
    • /
    • 2003
  • In this paper, results of an analysis of driving behavior characteristics and a driver-adaptive control algorithm for adaptive cruise control systems have been described. The analysis has been performed based on real-world driving data. The vehicle longitudinal control algorithm developed in our previous research has been extended based on the analysis to incorporate the driving characteristics of the human drivers into the control algorithm and to achieve natural vehicle behavior of the adaptive cruise controlled vehicle that would feel comfortable to the human driver. A driving characteristic parameters estimation algorithm has been developed. The driving characteristics parameters of a human driver have been estimated during manual driving using the recursive least-square algorithm and then the estimated ones have been used in the controller adaptation. The vehicle following characteristics of the adaptive cruise control vehicles with and without the driving behavior parameter estimation algorithm have been compared to those of the manual driving. It has been shown that the vehicle following behavior of the controlled vehicle with the adaptive control algorithm is quite close to that of the human controlled vehicles. Therefore, it can be expected that the more natural and more comfortable vehicle behavior would be achieved by the use of the driver adaptive cruise control algorithm.

Analysis of the Hashing and Encryption Algorithms Applied to the Linux (리눅스에 적용된 해시 및 암호화 알고리즘 분석)

  • Bae, Yu-Mi;Jung, Sung-Jae;Soh, Wooyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.1
    • /
    • pp.72-78
    • /
    • 2016
  • MD-5 has been the hash algorithm to encrypt the user's password on Linux from the beginning. Recently the more reliable password management was demanded and SHA-512 algorithm became the hash algorithm on the recent Enterprise Linux which is more reliable than MD-5. This paper researching the characteristics of the hashing and encryption algorithms and find out about Linux User information management. Based on this analysis, and analysis of the security of the hashing algorithm is applied to the user password. In addition, analyzes the cases used hash algorithm applied to the validation of Open Source Software file, such as Apache, PHP, MySQL. Finally, by analyzing the security tool John The Ripper this paper suggests the enhanced security with the administrative management of passwords.

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

  • Jie, Yan;Yu, Lu;Li-yun, Chen;Wei, Nie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.897-913
    • /
    • 2016
  • Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.

A NODE PREDICTION ALGORITHM WITH THE MAPPER METHOD BASED ON DBSCAN AND GIOTTO-TDA

  • DONGJIN LEE;JAE-HUN JUNG
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.27 no.4
    • /
    • pp.324-341
    • /
    • 2023
  • Topological data analysis (TDA) is a data analysis technique, recently developed, that investigates the overall shape of a given dataset. The mapper algorithm is a TDA method that considers the connectivity of the given data and converts the data into a mapper graph. Compared to persistent homology, another popular TDA tool, that mainly focuses on the homological structure of the given data, the mapper algorithm is more of a visualization method that represents the given data as a graph in a lower dimension. As it visualizes the overall data connectivity, it could be used as a prediction method that visualizes the new input points on the mapper graph. The existing mapper packages such as Giotto-TDA, Gudhi and Kepler Mapper provide the descriptive mapper algorithm, that is, the final output of those packages is mainly the mapper graph. In this paper, we develop a simple predictive algorithm. That is, the proposed algorithm identifies the node information within the established mapper graph associated with the new emerging data point. By checking the feature of the detected nodes, such as the anomality of the identified nodes, we can determine the feature of the new input data point. As an example, we employ the fraud credit card transaction data and provide an example that shows how the developed algorithm can be used as a node prediction method.

Development of a Period Analysis Algorithm for Detecting Variable Stars in Time-Series Observational Data

  • Kim, Dong-Heun;Kim, Yonggi;Yoon, Joh-Na;Im, Hong-Seo
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.4
    • /
    • pp.283-292
    • /
    • 2019
  • The purpose of this study was to develop a period analysis algorithm for detecting new variable stars in the time-series data observed by charge coupled device (CCD). We used the data from a variable star monitoring program of the CBNUO. The R filter data of some magnetic cataclysmic variables observed for more than 20 days were chosen to achieve good statistical results. World Coordinate System (WCS) Tools was used to correct the rotation of the observed images and assign the same IDs to the stars included in the analyzed areas. The developed algorithm was applied to the data of DO Dra, TT Ari, RXSJ1803, and MU Cam. In these fields, we found 13 variable stars, five of which were new variable stars not previously reported. Our period analysis algorithm were tested in the case of observation data mixed with various fields of view because the observations were carried with 2K CCD as well as 4K CCD at the CBNUO. Our results show that variable stars can be detected using our algorithm even with observational data for which the field of view has changed. Our algorithm is useful to detect new variable stars and analyze them based on existing time-series data. The developed algorithm can play an important role as a recycling technique for used data

Corrective Machining Algorithm for Improving the Motion Accuracy of Hydrostatic Table (유정압테이블의 정밀도향상을 위한 수정가공 알고리즘)

  • Park, Chun-Hong;Lee, Chan-Hong;Lee, Hu-Sang
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.19 no.6
    • /
    • pp.62-69
    • /
    • 2002
  • For improving the motion accuracy of hydrostatic table, corrective machining algorithm is proposed in this paper. The algorithm consists of three main processes. reverse analysis is performed firstly to estimate rail profile from measured linear and angular motion error, in the algorithm. For the next step, corrective machining information is decided as referring to the estimating rail profile. Finally, motion errors on correctively machined rail are analized by using motion error analysis method proposed in the previous paper. These processes can be iterated until the analized motion errors are satisfied with target accuracy. In order to verify the validity of the algorithm theoretically, motion errors by the estimated rail, after corrective machining, are compared with motion errors by true rail assumed as the measured value. Estimated motion errors show good agreement with assumed values, and it is confirmed that the algorithm is effective to acquire the corrective machining information to improve the accuracy of hydrostatic table.