• Title/Summary/Keyword: Combining Technique

Search Result 933, Processing Time 0.025 seconds

A Novel Soft Computing Technique for the Shortcoming of the Polynomial Neural Network

  • Kim, Dongwon;Huh, Sung-Hoe;Seo, Sam-Jun;Park, Gwi-Tae
    • International Journal of Control, Automation, and Systems
    • /
    • v.2 no.2
    • /
    • pp.189-200
    • /
    • 2004
  • In this paper, we introduce a new soft computing technique that dwells on the ideas of combining fuzzy rules in a fuzzy system with polynomial neural networks (PNN). The PNN is a flexible neural architecture whose structure is developed through the modeling process. Unfortunately, the PNN has a fatal drawback in that it cannot be constructed for nonlinear systems with only a small amount of input variables. To overcome this limitation in the conventional PNN, we employed one of three principal soft computing components such as a fuzzy system. As such, a space of input variables is partitioned into several subspaces by the fuzzy system and these subspaces are utilized as new input variables to the PNN architecture. The proposed soft computing technique is achieved by merging the fuzzy system and the PNN into one unified framework. As a result, we can find a workable synergistic environment and the main characteristics of the two modeling techniques are harmonized. Thus, the proposed method alleviates the problems of PNN while providing superb performance. Identification results of the three-input nonlinear static function and nonlinear system with two inputs will be demonstrated to demonstrate the performance of the proposed approach.

The Study on Temperature Measurement of Warm Needling Using Stainless Steel Needle and Gold Needle (금침과 스테인레스침을 이용한 온침에서의 부위별 온도측정 연구)

  • Yeo, Sujung
    • Korean Journal of Acupuncture
    • /
    • v.30 no.3
    • /
    • pp.178-184
    • /
    • 2013
  • Objectives : The warm needling technique is the method combining the effects of acupuncture needle with those of moxibustion. We need to standardize the characteristics of the warm needling technique, in order to get more systematic and objective results in operation and effects and then get more clinical abilities in these fields. Methods : In this study, using labview system on the warm needling technique, we measured and compared partial temperature changes according to the kind of needle. We studied relations of moxa cones of various sizes with the peak combustion temperature. Results and Conclusions: When we measured the warm needling's partial temperature, temperature measured at 1 and 2 cm below the head, according to the kind of needle, gold needle got the higher result on the peak than SS304 stainless steel needle. In the case of combustion of the moxa cones, cones weighing 0.4 g and 0.8 g, respectively, and the apex ignition method with gold needle showed the higher result than the apex ignition method with stainless steel needle, when we measured the effective stimulus time at 2 cm below the head and the mean temperature during the effective stimulus time. Although more research to standardize the characteristics of the warm needling technique will be needed, we suggest, according to these results, that warm needling of gold needle combined with moxa cone of 0.4 or 0.8 g is effective.

Development of the Near/Far Absolute Gain Measurement System Using an Extrapolation Technique (외삽기법을 이용한 안테나의 원 ${\cdot}$ 근역장 절대이득 측정시스템 개발)

  • Shin, Joon;Kang, Chan-Koo;Kim, Jeong-Hwan;Chung, Nak-Sam
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.2
    • /
    • pp.31-38
    • /
    • 1990
  • An antenna gain measurement system using an extrapolation technique is described. The technique is similar to the usual two-antenna method for absolute gain measurement system, but involves the measurement of the received signal as a function of seperation in short distances, and the signal-versus-seperation data is processed in a way that allows an extrapolation of the signal to "infinite" seperation. In this technique it is possible to obtain the near field gain as function of distance by combining the far field gain and a proximity correction factor. The results of gain measurements of standard gain horn antennas and OEG (open ended waveguide) antennas are also presented.

  • PDF

Estimation of Wrist Movements based on a Regression Technique for Wearable Robot Interfaces (웨어러블 로봇 인터페이스를 위한 회귀 기법 기반 손목 움직임 추정)

  • Park, Ki-Hee;Lee, Seong-Whan
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1544-1550
    • /
    • 2015
  • Recently, the development of practical wearable robot interfaces has resulted in the emergence of wearable robots such as arm prosthetics or lower-limb exoskeletons. In this paper, we propose a novel method of wrist movement intention estimation based on a regression technique using electromyography of human bio-signals. In daily life, changes in user arm position changes cause decreases in performance by modulating EMG signals. Therefore, we propose an estimation method for robust wrist movement intention for arm position changes, combining several movement intention models based on the regression technique trained by different arm positions. In our experimental results, our method estimates wrist movement intention more accurately than previous methods.

A Study on Trust Improvement of Packets Transmission using ZCN and N2N Authentication Technique (ZCN과 N2N 인증 기법을 이용한 패킷 전송에 대한 신뢰성 향상에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.4
    • /
    • pp.61-68
    • /
    • 2015
  • MANET has various vulnerability in wireless network and is more vulnerable in security because central management is not performed. In particular, routing attack may decrease performance of the overall network because the mobile node acts as a router. In this paper, we proposed authentication technique for improving the reliability of the network by increasing the integrity of the routing control packet and blocking effectively attacks that occur frequently in the inside. The proposed technique is consisted of two authentication methods of ZCN and N2N. ZCN authentication method is to elect CA nodes and monitor the role of the CA nodes. N2N authentication method is for an integrity check on the routing packets between nodes. Index key is determined by combining the hop count value to shared key table issued from CA in order to increase the robustness of the internal attack. Also, the overhead of key distribution was reduced by distributing a shared key to nodes certificated from CA. The excellent performance of the proposed method was confirmed through the comparison experiments.

Fusion Techniques Comparison of GeoEye-1 Imagery

  • Kim, Yong-Hyun;Kim, Yong-Il;Kim, Youn-Soo
    • Korean Journal of Remote Sensing
    • /
    • v.25 no.6
    • /
    • pp.517-529
    • /
    • 2009
  • Many satellite image fusion techniques have been developed in order to produce a high resolution multispectral (MS) image by combining a high resolution panchromatic (PAN) image and a low resolution MS image. Heretofore, most high resolution image fusion techniques have used IKONOS and QuickBird images. Recently, GeoEye-1, offering the highest resolution of any commercial imaging system, was launched. In this study, we have experimented with GeoEye-1 images in order to evaluate which fusion algorithms are suitable for these images. This paper presents compares and evaluates the efficiency of five image fusion techniques, the $\grave{a}$ trous algorithm based additive wavelet transformation (AWT) fusion techniques, the Principal Component analysis (PCA) fusion technique, Gram-Schmidt (GS) spectral sharpening, Pansharp, and the Smoothing Filter based Intensity Modulation (SFIM) fusion technique, for the fusion of a GeoEye-1 image. The results of the experiment show that the AWT fusion techniques maintain more spatial detail of the PAN image and spectral information of the MS image than other image fusion techniques. Also, the Pansharp technique maintains information of the original PAN and MS images as well as the AWT fusion technique.

DNA Based Cloud Storage Security Framework Using Fuzzy Decision Making Technique

  • Majumdar, Abhishek;Biswas, Arpita;Baishnab, Krishna Lal;Sood, Sandeep K.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3794-3820
    • /
    • 2019
  • In recent years, a cloud environment with the ability to detect illegal behaviours along with a secured data storage capability is much needed. This study presents a cloud storage framework, wherein a 128-bit encryption key has been generated by combining deoxyribonucleic acid (DNA) cryptography and the Hill Cipher algorithm to make the framework unbreakable and ensure a better and secured distributed cloud storage environment. Moreover, the study proposes a DNA-based encryption technique, followed by a 256-bit secure socket layer (SSL) to secure data storage. The 256-bit SSL provides secured connections during data transmission. The data herein are classified based on different qualitative security parameters obtained using a specialized fuzzy-based classification technique. The model also has an additional advantage of being able to decide on selecting suitable storage servers from an existing pool of storage servers. A fuzzy-based technique for order of preference by similarity to ideal solution (TOPSIS) multi-criteria decision-making (MCDM) model has been employed for this, which can decide on the set of suitable storage servers on which the data must be stored and results in a reduction in execution time by keeping up the level of security to an improved grade.

Spatial Downscaling Method for Use of GCM Data in A Mountainous Area (산악지역에 GCM 자료를 이용하기 위한 공간 축소방법 개발)

  • Kim, Soojun;Kang, Na Rae;Kim, Yon Soo;Lee, Jong So;Kim, Hung Soo
    • Journal of Wetlands Research
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2013
  • This study established a methodology for the application of downscaling technique in a mountainous area having large spatial variations of rainfall and tried to estimate the change of rainfall characteristics in the future under climate change using the established method. The Namhan river basin, which is in the mountainous area of the Korean peninsula, has been chosen as the study area. Artificial Neural Network - Simple Kriging with varying local means (ANN-SKlm) has been built by combining artificial neural network, which is one of the general downscaling techniques, and SKlm technique, which can reflect the geomorphologic characteristics like elevation of the study area. The evaluation of SKlm technique was done by using the monthly rainfalls at six weather stations which KMA(Korea Meteorological Administration) is managing in the basin. The ANN-SKlm technique was compared with the Thiessen technique and ordinary kriging(OK) technique. According to the evaluation result of each technique the SKlm technique showed the best result.

A combination method to generate fluctuating boundary conditions for large eddy simulation

  • Wang, Dayang;Yu, X.J.;Zhou, Y.;Tse, K.T.
    • Wind and Structures
    • /
    • v.20 no.4
    • /
    • pp.579-607
    • /
    • 2015
  • A Combination Random Flow Generation (CRFG) technique for obtaining the fluctuating inflow boundary conditions for Large Eddy Simulation (LES) is proposed. The CRFG technique was developed by combining the typical RFG technique with a novel calculation of k and ${\varepsilon}$ to estimate the length- and time-scales (l, ${\tau}$) of the target fluctuating turbulence field used as the inflow boundary conditions. Through comparatively analyzing the CRFG technique and other existing numerical/experimental results, the CRFG technique was verified for the generation of turbulent wind velocity fields with prescribed turbulent statistics. Using the turbulent velocity fluctuations generated by the CRFG technique, a series of LESs were conducted to investigate the wind flow around S-, R-, L- and U-shaped building models. As the pressures of the models were also measured in wind tunnel tests, the validity of the LES, and the effectiveness of the inflow boundary generated by the CRFG techniques were evaluated through comparing the simulation results to the wind tunnel measurements. The comparison showed that the LES accurately and reliably simulates the wind-induced pressure distributions on the building surfaces, which indirectly validates the CRFG technique in generating realistic fluctuating wind velocities for use in the LES. In addition to the pressure distribution, the LES results were investigated in terms of wind velocity profiles around the building models to reveal the wind flow dynamics around bluff bodies. The LES results quantitatively showed the decay of the bluff body influence when the flow moves away from the building model.

Optimized Design of a Tag Antenna for RFID using a Meander Line (미앤더 라인을 이용한 RFID 태그 안테나 최적 설계)

  • Kim, Hyeong-Seok
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.12
    • /
    • pp.2293-2298
    • /
    • 2011
  • In this paper, A tag antenna structure for RFID application with resonant frequency of 920MHz is proposed using the meander line technique and Evolution Strategy. Miniaturization structure design for a tag antenna is performed by structure combining the half-wave dipole with a meander line. To achieve this, an interface program between a commercial EM analysis tool and the optimal design program is made for implementing the evolution strategy technique that seeks a global optimum of the objective function through the iterative design process consisting of variation and reproduction. The optimized tag antenna size is 63mm ${\times}$ 15mm ${\times}$ 1mm. And the proposed antenna is realized on FR-4 substrate (${\epsilon}_r=4.4$, $tna{\delta}=0.02$).