• Title/Summary/Keyword: Control Rule Base

Search Result 189, Processing Time 0.024 seconds

A Study on the Efficiency of Import-Export Logistics through Advance Presentation of Vessel Manifest (해상적하목록 사전제출을 통한 수출입물류 효율화 방안에 관한 연구)

  • Kim, Yong-Jin;Seo, Dong-Gyun
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.275-296
    • /
    • 2011
  • The purpose of this study was to examine ways of ensuring the efficiency and stability of import-export logistics in our country by introducing an advance presentation system of vessel manifest. This advance presentation system of vessel manifest has already been introduced in the United States, the EU and China whom our country has actively traded with, and the reinforcement of logistics security is a global trend. Under the circumstances, the introduction of the advance presentation system of vessel manifest is required to assist exporters to properly respond to changing trade practices as early as possible, and it's also necessary to exercise stricter control over an import criminal cargo. Our country should urgently introduce the advance presentation system of vessel manifest that is up to global standard, and the establishment of an internet based manifest consolidation and presentation system and the introduction of an export inspection system of port of loading are requested as well. If all the systems are introduced and work properly, that will make a great contribution to the efficiency of import-export logistics in our country.

A Study on the Prediction of the Nonlinear Chaotic Time Series Using Genetic Algorithm based Fuzzy Neural Network (유전 알고리즘을 이용한 퍼지신경망의 시계열 예측에 관한 연구)

  • Park, In-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.4
    • /
    • pp.91-97
    • /
    • 2011
  • In this paper we present an approach to the structure identification based on genetic algorithm and to the parameter identification by hybrid learning method in neuro-fuzzy-genetic hybrid system in order to predicate the Mackey-Glass Chaotic time series. In this scheme the basic idea consists of two steps. One is the construction of a fuzzy rule base for the partitioned input space via genetic algorithm, the other is the corresponding parameters of the fuzzy control rules adapted by the backpropagation algorithm. In an attempt to test the performance the proposed system, three patterns, x(t-3), x(t-6) and x(t-9), was prepared according to time interval. It was through lots of simulation proved that the initial small error of learning owed to the good structural identification via genetic algorithm. The performance was showed in Table 2.

Control Method for the Number of Travel Hops for the ACK Packets in Selective Forwarding Detection Scheme (선택적 전달 공격 탐지기법에서의 인증 메시지 전달 홉 수 제어기법)

  • Lee, Sang-Jin;Kim, Jong-Hyun;Cho, Tae-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.2
    • /
    • pp.73-80
    • /
    • 2010
  • A wireless sensor network which is deployed in hostile environment can be easily compromised by attackers. The selective forwarding attack can jam the packet or drop a sensitive packet such as the movement of the enemy on data flow path through the compromised node. Xiao, Yu and Gao proposed the checkpoint-based multi-hop acknowledgement scheme(CHEMAS). In CHEMAS, each path node enable to be the checkpoint node according to the pre-defined probability and then can detect the area where the selective forwarding attacks is generated through the checkpoint nodes. In this scheme, the number of hops is very important because this parameter may trade off between energy conservation and detection capacity. In this paper, we used the fuzzy rule system to determine adaptive threshold value which is the number of hops for the ACK packets. In every period, the base station determines threshold value while using fuzzy logic. The energy level, the number of compromised node, and the distance to each node from base station are used to determine threshold value in fuzzy logic.

Amber Information Design for Supporting Safe-Driving Under Local Road in Small-scale Area (국지지역에서의 안전운전 지원을 위한 경보정보 설계)

  • Moon, Hak-Yong;Ryu, Seung-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.5
    • /
    • pp.38-48
    • /
    • 2010
  • Adverse weather (e.g. strong winds, snow and ice) will probably appear as a more serious and frequent threat to road traffic than in clear climate. Another consequence of climate change with a natural disastrous on road traffic is respond to traffic accident more the large and high-rise bridge zone, tunnel zone, inclined plane zone and de-icing zone than any other zone, which in turn calls for continuous adaption of monitoring procedures. Accident mitigating measures against this accident category may consist of intense winter maintenance, the use of road weather information systems for data collection and early warnings, road surveillance and traffic control. While hazard from reduced road friction due to snow and ice may be eliminated by snow removal and de-icing measures, the effect of strong winds on road traffic are not easily avoided. The purpose of the study described here, was to design of amber information the relationship between traffic safety, weather, user information on road weather and driving conditions in local-scale Geographic. The most applications are the optimization of the amber information definition, improvements to road surveillance, road weather monitoring and improved accuracy of user information delivery. Also, statistics on wind gust, surface condition, vehicle category and other relevant parameters for wind induced accidents provide basis for traffic control, early warning policies and driver education for improved road safety at bad weather-exposed locations.

An Analysis of the Pseudo-analytical Thought and Analytical Thought that Students Do in the Process of Algebra Problem Solving (대수 문장제 해결 과정에서 나타나는 擬似(의사) 분석적 사고와 분석적 사고에 대한 분석 - 중학생 대상의 사례 연구 -)

  • Park, Hyun-Jeong;Lee, Chong-Hee
    • Journal of Educational Research in Mathematics
    • /
    • v.17 no.1
    • /
    • pp.67-90
    • /
    • 2007
  • The purpose of this study is to understand students' thinking process in the algebra problem solving, on the base of the works of Vinner(1997a, 1997b). Thus, two middle school students were evaluated in this case study to examine how they think to solve algebra word problems. The following question was considered to analyze the thinking process from the similarity-based perspective by focusing on the process of solving algebra word problems; What is the relationship between similarity and the characteristics of thinking process at the time of successful and unsuccessful problem solving? The following results were obtained by analyzing the success or failure in problem solving based on the characteristics of thinking process and similarity composition. Successful problem solving can be based on pseudo-analytical thought and analytical thought. The former is the rule applied in the process of applying closed formulas that is constructed structural similarity not related with the situations described in the text. The latter means that control and correction occurred in all stages of problem solution. The knowledge needed for solutions was applied with the formulation of open-end formulas that is constructed structural similarity in which memory and modification with the related principles or concepts. In conclusion, the student's perception on the principles involved in a solution is very important in solving algebraic word problems.

  • PDF

Study for Understanding the Special Character and the Tendency of Movement Change in Twelve Meridians (12 경락(經絡)의 속성(屬性)과 운동변화(運動變化)의 경향성(傾向性)을 파악(把握)하기 위한 연구(硏究))

  • Shuk Dong-Yun;Choi Chan-Hun;Jang Kyeong-Seon
    • Korean Journal of Acupuncture
    • /
    • v.17 no.1
    • /
    • pp.123-140
    • /
    • 2000
  • The purpose of this study is to understand the special character and the tendency of the movement change that 12 meridians possess. We studied about the incidental and fundamental rule of the six atmospheric influence that was presented by Pyobonjoong(the incidental, fundamental, intermediate) theory, and the Hwang won-uh's the Six Channel activity of the Qi theory that presented movement form of the meridian through the six atmospheric influence. Then we found the following substances. The Pyobonjoong(the incidental, fundamental, intermediate) theory is applicable to understand the special character and the tendency of the movement change that Meridians possess. But, because the Pyobonjoong(the incidental, fundamental, intermediate) theory can't classify the characteristic difference of the hand and foot meridians, then the principle that can devide the meridians of the hand and foot, must be supplied. The Jungwha(right changing)-Daewha(opposite changing) theory is able to concretely classify the special character of the hand and foot six meridians. And Hwang's Shawha(superintending change)-Jongwha(following change) theory that is base on Jungwha(right changing)-Daewha(opposite changing) theory, is able to classify the special character of the hand and foot six meridians, too. If the concept of the Meridians is understood by the Shawha(superintending change)-Jongwha(following change) theory, the special character of the hand and foot six meridians could be concretely classified and then the meridian of the Bowels and the six atmospheric influence corresponded to the meridians could be expansively explained as the point that take charge and control these special Qi in the human body The Bon-Qi(fundamental Qi) act on the special character of Shawha(superintending change) six meridians and the tendency of the movement change is cause by the insufficiency and excessiveness of the Bon-Qi(fundamental Qi). The Qi of the Shawha(superintending change) meridians act on the special character of Jongwha(following change) six meridians and the tendency of the movement change is cause by the exuberance of Yang and the deficiency of Yang.

  • PDF

Calculating the Audit Fee Based on the Estimated Cost (예정원가계산에 의한 감사보수 산정)

  • Mun, Tae-Hyoung
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.189-206
    • /
    • 2016
  • It was required to attach the documents on the details of external audit including the number of the participants in external audit, audited parts and audit times under the Article 7-2 on the audit report to the accounting audit report from 2014 in accordance with the amendment to the Act on External Audit of Stock Companies. This study aim to calculate the audit fee based on the estimated cost of service calculation of the government contribution agencies by reflecting the implementation of the revised external audit. This study calculated the audit fee for the target company (a listed company assumed to have no internal control risks and relevant audit risks for unqualified opinion in the previous year, 100 billion won of total amount of asset, manufacturing company in the previous year and preliminary client request) by putting together four items of expenditure including employment costs, expenditure, general management expenses and profit in accordance with the calculation system of cost of service under the State Contract Act. Then, it used the data collected from the documents on the details of the revised external audit after requesting estimation on the target company with the estimated cost to Big-4 accounting firms to identify the participants and times of the accounting audit. The employment costs applied 150% of participation rate of the base price of employment costs for the academic research service cost in 2014, the expenditure used the average value of accounting firms of corporate business management analysis of the Bank of Korea (2013), the general management expenses applied 5% of the general management rate of service business under Article 7-1 of the Enforcement Rule of the Act on Contracts to which the State is a Party and the profit applied 10% of profit rate of service business under Article 7-2 of the Enforcement Rule of the Act on Contracts to which the State is a Party. Based on the calculation of the estimated costs by applying the above, the audit fee was estimated at 50,617,769won. Although the result is not the optimal audit fee, it may be used as a basic scale to compare the audit fees of companies without criteria. Also, such amendment to the Act on External Audit of Stock Companies may improve independence of auditors and transparency of the accounting system rather than previous announcing only the total audit times.

  • PDF

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF

An Overview of the Rationale of Monetary and Banking Intervention: The Role of the Central Bank in Money and Banking Revisited (화폐(貨幣)·금융개입(金融介入)의 이론적(理論的) 근거(根據)에 대한 고찰(考察) : 중앙은행(中央銀行)의 존립근거(存立根據)에 대한 개관(槪觀))

  • Jwa, Sung-hee
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.71-94
    • /
    • 1990
  • This paper reviews the rationale of monetary and banking intervention by an outside authority, either the government or the central bank, and seeks to delineate clearly the optimal limits to the monetary and banking deregulation currently underway in Korea as well as on a global scale. Furthermore, this paper seeks to establish an objective and balanced view on the role of the central bank, especially in light of the current discussion on the restructuring of Korea's central bank, which has been severely contaminated by interest-group politics. The discussion begins with the recognition that the modern free banking school and the new monetary economics are becoming formidable challenges to the traditional role of the government or the central bank in the monetary and banking sector. The paper reviews six arguments that have traditionally been presented to support intervention: (1) the possibility of an over-issue of bank notes under free banking instead of central banking; (2) externalities in and the public good nature of the use of money; (3) economies of scale and natural monopoly in producing money; (4) the need for macro stabilization policy due to the instability of the real sector; (5) the external effects of bank failure due to the inherent instability of the existing banking system; and (6) protection for small banknote users and depositors. Based on an analysis of the above arguments, the paper speculates on the optimal role of the government or central bank in the monetary and banking system and the optimal degree of monetary and banking deregulation. By contrast to the arguments for free banking or laissez-faire monetary systems, which become fashionable in recent years, monopoly and intervention by the government or central bank in the outside money system can be both necessary and optimal. In this case, of course, an over-issue of fiat money may be possible due to political considerations, but this issue is beyond the scope of this paper. On the other hand, the issue of inside monies based on outside money could indeed be provided for optimally under market competition by private institutions. A competitive system in issuing inside monies would help realize, to the maxim urn extent possible, external economies generated by using a single outside money. According to this reasoning, free banking activities will prevail in the inside money system, while a government monopoly will prevail in the outside money system. This speculation, then, also implies that the monetary and banking deregulation currently underway should and most likely will be limited to the inside money system, which could be liberalized to the fullest degree. It is also implied that it will be impractical to deregulate the outside money system and to allow market competition to provide outside money, in accordance with the arguments of the free banking school and the new monetary economics. Furthermore, the role of the government or central bank in this new environment will not be significantly different from their current roles. As far as the supply of fiat money continues to be monopolized by the government, the control of the supply of base money and such related responsibilities as monetary policy (argument(4)) and the lender of the last resort (argument (5)) will naturally be assigned to the outside money supplier. However, a mechanism for controlling an over-issue of fiat money by a monopolistic supplier will definitely be called for (argument(1)). A monetary policy based on a certain policy rule could be one possibility. More importantly, the deregulation of the inside money system would further increase the systemic risk inherent in the current fractional banking system, while enhancing the efficiency of the system (argument (5)). In this context, the role of the lender of the last resort would again become an instrument of paramount importance in alleviating liquidity crises in the early stages, thereby disallowing the possibility of a widespread bank run. Similarly, prudential banking supervision would also help maintain the safety and soundness of the fully deregulated banking system. These functions would also help protect depositors from losses due to bank failures (argument (6)). Finally, these speculations suggest that government or central bank authorities have probably been too conservative on the issue of the deregulation of the financial system, beyond the caution necessary to preserve system safety. Rather, only the fullest deregulation of the inside money system seems to guarantee the maximum enjoyment of external economies in the single outside money system.

  • PDF