• Title/Summary/Keyword: Identifiability

Search Result 55, Processing Time 0.026 seconds

Inverse problem for semilinear control systems

  • Park, Jong-Yeoul;Jeong, Jin-Mun;Kwun, Young-Chel
    • Bulletin of the Korean Mathematical Society
    • /
    • v.33 no.4
    • /
    • pp.603-611
    • /
    • 1996
  • Let consider the following problem: find an element u(t) in a Banach space U from the equation $$ x'(t) = Ax(t) + f(t,x(t)) + \Phi_0 u(t), 0 \leq t \leq T $$ with initial and terminal conditions $$ x(0) = 0, x(T) = \phi $$ in a Banach space X where $\phi \in D(A)$. This problem is a kind of control engineering inverse problem and contains nonlinear term, so that it is difficult and interesting. Thee proof main result in this paper is based on the Fredholm property of [1] in section 3. Similar considerations of linear system have been dealt with in many references. Among these literatures, Suzuki[5] introduced this problem for heat equation with unknown spatially-varing conductivity. Nakagiri and Yamamoto[2] considered the identifiability problem, which A is a unknown operator to be identified, where the system is described by a linear retarded functional differential equation. We can also apply to determining the magnitude of the control set for approximate controllability if X is a reflexive space, i.e., we can consider whether a dense subset of X is covered by reachable set in section 4.

  • PDF

Anonymous and Non-anonymous User Behavior on Social Media: A Case Study of Jodel and Instagram

  • Kasakowskij, Regina;Friedrich, Natalie;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.3
    • /
    • pp.25-36
    • /
    • 2018
  • Anonymity plays an increasingly important role on social media. This is reflected by more and more applications enabling anonymous interactions. However, do social media users behave different when they are anonymous? In our research, we investigated social media services meant for solely anonymous use (Jodel) and for widely spread non-anonymous sharing of pictures and videos (Instagram). This study examines the impact of anonymity on the behavior of users on Jodel compared to their non-anonymous use of Instagram as well as the differences between the user types: producer, consumer, and participant. Our approach is based on the uses and gratifications theory (U>) by E. Katz, specifically on the sought gratifications (motivations) of self-presentation, information, socialization, and entertainment. Since Jodel is mostly used in Germany, we developed an online survey in German. The questions addressed the three different user types and were subdivided according to the four motivation categories of the U>. In total 664 test persons completed the questionnaire. The results show that anonymity indeed influences users' usage behavior depending on user types and different U> categories.

Protein Adsorption on Ion Exchange Resin: Estimation of Equilibrium Isotherm Parameters from Batch Kinetic Data

  • Chu K.H.;Hashim M.A.
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.11 no.1
    • /
    • pp.61-66
    • /
    • 2006
  • The simple Langmuir isotherm is frequently employed to describe the equilibrium behavior of protein adsorption on a wide variety of adsorbents. The two adjustable parameters of the Langmuir isotherm - the saturation capacity, or $q_m$, and the dissociation constant, $K_d$ - are usually estimated by fitting the isotherm equation to the equilibrium data acquired from batch equilibration experiments. In this study, we have evaluated the possibility of estimating $q_m$ and $K_d$ for the adsorption of bovine serum albumin to a cation exchanger using batch kinetic data. A rate model predicated on the kinetic form of the Langmuir isotherm, with three adjustable parameters ($q_m,\;K_d$, and a rate constant), was fitted to a single kinetic profile. The value of $q_m$ determined as the result of this approach was quantitatively consistent with the $q_m$ value derived from the traditional batch equilibrium data. However, the $K_d$ value could not be retrieved from the kinetic profile, as the model fit proved insensitive to this parameter. Sensitivity analysis provided significant insight into the identifiability of the three model parameters.

Effects of Information Overload on Hostile Behaviors Online (온라인 상의 적대적 행동에 정보과부하가 미치는 영향)

  • Jin, Sanghyung;Rhee, Cheul;Jang, Youngbin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.179-197
    • /
    • 2019
  • Although there have been lots of studies about users' behaviors online, few have explored the mechanism of hostile behaviors. In this sense, this study aims at discovering what may elevate users' hostile behaviors. More specifically, we tried to find the relationship between flaming behavior and perception factors such as perceived risk, anonymity and expected emotional reaction. A survey was conducted to investigate the relationship of the above variables. As a result, all these variables show significant effects on flaming, and information overload are found to act as a moderator. We carefully conclude that flaming in online community can be reduced by preventing information overload each user perceives.

$Gr\ddot{o}bner$ basis versus indicator function (그뢰브너 기저와 지시함수와의 관계)

  • Kim, Hyoung-Soon;Park, Dong-Kwon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.6
    • /
    • pp.1015-1027
    • /
    • 2009
  • Many problems of confounding and identifiability for polynomial models in an experimental design can be solved using methods of algebraic geometry. The theory of $Gr\ddot{o}bner$ basis is used to characterize the design. In addition, a fractional factorial design can be uniquely represented by a polynomial indicator function. $Gr\ddot{o}bner$ bases and indicator functions are powerful computational tools to deal with ideals of fractions based on each different theoretical aspects. The problem posed here is to give how to move from one representation to the other. For a given fractional factorial design, the indicator function can be computed from the generating equations in the $Gr\ddot{o}bner$ basis. The theory is tested using some fractional factorial designs aided by a modern computational algebra package CoCoA.

  • PDF

BAYES EMPIRICAL BAYES ESTIMATION OF A PROPORT10N UNDER NONIGNORABLE NONRESPONSE

  • Choi, Jai-Won;Nandram, Balgobin
    • Journal of the Korean Statistical Society
    • /
    • v.32 no.2
    • /
    • pp.121-150
    • /
    • 2003
  • The National Health Interview Survey (NHIS) is one of the surveys used to assess the health status of the US population. One indicator of the nation's health is the total number of doctor visits made by the household members in the past year, There is a substantial nonresponse among the sampled households, and the main issue we address here is that the nonrespones mechanism should not be ignored because respondents and nonrespondents differ. It is standard practice to summarize the number of doctor visits by the binary variable of no doctor visit versus at least one doctor visit by a household for each of the fifty states and the District of Columbia. We consider a nonignorable nonresponse model that expresses uncertainty about ignorability through the ratio of odds of a household doctor visit among respondents to the odds of doctor visit among all households. This is a hierarchical model in which a nonignorable nonresponse model is centered on an ignorable nonresponse model. Another feature of this model is that it permits us to "borrow strength" across states as in small area estimation; this helps because some of the parameters are weakly identified. However, for simplicity we assume that the hyperparameters are fixed but unknown, and these hyperparameters are estimated by the EM algorithm; thereby making our method Bayes empirical Bayes. Our main result is that for some of the states the nonresponse mechanism can be considered non-ignorable, and that 95% credible intervals of the probability of a household doctor visit and the probability that a household responds shed important light on the NHIS.

Nondestructive Defect Detection in Two-dimensional Anisotropic Composite Elastic Bodies Using the Boundary Element Method (경계 요소법을 이용한 2차원 비등방성 복합재료 탄성체의 비파괴 결함 추정)

  • 이상열
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.17 no.1
    • /
    • pp.39-47
    • /
    • 2004
  • In this paper, the defects of two-dimensional anisotropic elastic bodies are identified by using the boundary element method. The use of numerical models that contain only boundary integral terns reduces the dimensionality of the problem by one. This advantage is particularly important in problems such as crack mechanics. Avoiding domain meshing is also particularly advantageous in the solution of inverse problems since it overcomes mesh perturbations and simplifies the procedure. In this paper, nondestructive approaches for the existing isotropic materials are extended to analyze the elastic bodies made of anisotropic materials such as composites. After verifying that the proposing boundary element model is in good agreement with numerical results reported by other investigators, the effect of noise in the measurements on the identifiability is studied with respect to different design parameters of layered composites. Sample studies are carried out for various layup configurations and loading conditions. The effects of the layup sequences in detecting flaw of composites is explored in this paper.

A Study on the Holistic Spatial Design Elements for Service User Experiences in Healthcare Facilities (의료 서비스 환경에서 서비스 사용자 경험 디자인 요소에 관한 연구)

  • Chun, Sookyung;Nam, Kyung-Sook
    • Korean Institute of Interior Design Journal
    • /
    • v.24 no.4
    • /
    • pp.3-13
    • /
    • 2015
  • For last decades, the interests and efforts to enhance healthcare facility users' experience is focused on improving facility environments for healing (Delvin, 2003) and servicescapes in order to meet the users' needs (Becker, 2008; Seunghee, 2011). In the emerging experience economy, customer want experiences and they're willing to pay for the experiences and memories not goods. (Pine, J. & Gillmore, J., 1999). It is important to identify what supports customer experiences and how they perceive the experiences in healthcare environments and it will provide important information for healthcare planners, managers, architects, and interior designers. This study examines the service user experience design elements from a User Experiences design perspective. It focuses on healthcare facilities as user experience elements and build up a conceptual framework that outlines service user experience design elements in healthcare facilities. Literature review and case studies were conducted to build the service user experience design elements according to affordance theory. Findings from this study shows that service user experience design elements were introduced and newly developed which can be categorized into three factors; 1) Functional experiences in the physical environments (safety, accessibility, self-directiveness), 2) emotional expression and cognitive experiences (identifiability/clarity, natural features/pleasant environment, aesthetic elements/playful space, media richness), 3) social relational experiences(closeness, privacy, communication with staff, integrated system). These service user experience design elements will help healthcare facility designers to understand what customer experiences, how they increase the satisfaction, and how they improve facilities for modeling the industry's best practices.

Proxy Signature Scheme based on Proxy-Register Protocol (위임등록 프로토콜을 이용한 대리서명 기법)

  • Park, Se-Joon;Oh, Hae-Suk
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.1-10
    • /
    • 2004
  • Proxy signature schemes based on delegation of warrant are frequently studied in these days. Proxy signatures are signature schemes that an original signer delegates his signing capability to a proxy signer, and the proxy signer creates a signature on behalf of the original signer. Proxy signatures are fundamentally accomplished by the process that original signer creates the signature about the proxy information and transmits to the proxy signer for using by the proxy key. There are several security requirements for using the proxy signature schemes. In this paper we suggest the proxy-register protocol scheme that original signer registers to the verifier about the proxy related information. In our scheme, verifier verifies the signature that original signer creates about the proxy information and sets the warrant of proxy signer, validity period for proxy signature and some limitation. At the same time, all security requirements that were mentioned in previous schemes are satisfied. We also show the advantages of our suggestion by comparing with the previous proxy signature schemes.

The fraction of simplex-centroid mixture designs (심플렉스 중심배열법의 일부실시에 관한 연구)

  • Kim, Hyoung Soon;Park, Dong Kwon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.26 no.6
    • /
    • pp.1295-1303
    • /
    • 2015
  • In a mixture experiment, one may be interested in estimating not only main effects but also some interactions. Main effects and interactions may be estimated through appropriate designs such as simplex-centroid designs. However, the estimability problems, implied by the sum to one functional relationship among the factors, have strong consequences on the confounding and identifiability of models for such designs. To handle these problems, we address homogeneous polynomial model based on the computational commutative algebra (CCA) instead of using $Scheff{\acute{e}}s$ canonical model which is typically used. The problem posed here is to give how to choose estimable main effects and also some low-degree interactions. The theory is tested using a fraction of simplex-centroid designs aided by a modern computational algebra package CoCoA.