• Title/Summary/Keyword: Individual Level

Search Result 4,274, Processing Time 0.032 seconds

A GENETIC ALGORITHM BASED ON OPTIMALITY CONDITIONS FOR NONLINEAR BILEVEL PROGRAMMING PROBLEMS

  • Li, Hecheng;Wang, Yuping
    • Journal of applied mathematics & informatics
    • /
    • v.28 no.3_4
    • /
    • pp.597-610
    • /
    • 2010
  • For a class of nonlinear bilevel programming problems in which the follower's problem is linear, the paper develops a genetic algorithm based on the optimality conditions of linear programming. At first, we denote an individual by selecting a base of the follower's linear programming, and use the optimality conditions given in the simplex method to denote the follower's solution functions. Then, the follower's problem and variables are replaced by these optimality conditions and the solution functions, which makes the original bilevel programming become a single-level one only including the leader's variables. At last, the single-level problem is solved by using some classical optimization techniques, and its objective value is regarded as the fitness of the individual. The numerical results illustrate that the proposed algorithm is efficient and stable.

Visualization of Tooth for Non-Destructive Evaluation from CT Images

  • Gao, Hui;Chae, Oksam
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.3
    • /
    • pp.207-213
    • /
    • 2009
  • This paper reports an effort to develop 3D tooth visualization system from CT sequence images as a part of the non-destructive evaluation suitable for the simulation of endodontics, orthodontics and other dental treatments. We focus on the segmentation and visualization for the individual tooth. In dental CT images teeth are touching the adjacent teeth or surrounded by the alveolar bones with similar intensity. We propose an improved level set method with shape prior to separate a tooth from other teeth as well as the alveolar bones. Reconstructed 3D model of individual tooth based on the segmentation results indicates that our technique is a very conducive tool for tooth visualization, evaluation and diagnosis. Some comparative visualization results validate the non-destructive function of our method.

Design of Food Management System Using NFC Tag

  • Lee, Jong-Chan;Bahk, Gyung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.5
    • /
    • pp.25-29
    • /
    • 2018
  • As society advances and consumers' perception of food safety changes, the demand for the safety of refrigerated and distributed foods is spreading. In this paper, we build an ICT system that can collect the TTH data from the NFC tag, store it, analyze the food safety level using it. This service platform consists of the temperature monitoring NFC tag attached to individual packaged food, the smartphone with NFC sensor, and the monitoring server with a big data system. Consumers and administrators in this system can easily identify and predict the safety level of individual packaged foods in real time using the provided app on smartphones. In the field of food safety, the use of new technologies such as ICT can create new value by combining with existing food industry in addition to creating new market by new service.

Modeling the Price-Reduction Effect in Mobile Telecommunications Traffic

  • Cha Kyoung Cheon;Jun Duk Bin;Wilson Amy R.
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.289-303
    • /
    • 2004
  • As needs for telecommunications services diversify, an increasingly wide range of telecommunications services is becoming available in the market. Any subscriber can find a service to satisfy his/her telecommunication requirements and competition between providers to retain heavy users is increasing. Service price reductions are one retention strategy, although price reductions for one service can affect the individual-level usage for other services. Price reductions can also be imposed on a service provider by regulation. For these reasons, understanding how price reductions affect service usage is of growing importance to the telecommunications industry for purposes of pricing and tariff development. In this paper, we develop an individual-level usage model for telecommunications services and analyze the effects on usage of a price reduction. We apply the model to age-stratified aggregate traffic data for a Korean mobile telecommunication service provider. Finally, we develop a model to support a market segmentation and price reduction strategy.

  • PDF

Improvement of fairness between assured service TCP users in a differentiated service network (차별화 서비스 망에서 보장형 서비스의 TCP 사용자들간 공정성 개선 방안)

  • Lee, Ji-Hyoung;Jeong, Choong-Kyo
    • Journal of Industrial Technology
    • /
    • v.20 no.B
    • /
    • pp.139-146
    • /
    • 2000
  • To support Quality of Service (QoS) in the existing Internet, Differentiated Service (Diff-Serv) has been proposed. But, the unfairness between TCP connections remains as a serious problem not only in the conventional best-effort service Internet but also in new Diff-Serv network. In this paper, we propose the Balancing Marker Algorithm (BMA) improving the fairness between individual connections of aggregated sources in a Diff-Serv network. This algorithm is based on the 3-level priority marking method. We compared the 2-level packet priority marker with the Balancing Marker proposed in this paper. And we showed that the BMA improved the fairness and the throughputs between the individual connections with different delays in an aggregated source.

  • PDF

Predicting ground-based damage states from windstorms using remote-sensing imagery

  • Brown, Tanya M.;Liang, Daan;Womble, J. Arn
    • Wind and Structures
    • /
    • v.15 no.5
    • /
    • pp.369-383
    • /
    • 2012
  • Researchers have recently begun using high spatial resolution remote-sensing data, which are automatically captured and georeferenced, to assess damage following natural and man-made disasters, in addition to, or instead of employing the older methods of walking house-to-house for surveys, or photographing individual buildings from an airplane. This research establishes quantitative relationships between the damage states observed at ground-level, and those observed from space using high spatial resolution remote-sensing data, for windstorms, for individual site-built one- or two-family residences (FR12). "Degrees of Damage" (DOD) from the Enhanced Fujita (EF) Scale were determined for ground-based damage states; damage states were also assigned for remote-sensing imagery, using a modified version of Womble's Remote-Sensing (RS) Damage Scale. The preliminary developed model can be used to predict the ground-level damage state using remote-sensing imagery, which could significantly lessen the time and expense required to assess the damage following a windstorm.

An Applicaton of Performance Assessment for the Identification of Gifted and Talented Students (수행평가를 활용한 영재 판별)

  • 오영주
    • Journal of Gifted/Talented Education
    • /
    • v.7 no.1
    • /
    • pp.77-116
    • /
    • 1997
  • The paper-and-pencil multiplce choise test has been widely used to identify gifted and talented student in Korea. Such test have several drawbacks; such~a s not being able to assess creative problem solving abilities and high level thinking abilities which are important characteristics of gifted students. The Korean Educational Development Institute (KEDI) developed a performance assessment which challenged traditional methods of identification. The 5-day summer camp was held to select gifted students for the Korean Minjok Leadership Academy. 211 students were evaluated in the aspects of creative problem solving abilities, high level thinking abilities, task commitments, and cooperativeness with various performance tasks, such as essay tests, conversations, oral examinations, computer simulations, puzzles, experiments, group discussions, debates, research reports, and games. As a result, it was found that there were several limitations of the performance assessment in terms of low reliability, requiring high costs and many professionals, and taking long times and large spaces. Expanding and continuing research should follow in order for a performance assessment to use widely as an identification methods because it assesses 'true' abilities of each individual student. follow in order for a performance assessment to use widely as an identification methods because it assesses 'true' abilities of each individual student.

  • PDF

Marital Instability of Wives Who Experienced Abuse from Their Husbands (학대 경험 아내들의 결혼불안정성에 관한 연구)

  • 정혜정
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.9
    • /
    • pp.17-33
    • /
    • 2002
  • This study was to investigate the relationships of personal resources, individual psychological variables, and relational characteristics with marital instability of wives who experienced physical and/or psychological abuse from their husbands, and to analyze the relative significance of related variables on marital instability. Self-administered questionnaire method was used to collect data from 500 wives residing in Chonbuk-do province, and data from 306 wives who reported to be psychologically and/or physically abused during last three years were used in the final analyses. Results showed that there were significant differences in the levels of marital instability according to wives' employment status, number of children, and occupational status of husbands. Correlational analyses indicated that wives' economic dependence, all individual psychological variables, and three relational variables were significantly correlated with marital instability of abused wives. Finally, multiple regression analyses showed that marital comparison level and degree of abuse from husband were the most powerful predictors on marital instability, and all these variables accounted for 61% of the total variance of abused wives' marital instability.

Performance Evaluation of the WiMAX Network under a Complete Partitioned User Group with a Traffic Shaping Algorithm

  • Akhter, Jesmin;Islam, Md. Imdadul;Amin, M.R.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.568-580
    • /
    • 2014
  • To enhance the utilization of the traffic channels of a network (instead of allocating radio channel to an individual user), a channel or a group of channels are allocated to a user group. The idea behind this is the statistical distribution of traffic arrival rates and the service time for an individual user or a group of users. In this paper, we derive the blocking probability and throughput of a subscriber station of Worldwide Interoperability for Microwave Access (WiMAX) by considering both the connection level and packet-level traffic under a complete partition scheme. The main contribution of the paper is to incorporate the traffic shaping scheme onto the incoming turbulent traffic. Hence, we have also analyzed the impact of the drain rate of the buffer on the blocking probability and throughput.

Combination of the Verb ha- ′do′ and Entity Type Nouns in Korean: A Generative Lexicon Approach. (개체유형 명사와 동사 ′하-′의 결합에 관한 생성어휘부 이론적 접근)

  • 임서현;이정민
    • Language and Information
    • /
    • v.8 no.1
    • /
    • pp.77-100
    • /
    • 2004
  • This paper aims to account for direct combination of an entity type noun with the verb HA- 'do' (ex. piano-rul ha- 'piano-ACC do') in Korean, based on Generative Lexicon Theory (Pustejovsky, 1995). The verb HA-'do' coerces some entity type nouns (e.g., pap 'boiled rice') into event type ones, by virtue of the qualia of the nouns. Typically, a telic-based type coercion supplies individual predication to the HA- construction and an agentive-based type coercion evokes a stage-level interpretation. Type coercion has certain constraints on the choice of qualia. We further point out that qualia cannot be a warehouse of pragmatic information. Qualia are composed of necessary information to explain the lattice structure of lexical meaning and co-occurrence constraints, distinct from accidental information. Finally, we seriously consider co-composition as an alternative to type coercion for the crucial operation of type shift.

  • PDF