• Title/Summary/Keyword: Information Engineering Methodology

Search Result 1,690, Processing Time 0.033 seconds

Study on the Parameter Optimization of Soft-switching DC/DC Converters with the Response Surface Methodology, a SPICE Model, and a Genetic Algorithm

  • Liu, Shuai;Wei, Li;Zhang, Yicheng;Yao, Yongtao
    • Journal of Power Electronics
    • /
    • v.15 no.2
    • /
    • pp.479-486
    • /
    • 2015
  • The application of soft-switching techniques is increasing in the DC/DC converter area. It is important to design soft-switching parameters to ensure the converter operates properly and efficiently. An optimized design method is presented in this paper. The objective function is the total power loss of a converter, while the variables are soft-switching parameters and the constraints are the electrical requirements for soft-switching. Firstly, a response surface methodology (RSM) model with a high precision is built, and the rough optimized parameters can be obtained with the help of a genetic algorithm (GA) in the solution space determined by the constraints. Secondly, a re-optimization is conducted with a SPICE model and a GA, and accurate optimized parameters can be obtained. Simulation and experiment results show that the proposed method performs well in terms of a wide adaptability, efficiency, and global optimization.

On an Improved Weapon System Design Method based on the Design Structure Matrix (DSM) Approach (DSM 기법에 의한 무기시스템 설계의 개선에 관한 연구)

  • Choi, Sang-Wook;Lee, Jae-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.11B
    • /
    • pp.1704-1709
    • /
    • 2010
  • A small number of countries are leading the world in the development of advanced weapon systems. In general, the access to the information on the design of advanced systems is limited. As such, when similar weapon systems need to be developed, a special methodology must be considered to catch up with both the technological and information barriers. In this paper, we study a design methodology based on the combination of the reverse engineering and the design structure matrix (DSM) approach. The methodology begins by analyzing the advanced system by reverse engineering and produces a set of design results in the form of physical architecture, functional architecture and system requirements. The design results are further enhanced by applying the DSM clustering. As a result, one can get an improved design result. As a target system, a guided missile system was considered.

Research Issues in Robust QFD

  • Kim, Kwang-Jae;Kim, Deok-Hwan
    • Industrial Engineering and Management Systems
    • /
    • v.7 no.2
    • /
    • pp.93-100
    • /
    • 2008
  • Quality function deployment (QFD) provides a specific approach for ensuring quality throughout each stage of the product development and production process. Since the focus of QFD is placed on the early stage of product development, the uncertainty in the input information of QFD is inevitable. If the uncertainty is neglected, the QFD analysis results are likely to be misleading. It is necessary to equip practitioners with a new QFD methodology that can model, analyze, and dampen the effects of the uncertainty and variability in a systematic manner. Robust QFD is an extended version of QFD methodology, which is robust to the uncertainty of the input information and the resulting variability of the QFD output. This paper discusses recent research issues in Robust QFD. The major issues are related with the determination of overall priority, robustness evaluation, robust prioritization, and web-based Robust QFD optimizer. Our recent research results on the issues are presented, and some of future research topics are suggested.

A Novel Face Recognition Algorithm based on the Deep Convolution Neural Network and Key Points Detection Jointed Local Binary Pattern Methodology

  • Huang, Wen-zhun;Zhang, Shan-wen
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.1
    • /
    • pp.363-372
    • /
    • 2017
  • This paper presents a novel face recognition algorithm based on the deep convolution neural network and key point detection jointed local binary pattern methodology to enhance the accuracy of face recognition. We firstly propose the modified face key feature point location detection method to enhance the traditional localization algorithm to better pre-process the original face images. We put forward the grey information and the color information with combination of a composite model of local information. Then, we optimize the multi-layer network structure deep learning algorithm using the Fisher criterion as reference to adjust the network structure more accurately. Furthermore, we modify the local binary pattern texture description operator and combine it with the neural network to overcome drawbacks that deep neural network could not learn to face image and the local characteristics. Simulation results demonstrate that the proposed algorithm obtains stronger robustness and feasibility compared with the other state-of-the-art algorithms. The proposed algorithm also provides the novel paradigm for the application of deep learning in the field of face recognition which sets the milestone for further research.

Evolutionary Design Methodology of Fuzzy Set-based Polynomial Neural Networks with the Information Granule

  • Roh Seok-Beom;Ahn Tae-Chon;Oh Sung-Kwun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.04a
    • /
    • pp.301-304
    • /
    • 2005
  • In this paper, we propose a new fuzzy set-based polynomial neuron (FSPN) involving the information granule, and new fuzzy-neural networks - Fuzzy Set based Polynomial Neural Networks (FSPNN). We have developed a design methodology (genetic optimization using Genetic Algorithms) to find the optimal structure for fuzzy-neural networks that expanded from Group Method of Data Handling (GMDH). It is the number of input variables, the order of the polynomial, the number of membership functions, and a collection of the specific subset of input variables that are the parameters of FSPNN fixed by aid of genetic optimization that has search capability to find the optimal solution on the solution space. We have been interested in the architecture of fuzzy rules that mimic the real world, namely sub-model (node) composing the fuzzy-neural networks. We adopt fuzzy set-based fuzzy rules as substitute for fuzzy relation-based fuzzy rules and apply the concept of Information Granulation to the proposed fuzzy set-based rules.

  • PDF

Neural Network and Cloud Computing for Predicting ECG Waves from PPG Readings

  • Kosasih, David Ishak;Lee, Byung-Gook;Lim, Hyotaek
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.11-20
    • /
    • 2022
  • In this paper, we have recently created self-driving cars and self-parking systems in human-friendly cars that can provide high safety and high convenience functions by recognizing the internal and external situations of automobiles in real time by incorporating next-generation electronics, information communication, and function control technologies. And with the development of connected cars, the ITS (Intelligent Transportation Systems) market is expected to grow rapidly. Intelligent Transportation System (ITS) is an intelligent transportation system that incorporates technologies such as electronics, information, communication, and control into the transportation system, and aims to implement a next-generation transportation system suitable for the information society. By combining the technologies of connected cars and Internet of Things with software features and operating systems, future cars will serve as a service platform to connect the surrounding infrastructure on their own. This study creates a research methodology based on the Enhanced Security Model in Self-Driving Cars model. As for the types of attacks, Availability Attack, Man in the Middle Attack, Imperial Password Use, and Use Inclusive Access Control attack defense methodology are used. Along with the commercialization of 5G, various service models using advanced technologies such as autonomous vehicles, traffic information sharing systems using IoT, and AI-based mobility services are also appearing, and the growth of smart transportation is accelerating. Therefore, research was conducted to defend against hacking based on vulnerabilities of smart cars based on artificial intelligence blockchain.

A Study on the Inference of Detailed Protocol Structure in Protocol Reverse Engineering (상세한 프로토콜 구조를 추론하는 프로토콜 리버스 엔지니어링 방법에 대한 연구)

  • Chae, Byeong-Min;Moon, Ho-Won;Goo, Young-Hoon;Shim, Kyu-Seok;Lee, Min-Seob;Kim, Myung-Sup
    • KNOM Review
    • /
    • v.22 no.1
    • /
    • pp.42-51
    • /
    • 2019
  • Recently, the amount of internet traffic is increasing due to the increase in speed and capacity of the network environment, and protocol data is increasing due to mobile, IoT, application, and malicious behavior. Most of these private protocols are unknown in structure. For efficient network management and security, analysis of the structure of private protocols must be performed. Many protocol reverse engineering methodologies have been proposed for this purpose, but there are disadvantages to applying them. In this paper, we propose a methodology for inferring a detailed protocol structure based on network trace analysis by hierarchically combining CSP (Contiguous Sequential Pattern) and SP (Sequential Pattern) Algorithm. The proposed methodology is designed and implemented in a way that improves the preceeding study, A2PRE, We describe performance index for comparing methodologies and demonstrate the superiority of the proposed methodology through the example of HTTP, DNS protocol.

A Study on the Design of an Efficient Audit Model in the Area of Information System Testing Activities

  • Kim, Hee Wan;Jung, Yong Gyu
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.1
    • /
    • pp.210-217
    • /
    • 2021
  • In the case of an agile-based project, it was inadequate to perform a comprehensive inspection and evaluation on the establishment and operation of an information system by performing audit only with the audit and inspection elements provided by the existing information system audit and inspection system. In particular, in the case of the test activity area, it was necessary to improve the test activity audit check items to comprehensively check the agile-based development process by applying the existing audit system. To this end, a test activity improvement check model of the agile methodology audit model was presented by applying the repetition concept, a characteristic of the agile methodology. In order to empirically verify the model of this study, a survey was conducted for auditors and designers/developers who have experience in performing agile-based projects and auditing information systems. As a result of the questionnaire on the integrated test and system test in the test stage, more than 70% of the respondents were found to be suitable. More than 80% of the respondents judged that it was appropriate as a result of the questionnaire on "improvement and regression test progress according to integrated test and system test results" and "integrated test and functional actions of components and subsystems".

A methodology for XML documentation of the structural calculation document to build database supporting safety management of infrastructures (사회기반시설물 안전관리 지원 데이터베이스 구축을 위한 구조계산서의 XML 문서화 방법론)

  • Kim, Bong-Geun;Park, Sang-Il;Lee, Jin-Hoon;Lee, Sang-Ho
    • 한국방재학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.414-417
    • /
    • 2007
  • A methodology for XML documentation of the structural calculation document is presented to support manipulation of the design information on the internet. The text file format is chosen as a neutral format because it can be easily translated from office documents generated from engineering practice. The first word of each line is compared with the reserved numbering groups, and relative levels among the lines are defined to generate the hierarchically structured XML document of the text file. The demonstration subjected to sample general documents and structural calculation documents shows that the prototype application module based on the developed methodology can be adopted to build the database of design information which supports the safety management of infrastructures.

  • PDF

A Study on Optimal Developmental Cost for Quality Factors of Integrated Information Security Systems (통합정보보호시스템의 최적 품질 확보를 위한 최소개발비용 탐색에 관한 연구)

  • Park, You-Jin;Choi, Myeong-Gil
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.3
    • /
    • pp.1-9
    • /
    • 2010
  • To protect information resources, many organizations including private corporate and government employ integrated information security systems which provide the functions of intrusion detection, firewall, and virus vaccine. So, in order to develop a reliable integrated information security system during the development life cycle, the managers in charge of the development of the system must effectively distribute the development resources to the quality factors of an integrated information security system. This study suggests a distribution methodology that minimizes the total cost with satisfying the minimum quality level of an integrated information security system by appropriately assigning development resources to quality factors considered. To achieve this goal, we identify quality factors of an integrated information system and then measure the relative weights among the quality factors using analytic hierarchy process (AHP). The suggested distribution methodology makes it possible to search an optimal solution which minimizes the total cost with satisfying the required quality levels of processes by assigning development resources to quality factors during the development life cycle.