• Title/Summary/Keyword: Information Requirement Analysis

Search Result 657, Processing Time 0.026 seconds

Ant Colony Optimization for Feature Selection in Pattern Recognition (패턴 인식에서 특징 선택을 위한 개미 군락 최적화)

  • Oh, Il-Seok;Lee, Jin-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.1-9
    • /
    • 2010
  • This paper propose a novel scheme called selective evaluation to improve convergence of ACO (ant colony optimization) for feature selection. The scheme cutdown the computational load by excluding the evaluation of unnecessary or less promising candidate solutions. The scheme is realizable in ACO due to the valuable information, pheromone trail which helps identify those solutions. With the aim of checking applicability of algorithms according to problem size, we analyze the timing requirements of three popular feature selection algorithms, greedy algorithm, genetic algorithm, and ant colony optimization. For a rigorous timing analysis, we adopt the concept of atomic operation. Experimental results showed that the ACO with selective evaluation was promising both in timing requirement and recognition performance.

Studies on Food Items of River Otter Residing in the Hongchon Stream (강원도 홍천강 유역에 서식하는 수달의 식이물 분석에 관한 연구)

  • Lee, Sangdon
    • Journal of Wetlands Research
    • /
    • v.14 no.4
    • /
    • pp.591-596
    • /
    • 2012
  • Stream of Hongchon in Gangwon province was well known site for river otter(Lutra lutra) habitat. Because of habitat importance in this region a food analysis was conducted using 478 spraints of the species. A total food was domintnant by fish species occupying 80.5% and the dominant species was Zacco temminckii because of population abundance. Other food items were Amphibians and birds. Summer food was the highest due to its diversity. Gunup and Naechon streams were not different among diversity. Currently the highway construction was underway and we need more information regarding habitat requirement, and management implication for the species in this region.

Performance Analysis of Switched Ethernets with Different Topologies for Industrial Communications (공장자동화를 위한 토폴로지에 따른 스위칭 이더넷의 성능분석)

  • Kim, Myung-Kyun;Park, Zin-Won
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.99-108
    • /
    • 2004
  • In this paper, the performance of switched ethernet networks with different topologies as an industrial control networks is analyzed. The switched ethernet eliminated data collisions on the network and can be used to transmit real-time data. While the amount of data on the network is small compared to the computer networks, the industrial control networks require the real-time data delivery. In this paper, we analyze and compare the network performance of switched ethernet networks with linear and tree topologies whether they satisfy the real-time data delivery requirement needed to be used as the industrial control networks.

Corporate Reengineering for MRPII Implementation: Via a Hierarchical Modelling Approach

  • Chan, Jimmy S.F.;Chau K.Y.;Chan, Y.K.
    • International Journal of Quality Innovation
    • /
    • v.6 no.2
    • /
    • pp.59-89
    • /
    • 2005
  • Manufacturing Resources Planning (MRPII) is one kind of manufacturing information system that can help manufacturing companies gain competitive advantages. It is estimated that more than one hundred MRPII systems are available in the market, many of them are mature enough to solve most operational issues in accordance with users' requirements. More often than not, many of these systems provide more functions than a company expects. Manufacturing companies worldwide have attempted to implement these MRPII systems, however, many companies experienced failure (Turbide, 1996) due to managerial rather than technical issues. The authors propose an approach utilising a roadmap to integrate BPR and the MRPII implementation in order to overcome this difficulty. A detail road map is developed to guide this implementation, which is designed using a hierarchical analysis technique known as Integrated DEFinition Method (IDEF). IDEF is a systematic manufacturing management and integration-modeling tool. The proposed approach is implemented and illustrated using a reference company and the results indicated that 66% reduction in errors for maintaining the bills of materials system; 99% reduction in time to carry out material requirement planning; and 70% reduction in time previously taken for non-productive discussions.

The Study about Installation Condition of Convenient Facilities on Toilets for the Disabled in Public Libraries -Focused On the Public Libraries in Daegu- (피공공도서관의 장애인화장실 편의시설 설치실태에 관한 연구 -대구광역시 공공도서관을 중심으로-)

  • Seo, Koung-Ja;Kim, Jong-Young;Kong, Sung-Hoon
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.16 no.4
    • /
    • pp.103-111
    • /
    • 2013
  • In view of the fact that modern society has a range of origins causing disability, the population of acquired crippled is escalating. Hence, it is obligatory to facilitate every visitors can utilize facility equitably because public libraries are being changed to compounded service area. Particularly, it is urgent to manage space planning and accommodation by considerate the requirement traits of disabled who are a susceptible social group about knowledge information. This study analysis installation of toilet, the inevitable factor of hygiene facility, for disabled equipped in four different public libraries in Daegu with related on the standards of establishment for prolonged stay through advanced research and legislation connected on handicapped. This study provides foundation data to establish construction plan for disabled to alleviate inconvenience of taking service of public library, and to compose satisfying hygiene facility.

Dynamic Evaluation of Bridge Mounted Structures (교량상부에 부착된 구조물의 동적거동해석)

  • Kim, Dong-Joo;Lee, Wan-Soo;Yang, Jong-Ho
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2011.04a
    • /
    • pp.324-327
    • /
    • 2011
  • The design requirement for ground mounted sign structures are fairly well defined in the AASHTO Standard Specifications for Structural Supports for Highway Signs, Luminaries, and Traffic Signals and consists of applying an equivalent pseudo-dynamic loading to account for the dynamic effects of wind loads and ignores the dynamic effect due to moving vehicle loads. This design approach, however, should not be applied to the design of bridge mounted sign structures because ignoring the dynamic effects of the moving vehicle loads may produce non-conservative results, since the stiffness of the bridge structure can greatly influence the behavior. Not enough information is available in the literatures which provide guide lines to include the influence of moving vehicles in the design of the bridge mounted sign structures. This paper describes a theoretical methodology, Bridge-Vehicle Interaction Element, which can be utilized to account for the dynamic effect of moving vehicles. A case study is also included where this methodology was successfully applied. It was concluded that the bridge-vehicle interaction finite element developed can provide a more accurate representation of the behavior of bridge mounted sign structures. The result of these analysis enabled development of simple and effective retrofitting scheme for the existing support system of bridge-mounted-structure.

  • PDF

Analysis of Improving Requirement on Military Security Regulations for Future Command Control System (미래 지휘통제체계를 위한 보안 규정 개선 요구사항 분석)

  • Kang, Jiwon;Moon, Jae Woong;Lee, Sang Hoon
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.69-75
    • /
    • 2020
  • The command control system, like the human brain and nervous system, is a linker that connects the Precision Guided Missile(PGR) in information surveillance and reconnaissance (ISR) and is the center of combat power. In establishing the future command and control system, the ROK military should consider not only technical but also institutional issues. The US Department of Defense establishes security policies, refines them, and organizes them into architectural documents prior to the development of the command and control system. This study examines the security architecture applied to the US military command control system and analyzes the current ROK military-related policies (regulations) to identify security requirements for the future control system. By grouping the identified security requirements, this study identifies and presents field-specific enhancements to existing security regulations.

Monitoring and Checking Concurrent Java Programs with HDTL (HDTL을 이용한 병렬 자바 프로그램의 모니터 링과 검사)

  • Cho, Seung-Mo;Kim, Hyung-Ho;Cha, Sung-Deok;Bae, Doo-Hwan
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.5
    • /
    • pp.345-354
    • /
    • 2002
  • There have been many researches about monitoring and checking the implementations during run-time using formal requirement specification. They usually adopt temporal logics or their extensions to specify the requirements for the implementations. However, most of the systems fail to support the specification of requirements fir dynamic systems - systems whore components are created and removed during run-time. Unlike analysis or design models, most actual implementations are dynamic, so the notion of instances should be employed in the property specification language. In this paper, we show how we can monitor and check Java programs using our temporal logic for dynamic systems (HDTL). We suggest a framework in which the execution of Java programs are monitored and chocked against given HDTL requirements.

mNPKI for Mobile Government in Developing Countries (개발도상국의 모바일 정부를 위한 mNPKI)

  • Kim, Hyunsung
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.161-171
    • /
    • 2019
  • Government transactions over wireless electronic devices are not safe and hence the messages are prone to attack. Thereby, devices supporting wireless Internet must assure the same level of security and privacy as the wired network. National public key infrastructure (NPKI) for electronic government used in the wired environment is not suitable for wireless environment for mobile government (mGovernment) because of the limitations of computing power, memory capacity and restricted battery power. This requires the development of a new NPKI for mGovernment, denoted as mNPKI, to developing countries, which provides the same security level as the wired NPKI. For the wireless environment requirements, mNPKI is based on short lived certificates. Analysis shows that mNPKI is well suited to wireless Internet and provides the same security requirement from the wired NPKI.

A Study on the Mid-term Man Power Demand Forecasting for the Telematics Industry in Korea (텔레매틱스 중기 인력 수요 예측 연구)

  • Yang, Young-Kyu;WhangBo, Tae-Kn;Kim, Dong-Sun
    • Journal of Korea Spatial Information System Society
    • /
    • v.7 no.1 s.13
    • /
    • pp.3-11
    • /
    • 2005
  • This paper proposes the method for the man power forecasting and performs mid-term(1994-1998) forecasting of telematics man power demands in Korea. Telematics technology has been selected as '839 New IT Growth Engine' by Ministry of Information and Communication (MIC) of Korean Government to boost Korean IT industry for the next 10 years. In order to meet the man power requirement in this telematics industry, accurate forecasting of the man power demand is necessary. The procedures for the forecasting includes study of man power forecasting models, deriving market size of the telematics industry, perform labor productivity analysis, derive the man power structure by the types of the work forces by the types of telematics industry, and finally derive annual man power demands by the worker types and the telematics industry types.

  • PDF