• Title/Summary/Keyword: Issue Tree

Search Result 173, Processing Time 0.028 seconds

A Study on Improvement for Curved Block Support Pipe Design and Process with TOC Thinking Process (TOC의 사고프로세스를 이용한 곡블럭 서포트 파이프의 설계 및 공정 개선 방법에 관한 연구)

  • Kwon, Oh Uk;Song, In;Choi, Sang Il;Hu, Chul Su;Kim, Hyuk Jun
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2013.12a
    • /
    • pp.21-29
    • /
    • 2013
  • For the purpose of supporting Curved Blocks, pipe welding is commonly used on Curved panel. Typically, when it comes to attaching supporting pipe on heavy incurvated surface, it makes much loss in the process of design, cutting, welding. This paper gives proper methods to collecting problems and Core conflicts surrounding Support Pipe by using of TOC (Theory Of Constraints). Therefore drawing two solutions, pipe development program and NC generating from pipe development Data for Plate Cutting machine. It describes a process of erasing loss surrounding Support Pipe with "TOC Thinking process" and development of two programs in this paper.

  • PDF

A Framework for Semantic Interpretation of Noun Compounds Using Tratz Model and Binary Features

  • Zaeri, Ahmad;Nematbakhsh, Mohammad Ali
    • ETRI Journal
    • /
    • v.34 no.5
    • /
    • pp.743-752
    • /
    • 2012
  • Semantic interpretation of the relationship between noun compound (NC) elements has been a challenging issue due to the lack of contextual information, the unbounded number of combinations, and the absence of a universally accepted system for the categorization. The current models require a huge corpus of data to extract contextual information, which limits their usage in many situations. In this paper, a new semantic relations interpreter for NCs based on novel lightweight binary features is proposed. Some of the binary features used are novel. In addition, the interpreter uses a new feature selection method. By developing these new features and techniques, the proposed method removes the need for any huge corpuses. Implementing this method using a modular and plugin-based framework, and by training it using the largest and the most current fine-grained data set, shows that the accuracy is better than that of previously reported upon methods that utilize large corpuses. This improvement in accuracy and the provision of superior efficiency is achieved not only by improving the old features with such techniques as semantic scattering and sense collocation, but also by using various novel features and classifier max entropy. That the accuracy of the max entropy classifier is higher compared to that of other classifiers, such as a support vector machine, a Na$\ddot{i}$ve Bayes, and a decision tree, is also shown.

Social Network Analysis to Analyze the Purchase Behavior Of Churning Customers and Loyal Customers (사회 네트워크 분석을 이용한 충성고객과 이탈고객의 구매 특성 비교 연구)

  • Kim, Jae-Kyeong;Choi, Il-Young;Kim, Hyea-Kyeong;Kim, Nam-Hee
    • Korean Management Science Review
    • /
    • v.26 no.1
    • /
    • pp.183-196
    • /
    • 2009
  • Customer retention has been a pressing issue for companies to get and maintain the loyal customers in the competing environment. Lots of researchers make effort to seek the characteristics of the churning customers and the loyal customers using the data mining techniques such as decision tree. However, such existing researches don't consider relationships among customers. Social network analysis has been used to search relationships among social entities such as genetics network, traffic network, organization network and so on. In this study, a customer network is proposed to investigate the differences of network characteristics of churning customers and loyal customers. The customer networks are constructed by analyzing the real purchase data collected from a Korean cosmetic provider. We investigated whether the churning customers and the loyal customers have different degree centralities and densities of the customer networks. In addition, we compared products purchased by the churning customers and those by the loyal customers. Our data analysis results indicate that degree centrality and density of the churning customer network are higher than those of the loyal customer network, and the various products are purchased by churning customers rather than by the loyal customers. We expect that the suggested social network analysis is used to as a complementary analysis methodology with existing statistical analysis and data mining analysis.

Tree based Route Optimization in Nested NEMO Environment (중첩 NEMO 환경에서 트리 기반 라우트 최적화 기법)

  • Lim, Hyung-Jin;Chung, Tai-Myoung
    • Journal of Internet Computing and Services
    • /
    • v.9 no.1
    • /
    • pp.9-19
    • /
    • 2008
  • This paper propose the issue of connecting nested NEMO (Network Nobility) networks to global IPv6 networks, while supporting IPv6 mobility. Specifically, we consider a self-addressing including topology information IPv6-enabled NEMO infrastructure. The proposed self-organization addressing protocol automatically organized mobile routers into free architecture and configuration their global IPv6 addresses. BU(binding update) to MR own HA and internal rouging, hosed on longest prefix matching and soft state routing cache, are specially designed for IPv6-based NEMO. In conclusion, numeric analysis ore conducted to show more efficiency of the proposed routing protocols than other RO (Route Optimization) approaches.

  • PDF

Multi-dimensional Query Authentication for On-line Stream Analytics

  • Chen, Xiangrui;Kim, Gyoung-Bae;Bae, Hae-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.154-173
    • /
    • 2010
  • Database outsourcing is unavoidable in the near future. In the scenario of data stream outsourcing, the data owner continuously publishes the latest data and associated authentication information through a service provider. Clients may register queries to the service provider and verify the result's correctness, utilizing the additional authentication information. Research on On-line Stream Analytics (OLSA) is motivated by extending the data cube technology for higher multi-level abstraction on the low-level-abstracted data streams. Existing work on OLSA fails to consider the issue of database outsourcing, while previous work on stream authentication does not support OLSA. To close this gap and solve the problem of OLSA query authentication while outsourcing data streams, we propose MDAHRB and MDAHB, two multi-dimensional authentication approaches. They are based on the general data model for OLSA, the stream cube. First, we improve the data structure of the H-tree, which is used to store the stream cube. Then, we design and implement two authentication schemes based on the improved H-trees, the HRB- and HB-trees, in accordance with the main stream query authentication framework for database outsourcing. Along with a cost models analysis, consistent with state-of-the-art cost metrics, an experimental evaluation is performed on a real data set. It exhibits that both MDAHRB and MDAHB are feasible for authenticating OLSA queries, while MDAHRB is more scalable.

Reference Frame Approach for Torque Ripple Minimization of BLDCM over Wide Speed Range Including Cogging Torque (코깅 토크를 포함한 광역 속도 영역상의 BLDCM의 토크 리플 최소화를 위한 기준 프레임 접근기법)

  • Park, Han-Woong;Cho, Sung-Bae;Won, Tae-Hyun;Kwon, Soon-Jae;Ham, Byung-Woon;Kim, Cheul-U
    • Proceedings of the KIEE Conference
    • /
    • 2001.04a
    • /
    • pp.33-36
    • /
    • 2001
  • Torque ripple control of brush less DC motor has been the main issue of the servo drive systems in which the speed fluctuation, vibration and acoustic noise should be minimized. Most methods for suppressing the torque ripples require Fourier series analysis and either the iterative or least mean square minimization. In this paper, the novel approach to achieve the ripple-tree torque control with maximum efficiency based on the d-q-0 reference frame is presented. The proposed method optimize the reference phase current waveforms including even the case of 3 phase unbalanced condition, and the motor winding currents are controlled to follow up the optimized current waveforms by delta modulation technique. As a result, the proposed approach provides a simple and clear way to obtain the optimal motor excitation currents. The validity and practical applications of the proposed control scheme are verified through the simulations and experimental results.

  • PDF

CREEC: Chain Routing with Even Energy Consumption

  • Shin, Ji-Soo;Suh, Chang-Jin
    • Journal of Communications and Networks
    • /
    • v.13 no.1
    • /
    • pp.17-25
    • /
    • 2011
  • A convergecast is a popular routing scheme in wireless sensor networks (WSNs) in which every sensor node periodically forwards measured data along configured routing paths to a base station (BS). Prolonging lifetimes in energy-limited WSNs is an important issue because the lifetime of a WSN influences on its quality and price. Low-energy adaptive clustering hierarchy (LEACH) was the first attempt at solving this lifetime problem in convergecast WSNs, and it was followed by other solutions including power efficient gathering in sensor information systems (PEGASIS) and power efficient data gathering and aggregation protocol (PEDAP). Our solution-chain routing with even energy consumption (CREEC)-solves this problem by achieving longer average lifetimes using two strategies: i) Maximizing the fairness of energy distribution at every sensor node and ii) running a feedback mechanism that utilizes a preliminary simulation of energy consumption to save energy for depleted Sensor nodes. Simulation results confirm that CREEC outperforms all previous solutions such as LEACH, PEGASIS, PEDAP, and PEDAP-power aware (PA) with respect to the first node death and the average lifetime. CREEC performs very well at all WSN sizes, BS distances and battery capacities with an increased convergecast delay.

A Study on Traditional Korean Furniture, PyeongSang II - Developing Modularized and Multi-useful Bed adopting PyeongSang - (한국 전통목가구 평상(平床) 연구 2 - 평상을 적용한 모듈화 다용도 침대 개발 -)

  • Kim, Min Keung;Moon, Sun Ok
    • Journal of the Korea Furniture Society
    • /
    • v.28 no.3
    • /
    • pp.145-155
    • /
    • 2017
  • This study explores developing a piece of modularized and multi-useful bed adapting PyeongSang followed by the last issue, 'a study on traditional Korean furniture, PyeongSang I' for the understanding of the furniture from theory and history. Adopted From the joints and ornament, the modularized elements were designed and developed in order to compose the head board, the side board, the foot board, and the seat bottom. The joints are sambang miter, samae miter, dado, and mortise and tenon, which are strong in holding the bed. And the ornament is lattice patterns like geokjamun and manjamun, elephant eyes patterns like ansangmun from the traditional furniture. Using the elements, the bed is composed with six modules which make people free and easy to move and transform them. Hence, the bed is multi-useful by using the double, the twin the single, and various sofas by the way to display them such as two, three, four, five, and six modules. And the bed was made of bright zelkova tree and dark heat treated ash expressing contrast of black and white, the design concept modern and easy to make many people access to them.

Cyber Security Risk Evaluation of a Nuclear I&C Using BN and ET

  • Shin, Jinsoo;Son, Hanseong;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.49 no.3
    • /
    • pp.517-524
    • /
    • 2017
  • Cyber security is an important issue in the field of nuclear engineering because nuclear facilities use digital equipment and digital systems that can lead to serious hazards in the event of an accident. Regulatory agencies worldwide have announced guidelines for cyber security related to nuclear issues, including U.S. NRC Regulatory Guide 5.71. It is important to evaluate cyber security risk in accordance with these regulatory guides. In this study, we propose a cyber security risk evaluation model for nuclear instrumentation and control systems using a Bayesian network and event trees. As it is difficult to perform penetration tests on the systems, the evaluation model can inform research on cyber threats to cyber security systems for nuclear facilities through the use of prior and posterior information and backpropagation calculations. Furthermore, we suggest a methodology for the application of analytical results from the Bayesian network model to an event tree model, which is a probabilistic safety assessment method. The proposed method will provide insight into safety and cyber security risks.

Deciding the Optimal Shutdown Time Incorporating the Accident Forecasting Model (원자력 발전소 사고 예측 모형과 병합한 최적 운행중지 결정 모형)

  • Yang, Hee Joong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.171-178
    • /
    • 2018
  • Recently, the continuing operation of nuclear power plants has become a major controversial issue in Korea. Whether to continue to operate nuclear power plants is a matter to be determined considering many factors including social and political factors as well as economic factors. But in this paper we concentrate only on the economic factors to make an optimum decision on operating nuclear power plants. Decisions should be based on forecasts of plant accident risks and large and small accident data from power plants. We outline the structure of a decision model that incorporate accident risks. We formulate to decide whether to shutdown permanently, shutdown temporarily for maintenance, or to operate one period of time and then periodically repeat the analysis and decision process with additional information about new costs and risks. The forecasting model to predict nuclear power plant accidents is incorporated for an improved decision making. First, we build a one-period decision model and extend this theory to a multi-period model. In this paper we utilize influence diagrams as well as decision trees for modeling. And bayesian statistical approach is utilized. Many of the parameter values in this model may be set fairly subjective by decision makers. Once the parameter values have been determined, the model will be able to present the optimal decision according to that value.