• Title/Summary/Keyword: Markov number

Search Result 344, Processing Time 0.03 seconds

Reinforcement Learning for Minimizing Tardiness and Set-Up Change in Parallel Machine Scheduling Problems for Profile Shops in Shipyard (조선소 병렬 기계 공정에서의 납기 지연 및 셋업 변경 최소화를 위한 강화학습 기반의 생산라인 투입순서 결정)

  • So-Hyun Nam;Young-In Cho;Jong Hun Woo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.60 no.3
    • /
    • pp.202-211
    • /
    • 2023
  • The profile shops in shipyards produce section steels required for block production of ships. Due to the limitations of shipyard's production capacity, a considerable amount of work is already outsourced. In addition, the need to improve the productivity of the profile shops is growing because the production volume is expected to increase due to the recent boom in the shipbuilding industry. In this study, a scheduling optimization was conducted for a parallel welding line of the profile process, with the aim of minimizing tardiness and the number of set-up changes as objective functions to achieve productivity improvements. In particular, this study applied a dynamic scheduling method to determine the job sequence considering variability of processing time. A Markov decision process model was proposed for the job sequence problem, considering the trade-off relationship between two objective functions. Deep reinforcement learning was also used to learn the optimal scheduling policy. The developed algorithm was evaluated by comparing its performance with priority rules (SSPT, ATCS, MDD, COVERT rule) in test scenarios constructed by the sampling data. As a result, the proposed scheduling algorithms outperformed than the priority rules in terms of set-up ratio, tardiness, and makespan.

Gas kinematics and star formation in NGC 6822

  • Park, Hye-Jin;Oh, Se-Heon;Wang, Jing;Zheng, Yun;Zhang, Hong-Xin;de Blok, W.J.G.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.61.4-62
    • /
    • 2020
  • We present H I gas kinematics and star formation activities of NGC 6822, a dwarf galaxy located in the Local Volume at a distance of ~490 kpc. We perform profile decomposition of the line-of-sight velocity profiles of the high-resolution (~42.4" × 12") spatial; ~1.6 km/s spectral) H I data cube taken with the Australia Telescope Compact Array (ATCA). For this, we use a new tool, the so-called BAYGAUD (BAYesian GAUssian Decompositor) which is based on Bayesian Markov Chain Monte Carlo (MCMC) techniques, allowing us to decompose a line-of-sight velocity profile into an optimal number of Gaussian components in a quantitative manner. We classify the decomposed H I gas components of NGC 6822 into kinematically cold, warm or hot ones with respect to their velocity dispersion: 1) cold: < 4 km/s, 2) warm: 4 ~ 8 km/s, 3) hot: > 8 km/s. We then derive the Toomre-Q parameters of NGC 6822 using the kinematically decomposed H I gas maps. We also correlate their gas surface densities with the surface star formation rates derived using both GALEX far-ultraviolet and WISE 22 micron data to examine the impact of gas turbulence caused by stellar feedback on the Kennicutt-Schmidt (K-S) law. The kinematically cold component is likely to better follow the linear extension of the Kennicutt-Schmidt (K-S) law for molecular hydrogen (H2) at the low gas surface density regime where H I is not saturated.

  • PDF

A Study of Reinforcement Learning-based Cyber Attack Prediction using Network Attack Simulator (NASim) (네트워크 공격 시뮬레이터를 이용한 강화학습 기반 사이버 공격 예측 연구)

  • Bum-Sok Kim;Jung-Hyun Kim;Min-Suk Kim
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.112-118
    • /
    • 2023
  • As technology advances, the need for enhanced preparedness against cyber-attacks becomes an increasingly critical problem. Therefore, it is imperative to consider various circumstances and to prepare for cyber-attack strategic technology. This paper proposes a method to solve network security problems by applying reinforcement learning to cyber-security. In general, traditional static cyber-security methods have difficulty effectively responding to modern dynamic attack patterns. To address this, we implement cyber-attack scenarios such as 'Tiny Alpha' and 'Small Alpha' and evaluate the performance of various reinforcement learning methods using Network Attack Simulator, which is a cyber-attack simulation environment based on the gymnasium (formerly Open AI gym) interface. In addition, we experimented with different RL algorithms such as value-based methods (Q-Learning, Deep-Q-Network, and Double Deep-Q-Network) and policy-based methods (Actor-Critic). As a result, we observed that value-based methods with discrete action spaces consistently outperformed policy-based methods with continuous action spaces, demonstrating a performance difference ranging from a minimum of 20.9% to a maximum of 53.2%. This result shows that the scheme not only suggests opportunities for enhancing cybersecurity strategies, but also indicates potential applications in cyber-security education and system validation across a large number of domains such as military, government, and corporate sectors.

  • PDF

Lip-Synch System Optimization Using Class Dependent SCHMM (클래스 종속 반연속 HMM을 이용한 립싱크 시스템 최적화)

  • Lee, Sung-Hee;Park, Jun-Ho;Ko, Han-Seok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.7
    • /
    • pp.312-318
    • /
    • 2006
  • The conventional lip-synch system has a two-step process, speech segmentation and recognition. However, the difficulty of speech segmentation procedure and the inaccuracy of training data set due to the segmentation lead to a significant Performance degradation in the system. To cope with that, the connected vowel recognition method using Head-Body-Tail (HBT) model is proposed. The HBT model which is appropriate for handling relatively small sized vocabulary tasks reflects co-articulation effect efficiently. Moreover the 7 vowels are merged into 3 classes having similar lip shape while the system is optimized by employing a class dependent SCHMM structure. Additionally in both end sides of each word which has large variations, 8 components Gaussian mixture model is directly used to improve the ability of representation. Though the proposed method reveals similar performance with respect to the CHMM based on the HBT structure. the number of parameters is reduced by 33.92%. This reduction makes it a computationally efficient method enabling real time operation.

Analysis of Signaling Load of Mobile IPv6 and Hierarchical Mobile IPv6 (Mobile IPv6와 Hierarchical Mobile IPv6의 시그널링 부하 분석)

  • Kong Ki-Sik;Song MoonBae;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.515-524
    • /
    • 2005
  • As the number of the mobile nodes (MNs) increases in the networks, the signaling traffic generated by mobility management for MNs will increase explosively, and such a phenomenon will probably affect overall network performance. In this paper, we propose a novel analytical approach using a continuous-time Markov chain model and hierarchical network model for the analysis on the signaling load of representative IPv6 mobility support Protocols such as Mobile IPv6 (MIPv6) and Hierarchical Mobile IPv6 (HMIPv6). According to these analytical modeling, this paper derives the various signaling costs, which are generated by an MN during its average domain residence time when MIPv6 and HMIPv6 are deployed under the same network architecture, respectively. In addition, based on these derived costs, we investigate the effects of various mobility/traffic-related parameters on the signaling costs generated by an MN under MIPv6 and HMIPv6. The analytical results show that as the average moving speed of an MN gets higher and the binding lifetime is set . to the larger value, and as its average packet arrival rate gets lower, the total signaling cost generated during its average domain residence time under HMIPv6 will get relatively lower than that under MIPv6, and that under the reverse conditions, the total signaling cost under MIPv6 will get relatively lower than that under HMIPv6.

Genetic Variability Comparison of Wild Populations and Cultured Stocks of Flounder Paralichthys olivaceus Based on Microsatellite DNA Markers (넙치, Paralichthys olivaceus 자연 집단과 양식 집단의 유전학적 다양성 비교)

  • Jeong, Dal Sang;Noh, Jae Koo;Myeong, Jeong In;Lee, Jeong Ho;Kim, Hyun Choul;Park, Chul Ji;Min, Byung Hwa;Ha, Dong Soo;Jeon, Chang Young
    • Korean Journal of Ichthyology
    • /
    • v.21 no.4
    • /
    • pp.221-226
    • /
    • 2009
  • Six microsatellite DNA markers were used to investigate the genetic variability between wild populations and cultured stocks of olive flounder Paralichthys olivaceus. The average of observed (Ho) and expected heterozygosity (He) ranged from 0.722 to 0.959, and from 0.735 to 0.937, respectively. There was no distinguishable difference between the wild populations and cultured stocks in terms of the observed and expected heterozygosities. However, number of alleles per locus differed markedly between the two fish groups: 19.7 to 21.8 for the wild populations and 12.0 to 14.7 for the cultured stocks. This result gives important information concerning the production of seedling for the improvement of genetic diversity in this species.

Uncertainty Assessment of Single Event Rainfall-Runoff Model Using Bayesian Model (Bayesian 모형을 이용한 단일사상 강우-유출 모형의 불확실성 분석)

  • Kwon, Hyun-Han;Kim, Jang-Gyeong;Lee, Jong-Seok;Na, Bong-Kil
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.5
    • /
    • pp.505-516
    • /
    • 2012
  • The study applies a hydrologic simulation model, HEC-1 developed by Hydrologic Engineering Center to Daecheong dam watershed for modeling hourly inflows of Daecheong dam. Although the HEC-1 model provides an automatic optimization technique for some of the parameters, the built-in optimization model is not sufficient in estimating reliable parameters. In particular, the optimization model often fails to estimate the parameters when a large number of parameters exist. In this regard, a main objective of this study is to develop Bayesian Markov Chain Monte Carlo simulation based HEC-1 model (BHEC-1). The Clark IUH method for transformation of precipitation excess to runoff and the soil conservation service runoff curve method for abstractions were used in Bayesian Monte Carlo simulation. Simulations of runoff at the Daecheong station in the HEC-1 model under Bayesian optimization scheme allow the posterior probability distributions of the hydrograph thus providing uncertainties in rainfall-runoff process. The proposed model showed a powerful performance in terms of estimating model parameters and deriving full uncertainties so that the model can be applied to various hydrologic problems such as frequency curve derivation, dam risk analysis and climate change study.

English Phoneme Recognition using Segmental-Feature HMM (분절 특징 HMM을 이용한 영어 음소 인식)

  • Yun, Young-Sun
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.3
    • /
    • pp.167-179
    • /
    • 2002
  • In this paper, we propose a new acoustic model for characterizing segmental features and an algorithm based upon a general framework of hidden Markov models (HMMs) in order to compensate the weakness of HMM assumptions. The segmental features are represented as a trajectory of observed vector sequences by a polynomial regression function because the single frame feature cannot represent the temporal dynamics of speech signals effectively. To apply the segmental features to pattern classification, we adopted segmental HMM(SHMM) which is known as the effective method to represent the trend of speech signals. SHMM separates observation probability of the given state into extra- and intra-segmental variations that show the long-term and short-term variabilities, respectively. To consider the segmental characteristics in acoustic model, we present segmental-feature HMM(SFHMM) by modifying the SHMM. The SFHMM therefore represents the external- and internal-variation as the observation probability of the trajectory in a given state and trajectory estimation error for the given segment, respectively. We conducted several experiments on the TIMIT database to establish the effectiveness of the proposed method and the characteristics of the segmental features. From the experimental results, we conclude that the proposed method is valuable, if its number of parameters is greater than that of conventional HMM, in the flexible and informative feature representation and the performance improvement.

Genome-wide survey and expression analysis of F-box genes in wheat

  • Kim, Dae Yeon;Hong, Min Jeong;Seo, Yong Weon
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.141-141
    • /
    • 2017
  • The ubiquitin-proteasome pathway is the major regulatory mechanism in a number of cellular processes for selective degradation of proteins and involves three steps: (1) ATP dependent activation of ubiquitin by E1 enzyme, (2) transfer of activated ubiquitin to E2 and (3) transfer of ubiquitin to the protein to be degraded by E3 complex. F-box proteins are subunit of SCF complex and involved in specificity for a target substrate to be degraded. F-box proteins regulate many important biological processes such as embryogenesis, floral development, plant growth and development, biotic and abiotic stress, hormonal responses and senescence. However, little is known about the F-box genes in wheat. The draft genome sequence of wheat (IWGSC Reference Sequence v1.0 assembly) used to analysis a genome-wide survey of the F-box gene family in wheat. The Hidden Markov Model (HMM) profiles of F-box (PF00646), F-box-like (PF12937), F-box-like 2 (PF13013), FBA (PF04300), FBA_1 (PF07734), FBA_2 (PF07735), FBA_3 (PF08268) and FBD (PF08387) domains were downloaded from Pfam database were searched against IWGSC Reference Sequence v1.0 assembly. RNA-seq paired-end libraries from different stages of wheat, such as stages of seedling, tillering, booting, day after flowering (DAF) 1, DAF 10, DAF 20, and DAF 30 were conducted and sequenced by Illumina HiSeq2000 for expression analysis of F-box protein genes. Basic analysis including Hisat, HTseq, DEseq, gene ontology analysis and KEGG mapping were conducted for differentially expressed gene analysis and their annotation mappings of DEGs from various stages. About 950 F-box domain proteins identified by Pfam were mapped to wheat reference genome sequence by blastX (e-value < 0.05). Among them, more than 140 putative F-box protein genes were selected by fold changes cut-offs of > 2, significance p-value < 0.01, and FDR<0.01. Expression profiling of selected F-box protein genes were shown by heatmap analysis, and average linkage and squared Euclidean distance of putative 144 F-box protein genes by expression patterns were calculated for clustering analysis. This work may provide valuable and basic information for further investigation of protein degradation mechanism by ubiquitin proteasome system using F-box proteins during wheat development stages.

  • PDF

An Evaluative Analysis of the Referral System for Insurance Patients (보험진료체계 개편의 효과에 대한 연구)

  • Han, Dal-Sun;Kim, Byungy-Ik;Lee, Young-Jo;Bae, Sang-Soo;Kwon, Soon-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.24 no.4 s.36
    • /
    • pp.485-495
    • /
    • 1991
  • This study examined the effects of referral requirements for insurance patients which have been enforced since July 1, 1989 when medical insurance coverage was extended to the whole population except beneficiaries of medical assistance program. The requirements are mainly aimed at discouraging the use of tertiary care hospitals by imposing restrictions on the patient's choice of a medical service facility. The expectation is that such change in the pattern of medical care utilization would produce several desirable effects including increased efficiency in patient care and balanced development of various types of medical service facilities. In this study, these effects were assessed by the change in the number of out-patient visits and bed-days per illness episode and the share of each type of facility in the volume of services and the amount of expenditures after the implementation of the new referral system. The data for analysis were obtained from the claims to the insurance for government and school employees. The sample was drawn from the claims for the patients treated during the first six months of 1989, prior to the enforcement of referral requirements, and those of the patients treated during the first six months of 1990, after the enforcement. The 1989 sample included 299,824 claims (3.6% of total) and the 1990 sample included 332,131 (3.7% of total). The data were processed to make the unit of analysis an illness episode instead of an insurance claim. The facilities and types of care utilized for a given illness episode are defined to make up the pathway of medical care utilization. This pathway was conceived of as a Markov Chain process for further analysis. The conclusion emerged from the analysis is that the enforcement of referral requirements resulted in less use of tertiary care hospitals, and thereby decreased the volume of services and the amount of insurance expenses per illness episode. However, there are a few points that have to be taken into account in relation to the conclusion. The new referral system is likely to increase the use of medical services not covered by insurance, so that its impact on national health expenditures would be different from that on insurance expenditures. The extension of insurance coverage must have inereased patient load for all types of medical service organizations, and this increase may be partly responsible for producing the effects attributed to the new referral system. For example, excessive patient load for tertiary care hospitals may lead to the transfer of their patients to other types of facilities. Another point is that the data for this study correspond to very early phase of the new system. But both patients and medical care providers would adapt themselves to the new system to avoid or overcome its disadvantages for them, so as that its effects could change over time. Therefore, it is still necessary to closely monitor the impact of the referral requirements.

  • PDF