• Title/Summary/Keyword: Priority Rules

Search Result 126, Processing Time 0.029 seconds

Multiple Target Management of Air-to-Air mode on Airborne AESA Radar (항공기 탑재 AESA 레이다의 공대공 모드 다표적 관리 기법)

  • Yong-min Kim;Ji-eun Roh
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.5
    • /
    • pp.580-586
    • /
    • 2023
  • AESA radar is able to instantaneously and adaptively position and control the beam, and this enables to greatly improve multi-target tracking capability with high accuracy in comparison to traditional mechanically-scanned radar system. This paper is primarily concerned with the development of an efficient methodology for multi-target managenent with the context of multi-target environment employing AESA radar. In this paper, targets are stratified into two principal categories: currently displayed targets and non-display targets, predicated upon their relative priority. Displayed targets are subsequently stratified into TOI (target of interest), HPT (high priority target), and SAT (situational awareness target), based on the requisite levels of tracking accuracy. It also suggests rules for determining target priority management, especially in air-to-air mode including interleaved mode. This proposed approach was tested and validated in a SIL (system integration lab) environment, applying it to AESA radars mounted on aircraft.

The Selection of Human factors Evaluation Criteria for Information Display on VDT using AHP (AHP를 이용한 개량형 정보 표시 평가 항목의 중요도 선정에 관한 연구)

  • 차우창;장성필
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.1
    • /
    • pp.109-120
    • /
    • 2004
  • In large scale complex system such as a nuclear power plant, it is important to select guidelines and/or checklist to evaluate the system performance, especially human performance for visual information while the number of evaluation items of the guidelines and checklist is voluminous. This paper presents the methodology and experiment for the relative weights or priority selection of evaluation items on the advanced information display of main control room in a nuclear power plant. To summarize this, 1) many human factors guidelines of Visual Display Terminal(VDT) displays are collected, 2) the collected guidelines are integrated and unified based on some rules in a way to avoid confusion or errors about work performances of operator groups, 3) using the unified guidelines, the more important items are defined when the advanced information indexes are applied by using the Analytic Hierarchy Process(AHP). For employing the AHP, the decisions and response of many human factors evaluation specialists in this field are collected to get the priority order of the evaluation items of VDT. The result of this paper will be applied for the evaluation of the usability of next generation of nuclear power plant which is focused on the visual information display on VDT.

Improvement Strategy of System Unavailability by Review of Logical Structure and Reliability Importance of Reliability Block Diagram (RED) and Fault Tree Analysis (FTA) (RBD와 FTA의 논리구조와 신뢰성 중요도의 고찰에 의한 시스템 비시간가동률 개선방안)

  • Choi, Sung-Woon
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.3
    • /
    • pp.45-53
    • /
    • 2011
  • The research proposes seven elimination rules of redundant gates and blocks in Fault Tree Analysis (FTA) and Reliability Block Diagram (RBD). The computational complexity of cut sets and path sets is NP-hard. In order to reduce the complexity of Minimal Cut Set (MCS) and Minimal Path Set (MPS), the paper classifies generation algorithms. Moreover, the study develops six implementation steps which reflect structural importance (SI) and reliability importance (RI) from Reliability Centered Maintenance (RCM) that a priority of using the functional logic among components is to reduce (improve) the system unavailability (or availability). The proposed steps include efficient generation of state structure function by Rare Event Enumeration (REA). Effective use of importance measures, such as SI and ill measures, is presented based on the number and the size of MCS and MPS which is generated from the reference[5] of this paper. In addition, numerical examples are presented for practitioners to obtain the comprehensive understanding of six steps that is proposed in this research.

A Study on Fuzzy Rule Functional Verification for Threshold Value Prediction of Buffer in ATM Networks (ATM 망에서 버퍼의 임계값 예측을 위한 퍼지 규칙 기능 검증에 관한 연구)

  • 정동성;이용학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8C
    • /
    • pp.1149-1158
    • /
    • 2004
  • In this thesis, we created a Fuzzy rule in a Fuzzy logic that are Fuzzy logic which is composed of linguistic rules and Fuzzy inference engine for effective traffic control in ATM networks. The parameters of the Fuzzy rules are adapted to minimize the given performance index in both cases. In other words, the difuzzification value controls the threshold in the buffer to arrival ratio to traffic priority (low or high) using fuzzy set theory for traffic connected after reasoning. Also, show experiment result about rule by MATLAB6.5 and on-line bulid-up to verify validity of created Fuzzy rule. As a result, we can verify that threshold value in buffer is efficiently controlled by the traffic arrival ratio.

Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection (계층분석기법을 활용한 전장관리정보체계 소프트웨어 시큐어 코딩룰 선정 평가 방안)

  • Choi, June-Sung;Kim, Woo-Je;Park, Won-Hyung;Kook, Kwang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.651-662
    • /
    • 2013
  • In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.

A Study on Fuzzy Rule Functional Verification for Service ratio Prediction of Server in ATM Networks (ATM망에서 서버의 서비스율 예측을 위한 퍼지 규칙 기능 검증에 관한 연구)

  • 정동성;이용학
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.10
    • /
    • pp.69-77
    • /
    • 2004
  • In this thesis, we created a Fuzzy rule in a Fuzzy logic that are fuzzy logic which is composed of linguistic rules and Fuzzy inference engine for effective traffic control in ATM networks. The parameters of the Fuzzy rules are adapted to minimize the given performance index in both cases. In other words, the difuzzification value controls the service rate in the server to total traffic arrival ratio and buffer occupancy ratio using fuzzy set theory for traffic connected after reasoning. Also, show experiment result about rule by MATLAB6.5 and on-line bulid-up to verify validity of created Fuzzy rule. As a result, we can verify that service ratio in server is efficiently controlled by the total traffic arrival ratio and buffer occupancy ratio.

The Multiple Dimensions of Family Meals and Their Associations with Family Strengths from the Perspective of Korean Mothers with School-Aged Children (가족식사의 다차원성과 가족건강성: 학령기 어머니를 중심으로)

  • Kim, Eun-Joo;Lee, Jaerim
    • Human Ecology Research
    • /
    • v.59 no.2
    • /
    • pp.169-183
    • /
    • 2021
  • The purpose of this study was to examine the association between family meals and family strengths (cohesion and flexibility) in Korean families with school-aged children. We focused on five dimensions of family meals: frequency, family rituals, communication, rules and roles, and perceptions. Our data came from 619 mothers who were married with at least one child in elementary school. Our multiple regression analyses showed that mothers reported higher levels of both cohesion and flexibility when they gave a higher priority to family meals, made family meals a ritual, had conversations on diverse topics during family meals, or experienced lower levels of meal-related stress. In addition, higher levels of family flexibility were found when a family had more structured rules related to family meals and the father more regularly participated in meal-related housework. This study contributes to the literature by understanding the roles of family meals from a multi-dimensional perspective.

A Study on the Major Elements of an Arbitration Clause in International Investment Contracts (국제투자계약상의 중재조항(Arbitration Clause)의 주요 구성요소에 관한 연구)

  • Oh, Won-Suk;Seo, Kyung
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.38
    • /
    • pp.155-180
    • /
    • 2008
  • The purpose of this paper is to examine the major elements of Arbitration Clause in international investment contracts and to help the investor, especially foreign investors, considering these elements when they draft the contracts. First of all, to describe the extent of the arbitrable issues broadly is very important by using the phrase such as "disputes in connection with". Furthermore in order to be enforceable, the issues must be a subject-matter to be submitted to arbitration in accordance with the laws of the place of arbitration and the law application to the merits of the disputes (N.Y. Convention, Art. II). Second, the appointment of the arbitrators usually shall be based on the principle of freedom of contract. If the parties do not agree on the appointment, it is decided in accordance with the arbitration rules of the institution by the tribunal. Third, the procedural rules of the arbitration are the arbitration rules of the arbitration institution in case of institution arbitration, unless otherwise agreed. Forth, what is the most importance element of Arbitration Clause is the place of arbitration. In this case, also the principle of freedom of contract has priority. Unless otherwise agreed, Washington is the place of arbitration in case of ICSID Arbitration, but in case of ICC Arbitration, neutral third country may be the place of arbitration. However in case of ad hoc arbitration, both parties should indicate the place. If not, the whole arbitration may be paralysed by an uncooperative party. Besides the major elements, I examined the relation between the arbitration clause and award enforcement in terms of sovereign immunity. The enforcement of awards in the field of state contracts many encounter the problem of the sovereign immunity, which means that the State itself or the State enterprise is the contract partner. To avoid the this problems, it is advisable for the parties insert the clause such as ICSID Model Clause XIX.

  • PDF

Feature Subset Selection in the Induction Algorithm using Sensitivity Analysis of Neural Networks (신경망의 민감도 분석을 이용한 귀납적 학습기법의 변수 부분집합 선정)

  • 강부식;박상찬
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.51-63
    • /
    • 2001
  • In supervised machine learning, an induction algorithm, which is able to extract rules from data with learning capability, provides a useful tool for data mining. Practical induction algorithms are known to degrade in prediction accuracy and generate complex rules unnecessarily when trained on data containing superfluous features. Thus it needs feature subset selection for better performance of them. In feature subset selection on the induction algorithm, wrapper method is repeatedly run it on the dataset using various feature subsets. But it is impractical to search the whole space exhaustively unless the features are small. This study proposes a heuristic method that uses sensitivity analysis of neural networks to the wrapper method for generating rules with higher possible accuracy. First it gives priority to all features using sensitivity analysis of neural networks. And it uses the wrapper method that searches the ordered feature space. In experiments to three datasets, we show that the suggested method is capable of selecting a feature subset that improves the performance of the induction algorithm within certain iteration.

  • PDF

A study of Cluster Tool Scheduler Algorithm which is Support Various Transfer Patterns and Improved Productivity (반도체 생산 성능 향상 및 다양한 이송패턴을 수행할 수 있는 범용 스케줄러 알고리즘에 관한 연구)

  • Song, Min-Gi;Jung, Chan-Ho;Chi, Sung-Do
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.4
    • /
    • pp.99-109
    • /
    • 2010
  • Existing research about automated wafer transport management strategy for semiconductor manufacturing equipment was mainly focused on dispatching rules which is optimized to specific system layout, process environment or transfer patterns. But these methods can cause problem as like requiring additional rules or changing whole transport management strategy when applied to new type of process or system. In addition, a lack of consideration for interconnectedness of the added rules can cause unexpected deadlock. In this study, in order to improve these problems, propose dynamic priority based transfer job decision making algorithm which is applicable with regardless of system lay out and transfer patterns. Also, extra rule handling part proposed to support special transfer requirement which is available without damage to generality for maintaining a consistent scheduling policies and minimize loss of stability due to expansion and lead to improve productivity at the same time. Simulation environment of Twin-slot type semiconductor equipment was built In order to measure performance and examine validity about proposed wafer scheduling algorithm.