• 제목/요약/키워드: Research Subject Network

검색결과 314건 처리시간 0.023초

유연생산시스템에서 절삭공구 비용절감을 위한 가공시간과 경로배합 최적화 (Saving Tool Cost in Flexible Manufacturing Systems: Optimal Processing Times and Routing Mix)

  • 김정섭
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 2004년도 춘계공동학술대회 논문집
    • /
    • pp.475-478
    • /
    • 2004
  • Tool costs can comprise a significant part of the total operating costs of Flexible Manufacturing Systems. We address the problem of determining the optimal processing times of individual operations and routing mix in FMSs with multiple routes for each part type in order to minimize tool cost, subject to meeting a throughput constraint for each part type. The problem is formulated as a nonlinear program superimposed on a closed queueing network of the FMSs under consideration. Numerical examples reveal the potential of our approach for significant saving in tool costs.

  • PDF

Robustness of Learning Systems Subject to Noise:Case study in forecasting chaos

  • Kim, Steven H.;Lee, Churl-Min;Oh, Heung-Sik
    • 한국경영과학회:학술대회논문집
    • /
    • 한국경영과학회 1997년도 추계학술대회발표논문집; 홍익대학교, 서울; 1 Nov. 1997
    • /
    • pp.181-184
    • /
    • 1997
  • Practical applications of learning systems usually involve complex domains exhibiting nonlinear behavior and dilution by noise. Consequently, an intelligent system must be able to adapt to nonlinear processes as well as probabilistic phenomena. An important class of application for a knowledge based systems in prediction: forecasting the future trajectory of a process as well as the consequences of any decision made by e system. This paper examines the robustness of data mining tools under varying levels of noise while predicting nonlinear processes in the form of chaotic behavior. The evaluated models include the perceptron neural network using backpropagation (BPN), the recurrent neural network (RNN) and case based reasoning (CBR). The concepts are crystallized through a case study in predicting a Henon process in the presence of various patterns of noise.

  • PDF

주거이동이 노인의 사회적, 심리적 변화에 미치는 영향 - 일산과 분당에 거주는 노인을 중심으로 - (The Effects of Residential Relocation on the Social and Psychological Change of the Elderly)

  • 서승희;이경희
    • 한국주거학회:학술대회논문집
    • /
    • 한국주거학회 1996년도 학술발표대회논문집
    • /
    • pp.21-28
    • /
    • 1996
  • The Purpose of this study was to identify the effects of the elderly Koreans of residential relocation and to find their conditioning variables that mediate some of the negative effects of residential relocation. The research was performed by questionnares. Subject samples consisted of 448 elderly individuals who have lived for two years or less in one of the two new residential communities in commuting proximity with Seoul: Ilsan or Bundang. Two variables measured for the life of the elderly to residential relocation were the change of the social relationship network and the change of the depression level. Results indicated that the relocation had a substantial disrupting effect on the social network of the elderly. The level of depression of the subjects after relocation was decresed. It was also found that the effects of the elderly to residential relocation was mainly affected by physical factors of environment and residential satisfaction.

  • PDF

초음파 영상 전달을 위한 ISDN(Integrated Service Digital-Network)의 LAPD(Link Access Procedure on the D-Channel) 프로토콜 구현에 관한 연구 (A Study on the Implementation of ISDN LAPD Protocol for the Ultrasonic Image Trasfer)

  • 정용길;한민수
    • 대한의용생체공학회:의공학회지
    • /
    • 제14권4호
    • /
    • pp.315-320
    • /
    • 1993
  • This paper deals with a subject for implementation of L+ayer 1 and Layer 2(LAPD) of ISDN user-network interface on the basis of CCITT recommandation I.411, I.412, I.441 (Q.921), I.450(Q.930) and I.451 (Q.931) for ultrasonic image transfer. For the implementa tion of LAPD protocol of ISDN in this study. PC-CARD based hardware(TA :Terminal Adopt) is proposed and operating system (PC-XINU) supporting the Multiprocessing is transplanted to it. As the Service Access Point(SAP) is accessed by using the port of XINU and Layers which consist of transmitting and receiving part are independantly processed for each other in this proposed system. It can be easy and flexible to implement LAPD protocol for the message transfer.

  • PDF

Key Recovery Compatible with IP Security

  • Rhee, Yoon-Jung;Chan Koh;Kim, Tai-Yun
    • 한국정보과학회:학술대회논문집
    • /
    • 한국정보과학회 2001년도 가을 학술발표논문집 Vol.28 No.2 (3)
    • /
    • pp.229-231
    • /
    • 2001
  • IPSec is a security protocol suite that provides encryption and authentication services for IP messages at the network layer of the Internet. Key recovery has been the subject of a lot of discussion, of much controversy and of extensive research. Key recovery, however, might be needed at a corporate level, as a from of key management. The basic observation of the present paper is that cryptographic solutions that have been proposed so far completely ignore the communication context. Static systems are put forward fur key recovery at network layer and solutions that require connections with a server are proposed at application layer. We propose example to provide key recovery capability by adding key recovery information to an IP datagram. It is possible to take advantage of the communication environment in order to design key recovery protocols that are better suited and more efficient.

  • PDF

Interpolation on data with multiple attributes by a neural network

  • Azumi, Hiroshi;Hiraoka, Kazuyuki;Mishima, Taketoshi
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -2
    • /
    • pp.814-817
    • /
    • 2002
  • High-dimensional data with two or more attributes are considered. A typical example of such data is face images of various individuals and expressions. In these cases, collecting a complete data set is often difficult since the number of combinations can be large. In the present study, we propose a method to interpolate data of missing combinations from other data. If this becomes possible, robust recognition of multiple attributes is expectable. The key of this subject is appropriate extraction of the similarity that the face images of same individual or same expression have. Bilinear model [1]has been proposed as a solution of this subjcet. However, experiments on application of bilinear model to classification of face images resulted in low performance [2]. In order to overcome the limit of bilinear model, in this research, a nonlinear model on a neural network is adopted and usefulness of this model is experimentally confirmed.

  • PDF

Design and Configuration of Reconfigurable ATM Networks with Unreliable Links

  • Lee, Jong-Hyup
    • ETRI Journal
    • /
    • 제21권4호
    • /
    • pp.9-22
    • /
    • 1999
  • This paper considers a problem of configuring both physical backbone and logical virtual path (VP) networks in a reconfigurable asynchronous transfer mode (ATM) network where links are subject to failures. The objective is to determine jointly the VP assignment, the capacity assignment of physical links and the bandwidth allocation of VPs, and the routing assignment of traffic demand at least cost. The network cost includes backbone link capacity expansion cost and penalty cost for not satisfying the maximum throughput of the traffic due to link failures or insufficient link capacities. The problem is formulated as a zero-one non-linear mixed integer programming problem, for which an effective solution procedure is developed by using a Lagrangean relaxation technique for finding a lower bound and a heuristic method exploited for improving the upper bound of any intermediate solution. The solution procedure is tested for its effectiveness with various numerical examples.

  • PDF

패턴분류와 해싱기법을 이용한 침입탐지 시스템 (Intrusion Detection System using Pattern Classification with Hashing Technique)

  • 윤은준;김현성;부기동
    • 한국산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.75-82
    • /
    • 2003
  • 인터넷의 대중화로 인한 네트워크의 급속한 팽창으로 보안관리가 중요하게 인식되고 있다. 특히, 이상패킷을 이용한 공격들은 비정상적인 패킷들을 통하여 침입탐지 시스템이나 침입차단 시스템을 우회하여 공격하기 때문에 탐지해 내기가 어렵다. 본 논문에서는 이상패킷을 이용한 공격들을 실시간에 효율적으로 탐지할 수 있는 네트워크 기반의 침입탐지 시스템을 설계하고 구현한다. 침입탐지 시스템을 설계하기 위하여 먼저 침입 탐지를 위한 패턴을 분류하고 이를 기반으로 해싱기법이 적용된 룰트리를 생성한다. 생성된 룰트리를 기반으로 제안한 시스템은 이상패킷 공격을 효율적으로 실시간에 탐지한다.

  • PDF

시간 지연을 갖는 쌍전파 신경회로망을 이용한 근전도 신호인식에 관한 연구 (A Study on EMG Signals Recognition using Time Delayed Counterpropagation Neural Network)

  • 권장우;정인길;홍승홍
    • 대한의용생체공학회:의공학회지
    • /
    • 제17권3호
    • /
    • pp.395-401
    • /
    • 1996
  • In this paper a new neural network model, time delayed counterpropagation neural networks (TDCPN) which have high recognition rate and short total learning time, is proposed for electromyogram(EMG) recognition. Signals the proposed model increases the recognition rates after learned the regional temporal correlation of patterns using time delay properties in input layer, and decreases the learning time by using winner-takes-all learning rule. The ouotar learning rule is put at the output layer so that the input pattern is able to map a desired output. We test the performance of this model with EMG signals collected from a normal subject. Experimental results show that the recognition rates of the suggested model is better and the learning time is shorter than those of TDNN and CPN.

  • PDF

Creation of High-Quality Abstractions in Software Engineering

  • Alexey Razumowsky
    • International Journal of Computer Science & Network Security
    • /
    • 제23권7호
    • /
    • pp.193-201
    • /
    • 2023
  • Abstraction is the cornerstone of ideal software engineering (SWE). This paper discusses a problem of forming reasonable generalizations, representations and descriptions in various software development processes through the prism of poor-quality (rash, unconsidered, uncertain and harmful) abstractions. To do this, emphasis is made on an induced strategic connection between the required abstraction and its compact specific formulation based on existing research and the author's introspective experience. A software aim point and characteristic preservation of the solution integrity is the subject of the best formulation and a program module or code associated with it. Moreover, a personal attitude expressed by personal interest, motivation and creativity, is proclaimed to be a fundamental factor in successful software development.