• Title/Summary/Keyword: Rule-Based

Search Result 3,843, Processing Time 0.036 seconds

3D Topology Optimization of Fixed Offshore Structure and Experimental Validation

  • Kim, Hyun-Seok;Kim, Hyun-Sung;Park, Byoungjae;Lee, Kangsu
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.4
    • /
    • pp.263-271
    • /
    • 2020
  • In this study, we performed a three-dimensional (3D) topology optimization of a fixed offshore structure to enhance its structural stiffness. The proposed topology optimization is based on the solid isotropic material with penalization (SIMP) method, where a volume constraint is applied to utilize an equivalent amount of material as that used for the rule-based scantling design. To investigate the effects of the main legs of the fixed offshore structure on its structural stiffness, the leg region is selectively considered in the design domain of the topology optimization problem. The obtained optimal designs and the rule-based scantling design of the structure are manufactured by 3D metal printing technology to experimentally validate the topology optimization. The behaviors under compressive loading of the obtained optimal designs are compared with those of the rule-based scantling design using a universal testing machine (UTM). Based on the structural experiments, we concluded that by employing the topology optimization method, the structural stiffness of the structure was enhanced compared to that of the rule-based scantling design for an equal amount of the fabrication material. Furthermore, by effectively combining the topology optimization and rule-based scantling methods, we succeeded in enhancing the structural stiffness and improving the breaking load of the fixed offshore structure.

Combining Multi-Criteria Analysis with CBR for Medical Decision Support

  • Abdelhak, Mansoul;Baghdad, Atmani
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1496-1515
    • /
    • 2017
  • One of the most visible developments in Decision Support Systems (DSS) was the emergence of rule-based expert systems. Hence, despite their success in many sectors, developers of Medical Rule-Based Systems have met several critical problems. Firstly, the rules are related to a clearly stated subject. Secondly, a rule-based system can only learn by updating of its rule-base, since it requires explicit knowledge of the used domain. Solutions to these problems have been sought through improved techniques and tools, improved development paradigms, knowledge modeling languages and ontology, as well as advanced reasoning techniques such as case-based reasoning (CBR) which is well suited to provide decision support in the healthcare setting. However, using CBR reveals some drawbacks, mainly in its interrelated tasks: the retrieval and the adaptation. For the retrieval task, a major drawback raises when several similar cases are found and consequently several solutions. Hence, a choice for the best solution must be done. To overcome these limitations, numerous useful works related to the retrieval task were conducted with simple and convenient procedures or by combining CBR with other techniques. Through this paper, we provide a combining approach using the multi-criteria analysis (MCA) to help, the traditional retrieval task of CBR, in choosing the best solution. Afterwards, we integrate this approach in a decision model to support medical decision. We present, also, some preliminary results and suggestions to extend our approach.

ANIDS(Advanced Network Based Intrusion Detection System) Design Using Association Rule Mining (연관법칙 마이닝(Association Rule Mining)을 이용한 ANIDS (Advanced Network Based IDS) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2287-2297
    • /
    • 2007
  • The proposed ANIDS(Advanced Network Intrusion Detection System) which is network-based IDS using Association Rule Mining, collects the packets on the network, analyze the associations of the packets, generates the pattern graph by using the highly associated packets using Association Rule Mining, and detects the intrusion by using the generated pattern graph. ANIDS consists of PMM(Packet Management Module) collecting and managing packets, PGGM(Pattern Graph Generate Module) generating pattern graphs, and IDM(Intrusion Detection Module) detecting intrusions. Specially, PGGM finds the candidate packets of Association Rule large than $Sup_{min}$ using Apriori algorithm, measures the Confidence of Association Rule, and generates pattern graph of association rules large than $Conf_{min}$. ANIDS reduces the false positive by using pattern graph even before finalizing the new pattern graph, the pattern graph which is being generated is compared with the existing one stored in DB. If they are the same, we can estimate it is an intrusion. Therefore, this paper can reduce the speed of intrusion detection and the false positive and increase the detection ratio of intrusion.

A Study on Consonant/Vowel/Unvoiced Consonant Phonetic Value Segmentation and Recognition of Korean Isolated Word Speech (한국어 고립 단어 음성의 자음/모음/유성자음 음가 분할 및 인식에 관한 연구)

  • Lee, Jun-Hwan;Lee, Sang-Beom
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.6
    • /
    • pp.1964-1972
    • /
    • 2000
  • For the Korean language, on acoustics, it creates a different form of phonetic value not a phoneme by its own peculiar property. Therefore, the construction of extended recognition system for understanding Korean language should be created with a study of the Korean rule-based system, before it can be used as post-processing of the Korean recognition system. In this paper, text-based Korean rule-based system featuring Korean peculiar vocal sound changing rule is constructed. and based on the text-based phonetic value result of the system constructed, a preliminary phonetic value segmentation border points with non-uniform blocks are extracted in Korean isolated word speech. Through the way of merge and recognition of the non-uniform blocks between the extracted border points, recognition possibility of Korean voice as the form of the phonetic vale has been investigated.

  • PDF

Rule-based Aspect Oriented Approach for Efficient Service System Development (효율적인 서비스 시스템 개발을 위한 룰 기반의 관점 지향 기법)

  • Lee, Woo-Jin;Choi, Il-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.735-743
    • /
    • 2015
  • The service oriented architecture assures flexibility of enterprise application development, so it supports agile reaction to business change. On the other hand, considerable effort is needed to develop a service by combining business and constraint consumes because the entire combination logic should be changed according to the change in business rule. To improve the current method, this paper applied an aspect oriented approach to service system development. In this paper, the rule concern is proposed in addition to the core concern and cross cutting concern of aspect oriented approach. The rule concern is extracted from business rules included in the business processes and services. The rule concern is classified into the process rule aspect and service rule aspect according to the level of the rule. In the proposed approach, system is modularized into the core concern, cross cutting concern and rule concern through separation of concern, and they are maintained independently. Therefore, the adaptability, reusability, and maintainability of a service system will be enhanced.

The Prediction of Fatigue Crack Initiation Life of Cylindrical Notch Specimens Using Local Strain Approximation (국부 변형률 근사를 이용한 원통형 노치시편의 피로균열 발생수명의 예측)

  • Lim, Jae-Yong;Hong, Seong-Gu;Lee, Soon-Bok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.28 no.6
    • /
    • pp.791-798
    • /
    • 2004
  • Fatigue crack initiation lives of round cylindrical notch specimen were investigated. Firstly, local strain approximation methods, such as the modified incremental Neuber's rule and the modified incremental Glinka's equivalent strain energy density(ESED) rule, were used to get multiaxial stress and strain state components at the notch tip. Based on the history of local stress and strain, multiaxial fatigue models were used to obtain fatigue crack initiation lives. Because the solution of Neuber's rule and Glinka's ESED rule make the upper and lower bound of local strain approximations, fatigue crack initiation lives are expected to place between life predictions by two local strain approximations. Experimental data were compared with the fatigue crack initiation life prediction results.

The Effect of International Trade on Rule of Law

  • Yang, Junsok
    • East Asian Economic Review
    • /
    • v.17 no.1
    • /
    • pp.27-53
    • /
    • 2013
  • In this paper, we look at the relationship between international trade and the rule of law, using the World Justice Project Rule of Law Index, which include index figures on human rights, limits on government powers, transparency and regulatory efficiency. Based on regression analyses using the rule of law index figures and international trade figures (merchandise trade, service trade, exports and imports as percentage of GDP,) international trade and basic human rights seem to have little relationship; but trade has a close positive relationship with strong order and security. Somewhat surprisingly, regulatory transparency and effective implementation seems to have little or no effect on international trade and vice versa. International trade shows a clear positive relationship with the country's criminal justice system, but the relationship with the civil justice system is not as clear as such. For regulatory implementation and civil justice, services trade positively affect these institutions, but these institutions in turn affect exports more strongly than services trade. Finally, the effect of trade on rule of law is stronger on a medium to long term (10-20 year) time horizon.

Fuzzy Measure를 이용한 화재감지기의 기본설계

  • 백동현;김기화
    • Fire Science and Engineering
    • /
    • v.10 no.3
    • /
    • pp.19-28
    • /
    • 1996
  • This paper present the way the fire detector determines whether a fire has broken out or not using the fuzzy measure. This method is based on Dempster's combination rule using the belief measure. The detector indicate a 'Fire'(F) or 'Nonfire'(N) when it determines whether a fire has broken out or not. To determine this, the fuzzy rule is applied in the setting value for the heat and smoke detector which is used. As a result, It is proved that the final decision can be determined more exactly whether a fire has broken out or not in proportion to the frequency of the fuzzy measure and the value of Bel (F).

  • PDF

Design and Implementation of the Conversion Rule between XML and MTF Messages (MTF 메시지와 XML간 상호변환 규칙 설계 및 구현)

  • Park, In-Soo;Yoon, Hee-Byung
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.781-788
    • /
    • 2005
  • MTF message is the normalized and standardized format which is used in the time when it tries to transmit data to other systems or exchanges needed information in defense message systems. XML can support variety of search functionality and is estimated to be the best way from the view of efficient presentation and exchange in internet based environment, based on advantage which is independent of hardware and software. US army brought in XML-MTF combining with XML based technology, but we do not contain such a MTF system, and necessity of MTF is increasing for combined operation between ROK and US as a lot of C4I system were transferred to Web based systems. In this paper, we make analysis of fundamental structure, organization of paragraph, witting regulation of MTF message. We present the rule of naming element and fundamental mapping rule for transformation of its XML based on it. Also, we prove that MTF message can be transformed to XML document by trying to transforming sample documents to XML document applying presented mapping rule, creating MTF message based on it and implement program which can automatically transform them to XML-MTF.