• Title/Summary/Keyword: Ultra-weight algorithm

Search Result 14, Processing Time 0.036 seconds

Development of Preliminary Design Model for Ultra-Large Container Ships by Genetic Algorithm

  • Han, Song-I;Jung, Ho-Seok;Cho, Yong-Jin
    • International Journal of Ocean System Engineering
    • /
    • v.2 no.4
    • /
    • pp.233-238
    • /
    • 2012
  • In this study, we carried out a precedent investigation for an ultra-large container ship, which is expected to be a higher value-added vessel. We studied a preliminary optimized design technique for estimating the principal dimensions of an ultra-large container ship. Above all, we have developed optimized dimension estimation models to reduce the building costs and weight, using previous container ships in shipbuilding yards. We also applied a generalized estimation model to estimate the shipping service costs. A Genetic Algorithm, which utilized the RFR (required freight rate) of a container ship as a fitness value, was used in the optimization technique. We could handle uncertainties in the shipping service environment using a Monte-Carlo simulation. We used several processes to verify the estimated dimensions of an ultra-large container ship. We roughly determined the general arrangement of an ultra-large container ship up to 1500 TEU, the capacity check of loading containers, the weight estimation, and so on. Through these processes, we evaluated the possibility for the practical application of the preliminary design model.

Environment Adaptive WBAN Routing based on Residual energy (에너지량에 기반한 환경 적응 WBAN 라우팅 알고리즘)

  • Kim, Wee-Yeon;Kim, Dae-Young;Shin, Sang-Bae;Cho, Jin-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.89-99
    • /
    • 2011
  • In this paper, we propose an routing algorithm for ultra low power and high reliable transmission in WBAN environment. This algorithm is to minimize energy consumption and to maximize the life and reliability for medical devices. Also, this algorithm is not only medical devices but also non-medical devices is to minimize energy consumption and to maximize the life of device. The combination of the distance from the previous node and residual energy calculates weight. The calculated weight is used to calculate the weight of full path by cumulative weights. The full path to the smallest of the weights are set to the path. Also this algorithm is able to select another path to avoid the error path by determining the link status between nodes, when occurs link error and congestion. In this paper, we show that WSN routing algorithm based on shortest hop count routing algorithm and EAR routing algorithm compared to ensure high reliability and low power characteristic of WBAN to be verified through simulations.

A Study on the Optimum Mix Design Model of 100MPa Class Ultra High Strength Concrete using Neural Network (신경망 이론을 이용한 100MPa급 초고강도 콘크리트의 최적 배합설계모델에 관한 연구)

  • Kim, Young-Soo;Shin, Sang-Yeop;Jeong, Euy-Chang
    • Journal of the Regional Association of Architectural Institute of Korea
    • /
    • v.20 no.6
    • /
    • pp.17-23
    • /
    • 2018
  • The purpose of this study is to suggest 100MPa class ultra high strength concrete mix design model applying neural network theory, in order to minimize an effort wasted by trials and errors method until now. Mix design model was applied to each of the 70 data using binary binder, ternary binder and quaternary binder. Then being repeatedly applied to back-propagation algorithm in neural network model, optimized connection weight was gained. The completed mix design model was proved, by analyzing and comparing to value predicted from mix design model and value measured from actual compressive strength test. According to the results of this study, more accurate value could be gained through the mix design model, if error rate decreases with the test condition and environment. Also if content of water and binder, slump flow, and air content of concrete apply to mix design model, more accurate and resonable mix design could be gained.

Security APIs for Security Services in Ultra Light-weight Environment (초경량 환경의 보안 서비스 지원을 위한 보안 API)

  • Kim, Won-Young;Lee, Young-Seok;Lee, Jae-Wan;Seo, Chang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.485-492
    • /
    • 2008
  • Computers used fer light-weight computing environments are considerably limited in resources and performance running in ubiquitous environment. Because of the limited resources, it is difficult to apply existing security technologies to the light-weight computers. In this paper, light-weight security software is implemented using RC-5 encryption and SHA-1 authentication algorithm which is appropriate for light-weight computing environments. The design of components based on security software of a light-weight computer application and the test-bed for security software are presented. The simulation verifies the correctness of the security software. The architecture of the light-weight and reconfigurable security software for light-weight computer applications is proposed. The proposed security software is small size and provides reconfigurable security library based on the light-weight component and the software manager that configures software platform is loaded with the library at the time it is needed.

Automatic Extraction of UV patterns for Paper Money Inspection (지폐검사를 위한 UV 패턴의 자동추출)

  • Lee, Geon-Ho;Park, Tae-Hyoung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.3
    • /
    • pp.365-371
    • /
    • 2011
  • Most recently issued paper money includes security patterns that can be only identified by ultra violet (UV) illuminations. We propose an automatic extraction method of UV patterns for paper money inspection systems. The image acquired by camera and UV illumination is transformed to input data through preprocessing. And then, the Gaussian mixture model (GMM) and split-and-merge expectation maximization (SMEM) algorithm are applied to segment the image represented by input data. In order to extract the UV pattern from the segmented image, we develop a criterion using the area of covariance vector and the weight value. The experimental results on various paper money are presented to verify the usefulness of the proposed method.

Simulation of Motion Accuracy Considering Loads in Linear Motion Units (부하를 고려한 직선운동유니트의 정밀도 시뮬레이션 기술)

  • Khim, Gyungho;Park, Chun Hong;Oh, Jeong Seok
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.32 no.5
    • /
    • pp.405-413
    • /
    • 2015
  • This paper presents the motion accuracy simulation considering loads such as workpiece weight, cutting force, cogging force of a linear motor, and force caused by misalignment and runout error of a ballscrew in linear motion units. The transfer function method is basically utilized to estimate 5-DOF motion errors, together with the equilibrium equations of force and moment on the table. The transfer function method is modified in order to consider clearance changed according to the loads in the double sided hydrostatic/aerostatic bearings. Then, the analytic model for predicting the 5-DOF motion errors is proposed with the modified transfer function method. Motion errors were simulated under different loading conditions in the linear motion units using hydrostatic, aerostatic, and linear motion bearings, respectively. And the proposed analytic model was verified by comparing the estimated and measured motion errors.

Analyses of Security, Privacy Issues and Challenges for RFID System

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.6
    • /
    • pp.701-705
    • /
    • 2011
  • RFID is a widely adopted in the field of identification technology these days. Radio Frequency IDentification (RFID) has wide applications in many areas including manufacturing, healthcare, and transportation. Because limited resource RFID tags are used, various risks could threaten their abilities to provide essential services to users. A number of RFID protocols have done by researcher in order to protect against some malicious attacks and threat. Existing RFID protocols are able to resolve a number of security and privacy issues, but still unable to overcome other security & privacy related issues. In this paper, we analyses security schemes and vulnerability in RFID application. Considering this RFID security issues, we survey the security threats and open problems related to issues by means of information security and privacy. Neither a symmetric nor an asymmetric cryptographic deployment is necessarily used with light weighted algorithm in the future.

Effective Content-Based Image Retrieval Using Relevance feedback (관련성 피드백을 이용한 효과적인 내용기반 영상검색)

  • 손재곤;김남철
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.669-672
    • /
    • 2001
  • We propose an efficient algorithm for an interactive content-based image retrieval using relevance feedback. In the proposed algorithm, a new query feature vector first is yielded from the average feature vector of the relevant images that is fed back from the result images of the previous retrieval. Each component weight of a feature vector is computed from an inverse of standard deviation for each component of the relevant images. The updated feature vector of the query and the component weights are used in the iterative retrieval process. In addition, the irrelevant images are excluded from object images in the next iteration to obtain additional performance improvement. In order to evaluate the retrieval performance of the proposed method, we experiment for three image databases, that is, Corel, Vistex, and Ultra databases. We have chosen wavelet moments, BDIP and BVLC, and MFS as features representing the visual content of an image. The experimental results show that the proposed method yields large precision improvement.

  • PDF

Block Cipher Circuit and Protocol for RFID in UHF Band (UHF 대역 RFID 시스템을 위한 블록 암호 회로와 프로토콜)

  • Lee, Sang-Jin;Park, Kyung-Chang;Kim, Han-Byeo-Ri;Kim, Seung-Youl;You, Young-Gap
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.74-79
    • /
    • 2009
  • This paper proposes a hardware structure and associated finite state machine designs sharing key scheduling circuitry to enhance the performance of the block cypher algorithm, HIGHT. It also introduces an efficient protocol applicable to RFID systems comprising the HIGHT block cipher algorithm. The new HIGHT structure occupies an area size small enough to accommodate tag applications. The structure yields twice higher performance them conventional HIGHT algorithms. The proposed protocol overcomes the security vulnerability of RFID tags and thereby strengthens the security of personal information.

An Effective Cell Scheduling Algorithm for Input Queueing ATM Switch (입력단 큐잉 방식의 ATM 스위치를 위한 효율적 셀 중재 방식에 관한 연구)

  • 김용웅;원상연;박영근
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.122-131
    • /
    • 2000
  • In this paper, we propose a cell scheduling algorithm for input queueing ATM switch. The input queueing architecture is attractive for building an ultra-high speed ATM (Asynchronous Transfer Mode) switch. We proposea WMUCS (Weighted Matrix Unit Cell Scheduler) based on the MUCS which resolves HOL blocking and outputport contention. The MUCS algorithm selects an optimal set of entries as winning cells from traffic matrix (weightmatrix). Our WMUCS differs from the MUCS in generating weight matrices. This change solves the starvationproblem and it reduces the cell loss variance. The performance of the proposed algorithm is evaluated by thesimulation program written in C++. The simulation results show that the maximum throughput, the average celldelay, and the cell loss rate are significantly improved. We can see that the performance of WMUCS is excellentand the cost-effective implementation of the ATM switch using proposed cell scheduling algorithm.

  • PDF