• Title/Summary/Keyword: User-defined Model

Search Result 412, Processing Time 0.033 seconds

Event date model: a robust Bayesian tool for chronology building

  • Philippe, Lanos;Anne, Philippe
    • Communications for Statistical Applications and Methods
    • /
    • v.25 no.2
    • /
    • pp.131-157
    • /
    • 2018
  • We propose a robust event date model to estimate the date of a target event by a combination of individual dates obtained from archaeological artifacts assumed to be contemporaneous. These dates are affected by errors of different types: laboratory and calibration curve errors, irreducible errors related to contaminations, and taphonomic disturbances, hence the possible presence of outliers. Modeling based on a hierarchical Bayesian statistical approach provides a simple way to automatically penalize outlying data without having to remove them from the dataset. Prior information on individual irreducible errors is introduced using a uniform shrinkage density with minimal assumptions about Bayesian parameters. We show that the event date model is more robust than models implemented in BCal or OxCal, although it generally yields less precise credibility intervals. The model is extended in the case of stratigraphic sequences that involve several events with temporal order constraints (relative dating), or with duration, hiatus constraints. Calculations are based on Markov chain Monte Carlo (MCMC) numerical techniques and can be performed using ChronoModel software which is freeware, open source and cross-platform. Features of the software are presented in Vibet et al. (ChronoModel v1.5 user's manual, 2016). We finally compare our prior on event dates implemented in the ChronoModel with the prior in BCal and OxCal which involves supplementary parameters defined as boundaries to phases or sequences.

Punching Fracture Experiments and Simulations of Unstiffened and Stiffened Panels for Ships and Offshore Structures

  • Park, Sung-Ju;Choung, Joonmo
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.3
    • /
    • pp.155-166
    • /
    • 2020
  • Ductile fracture prediction is critical for the reasonable damage extent assessment of ships and offshore structures subjected to accidental loads, such as ship collisions and groundings. A fracture model combining the Hosford-Coulomb ductile fracture model with the domain of solid-to-shell equivalence model (HC-SDDE), was used in fracture simulations based on shell elements for the punching fracture experiments of unstiffened and stiffened panels. The flow stress and ductile fracture characteristics of JIS G3131 SPHC steel were identified through tension tests for flat bar, notched tension bar, central hole tension bar, plane strain tension bar, and pure shear bar specimens. Punching fracture tests for unstiffened and stiffened panels are conducted to validate the presented HC-DSSE model. The calibrated fracture model is implemented in a user-defined material subroutine. The force-indentation curves and final damage extents obtained from the simulations are compared with experimental results. The HC-DSSE fracture model provides reasonable estimations in terms of force-indentation paths and residual damage extents.

A Study on Self efficacy Difference between User and Nonuser of Smartphone (자기 효능감에 의한 스마트폰 사용의도 연구)

  • Lee, JangHyung;Kim, Jong-Won;Sung, Baek-Chun;Choi, Young-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.2
    • /
    • pp.157-164
    • /
    • 2013
  • Self efficacy is a term used in psychology, roughly corresponding to a person's belief in their own competence. It has been defined as the belief that one is capable of performing in a certain manner to attain certain goals. It is believed that our personalized ideas of self-efficacy affect our social interactions in almost every way. Understanding how to foster the development of self-efficacy is a vitally important goal for positive psychology because it can lead to living a more productive and happy life. The objective of this study is to show difference of the relationship between user and non-user in smartphone by self efficacy. For this purpose, we propose a research model which consists of 3type' self efficacy. For empirical test of this model, the sample data is collected from employee in a company and divided into two groups by user and nonuser. By multi-group analysis, we show two groups are different from each other in the relationship between user and nonuser of smartphone. Results show difference of the relationship smartphone user and non-user's self-efficacy(self-control self-efficiacy and problem difficulty preference).

Gaze Mirroring-based Intelligent Information System for Making User's Latent Interest (사용자의 잠재적 흥미를 인식하기 위한 주시 모방 모델 기반의 지능형 정보 시스템)

  • Park, Hye-Sun;Hirayama, Takatsugu;Matsuyama, Takashi
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.37-54
    • /
    • 2010
  • The information system that preserves and presents information collections, records, processes, retrievals, is applied in various fields recently and is supporting man's many activities. Conventional information systems are based on the reactive interaction model. Such reactive systems respond to only specific instructions, i.e. the defined commands, from the user. To go beyond the reactive interaction, it is necessary that the interactive dynamic interaction based information system which understands human's action and intention autonomously and then provides sensible information adapted to the user. Therefore, we propose a Gaze Mirroring-based intelligent information system for making user's latent interest using the internal state estimation methods based on the interactive dynamic interaction. Then, the proposed Gaze Mirroring method is that an anthropomorphic agent(avatar) actively established the joint attention with the user by imitating user's eye-gaze behavior. We verify that the Gaze Mirroring can elicit the user's behavior reflecting the latent interestand contribute to improving the accuracy of interest estimation. We also have confidence that the Gaze Mirroring promotes the self-awareness of interest. Such a Gaze Mirroring-based intelligent information system also provides suitable information to user by making user's latent interest using the internal state estimation.

Design of an Algorithm for the Validation of SCL in Digital Substations

  • Jang, B.T.;Alidu, A.;Kim, N.D.
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.3 no.2
    • /
    • pp.89-97
    • /
    • 2017
  • The substation is a critical node in the power network where power is transformed in the power generation, transmission and distribution system. The IEC 61850 is a global standard which proposes efficient substation automation by defining interoperable communication and data modelling techniques. In order to achieve this level of interoperability and automation, the IEC 61850 (Part 6) defines System Configuration description Language (SCL). The SCL is an XML based file format for defining the abstract model of primary and secondary substation equipment, communications systems and also the relationship between them. It enables the interoperable exchange of data during substation engineering by standardizing the description of applications at different stages of the engineering process. To achieve the seamless interoperability, multi-vendor devices are required to adhere completely to the IEC 61850. This paper proposes an efficient algorithm required for verifying the interoperability of multi-vendor devices by checking the adherence of the SCL file to specifications of the standard. Our proposed SCL validation algorithm consists of schema validation and other functionalities including information model validation using UML data model, the Vendor Defined Extension model validation, the User Defined Rule validation and the IED Engineering Table (IET) consistency validation. It also integrates the standard UCAIUG (Utility Communication Architecture International Users Group) Procedure validation for quality assurance testing. Our proposed algorithm is not only flexible and efficient in terms of ensuring interoperable functionality of tested devices, it is also convenient for use by system integrators and test engineers.

A proposal for an approach for meso scale modeling for concrete based on rigid body spring model

  • Zhao, Chao;Shi, Zheng;Zhong, Xingu
    • Computers and Concrete
    • /
    • v.27 no.3
    • /
    • pp.283-295
    • /
    • 2021
  • Existing meso-scale models of concrete need to refine the mesh grids of aggregate and cement mortar, which may greatly reduce the computational efficiency. To overcome this problem, a novel meso-scale modeling strategy, which is based on rigid body spring method and Voronoi diagram, is proposed in this study to establish the meso-scale model of concrete. Firstly, establish numerical aggregate models according to user-defined programs. Circle aggregates are adopted due to their high efficiency in generation and packing process, and the grading of aggregate are determined according to the distribution curve proposed by Full and Thompson; Secondly, extract the centroids of aggregates, and then develop the Voronoi diagram in which aggregate centroids are defined as initial scatters; Finally, establish the rigid body spring model for concrete based on the Voronoi diagram. Aggregates are represented by rigid blocks, and assumed to be unbreakable. Cement mortar is concentrated into the interface between adjacent blocks and represented by two uniform springs. The number of grids is consistent with that of aggregates in specimens, and no mesh-refinement of aggregates and cement mortar is required. The accuracy and efficiency of the proposed modeling strategy are firstly identified by comparing the numerical results with the experimental ones, and then the applicability of the proposed strategy with different volume percentage occupied by aggregates is investigated.

Robot's Emotion Generation Model based on Generalized Context Input Variables with Personality and Familiarity (성격과 친밀도를 지닌 로봇의 일반화된 상황 입력에 기반한 감정 생성)

  • Kwon, Dong-Soo;Park, Jong-Chan;Kim, Young-Min;Kim, Hyoung-Rock;Song, Hyunsoo
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.3 no.2
    • /
    • pp.91-101
    • /
    • 2008
  • For a friendly interaction between human and robot, emotional interchange has recently been more important. So many researchers who are investigating the emotion generation model tried to naturalize the robot's emotional state and to improve the usability of the model for the designer of the robot. And also the various emotion generation of the robot is needed to increase the believability of the robot. So in this paper we used the hybrid emotion generation architecture, and defined the generalized context input of emotion generation model for the designer to easily implement it to the robot. And we developed the personality and loyalty model based on the psychology for various emotion generation. Robot's personality is implemented with the emotional stability from Big-Five, and loyalty is made of familiarity generation, expression, and learning procedure which are based on the human-human social relationship such as balance theory and social exchange theory. We verify this emotion generation model by implementing it to the 'user calling and scheduling' scenario.

  • PDF

Application of the QUAL2Kw model to a Polluted River for Automatic Calibration and Sensitivity Analysis of Genetic Algorithm Parameters (오염하천의 자동보정을 위한 QUAL2Kw 모형의 적용과 유전알고리즘의 매개변수에 관한 민감도분석)

  • Cho, Jae-Heon
    • Journal of Environmental Impact Assessment
    • /
    • v.20 no.3
    • /
    • pp.357-365
    • /
    • 2011
  • The QUAL2K has the same basic characteristics as the QUAL2E model, which has been widely used in stream water quality modeling; in QUAL2K, however, various functions are supplemented. The QUAL2Kw model uses a genetic algorithm(GA) for automatic calibration of QUAL2K, and it can search for optimum water quality parameters efficiently using the calculation results of the model. The QUAL2Kw model was applied to the Gangneung Namdaecheon River on the east side of the Korean Peninsula. Because of the effluents from the urban area, the middle and lower parts of the river are more polluted than the upper parts. Moreover, the hydraulic characteristics differ between the lower and upper parts of rivers. Thus, the river reaches were divided into seven parts, auto-calibration for the multiple reaches was performed using the function of the user-defined automatic calibration of the rates worksheets. Because GA parameters affect the optimal solution of the model, the impact of the GA parameters used in QUAL2Kw on the fitness of the model was analyzed. Sensitivity analysis of various factors, such as population size, crossover probability, crossover mode, strategy for mutation and elitism, mutation rate, and reproduction plan, were performed. Using the results of this sensitivity analysis, the optimum GA parameters were selected to achieve the best fitness value.

Modeling and Evaluating Information Diffusion for Spam Detection in Micro-blogging Networks

  • Chen, Kan;Zhu, Peidong;Chen, Liang;Xiong, Yueshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3005-3027
    • /
    • 2015
  • Spam has become one of the top threats of micro-blogging networks as the representations of rumor spreading, advertisement abusing and malware distribution. With the increasing popularity of micro-blogging, the problems will exacerbate. Prior detection tools are either designed for specific types of spams or not robust enough. Spammers may escape easily from being detected by adjusting their behaviors. In this paper, we present a novel model to quantitatively evaluate information diffusion in micro-blogging networks. Under this model, we found that spam posts differ wildly from the non-spam ones. First, the propagations of non-spam posts mostly result from their followers, but those of spam posts are mainly from strangers. Second, the non-spam posts relatively last longer than the spam posts. Besides, the non-spam posts always get their first reposts/comments much sooner than the spam posts. With the features defined in our model, we propose an RBF-based approach to detect spams. Different from the previous works, in which the features are extracted from individual profiles or contents, the diffusion features are not determined by any single user but the crowd. Thus, our method is more robust because any single user's behavior changes will not affect the effectiveness. Besides, although the spams vary in types and forms, they're propagated in the same way, so our method is effective for all types of spams. With the real data crawled from the leading micro-blogging services of China, we are able to evaluate the effectiveness of our model. The experiment results show that our model can achieve high accuracy both in precision and recall.

Provably Secure Tree-Based Centralized Group Key Distribution: Security Model and Modular Approach (증명 가능한 트리기반 중앙 분배 방식의 그룹키 기법: 안전성 모델 및 변환모듈)

  • Kim Hyun-Jeong;Lee Su-Mi;Lee Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.69-78
    • /
    • 2004
  • During the last decade, security models have been defined for two- and three-parity key exchange protocols. Currently there is a growing research interest in security models for group key management schemes. While various security models and provably secure protocols have been proposed for distributed group key exchange schemes, no results are hewn for centralized group key distribution schemes in spite of their theoretical and practical importance. We describe security requirements and a formal security model for centralized group key distribution scheme: we define the model on the channel controlled by adversaries with the ability of strong user corruption. In the security model, we propose a conversion module which can transform centralized tree-based group key distribution schemes in the literature to provably secure centralized tree-based group key distribution schemes.