• Title/Summary/Keyword: WFA

Search Result 10, Processing Time 0.025 seconds

Analysis on Image Compression using Weighted Finite Automata (WFA를 이용한 이미지 압축 알고리즘에 대한 분석)

  • 엄준형;김태환
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.04a
    • /
    • pp.727-729
    • /
    • 2002
  • 본 논문에서 우리는 grey scale 영상을 weighted finite automata(WFA)로써 기술하는 두개의 알고리즘(2, 4)을 분석하였다. 또한 원영상과 WFA를 이용하여 압축된 영상간의 error를 분석하고 그 결과를 제시하였다. 구체적으로, 영상복원 tolerance $\delta$를 이용하여 찾아진 atomatone에 의해 복원된 영상과 원영상의 ι$^2$-norm의 차이가 $\delta$보다 작거나 같음을 증명하였다.

  • PDF

Wind fragility analysis of RC chimney with temperature effects by dual response surface method

  • Datta, Gaurav;Sahoo, Avinandan;Bhattacharjya, Soumya
    • Wind and Structures
    • /
    • v.31 no.1
    • /
    • pp.59-73
    • /
    • 2020
  • Wind fragility analysis (WFA) of concrete chimney is often executed disregarding temperature effects. But combined wind and temperature effect is the most critical limit state to define the safety of a chimney. Hence, in this study, WFA of a 70 m tall RC chimney for combined wind and temperature effects is explored. The wind force time-history is generated by spectral representation method. The safety of chimney is assessed considering limit states of stress failure in concrete and steel. A moving-least-squares method based dual response surface method (DRSM) procedure is proposed in WFA to alleviate huge computational time requirement by the conventional direct Monte Carlo simulation (MCS) approach. The DRSM captures the record-to-record variation of wind force time-histories and uncertainty in system parameters. The proposed DRSM approach yields fragility curves which are in close conformity with the most accurate direct MCS approach within substantially less computational time. In this regard, the error by the single-level RSM and least-squares method based DRSM can be easily noted. The WFA results indicate that over temperature difference of 150℃, the temperature stress is so pronounced that the probability of failure is very high even at 30 m/s wind speed. However, below 100℃, wind governs the design.

Strengthening Enterprise Security through the Adoption of Zero Trust Architecture - A Focus on Micro-segmentation Approach - (제로 트러스트 아키텍처 도입을 통한 기업 보안 강화 방안 - 마이크로 세그먼테이션 접근법 중심으로 -)

  • Seung-Hyun Joo;Jin-Min Kim;Dae-Hyun Kwon;Yong-Tae Shin
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.3-11
    • /
    • 2023
  • Zero Trust, characterized by the principle of "Never Trust, Always Verify," represents a novel security paradigm. The proliferation of remote work and the widespread use of cloud services have led to the establishment of Work From Anywhere (WFA) environments, where access to corporate systems is possible from any location. In such environments, the boundaries between internal and external networks have become increasingly ambiguous, rendering traditional perimeter security models inadequate to address the complex and diverse nature of cyber threats and attacks. This research paper introduces the implementation principles of Zero Trust and focuses on the Micro Segmentation approach, highlighting its relevance in mitigating the limitations of perimeter security. By leveraging the risk management framework provided by the National Institute of Standards and Technology (NIST), this paper proposes a comprehensive procedure for the adoption of Zero Trust. The aim is to empower organizations to enhance their security strategies.

Performance Evaluation of a Bandwidth Allocation Algorithm of E-PON (가입자 통신망을 위한 대역 할당 알고리즘 성능 분석)

  • Ju, Un-Gi;Lee, Sang-U;Kim, Chan;Gwon, Yul
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.10a
    • /
    • pp.361-364
    • /
    • 2005
  • As increasing the Internet traffic, many researches on access network are reported for end-to-end high-speed broadband network, where E-PON(Ethernet-Passive Active Network) is one of reasonable candidate fur the network with respect to cost and bandwidth utilization. For the high-speed access network, E-PON need an efficient bandwidth allocation method. This paper suggests a WFA(Water-Filling Allocation) algorithm for the efficient bandwidth allocation with various simulation test.

  • PDF

A Trend to Next-Generation Wireless LAN with a Data Rate over 1 Gbps (Gigabit 차세대무선랜 무선전송 기술동향)

  • Cheong, M.H.;Lee, S.K.;Chung, H.K.
    • Electronics and Telecommunications Trends
    • /
    • v.24 no.3
    • /
    • pp.54-60
    • /
    • 2009
  • 2007년 3월부터 WFA에서 시작된 "Wi-Fi $CERTIFIED^{TM}$ 802.11n draft 2.0" 인증을 통해 현재까지 180가지가 넘는 제품이 출시되고 있는 가운데 이러한 시장의 상황을 반영하듯 여러 매체를 통해 IEEE 802.11n이 핫이슈로 등장하였다. 예를 들어 $1820{\times}1080$ pixels, 24 bits/pixel, 초당 60 프레임 정도의 1080p급 비디오를 전송하려면 Gbps 이상의 전송속도를 필요로 한다. 이를 위하여 최근에 Gbps 이상의 차세대 무선랜 서비스를 위한 새로운 국제규격을 정의하려는 움직임이 IEEE 802.11 내에서 활발해지고 있다. 본 고에서는 이러한 IEEE 802.11에서의 표준화 활동을 중심으로 차세대무선랜에 대한 응용분야, 관련기술, 표준화 작업 내용에 대해 살펴보고자 한다.

A New Algorithm for Complete Coverage Path-Planning of Cleaning Robots (청소 로봇을 위한 경로 계획의 새로운 알고리즘)

  • Jiang, Liu;Son, Young-Ik;Kim, Kab-Il
    • Proceedings of the KIEE Conference
    • /
    • 2005.05a
    • /
    • pp.252-254
    • /
    • 2005
  • Completer coverage path planning requires the robot path to cover every part of the workspace, which is an essential issue in cleaning robots and many other robotic applications such as vacuum robots and painter robots. In this paper, a novel Water Flowing Algorithm (WFA) is proposed for cleaning robots to complete coverage path planning in unknown environment without obstacles. The robot covers the whole workspace just like that water fills up a container. First the robot goes to the lowest point in the workspace just like water flows to the bottom of the container. At last the robot will come to highest point in the workspace just like water overflows from the container and simultaneously the robot has covered the whole workspace. The computer simulation results show that the proposed algorithm enable the robot to plan complete coverage paths.

  • PDF

A Trend to Next-Generation Wireless LAN and Standardization Activity in IEEE 802.11 (차세대무선랜 기술 및 표준화 동향)

  • Lee, Je-Heon;Lee, Seok-Gyu
    • Electronics and Telecommunications Trends
    • /
    • v.23 no.3
    • /
    • pp.19-28
    • /
    • 2008
  • 2007년 3월부터 WFA에서 시작된 "Wi-Fi CERTIFIED(TM)802.11n Draft 2.0" 인증을 통해 현재까지 180가지가 넘는 제품이 출시되고 있는 가운데 이러한 시장의 상황을 반영하듯 여러 매체를 통해 IEEE 802.11n이 2008년 핫이슈로 등장하고 있다. 하지만 차세대무선통신의 기술적인 로드맵을 선도하고 있는 ITU-R WP8F의 IMT-Advanced에서 요구하고 있는 보행시 1Gbps까지 가능하게 하는 기술을 2010년까지 제공한다는 측면에서는 IEEE 802.11n의 성능이 못 미치는 게 사실이며, 이러한 상황을 반영해 IEEE 802.11 내부에서 IEEE 802.11n 후속으로 보행시 Gbps급의 전송 속도를 지원하는 새로운 기술에 대한 표준화 작업에 대한 논의가 꾸준히 있어 왔고, 그 결과 2007년 5월 정식으로 이를 위한 Study Group이 만들어져 작업에 들어갔다. 본 고에서는 이러한 IEEE 802.11에서의 표준화 활동을 중심으로 차세대무선랜에 대한 응용분야, 관련 기술, 표준화 작업 내용에 대해 살펴보고자 한다.

Inductances Evaluation of a Squirrel-Cage Induction Motor with Curved Dynamic Eccentricity

  • Lv, Qiang;Bao, Xiaohua;He, Yigang;Fang, Yong;Cheng, Xiaowei
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.5
    • /
    • pp.1623-1631
    • /
    • 2014
  • Eccentricity faults more or less exist in all rotating electrical machines. This paper establishes a more precise model of dynamic eccentricity (DE) in electrical machines named as curved dynamic eccentricity. It is a kind of axial unequal eccentricity which has not been investigated in detail so far but occurs in large electrical machines. The inductances of a large three-phase squirrel-cage induction machine (SCIM) under different levels of curved DE conditions are evaluated using winding function approach (WFA). These inductances include the stator self and mutual inductances, rotor self and mutual inductances, and mutual inductances between stator phases and rotor loops. A comparison is made between the calculation results under curved DE and the corresponding pure DE conditions. It indicates that the eccentricity condition will be more terrible than the monitored eccentricity based on the conventional pure DE model.

Hybrid Fuzzy Least Squares Support Vector Machine Regression for Crisp Input and Fuzzy Output

  • Shim, Joo-Yong;Seok, Kyung-Ha;Hwang, Chang-Ha
    • Communications for Statistical Applications and Methods
    • /
    • v.17 no.2
    • /
    • pp.141-151
    • /
    • 2010
  • Hybrid fuzzy regression analysis is used for integrating randomness and fuzziness into a regression model. Least squares support vector machine(LS-SVM) has been very successful in pattern recognition and function estimation problems for crisp data. This paper proposes a new method to evaluate hybrid fuzzy linear and nonlinear regression models with crisp inputs and fuzzy output using weighted fuzzy arithmetic(WFA) and LS-SVM. LS-SVM allows us to perform fuzzy nonlinear regression analysis by constructing a fuzzy linear regression function in a high dimensional feature space. The proposed method is not computationally expensive since its solution is obtained from a simple linear equation system. In particular, this method is a very attractive approach to modeling nonlinear data, and is nonparametric method in the sense that we do not have to assume the underlying model function for fuzzy nonlinear regression model with crisp inputs and fuzzy output. Experimental results are then presented which indicate the performance of this method.

Development of a Stock Trading System Using M & W Wave Patterns and Genetic Algorithms (M&W 파동 패턴과 유전자 알고리즘을 이용한 주식 매매 시스템 개발)

  • Yang, Hoonseok;Kim, Sunwoong;Choi, Heung Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.63-83
    • /
    • 2019
  • Investors prefer to look for trading points based on the graph shown in the chart rather than complex analysis, such as corporate intrinsic value analysis and technical auxiliary index analysis. However, the pattern analysis technique is difficult and computerized less than the needs of users. In recent years, there have been many cases of studying stock price patterns using various machine learning techniques including neural networks in the field of artificial intelligence(AI). In particular, the development of IT technology has made it easier to analyze a huge number of chart data to find patterns that can predict stock prices. Although short-term forecasting power of prices has increased in terms of performance so far, long-term forecasting power is limited and is used in short-term trading rather than long-term investment. Other studies have focused on mechanically and accurately identifying patterns that were not recognized by past technology, but it can be vulnerable in practical areas because it is a separate matter whether the patterns found are suitable for trading. When they find a meaningful pattern, they find a point that matches the pattern. They then measure their performance after n days, assuming that they have bought at that point in time. Since this approach is to calculate virtual revenues, there can be many disparities with reality. The existing research method tries to find a pattern with stock price prediction power, but this study proposes to define the patterns first and to trade when the pattern with high success probability appears. The M & W wave pattern published by Merrill(1980) is simple because we can distinguish it by five turning points. Despite the report that some patterns have price predictability, there were no performance reports used in the actual market. The simplicity of a pattern consisting of five turning points has the advantage of reducing the cost of increasing pattern recognition accuracy. In this study, 16 patterns of up conversion and 16 patterns of down conversion are reclassified into ten groups so that they can be easily implemented by the system. Only one pattern with high success rate per group is selected for trading. Patterns that had a high probability of success in the past are likely to succeed in the future. So we trade when such a pattern occurs. It is a real situation because it is measured assuming that both the buy and sell have been executed. We tested three ways to calculate the turning point. The first method, the minimum change rate zig-zag method, removes price movements below a certain percentage and calculates the vertex. In the second method, high-low line zig-zag, the high price that meets the n-day high price line is calculated at the peak price, and the low price that meets the n-day low price line is calculated at the valley price. In the third method, the swing wave method, the high price in the center higher than n high prices on the left and right is calculated as the peak price. If the central low price is lower than the n low price on the left and right, it is calculated as valley price. The swing wave method was superior to the other methods in the test results. It is interpreted that the transaction after checking the completion of the pattern is more effective than the transaction in the unfinished state of the pattern. Genetic algorithms(GA) were the most suitable solution, although it was virtually impossible to find patterns with high success rates because the number of cases was too large in this simulation. We also performed the simulation using the Walk-forward Analysis(WFA) method, which tests the test section and the application section separately. So we were able to respond appropriately to market changes. In this study, we optimize the stock portfolio because there is a risk of over-optimized if we implement the variable optimality for each individual stock. Therefore, we selected the number of constituent stocks as 20 to increase the effect of diversified investment while avoiding optimization. We tested the KOSPI market by dividing it into six categories. In the results, the portfolio of small cap stock was the most successful and the high vol stock portfolio was the second best. This shows that patterns need to have some price volatility in order for patterns to be shaped, but volatility is not the best.