• Title/Summary/Keyword: multiple solution

Search Result 1,478, Processing Time 0.03 seconds

Wavelength Integration Transmission Method for Hybrid-PON (Hybrid-PON을 위한 파장통합 전송방식)

  • Kim, Jin-Hee;Cheong, Ki-Tae;Chung, Hae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.11B
    • /
    • pp.1207-1215
    • /
    • 2009
  • The FTTH is known as an optimal solution to provide broadband services like IPTV and the W-PON is a good alternative to implement the FTTH. It is firstly commercialized in Korea but not widely deployed because of it's high price. In this paper, we suggest a wavelength integration method to drop the price and enhance the utilization of the W-PON. The method makes one logical channel with multiple wavelengths when the W-PON system has to accommodate a signal of which transmission rate is greater than the rate of a single wavelength. Accordingly, the system can accommodate any signal rate. We introduce a frame structure, suggest synchronization and clock recovery methods, and finally show actual applications for the Ethernet and the G-PON.

A Muti-Resolution Approach to Restaurant Named Entity Recognition in Korean Web

  • Kang, Bo-Yeong;Kim, Dae-Won
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.12 no.4
    • /
    • pp.277-284
    • /
    • 2012
  • Named entity recognition (NER) technique can play a crucial role in extracting information from the web. While NER systems with relatively high performances have been developed based on careful manipulation of terms with a statistical model, term mismatches often degrade the performance of such systems because the strings of all the candidate entities are not known a priori. Despite the importance of lexical-level term mismatches for NER systems, however, most NER approaches developed to date utilize only the term string itself and simple term-level features, and do not exploit the semantic features of terms which can handle the variations of terms effectively. As a solution to this problem, here we propose to match the semantic concepts of term units in restaurant named entities (NEs), where these units are automatically generated from multiple resolutions of a semantic tree. As a test experiment, we applied our restaurant NER scheme to 49,153 nouns in Korean restaurant web pages. Our scheme achieved an average accuracy of 87.89% when applied to test data, which was considerably better than the 78.70% accuracy obtained using the baseline system.

Analysis of Unequal Distribution of Population Income in Indonesia

  • PRAWOTO, Nano;CAHYANI, Richa Dwi
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.7
    • /
    • pp.489-495
    • /
    • 2020
  • Income inequality is a problem that is not only faced by developing countries such as Indonesia, but also developed countries. The difference lies in the proportion of an inequality that occurs and the solution to the level of difficulty experienced. Thus, this study aims to empirically analyze the unequal distribution of population income in Java island, Indonesia, by including the human development index, open unemployment rate, foreign investment, and the degree of fiscal decentralization. The research model used in this study was multiple linear regression to analyze the panel data with a fixed-effect model approach. The results of the study showed that human development index, open unemployment rate, and the degree of fiscal decentralization had a positive and significant effect on income inequality in Java island. Meanwhile, foreign investment had a negative and insignificant effect on income inequality in Java. It is because the value of the investment is more invested in the capital-intensive sector. The government is expected to be more selective in accepting foreign investments that enter the country, especially in Java, and it should be labor-intensive investments. In addition, the government has to equalize locations for foreign investment without reducing good cooperation with these foreign investors.

Distributed Genetic Algorithm using aster/slave model for the TSP (TSP를 위한 마스터/슬레이브 모델을 이용한 분산유전 알고리즘)

  • Jung-Sook Kim
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.2
    • /
    • pp.185-190
    • /
    • 2002
  • As the TSP(Traveling Salesman Problem) belongs to the class of NP-complete problems, various techniques are required for finding optimum or near optimum solution to the TSP. This paper designs a distributed genetic algorithm in order to reduce the execution time and obtain more near optimal using multi-slave model for the TSP. Especially, distributed genetic algorithms with multiple populations are difficult to configure because they are controlled by many parameters that affect their efficiency and accuracy. Among other things, one must decide the number and the size of the populations (demes), the rate of migration, the frequency of migrations, and the destination of the migrants. In this paper, I develop random dynamic migration rate that controls the size and the frequency of migrations. In addition to this, I design new migration policy that selects the destination of the migrants among the slaves

  • PDF

Computation of Zwicker's loudness and design optimization with Pad$\acute{e}$ approximation (Pad$\acute{e}$ 근사법을 이용한 Zwicker 라우드니스의 계산과 최적화)

  • Kook, Jung-Hwan;Jensen, Jakob S.;Wang, Se-Myung
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2011.10a
    • /
    • pp.279-284
    • /
    • 2011
  • The calculation of Zwicker's loudness which is needed for multiple frequency response with a fine frequency resolution using the finite element (FE) procedure usually requires significant computation time since a numerical solution must be obtained for each considered frequency. Furthermore, if the analysis is the basis for an iterative optimization procedure this approach imposes high computational cost. In this work, we present an efficient approach for obtaining Zwicker's loudness via the Pad$\acute{e}$ approximants and applying in an acoustical topology optimization procedure. The paper is focused on an efficient and accurate calculation of Zwicker's loudness, design sensitivity analysis, and the acoustical topology optimization method by using Pad$\acute{e}$ approximants. The paper compares the efficient algorithm to results obtained by a standard FEM. Comparison are made both in terms of accuracy and in terms of CPU-times needed for the calculation.

  • PDF

Performance Analysis of ZFE MUD Receiver in 2.4㎓ DSSS Unidirectional Wireless Transceiver (2.4㎓ 직접 대역확산 단방향 무선 송수신 시스템에서 ZFE 다중 사용자검출 수신기의 성능분석)

  • 이창석;정인화;김재형;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.2C
    • /
    • pp.91-99
    • /
    • 2003
  • In this paper, We analyze performance of ZFE MUD receiver in DSSS unidirectional wireless transceiver operating in 2.4㎓ ISM band and indoor environment. This system has the shortcomings that many burst error is occurred because of long term deep fade experienced by some user and impossibility of power control. Therefore, the solution to this problem is important because the performance of DS-CDMA system is guaranteed under, the perfect power control. MUD receive. which improves the performance of this system is not required to perform rigorous power control and is able to remove MAI using linear equalization. From the result of performance comparison, we show that ZFE MUD receiver is more adequate for this system than other receivers.

Approximate Multi-Objective Optimization of Robot Casting Considering Deflection and Weight (처짐과 무게를 고려한 주물 프레임의 다중목적 근사최적설계)

  • Choi, Ha-Young;Lee, Jongsoo;Park, Juno
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.21 no.6
    • /
    • pp.954-960
    • /
    • 2012
  • Nowadays, rapidly changing and unstable global economic environments request a lot of roles to engineers. In this situation, product should be designed to make more profit by cost down and to satisfy distinguished performance comparing to other competitive ones. In this research, the optimization design of the industrial robot casting will be done. The weight and deflection have to be reduced as objective functions and stress has to be constrained under some constant value. To reduce time cost, CCD (Central Composite Design) will be used to make experimental design. And RSM (Response Surface Methodology) will be taken to make regression model for objective functions and constraint function. Finally, optimization will be done with Genetic Algorithm. In this problem, the objective functions are multiple, so NSGA-II which is brilliant and efficient for such a problem will be used. For the solution quality check, the diversity between Pareto solutions will be also checked.

Classifying Rules by In-out Traffic Direction to Avoid Security Policy Anomaly

  • Kim, Sung-Hyun;Lee, Hee-Jo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.671-690
    • /
    • 2010
  • The continuous growth of attacks in the Internet causes to generate a number of rules in security devices such as Intrusion Prevention Systems, firewalls, etc. Policy anomalies in security devices create security holes and prevent the system from determining quickly whether allow or deny a packet. Policy anomalies exist among the rules in multiple security devices as well as in a single security device. The solution for policy anomalies requires complex and complicated algorithms. In this paper, we propose a new method to remove policy anomalies in a single security device and avoid policy anomalies among the rules in distributed security devices. The proposed method classifies rules according to traffic direction and checks policy anomalies in each device. It is unnecessary to compare the rules for outgoing traffic with the rules for incoming traffic. Therefore, classifying rules by in-out traffic, the proposed method can reduce the number of rules to be compared up to a half. Instead of detecting policy anomalies in distributed security devices, one adopts the rules from others for avoiding anomaly. After removing policy anomalies in each device, other firewalls can keep the policy consistency without anomalies by adopting the rules of a trusted firewall. In addition, it blocks unnecessary traffic because a source side sends as much traffic as the destination side accepts. Also we explain another policy anomaly which can be found under a connection-oriented communication protocol.

Analysis of the Behavior of Bolt Jointed Wood Connections by Applying Semi-Rigid Theory

  • Kim, Gwang-Chul;Lee, Jun-Jae
    • Journal of the Korean Wood Science and Technology
    • /
    • v.28 no.4
    • /
    • pp.72-82
    • /
    • 2000
  • Attempts were made to analyze the behavior of single and multiple-bolted connections through theoretical methods such as European yield theory, empirical approaching method, and semi-rigid theory instead of many experimental methods that have been actually inefficient and non-economical. In the case of a single-bolted connection, if accurate characteristic values of a material could be guaranteed, it would be more convenient and economical to perform the behavior analysis using a model based on the semi-rigid theory, instead of the existing complex yield model, or the empirical formula which produces errors, giving different results from the actual ones. If the variables of equation determining the load and deformation could be appropriately controlled, the analytical method in conjunction with a semi-rigid theory could be effectively applied to obtain the desirably predicted value, considering that the appropriate solution could be derived through a simpler equation using a less difficult method compared to the existing yield model. It is concluded that analytical method with semi-rigid theory can be used in the behavior analysis of bolted connection because our developed method showed excellent analysis ability of behavior until number of bolt is two. Although our analytical method has the disadvantage that the number of bolt is limited to two, it is concluded that it has the advantage than numerical method which complicated and time-consuming.

  • PDF

Fabrication and Characterization of Ag Particles by Polyol Process and Wet Chemical Process (폴리올 공정과 액상 환원 공정에 따른 은 입자 제조 및 특성 평가)

  • Yoo, Juyeon;Jang, Hyosung;Lee, Kun-Jae
    • Journal of Powder Materials
    • /
    • v.23 no.4
    • /
    • pp.297-302
    • /
    • 2016
  • Ag nanoparticles are extensively studied and utilized due to their excellent catalysis, antibiosis and optical properties. They can be easily synthesized by chemical reduction methods and it is possible to prepare particles of uniform size and high purity. These methods are divided into vapor methods and liquid phase reduction methods. In the present study, Ag particles are prepared and analyzed through two chemical reduction methods using solvents containing a silver nitrate precursor. When Ag ions are reduced using a reductant in the aqueous solution, it is possible to control the Ag particle size by controlling the formic acid ratio. In addition, in the Polyol process, Ag nanoparticles prepared at various temperatures and reaction time conditions have multiple twinned and anisotropic structures, and the particle size variation can be confirmed using field emissions scanning electron microscopy and by analyzing the UV-vis spectrum.