• Title/Summary/Keyword: multiple solution

Search Result 1,471, Processing Time 0.024 seconds

Integrated Procedure of Self-Organizing Map Neural Network and Case-Based Reasoning for Multivariate Process Control (자기조직화 지도 신경망과 사례기반추론을 이용한 다변량 공정관리)

  • 강부식
    • Journal of Intelligence and Information Systems
    • /
    • v.9 no.1
    • /
    • pp.53-69
    • /
    • 2003
  • Many process variables in modem manufacturing processes have influence on quality of products with complicated relationships. Therefore, it is necessary to control multiple quality variables in order to monitor abnormal signals in the processes. This study proposes an integrated procedure of self-organizing map (SOM) neural network and case-based reasoning (CBR) for multivariate process control. SOM generates patterns of quality variables. The patterns are compared with the reference patterns in order to decide whether their states are normal or abnormal using the goodness-of-fitness test. For validation, it generates artificial datasets consisting of six patterns, normal and abnormal patterns. Experimental results show that the abnormal patterns can be detected effectively. This study also shows that the CBR procedure enables to keep Type 2 error at very low level and reduce Type 1 error gradually, and then the proposed method can be a solution fur multivariate process control.

  • PDF

Implementation of an Ethernet Adapter for the G-PON TC Layer (G-PON TC 계층을 위한 이더넷 정합기의 구현)

  • Chung, Hae;Ahn, Eu-Kwang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.5B
    • /
    • pp.429-436
    • /
    • 2011
  • The G-PON is an efficient solution to implement the FTTH and have GEM frame to accomodate various protocols like Ethernet frames, IP packets, and TDM signals. Above all, the Ethernet is one of the most widely used 2nd layer protocol in the campus, the subscriber access, and the carrier service. So G-PON system has to provide an Ethernet interface with top priority. In this paper, we implement a gigabit Ethernet adapter based on Ethernet over GEM in the ITU-T G.984.3 to accommodate Ethernet protocol in the G-PON TC chip. The adapter maps each Ethernet frame to a single or multiple GEM frames and has several functions including generation of the GEM header, encapsulation of frames and the SAR. In particular, the adapter have converter (LUT) MAC address to port-ID which is a key to identify logical connections though it is not defined in specification but important. We implement the adapter with a FPGA and verify the functions of segmentation and reassembling, MAC address learning, and throughput with the logic analyzer and the Ethernet analyzer.

AN EXPERIMENTAL STUDY ON THE SEALING ABILITY OF DIFFERENT ROOT CANAL OBTURATION METHODS (각종 근관충전법의 치근단 폐쇄효과에 관한 연구)

  • Hur, Seung-Myun;Cho, Young-Gon
    • Restorative Dentistry and Endodontics
    • /
    • v.16 no.2
    • /
    • pp.143-154
    • /
    • 1991
  • The purpose of this study was to evaluate the sealing ability of five obturation methods in conjunction with sealer. Fifty extracted upper and lower anterior teeth were selected and the access cavities were prepared lingually with a round bur. The working length was determined with a #15K file, and the root canals were instrumented with a #40K file 1mm short of the apical foramen. The apical third of root canal was flared by step-back technique and the coronal two thirds of root canal using #2 - 3 Gates Glidden drills. And then, the teeth were randomly assigned to five groups of 10 teeth each. A thin coat of Tubliseal was placed into the canal into the canal using the # 35 reamer and the canals were filled by lateral condensation, vertical condensation, ultrasonic activated lateral condensation, ULTRAFIL injecting, and McSpadden compaction methods. All teeth were stored in 100 % relative humidity at 31c for 48 hours. The roots were suspended in 2 % methylene blue solution for 48 hours, left to dry for 24 hours and then, half side of root was removed longitudinally using the fissure bur. A Boley gauge wes used to measure the distance, to the nearest 0.1mm, from the apical foramen to the most coronal level of dye penetration. The measurement of dye penetration was statistically compared by Duncan's multiple range test The results were as follows 1. Ultrasonic group showed the best sealing ability among the all experimental groups, but there were statistically no significant difference in the sealing ability between ultrasonic group and vertical condensation group. 2. There were no statistically significant difference in the sealing ability among the lateral, vertical, and ultrasonic groups. 3. McSpadden group showed the worst sealing ability among the all exprimental groups.

  • PDF

Development of the Bicycle Level of Service Model from the User's Perspective (이용자 중심의 자전거도로 서비스수준 모형 개발)

  • Gang, Gyeong-U;Lee, Gyeo-Ra
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.3
    • /
    • pp.75-84
    • /
    • 2010
  • South Korea is seeking for a solution to the problems of traffic congestion and environment: the increase of bicycle use. However many people feel that using a bicycle is inconvenient. Therefore, we developed bicycle level of service model from the user's perspective so that the existing bicycle roads can be evaluated and improved. The purpose of this paper is to develop a bicycle level of service (LOS) model by considering user's satisfaction and multiple factors that affect bicycle LOS. Bicycle LOS criteria is estimated by applying an ordered probit model, which is suitable for research relating to choice. In addition, we determine the bicycle LOS using three-level(A-C) LOS structure from the user position considering the satisfaction level that people can distinguish clearly. The results show that the bicycle LOS is largely determined by the bicycle road width. Other factors are involved as well, including bicycle road type, the number of access and egress point on the bicycle road corridor, pedestrian volume, and frequency of meetings.

An Optimal Pricing and Inventory control for a Commodity with Price and Sales-period Dependent Demand Pattern

  • Sung, Chang-Sup;Yang, Kyung-Mi;Park, Sun-Hoo
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2005.05a
    • /
    • pp.904-913
    • /
    • 2005
  • This paper deals with an integrated problem of inventory control and dynamic pricing strategies for a commodity with price and sales-period dependent demand pattern, where a seller and customers have complete information of each other. The problem consists of two parts; one is each buyer's benefit problem which makes the best decision on price and time for buyer to purchase items, and the other one is a seller's profit problem which decides an optimal sales strategy concerned with inventory control and discount schedule. The seller's profit function consists of sales revenue and inventory holding cost functions. The two parts are closely related into each other with some related variables, so that any existing general solution methods can not be applied. Therefore, a simplified model with single seller and two customers in considered first, where demand for multiple units is allowed to each customer within a time limit. Therewith, the model is generalized for a n-customer-classes problem. To solve the proposed n-customer-set problem, a dynamic programming algorithm is derived. In the proposed dynamic programming algorithm, an intermediate profit function is used, which is computed in case of a fixed initial inventory level and then adjusted in searching for an optimal inventory level. This leads to an optimal sales strategy for a seller, which can derive an optimal decision on both an initial inventory level and a discount schedule, in $O(n^2)$ time. This result can be used for some extended problems with a small customer set and a short selling period, including sales strategy for department stores, Dutch auction for items with heavy holding cost, open tender of materials, quantity-limited sales, and cooperative buying in the on/off markets.

  • PDF

Maximum Likelihood Based Doppler Estimation and Target Detection with Pulse Code Modulated Waveform (ML 기법을 이용한 PCM 파형에서의 표적 탐지 및 도플러 추정)

  • Yang, Eunjung;Lee, Heeyoung;Song, Junho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.12
    • /
    • pp.1275-1283
    • /
    • 2014
  • Characteristics of PCM(Pulse Code Modulation) waveform are suitable for target tracking. Especially in terms of dwell time, it is desirable to detect and track a moving target with the single PCM waveform for a MFR(Multi-Function Radar) which carries out multiple tasks. General PCM waveform processing includes Doppler filter bank caused by the characteristics of ambiguity function, to detect target and estimate Doppler frequency, which induces hardware burden and computational complexity. We propose a ML(Maximum Likelihood) based Doppler estimator for a PCM waveform, which is the closed form suboptimal solution and computationally efficient to estimate Doppler frequency and detect a moving target.

A Study on a 4-Stage Phased Defense Method to Defend Cloud Computing Service Intrusion (Cloud Computing 서비스 침해방어를 위한 단계별 4-Stage 방어기법에 관한 연구)

  • Seo, Woo-Seok;Park, Dea-Woo;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.5
    • /
    • pp.1041-1051
    • /
    • 2012
  • Attack on Cloud Computing, an intensive service solution using network infrastructure recently released, generates service breakdown or intrusive incidents incapacitating developmental platforms, web-based software, or resource services. Therefore, it is needed to conduct research on security for the operational information of three kinds of services (3S': laaS, PaaS, SaaS) supported by the Cloud Computing system and also generated data from the illegal attack on service blocking. This paper aims to build a system providing optimal services as a 4-stage defensive method through the test on the attack and defense of Cloud Computing services. It is a defense policy that conducts 4-stage, orderly and phased access control as follows: controlling the initial access to the network, controlling virtualization services, classifying services for support, and selecting multiple routes. By dispersing the attacks and also monitoring and analyzing to control the access by stage, this study performs defense policy realization and analysis and tests defenses by the types of attack. The research findings will be provided as practical foundational data to realize Cloud Computing service-based defense policy.

Lifetime Maximizing Routing Algorithm for Multi-hop Wireless Networks (다중-홉 무선 네트워크 환경에서 수명 최대화를 위한 라우팅 알고리즘)

  • Lee, Keon-Taek;Han, Seung-Jae;Park, Sun-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.292-300
    • /
    • 2008
  • In multi-hop wireless networks like Wireless Mesh Networks (WMN) and Wireless Sensor Networks (WSN), nodes often rely on batteries as their power source. In such cases, energy efficient routing is critical. Many schemes have been proposed to find the most energy efficient path, but most of them do not achieve optimality on network lifetime. Once found, the energy efficient path is constantly used such that the energy of the nodes on the path is depleted quickly. As an alternative, the approaches that dynamically change the path at run time have also been proposed. These approaches, however, involve high overhead of establishing multiple paths. In this paper, we first find an optimal multi-path routing using LP. Then we apply an approximation algorithm to derive a near-optimal solution for single-path routing. We compare the performance of the proposed scheme with several other existing algorithms through simulation.

Partially Evaluated Genetic Algorithm based on Fuzzy Clustering (퍼지 클러스터링 기반의 국소평가 유전자 알고리즘)

  • Yoo Si-Ho;Cho Sung-Bae
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.9
    • /
    • pp.1246-1257
    • /
    • 2004
  • To find an optimal solution with genetic algorithm, it is desirable to maintain the population sire as large as possible. In some cases, however, the cost to evaluate each individual is relatively high and it is difficult to maintain large population. To solve this problem we propose a novel genetic algorithm based on fuzzy clustering, which considerably reduces evaluation number without any significant loss of its performance by evaluating only one representative for each cluster. The fitness values of other individuals are estimated from the representative fitness values indirectly. We have used fuzzy c-means algorithm and distributed the fitness using membership matrix, since it is hard to distribute precise fitness values by hard clustering method to individuals which belong to multiple groups. Nine benchmark functions have been investigated and the results are compared to six hard clustering algorithms with Euclidean distance and Pearson correlation coefficients as fitness distribution method.

Parameter-setting-free algorithm to determine the individual sound power levels of noise sources (적응형 파라미터 알고리즘을 이용한 개별 소음원의 음향파워 예측 연구)

  • Mun, Sungho
    • International Journal of Highway Engineering
    • /
    • v.20 no.3
    • /
    • pp.59-64
    • /
    • 2018
  • PURPOSES : We propose a parameter-setting-free harmony-search (PSF-HS) algorithm to determine the individual sound power levels of noise sources in the cases of industrial or road noise environment. METHODS :In terms of using methods, we use PSF-HS algorithm because the optimization parameters cannot be fixed through finding the global minimum. RESULTS:We found that the main advantage of the PSF-HS heuristic algorithm is its ability to find the best global solution of individual sound power levels through a nonlinear complex function, even though the parameters of the original harmony-search (HS) algorithm are not fixed. In an industrial and road environment, high noise exposure is harmful, and can cause nonauditory effects that endanger worker and passenger safety. This study proposes the PSF-HS algorithm for determining the PWL of an individual machine (or vehicle), which is a useful technique for industrial (or road) engineers to identify the dominant noise source in the workplace (or road field testing case). CONCLUSIONS : This study focuses on providing an efficient method to determine sound power levels (PWLs) and the dominant noise source while multiple machines (or vehicles) are operating, for comparison with the results of previous research. This paper can extend the state-of-the-art in a heuristic search algorithm to determine the individual PWLs of machines as well as loud machines (or vehicles), based on the parameter-setting-free harmony-search (PSF-HS) algorithm. This algorithm can be applied into determining the dominant noise sources of several vehicles in the cases of road cross sections and congested housing complex.