• Title/Summary/Keyword: systems-theory

Search Result 5,367, Processing Time 0.027 seconds

Structure Optimization of Neural Networks using Rough Set Theory (러프셋 이론을 이용한 신경망의 구조 최적화)

  • 정영준;이동욱;심귀보
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1998.03a
    • /
    • pp.49-52
    • /
    • 1998
  • Neural Network has good performance in pattern classification, control and many other fields by learning ability. However, there is effective rule or systematic approach to determine optimal structure. In this paper, we propose a new method to find optimal structure of feed-forward multi-layer neural network as a kind of pruning method. That eliminating redundant elements of neural network. To find redundant elements we analysis error and weight changing with Rough Set Theory, in condition of executing back-propagation leaning algorithm.

  • PDF

Modeling and simulation of partially delaminated composite beams

  • Mahieddine, A.;Ouali, M.;Mazouz, A.
    • Steel and Composite Structures
    • /
    • v.18 no.5
    • /
    • pp.1119-1127
    • /
    • 2015
  • A finite-element model for beams with partially delaminated layers is used to investigate their behavior. In this formulation account is taken of lateral strains and the first-order shear deformation theory is used. Both displacement continuity and force equilibrium conditions are imposed between the regions with and without delamination. Numerical results of the present model are presented and its performance is evaluated for static and dynamic problems.

A Study on Design of Parser Using GPSG (일반화 구구조 문법(GPSG)을 이용한 구문 해석기의 설계)

  • 우요섭;최병욱
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.12
    • /
    • pp.1975-1983
    • /
    • 1989
  • Implementing the linguistic theories on computer, we resolve the problems for restrictions of computer and increase processing efficiency for systemization not for linguistic theory itself. Thus, we modify the grammatical theory to be applied to systems. This paper reports the various problems about constructing dictionaies, defining rules, and appling universal principles and metarules, which is caused to implement the systems based on GPSG. In semantic interpretations, logical expressions which correspond Montague grammar are acquired, and we make a rule connect with several logical expressions. And we show the efficiency of the this method through implementing parser.

  • PDF

Relations between Resonance Structures in Photoionization Spectra in Three-Channel-Systems Studied by Multichannel Quantum Defect Theory

  • Lee, Chun-Woo
    • Bulletin of the Korean Chemical Society
    • /
    • v.33 no.7
    • /
    • pp.2168-2176
    • /
    • 2012
  • Relations between fitted parameters for photoionization spectra both below and above the thresholds in the systems involving 3 channels are obtained using phase-shifted version of the multichannel quantum-defect theory. Analytical continuation of the photoionization cross sections in the form of ${\langle}{\sigma}_{below}{\rangle}_{v_{below}}={\sigma}_{above}$ examined using several representations.

EXISTENCE THEOREMS OF BOUNDARY VALUE PROBLEMS FOR FOURTH ORDER NONLINEAR DISCRETE SYSTEMS

  • YANG, LIANWU
    • Journal of applied mathematics & informatics
    • /
    • v.37 no.5_6
    • /
    • pp.399-410
    • /
    • 2019
  • In the manuscript, we concern with the existence of solutions of boundary value problems for fourth order nonlinear discrete systems. Some criteria for the existence of at least one nontrivial solution of the problem are obtained. The proof is mainly based upon the variational method and critical point theory. An example is presented to illustrate the main result.

Use of Fuzzy Set Theory in the Inspection of Transmission Lines of Nuclear Installations

  • Durpel, L.Van-den;D.Ruan;P.D hondt
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1066-1069
    • /
    • 1993
  • The presence of older installations, in particular nuclear facilities, demands extra studies concerning the safety evaluation of those installations. One of the aspects to deal with is the safety of the several transmission lines in a nuclear installation, for instance the safety of control, safety against fire, etc.. . This paper investigates the use of fuzzy set theory in the inspection of transmission lines of nuclear installations at SCK/CEN, Belgium.

  • PDF

A Study on Factors Influencing Privacy Decision Making on the Internet: Focus on Dual-Calculus Model (온라인 환경에서 프라이버시 의사결정에 영향을 미치는 요인에 관한 연구: 이중계산모델을 중심으로)

  • Kim, Sanghee;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.25 no.3
    • /
    • pp.197-215
    • /
    • 2016
  • Purpose This study aims to investigate the factors that influence decision making in relation to providing personal information on the internet with respect to the integration of the privacy calculus theory and protection motivation theory based on the dual-calculus model proposed by Li(2012). Design/methodology/approach The privacy calculus theory and protection motivation theory have been applied to explain privacy behavior to a certain degree but few studies have been conducted to explain privacy behavior based on the integration of these two theories. Although Li(2012) proposed the dual-calculus model, he only proposed its framework and did not carry out an empirical study. Therefore, this study proposes a research model that integrates these two theories and examines the relationship between the two theories through an empirical study. Findings According to the results of empirical analysis, it was found that all relations have statistically significant explanatory power except the relation between coping appraisal and privacy risk in the risk calculus process. Thus, the results verify that external threat played a decisive role in increasing the risk level of a consumer's privacy. It can be discussed the ways to enhance the privacy behavior of consumer on the internet through these findings.

Integration rough set theory and case-base reasoning for the corporate credit evaluation (러프집합이론과 사례기반추론을 결합한 기업신용평가 모형)

  • Roh, Tae-Hyup;Yoo Myung-Hwan;Han In-Goo
    • The Journal of Information Systems
    • /
    • v.14 no.1
    • /
    • pp.41-65
    • /
    • 2005
  • The credit ration is a significant area of financial management which is of major interest to practitioners, financial and credit analysts. The components of credit rating are identified decision models are developed to assess credit rating an the corresponding creditworthiness of firms an accurately ad possble. Although many early studies demonstrate a priori which of these techniques will be most effective to solve a specific classification problem. Recently, a number of studies have demonstrate that a hybrid model integration artificial intelligence approaches with other feature selection algorthms can be alternative methodologies for business classification problems. In this article, we propose a hybrid approach using rough set theory as an alternative methodology to select appropriate attributes for case-based reasoning. This model uses rough specific interest lies in lthe stable combining of both rough set theory to extract knowledge that can guide dffective retrevals of useful cases. Our specific interest lies in the stable combining of both rough set theory and case-based reasoning in the problem of corporate credit rating. In addition, we summarize backgrounds of applying integrated model in the field of corporate credit rating with a brief description of various credit rating methodologies.

  • PDF

Identifying the Determinants and the Dynamic Characteristics of ICT Non-Use: A Qualitative Study by Grounded Theory Methodolgy (정보기술 비사용의 결정요인과 동태적 성격의 규명: 근거이론방법론에 의한 질적 연구)

  • Lee, Woong-Kyu
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.1-20
    • /
    • 2018
  • Purpose The purpose of this study is to identify the determinants of non-use and the dynamic nature of non-use by the qualitative research methodology, grounded theory methodology, as part of identifying the nature of non-use. Design/methodology/approach We applied the grounded theory methodology to a total of 23 college students, including non-users who are not currently using them, users with low intention to use them, and users with high intention to use. We extracted the codes related to the use and proposed the non-use dynamics conversion process based on the coding results. Findings First, the use of information technology can also promote the frequency of use, but can also lead to the use of negative attitudes which would fall in the state of non-use. Second, the user may have both positive and negative attitudes toward the current information technology. Third, if usage is dominated by habits, it is not so easy to change persistent use into an unused state. Fourth, factors that determine the use of specific information technology can be a factor in determining nonuse. This study has contributed to understand the essence of non - use as well as the nature of use, overcoming limitations of quantitative research approach and confirming possibility of grounded theory method in information system research.

Game Theory-Based Vulnerability Quantification Method Using Attack Tree (Attack Tree를 활용한 Game Theory 기반 보안 취약점 정량화 기법)

  • Lee, Seokcheol;Lee, Sang-Ha;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.259-266
    • /
    • 2017
  • In modern society, IT technology based systems are introduced and operated in various fields such as home, industry, and finance. To ensure the safety of society, IT systems introduced throughout society should be protected from cyber attacks. Understanding and checking the current security status of the system is one of the important tasks to response effectively against cyber attacks. In this paper, we analyze limitations of Game Theory and Attack Tree methodologies used to inspect for security vulnerabilities. Based on this, we propose a security vulnerability quantification method that complements the limitations of both methodologies. This provides a more objective and systematic way to inspect for security weaknesses.