• Title/Summary/Keyword: unified design

Search Result 829, Processing Time 0.025 seconds

The Development of Content Management System for Culture & Tourism Based on Recursive Relation Object Model (순환관계 객체모델에 기반한 문화관광 콘텐츠관리시스템 개발)

  • Shin Dong-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.263-273
    • /
    • 2006
  • The remarkable development of the internet causes us to have too many homepages and content, to be specialized and subdivided, and to need 'CMS'(Content Management System). Currently, CMS have been developed by many solution providers and studied in many ways. However, it is hard to find a system which is able to construct the specified Culture & Tourism content rapidly and managed them efficiently. Step on these requirement, this paper focus on design and implementation of unified CMS based on recursive relation object model which can be satisfied the demand of the usual people's information service of Culture & Tourism and which can be installed and managed the standardized Culture & Tourism content easily.

  • PDF

Genetic association tests when a nuisance parameter is not identifiable under no association

  • Kim, Wonkuk;Kim, Yeong-Hwa
    • Communications for Statistical Applications and Methods
    • /
    • v.24 no.6
    • /
    • pp.663-671
    • /
    • 2017
  • Some genetic association tests include an unidentifiable nuisance parameter under the null hypothesis of no association. When the mode of inheritance (MOI) is not specified in a case-control design, the Cochran-Armitage (CA) trend test contains an unidentifiable nuisance parameter. The transmission disequilibrium test (TDT) in a family-based association study that includes the unaffected also contains an unidentifiable nuisance parameter. The hypothesis tests that include an unidentifiable nuisance parameter are typically performed by taking a supremum of the CA tests or TDT over reasonable values of the parameter. The p-values of the supremum test statistics cannot be obtained by a normal or chi-square distribution. A common method is to use a Davies's upper bound of the p-value instead of an exact asymptotic p-value. In this paper, we provide a unified sine-cosine process expression of the CA trend test that does not specify the MOI and the TDT that includes the unaffected. We also present a closed form expression of the exact asymptotic formulas to calculate the p-values of the supremum tests when the score function can be written as a linear form in an unidentifiable parameter. We illustrate how to use the derived formulas using a pharmacogenetics case-control dataset and an attention deficit hyperactivity disorder family-based example.

Algorithms for Designing Optimal Keypads of Mobile Devices (최적의 휴대폰 키패드 디자인을 위한 알고리즘)

  • Kim, Hyun-Min;Kim, Yong-Hyuk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.6
    • /
    • pp.814-820
    • /
    • 2009
  • The arrangement of the general 12-button cellular phone keypad is unified with one or two kind. In general, the several alphabets are arranged in one key. When inputting an English, countries which do not speak English use multi-tap method. We can input next alphabet by pressing key repeatedly. We address the problem of finding multi-tap-based keypad designs which minimize the number of key presses for various case. Genetic algorithms is proposed method for optimal keypad designs. We are to maintain the number of keys, which is ranged from 8 to 12. We also show experimental using non-alphabetically-constrained and alphabetically-constrained arrangement, respectively. Finally, we give improved keypad designs.

A Study on the Pattern of Spatial Structure in University Campus (대학 캠퍼스 공간구조 유형에 관한 연구)

  • 구민아;김영대
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.26 no.4
    • /
    • pp.135-143
    • /
    • 1999
  • This study is about the pattern of spatial structures of major university campuses in Korea. The pattern is composed of buildings, circulation, and open space within the campus. It is physical structural system which makes campus more educational environment as well as new academic landscape. The pattern is checked on the basis of existing sub-patterns of eleven universities with base data by using computer program, Autocad and Landcadd. The result is that most of campus spatial structures consists of simple and unified grid pattern. Basic educational facilities are at the center of the whole structure as well. Some universities are located in suburb and have large site which makes it more open space oriented pattern, more various exterior space and more specific circulation system. So the campus patterns of recently built is more diverse and has more design components. In most cases, campus does not have strong spatial coherence among its buildings, circulation, and open space. It is important to develop Korean formal campus spatial structure which is intrinsic to its site and is proper to its academic plan. Campus spatial structure should be formulated to embrace diverse demands of university and to accumulate unique university landscape.

  • PDF

Airport Power Information System Design in the Inchon Inta'l Airport (인천국제공항 공항전력정보시스템 설계)

  • Oh, Y.D.;Min, S.J.;Lim, J.G.;Moon, J.H.;Lee, T.S.;Yun, T.H.;Kim, M.H.;Moon, Y.H.
    • Proceedings of the KIEE Conference
    • /
    • 1998.07c
    • /
    • pp.1121-1124
    • /
    • 1998
  • Inchon International Airport(IIA) is constructed for Northeast Asia Gate as is important for IIA to become a 21 century's leader in the world, as is planned for open at december 2000 as a important economic link for unified korea. Airport Power Information System(APIS) is designed through investigation of advanced domestic and international example. In addition to power facility operation it is designed for using an information infrastructure of whole airport. APIS is newly designed for uninterupted power supply, effective power management, information infrastructure's construction. making a profit by positively introduction of new technology for collection and conservation of power related data, correlation with airport infra systems, data interrelative arrangement about related systems like outdoor lighting system and automatic measuring record, CCTV systems for remote power facility monitoring, and promotion of management ability in the emergency status.

  • PDF

Design of Acceptance Control Charts According to the Process Independence, Data Weighting Scheme, Subgrouping, and Use of Charts (프로세스의 독립성, 데이터 가중치 체계, 부분군 형성과 관리도 용도에 따른 합격판정 관리도의 설계)

  • Choi, Sung-Woon
    • Journal of the Korea Safety Management & Science
    • /
    • v.12 no.3
    • /
    • pp.257-262
    • /
    • 2010
  • The study investigates the various Acceptance Control Charts (ACCs) based on the factors that include process independence, data weighting scheme, subgrouping, and use of control charts. USL - LSL > $6{\sigma}$ that used in the good condition processes in the ACCs are designed by considering user's perspective, producer's perspective and both perspectives. ACCs developed from the research is efficiently applied by using the simple control limit unified with APL (Acceptable Process Level), RLP (Rejectable Process Level), Type I Error $\alpha$, and Type II Error $\beta$. Sampling interval of subgroup examines i.i.d. (Identically and Independent Distributed) or auto-correlated processes. Three types of weight schemes according to the reliability of data include Shewhart, Moving Average(MA) and Exponentially Weighted Moving Average (EWMA) which are considered when designing ACCs. Two types of control charts by the purpose of improvement are also presented. Overall, $\alpha$, $\beta$ and APL for nonconforming proportion and RPL of claim proportion can be designed by practioners who emphasize productivity and claim defense cost.

Ductility of Circular Hollow Columns with Internal Steel Tube (강관 코아 합성 중공 기둥의 연성 거동 연구)

  • 강영종;한승룡;박남회
    • Proceedings of the KSR Conference
    • /
    • 2002.05a
    • /
    • pp.183-188
    • /
    • 2002
  • In locations where the cost or concrete is relatively high, or in situations where the weight or concrete members is to be kept to a minimum, it may be economical to use hollow reinforced concrete vertical members. Hollow reinforced concrete columns with low axial load, moderate longitudinal steel percentage, and a reasonably thick wall were found to perform in a ductile manner at the flexural strength, similar to solid columns. However, hollow reinforced concrete columns with high axial load, high longitudinal steel percentage, and a thin wall were found to behave in a brittle manner at the flexural strength, since the neutral axis is forced to occur away from the inside face of the tube towards the section centroid and, as a result, crushing of concrete occurs near the unconfined inside face of the section. If, however, a steel tube is placed near the inside face of a circular hollow column, the column can be expected not to fail in a brittle manner by disintegration of the concrete in the compression zone. Design recommendation and example by moment-curvature analysis program for curvature ductility are presented. Theoretical moment-curvature analysis for reinforced concrete columns, indicating the available flexural strength and ductility, can be conducted providing the stress-strain relation for the concrete and steel are known. In this paper, a unified stress-stain model for confined concrete by Mander is developed for members with circular sections.

  • PDF

A Novel Stabilizing Control for Neural Nonlinear Systems with Time Delays by State and Dynamic Output Feedback

  • Liu, Mei-Qin;Wang, Hui-Fang
    • International Journal of Control, Automation, and Systems
    • /
    • v.6 no.1
    • /
    • pp.24-34
    • /
    • 2008
  • A novel neural network model, termed the standard neural network model (SNNM), similar to the nominal model in linear robust control theory, is suggested to facilitate the synthesis of controllers for delayed (or non-delayed) nonlinear systems composed of neural networks. The model is composed of a linear dynamic system and a bounded static delayed (or non-delayed) nonlinear operator. Based on the global asymptotic stability analysis of SNNMs, Static state-feedback controller and dynamic output feedback controller are designed for the SNNMs to stabilize the closed-loop systems, respectively. The control design equations are shown to be a set of linear matrix inequalities (LMIs) which can be easily solved by various convex optimization algorithms to determine the control signals. Most neural-network-based nonlinear systems with time delays or without time delays can be transformed into the SNNMs for controller synthesis in a unified way. Two application examples are given where the SNNMs are employed to synthesize the feedback stabilizing controllers for an SISO nonlinear system modeled by the neural network, and for a chaotic neural network, respectively. Through these examples, it is demonstrated that the SNNM not only makes controller synthesis of neural-network-based systems much easier, but also provides a new approach to the synthesis of the controllers for the other type of nonlinear systems.

Searching a global optimum by stochastic perturbation in error back-propagation algorithm (오류 역전파 학습에서 확률적 가중치 교란에 의한 전역적 최적해의 탐색)

  • 김삼근;민창우;김명원
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.3
    • /
    • pp.79-89
    • /
    • 1998
  • The Error Back-Propagation(EBP) algorithm is widely applied to train a multi-layer perceptron, which is a neural network model frequently used to solve complex problems such as pattern recognition, adaptive control, and global optimization. However, the EBP is basically a gradient descent method, which may get stuck in a local minimum, leading to failure in finding the globally optimal solution. Moreover, a multi-layer perceptron suffers from locking a systematic determination of the network structure appropriate for a given problem. It is usually the case to determine the number of hidden nodes by trial and error. In this paper, we propose a new algorithm to efficiently train a multi-layer perceptron. OUr algorithm uses stochastic perturbation in the weight space to effectively escape from local minima in multi-layer perceptron learning. Stochastic perturbation probabilistically re-initializes weights associated with hidden nodes to escape a local minimum if the probabilistically re-initializes weights associated with hidden nodes to escape a local minimum if the EGP learning gets stuck to it. Addition of new hidden nodes also can be viewed asa special case of stochastic perturbation. Using stochastic perturbation we can solve the local minima problem and the network structure design in a unified way. The results of our experiments with several benchmark test problems including theparity problem, the two-spirals problem, andthe credit-screening data show that our algorithm is very efficient.

  • PDF

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • The Journal of Information Systems
    • /
    • v.14 no.3
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF