• Title/Summary/Keyword: value function

Search Result 5,770, Processing Time 0.037 seconds

Replacement Model Based on Cost and Downtime

  • Jung, Ki-Mun;Han, Sung-Sil;Lim, Jae-Hak
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.4
    • /
    • pp.889-901
    • /
    • 2003
  • In this paper, we consider the optimal replacement policies following the expiration of the combination warranty. The combination warranty can be divided into the renewing combination warranty and the non-renewing combination warranty. The criterion used to determine the optimal replacement period is the overall value function based on the expected cost and the expected downtime. Thus, we obtain the expected cost rate per unit time and the expected downtime per unit time for our model. And then the overall value function suggested by Jiagn and Ji(2002) is applied to obtain the optimal replacement period. The numerical examples are presented for illustrative purpose.

  • PDF

Procedure for improving dynamic operability of chemical processes

  • Kwon, Youngwoon;Chang, Tae-Suk;Yoon, En-Sup
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.332-335
    • /
    • 1995
  • A simple and effective method for improving Euclidean norm condition number for chemical processing system is presented. The singular value sensitivities of Freudenberg et al. (1982) is used to estimate the behavior of singular values of process transfer function matrix when design parameter is changed, then the condition number can be calculated straightforwardly. The method requires explicit dependencies of each transfer function matrix elements on design parameters. These dependencies can be obtained either by symbolic differentiation in the form of explicit function of design parameters, or by numerical perturbation studies for units with large and complicated models. Gerschgorin-type lower bound for minimum singular value is introduced to detect the large divergencies near singular point due to linearity of sensitivities. The case studies are performed to show the efficiency of the proposed method.

  • PDF

Differential Game of Approach with an Inertial Evader and Two Noninertial Pursuers (한 관성 회피자와 두 비관성 추적자 간의 접근 미분 게임)

  • Nam, Dong-K.;Seo, Jin-H.
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.213-215
    • /
    • 1995
  • This paper is concerned with a coplanar pursuit-evasion game of one inertial evader and two identical noninertial pursuers. The terminal time is fired and the payoff is the distance between the evader and the nearest pursuer when tile game is terminated. The value functions and the strategies is constructed for all the game surface. To get a value function, we use the generalization of the Bellman-Isaacs fundamental equation.

  • PDF

The Analysis of Munsell Value Function by Cubic Spline Method (Cubic Spline Method에 의한 Munsell Value Function의 해석)

  • Jeong, Hong-Soo;Kim, Gong-Ju;Im, Jin-Mo;Park, Pyong-Ki;Rhee, John M.
    • Textile Coloration and Finishing
    • /
    • v.2 no.2
    • /
    • pp.20-32
    • /
    • 1990
  • In this paper, a new method by Cubic Spline to analyze Munsell Value Function is proposed. The values calculated by this method are compared with ones by Judd's Polynomial and Cube Root Functions, etc. For performing these computation algorithms have been developed.

  • PDF

Positive Solutions of Nonlinear Neumann Boundary Value Problems with Sign-Changing Green's Function

  • Elsanosi, Mohammed Elnagi M.
    • Kyungpook Mathematical Journal
    • /
    • v.59 no.1
    • /
    • pp.65-71
    • /
    • 2019
  • This paper is concerned with the existence of positive solutions of the nonlinear Neumann boundary value problems $$\{u^{{\prime}{\prime}}+a(t)u={\lambda}b(t)f(u),\;t{\in}(0,1),\\u^{\prime}(0)=u^{\prime}(1)=0$$, where $a,b{\in}C[0,1]$ with $a(t)>0,\;b(t){\geq}0$ and the Green's function of the linear problem $$\{u^{{\prime}{\prime}}+a(t)u=0,\;t{\in}(0,1),\\u^{\prime}(0)=u^{\prime}(1)=0$$ may change its sign on $[0,1]{\times}[0,1]$. Our analysis relies on the Leray-Schauder fixed point theorem.

Association rule ranking function by decreased lift influence (향상도 영향 감소화에 의한 연관성 순위결정함수)

  • Park, Hee-Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.21 no.3
    • /
    • pp.397-405
    • /
    • 2010
  • Data mining is the method to find useful information for large amounts of data in database, and one of the important goals is to search and decide the association for several variables. The task of association rule mining is to find certain association relationships among a set of data items in a database. There are three primary measures for association rule, support and confidence and lift. In this paper we developed a association rule ranking function by decreased lift influence to generate association rule for items satisfying at least one of three criteria. We compared our function with the functions suggested by Park (2010), and Wu et al. (2004) using some numerical examples. As the result, we knew that our decision function was better than the function of Park's and Wu's functions because our function had a value between -1 and 1regardless of the range for three association thresholds. Our function had the value of 1 if all of three association measures were greater than their thresholds and had the value of -1 if all of three measures were smaller than the thresholds.

A Study on S-Function in SEED Cryptosystem (SEED암호에서 S-함수에 대한 고찰)

  • Yang, Jeong-Mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1295-1305
    • /
    • 2017
  • There is SEED cryptosystem in domestic block cipher standard. This code was drafted by the Korea Information Security Agency (KISA) in October 1998 and underwent a public verification process in December of the same year, which resulted in the final amendment to improve safety and performance. Unlike DES, it is a 128-bit block cipher that has been passed through various processes and established in 2005 as an international standard. It is a block cipher with a pastel structure like DES, but the input bit block has been increased to 128 bits, double DES. In this paper, first, we introduce the general algorithm of SEED cryptosystem and analyzed mathematically generating principle of key-value which is used in F-function. Secondly, we developed a table that calculates the exponent of the primitive element ${\alpha}$ corresponding to the 8-bit input value of the S-function and finally analyzed calculating principle of S-function designed in G-function through the new theorem and example. Through this course, we hope that it is to be suggest the ideas and background theory needed in developing new cryptosystem to cover the weakness of SEED cryptosystem.

Apparel design evaluation process from users' perceived values

  • Kim, Jungsook
    • The Research Journal of the Costume Culture
    • /
    • v.22 no.1
    • /
    • pp.158-166
    • /
    • 2014
  • Apparel design is an economic activity to create values for users over the value chain of a product. In this paper, the contribution of apparel design is defined as the enhancement of users' perceived values by improving users' experience of products. In this context, the value of a product corresponds to compensation for experience or a promise for experience of a product. Experience can be sensory or psychological benefits to users. To evaluate the value of apparel design, the researcher identified and analyzed the apparel design parameters affecting users' experience and benefits of products such as macro-, micro-environmental factors, value chain factors, apparel designer factors, and user factors. For an analytical modeling of the values of apparel design, this paper introduces the concept of a utility function from economics. In economics, utility is a measure of desirability or satisfaction that can be correlative to need or desire. The measure of value can be found in the price which a user is willing to pay for the fulfillment or satisfaction of need or desire via the experience of a product.

A Ranking Method for Type-2 Fuzzy Values (타입-2 퍼지값의 순위결정)

  • Lee, Seungsoo;Lee, Kwang H.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.05a
    • /
    • pp.145-148
    • /
    • 2002
  • Type-1 fuzzy value is used to show the uncertainty in a given value. But there exist many situations that it needs to be extended to type-2 fuzzy value because it is difficult to determine the crisp membership function itself. Intrinsically type-2 fuzzy values are more expressive and powerful than type-1 fuzzy values, but, at the same time, more difficult to be compared or ranked . In this paper, a ranking method for type-2 fuzzy values is proposed. It is based on the satisfaction function which shows the possibility that one type-2 fuzzy value is greater than the other type-2 fuzzy value Some properties of the proposed method are also analyzed .

  • PDF