• Title/Summary/Keyword: system identification

Search Result 5,859, Processing Time 0.039 seconds

Genetic Programming with Weighted Linear Associative Memories and its Application to Engineering Problems (가중 선형 연상기억을 채용한 유전적 프로그래밍과 그 공학적 응용)

  • 연윤석
    • Korean Journal of Computational Design and Engineering
    • /
    • v.3 no.1
    • /
    • pp.57-67
    • /
    • 1998
  • Genetic programming (GP) is an extension of a genetic algoriths paradigm, deals with tree structures representing computer programs as individuals. In recent, there have been many research activities on applications of GP to various engineering problems including system identification, data mining, function approximation, and so forth. However, standard GP suffers from the lack of the estimation techniques for numerical parameters of the GP tree that is an essential element in treating various engineering applications involving real-valued function approximations. Unlike the other research activities, where nonlinear optimization methods are employed, I adopt the use of a weighted linear associative memory for estimation of these parameters under GP algorithm. This approach can significantly reduce computational cost while the reasonable accurate value for parameters can be obtained. Due to the fact that the GP algorithm is likely to fall into a local minimum, the GP algorithm often fails to generate the tree with the desired accuracy. This motivates to devise a group of additive genetic programming trees (GAGPT) which consists of a primary tree and a set of auxiliary trees. The output of the GAGPT is the summation of outputs of the primary tree and all auxiliary trees. The addition of auxiliary trees makes it possible to improve both the teaming and generalization capability of the GAGPT, since the auxiliary tree evolves toward refining the quality of the GAGPT by optimizing its fitness function. The effectiveness of this approach is verified by applying the GAGPT to the estimation of the principal dimensions of bulk cargo ships and engine torque of the passenger car.

  • PDF

Local Environmental Effects on AGN Activities

  • Kim, Jaemin;Yi, Sukyoung K.
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.1
    • /
    • pp.43.2-43.2
    • /
    • 2013
  • The local environmental effects on the triggering of active galactic nucleus(AGN) activity has been studied with many authors, but there still be controversy. We perform statistical analysis for nearby(0.01 < z < 0.05) volume limited(Mr < -19) samples with visual inspection based on Sloan Digital Sky Survey Data Release7. We inspect ~60,000 galaxy images visually to find peculiar objects which show not only ongoing merging features and tidal features, but also post merging features like ring or shell structures. We found that these peculiar features were shown at least 2 times more frequently among AGN host galaxies than non AGN galaxies, and this trend was still visible when galaxy properties such as color or stellar mass are fixed. Furthermore, L[OIII] and L(Ha) of peculiar galaxies are found to be more increased than those of normal galaxies. In order to ensure this results, we also checked it for a smaller subsample with ~2mag deeper monochromatic images provided from SDSS Stripe82 database, and found consistent results. At last, we perform the same work for pair(r_p<80kpc/h, delta_v<200km/s) systems. Because of some pair systems which do not interact gravitationally in actuality but fulfill the criteria for identification of pair system, the trends are found to be slightly weaker. We also found that line luminosities are increased consistently as projected distance between central and companion galaxy decreased, and as companion color gets bluer. Overall, the results of this study tell us that the local environment of galaxies affect the frequency as well as the strength of AGN activity. Local environmental effects, however, may not be the dominant triggering mechanism for AGN activity since the majority of peculiar galaxies are non AGN galaxies.

  • PDF

Method to Reduce the Time when Identifying RFID Tag by using Computational Grid (계산 그리드를 이용한 대량의 RFID 태그 판별 시간 단축 방법)

  • Shin, Myeong-Sook;Lee, Joon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.5
    • /
    • pp.547-554
    • /
    • 2010
  • RFID is core technology to lead ubiquitous computing, and attract the notice of the world. It also improves social transparency, creates employment, and invigorates the allied industries. However, The technical characteristic with RFID has some problems with security and privacy. The commercialization of RFID is delayed due to these problems. This paper introduces the technical method to find solutions about an invasion of privacy to be due to introduce RFID system. First, this method applies Hash-Chain proposed by M. Ohkubo and some other researchers. The more tags increase, the more it demands lots of computation time. We divide SPs equally to solve these problems. And then, We'll suggest solutions to shorten the identification time of tag by implementing SPs with multi nodes of Grid environment at the same time. This makes it possible to keep the privacy protection of RFID tag, and process RFID tag in real time at the same time.

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

The Hangul 4 State Bar Code System for the Automatic processing of Mail Items (우편물 자동처리를 위한 한글 4 State 바코드 시스템)

  • Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.146-155
    • /
    • 2000
  • This paper describes a 4-state bar code called HANGUL 4 ST that has been specifically designed for automatic processing of the letter mails, A HANGUL 4 ST bar code is a necessary data base that is applied data capture and data carrier with it all the information necessary for sorting, the amount capture for transportation of mail items, and valued-added services such as indicia, tracking and trace. The 4-state bar code information contents are composed of a postal code, delivery point, customer information including customer identification number and name, and parity bits for error detect and correct. The data density capability of HANGUL 4 St allows all useful sorting data and customer data to be encoded on one label. This supports better automatic processing in mail items, higher level of customer service and more efficient operation.

  • PDF

Secure Mobile Credit Card Payment Protocol based on Certificateless Signcryption (무인증서 서명 암호화 기법을 이용한 안전한 모바일 신용카드 결제 프로토콜)

  • Choi, Hui-Jin;Kim, Hyung-Jung
    • Journal of Digital Contents Society
    • /
    • v.14 no.1
    • /
    • pp.81-88
    • /
    • 2013
  • The increase of the smartphone users has popularized the mobile payment and the mobile credit card users are rapidly getting increased. The mobile credit cards that currently used provide its users with the service through downloading mobile credit card information into USIM. The mobile credit card saved in USIM has the minimized information for the security and is based on PKI. However certificate-based payment system has a complicated procedure and costs a lot of money to manage the certificates and CRL(Certificate Revocation List). Furthermore, It can be a obstacle to develop local e-commerce in Korea because it is hard for foreigners to use them. We propose the secure and efficient mobile credit card payment protocol based on certificateless signcryption which solve the problem of certificate use.

Statistical analysis and probabilistic modeling of WIM monitoring data of an instrumented arch bridge

  • Ye, X.W.;Su, Y.H.;Xi, P.S.;Chen, B.;Han, J.P.
    • Smart Structures and Systems
    • /
    • v.17 no.6
    • /
    • pp.1087-1105
    • /
    • 2016
  • Traffic load and volume is one of the most important physical quantities for bridge safety evaluation and maintenance strategies formulation. This paper aims to conduct the statistical analysis of traffic volume information and the multimodal modeling of gross vehicle weight (GVW) based on the monitoring data obtained from the weigh-in-motion (WIM) system instrumented on the arch Jiubao Bridge located in Hangzhou, China. A genetic algorithm (GA)-based mixture parameter estimation approach is developed for derivation of the unknown mixture parameters in mixed distribution models. The statistical analysis of one-year WIM data is firstly performed according to the vehicle type, single axle weight, and GVW. The probability density function (PDF) and cumulative distribution function (CDF) of the GVW data of selected vehicle types are then formulated by use of three kinds of finite mixed distributions (normal, lognormal and Weibull). The mixture parameters are determined by use of the proposed GA-based method. The results indicate that the stochastic properties of the GVW data acquired from the field-instrumented WIM sensors are effectively characterized by the method of finite mixture distributions in conjunction with the proposed GA-based mixture parameter identification algorithm. Moreover, it is revealed that the Weibull mixture distribution is relatively superior in modeling of the WIM data on the basis of the calculated Akaike's information criterion (AIC) values.

Assessment of modal parameters considering measurement and modeling errors

  • Huang, Qindan;Gardoni, Paolo;Hurlebaus, Stefan
    • Smart Structures and Systems
    • /
    • v.15 no.3
    • /
    • pp.717-733
    • /
    • 2015
  • Modal parameters of a structure are commonly used quantities for system identification and damage detection. With a limited number of studies on the statistics assessment of modal parameters, this paper presents procedures to properly account for the uncertainties present in the process of extracting modal parameters. Particularly, this paper focuses on how to deal with the measurement error in an ambient vibration test and the modeling error resulting from a modal parameter extraction process. A bootstrap approach is adopted, when an ensemble of a limited number of noised time-history response recordings is available. To estimate the modeling error associated with the extraction process, a model prediction expansion approach is adopted where the modeling error is considered as an "adjustment" to the prediction obtained from the extraction process. The proposed procedures can be further incorporated into the probabilistic analysis of applications where the modal parameters are used. This study considers the effects of the measurement and modeling errors and can provide guidance in allocating resources to improve the estimation accuracy of the modal data. As an illustration, the proposed procedures are applied to extract the modal data of a damaged beam, and the extracted modal data are used to detect potential damage locations using a damage detection method. It is shown that the variability in the modal parameters can be considered to be quite low due to the measurement and modeling errors; however, this low variability has a significant impact on the damage detection results for the studied beam.

A Study on the Unsteady Flow Characteristics of a Delta Wing by 3-D Stereo PIV (3-D Stereo PIV에 의한 비정상 델타윙 유동특성에 대한 연구)

  • Kim, Beom-Seok;Lee, Hyun;Kim, Jeong-Hwan;Lee, Young-Ho
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1672-1677
    • /
    • 2004
  • Leading edge extension(LEX) in a highly swept shape applied to a delta wing features the modem air-fighters. The LEX vortices generated upon the upper surface of the wing at high angle of attack enhance the lift force of the delta wing by way of increased negative suction pressure over the surfaces. The present 3-D stereo PIV includes the Identification of 2-D cross-correlation equation, stereo matching of 2-D velocity vectors of two cameras, accurate calculation of 3-D velocity vectors by homogeneous coordinate system, removal of error vectors by a statistical method followed by a continuity equation criterion and so on. A delta wing model with or without LEX was immersed in a circulating water channel. Two high-resolution, high-speed digital cameras($1280pixel{\times}1024pixel$) were used to allow the time-resolved animation work. The present dynamic stereo PIV represents the complicated vortex behavior, especially, in terms of time-dependent characteristics of the vortices at given measuring sections. Quantities such as three velocity vector components, vorticity and other flow information can be easily visualized via the 3D time-resolved post-processing to make the easy understanding of the LEX effect or vortex emerging and collapse which are important phenomena occurring in the field of delta wing aerodynamics.

  • PDF

The System Reliability Analysis of Web Frame by Plastic Strength Analysis (소성 강도 해석에 의한 Web Frame의 시스템 신뢰성 해석)

  • Y.S. Yang;S.J. Yim
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.28 no.2
    • /
    • pp.251-267
    • /
    • 1991
  • Plastic strength analysis using plastic failure mode as a limit state is adopted instead of a conventional elastic structural analysis to predict the ultimate strength of Web frame idealized by a plane frame. Linear programming arid Compact procedure are developed for determining the collapse load factor. It is found that the final results are good agreement with the results of Elasto-plastic analysis. Besides, the redundant structures like Web frame is known to have multiple failure modes. Web frame may collapse under any of the possible failure modes. Thus, the identification of these possible failure modes is necessary and very important in the reliability analysis of Web frame. In order to deal with multiple failure modes, automatic generation method of all failure modes and basic failure modes is used for selecting the dominant failure modes. The probability of failure pastic collapse of Web frame is calculated using these dominant failure modes. The safety of Web frame is asscssed and compared by performing the deterministic and probabilistic analysis.

  • PDF