• Title/Summary/Keyword: 무작위진화과정

Search Result 7, Processing Time 0.023 seconds

An Empirical Study on the Size Distribution of Venture Firms in the center of KOSDAQ Listed Companies (국내 벤처기업 진화과정에 관한 실증분석 - 코스닥상장 기술벤처기업 분석을 중심으로 -)

  • Cho, Sang-Sup;Yang, Young-Seok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.6 no.1
    • /
    • pp.23-37
    • /
    • 2011
  • This paper is brought to carry out an empirical study whether evolution process of venture firm's scale is following the Gibrat's law; random evolution process, or Pareto law; self-organizing process. The empirical test, as attaching theoretical explanation, of this research utilize the serial data samples of 92 KOSDAQ listed companies from the year of 2005 through 2008. Summarizing the research results are as followed. First, Gini Coefficients representing the density of venture firm's scale has been constantly reduced since the year of 2005 in terms of number of employee, while these index increased during the same time period from the perspective of sales volume. Second, the evolution process of Korea venture firm's scale is following the Power Law related to Pareto Law. In particular, estimated Pareto coefficient, ${\alpha}$, is shown lower than 1 which is significant result. Third, the probability of joining in the top tier group of firm starting from the early stage growing is forecasted into 6.9%, the result which emphasize the starting scale of venture firm play an important role in long term evolution of venture firm.

  • PDF

Review on the Terror Network in Smart Media Era (스마트미디어 시대의 테러네트워크에 관한 고찰)

  • Lim, You Seok;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.13 no.2
    • /
    • pp.85-93
    • /
    • 2013
  • Today, the structure of terrorist organizations in the form of a variety of network complexity are evolving. However, terrorist organization not combining randomly generated network but preferential attachment a network. So, it's research should be preceded a better understanding about the characteristics and type of terror network for a effective counter-terrorism policy of law enforcement. In addition, the appropriate response strategy have to technique establish in an era of smart media. In particular, homegrown terrorist attacks on unspecified people without boundaries of countries and regions unlike the traditional terrorism. Also, homegrown terrorism are violence and criminal activity by new various of religion, politics, philosophy. Besides the extreme members of homegrown terror networks went grow up through the evolutionary process in the age of smart media. Law enforcement agencies must identify the terrorist network at the national level. Therefore, terror networks evolving in the online space, forming a radical homegrown terror organizations have access to the network. Intelligence community track terrorist networks and to block the negative aspects of the smart media outlets should be considered.

Blockchain-based Important Information Management Techniques for IoT Environment (IoT 환경을 위한 블록체인 기반의 중요 정보 관리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.1
    • /
    • pp.30-36
    • /
    • 2024
  • Recently, the Internet of Things (IoT), which has been applied to various industrial fields, is constantly evolving in the process of automation and digitization. However, in the network where IoT devices are built, research on IoT critical information-related data sharing, personal information protection, and data integrity among intermediate nodes is still being actively studied. In this study, we propose a blockchain-based IoT critical information management technique that is easy to implement without burdening the intermediate node in the network environment where IoT is built. The proposed technique allocates a random value of a random size to the IoT critical information arriving at the intermediate node and manages it to become a decentralized P2P blockchain. In addition, the proposed technique makes it easier to manage IoT critical data by creating licenses such as time limit and device limitation according to the weight condition of IoT critical information. Performance evaluation and proposed techniques have improved delay time and processing time by 7.6% and 10.1% on average compared to existing techniques.

A Type-2 Fuzzy Logic Base Maturity Model of Green IT Richness (유형-2 퍼지 논리 기반 그린 IT 깊이 성숙도 모델)

  • Moon, Kyung-Il;Kim, Chul
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.2
    • /
    • pp.273-283
    • /
    • 2010
  • Emergent process or behaviour can be seen in many places, from any multicellular biological organism to traffic patterns, cities or organizational phenomena in computer simulations. Similarly, the concept of 'Green IT' refers to the way complex systems and patterns arise inevitably among groups due to environmental concerns in real world. Green IT has good possibility to evolve as very chaotic system, in which the number of interactions between components increases geometrically with the number of components, thus potentially allowing for many new types of behaviour to emerge. However, when Green IT system regards as a complexity one, there exits some attractors to derive and control the system. In this context, this paper presents a new model based on type-2 fuzzy logic system to identify and assess the attractors of Green IT system which correspond to Reach-Richness matrix of Green IT.

  • PDF

Development of Optimization Algorithm Using Sequential Design of Experiments and Micro-Genetic Algorithm (순차적 실험계획법과 마이크로 유전알고리즘을 이용한 최적화 알고리즘 개발)

  • Lee, Jung Hwan;Suh, Myung Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.38 no.5
    • /
    • pp.489-495
    • /
    • 2014
  • A micro-genetic algorithm (MGA) is one of the improved forms of a genetic algorithm. It is used to reduce the number of iterations and the computing resources required by using small populations. The efficiency of MGAs has been proved through many problems, especially problems with 3-5 design variables. This study proposes an optimization algorithm based on the sequential design of experiments (SDOE) and an MGA. In a previous study, the authors used the SDOE technique to reduce trial-and-error in the conventional approximate optimization method by using the statistical design of experiments (DOE) and response surface method (RSM) systematically. The proposed algorithm has been applied to various mathematical examples and a structural problem.

Micromorphological Changes of Rill Development under Simulated Rainfall and Inflow on Steep Slopes (모의 강우와 유입수에 의해 급경사면에서 발달한 세류의 미세지형 변화)

  • Shin, Seung Sook;Sim, Young Ju;Son, Sang Jin;Park, Sang Deog
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.1
    • /
    • pp.21-32
    • /
    • 2023
  • Interrill erosion dominates in forest areas, and the erosion rate in surface-disturbed areas is significantly increased by the development and expansion of rill. In this study, soil erosion experiments using simulated rainfall and inflow were performed to understand the development and the micromorphological changes of rill on steep slopes. The characteristic factors of the micromorphology, such as the rill cross section, rill volume, rill density, rill order, and rill sharpness, were analyzed according to steepness and location (upper or lower) of slope. The head-cut of the simultaneous incised rills by rainfall simulation moved rapidly upslope, and the randomly developed rills expanded deeply and widely with their connection. The rill cross section evolved to downslope gradually increased. The rill volume occupied about 78 % of the sediment volume, confirming that the contribution of the sediment from the rill erosion is greater than that of the interrill erosion. Although the rate of increase in rill order slowed as the slope increased, the total length and density of the rill generally increased. As the slope increased from 15° to 20°, the bed incision of rills became larger than the sidewall expansion, and the rill sharpness increased by 1.6 times. The runoff coefficient on the lower slope decreased by 12.3 % than that on the upper slope. It was evaluated that the subsoil exposures and formation changes by the rill expansion increased the infiltration rate. Although the sediment accompanying the rills generally increased with slope increase, it was directly influenced by the hydraulic velocity of enhanced rill with the local convergence and expansion in the process of the rill evolution.

Functional Analysis and Selection of Second-site Revertant of Escherichia coli 16S rRNA of C770G (Escherichia coli 16S rRNA 상의 770 위치에 염기치환을 가진 변이체 리보솜의 단백질 합성 능력을 회복시키는 이차복귀돌연변이체의 발췌)

  • Ha, Hye-Jeong;Ryou, Sang-Mi;Lee, Kang-Seok;Jeon, Che-Ok
    • Microbiology and Biotechnology Letters
    • /
    • v.39 no.1
    • /
    • pp.93-96
    • /
    • 2011
  • It has been shown that a nucleotide substitution at position 770 in Escherichia coli 16S rRNA, which is implicated in forming the evolutionary conserved B2c intersubunit bridge, has a detrimental effect on ribosome function. In order to isolate second-site revertants that complement ribosomes containing C770G, we performed a random mutagenesis of the 16S rRNA gene and selected clones that could produce more CAT protein translated by specialized ribosome. One of the clones contained two nucleotide substitutions at positions 569 and 904 (C569G and U904C) and these mutations partially complemented the loss of protein-synthesis ability caused by C770G. Further studies using the isolated revertant will provide information about which part of 16S rRNA is interacting with C770 and the consequence of the structure formed by these interactions in the process of protein synthesis.