• 제목/요약/키워드: Analysis algorithm

검색결과 12,289건 처리시간 0.029초

도시철도 급완행 통합해석 알고리즘 개발에 관한 연구 (A Study for Development of Integrated DC Railway System Analysis Algorithm)

  • 장동욱;김무선;홍재성;이한상
    • 전기학회논문지
    • /
    • 제64권4호
    • /
    • pp.646-652
    • /
    • 2015
  • Increasing needs for rapid driving vehicles during rush hour, there are various researches how to operate or allocate rapid driving vehicles with the existing normal driving vehicles. In the aspect of power system, it should be preceded by an analysis for power equipment capacity. Also, it should be studied whether the added rapid driving vehicles gives a bad effects for stable operation of railway systems or not. In order to derive the results for these analysis processes, this paper suggest a novel analysis algorithm which can implement integrated analysis including rapid and normal driving railway vehicles simultaneously. This algorithm has been verified using Seoul Metro 7 Line data.

민감도가 고려된 유전 알고리듬을 이용한 보 구조물의 지지점 최적화에 관한 연구 (A Study on the Support location Optimizations of the Beams using the Genetic Algorithm and the Sensitivity Analysis.)

  • 이재관;신효철
    • 소음진동
    • /
    • 제10권5호
    • /
    • pp.783-791
    • /
    • 2000
  • This describes a study on the support location optimizations of the beams using the genetic algorithm and the sensitivity analysis. The genetic algorithm is a probabilistic method searching the optimum at several points simultaneously and requiring only the values of the object and constraint functions. It has therefore more chances to find the global solution and can be applied to the various problems. Nevertheless, it has such a shortcoming that it takes too many calculations, because it is ineffective in local search. While the traditional method using sensitivity analysis is of great advantage in searching the near optimum. thus the combination of the two techniques will make use of the individual advantages, that is, the superiority in global searching form the genetic algorithm and that in local searching form the sensitivity analysis. In this thesis, for the practical applications, the analysis is conducted by FEB ; and as the shapes of structures are taken as the design variation, it requires re-meshing for every analysis. So if it is not properly controlled, the result of the analysis is affected and the optimized solution amy not be the real one. the method is efficiently applied to the problems which the traditional methods are not working properly.

  • PDF

ATM ABR 서비스에서 큐 길이 변화를 이용한 개선된 폭주 제어 알고리즘 (Advanced Congestion Control Algorithm Using Change of Queue Length in ATM ABR Service)

  • 김체훤;강현철;곽지영;남지승
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 하계종합학술대회 논문집(3)
    • /
    • pp.109-112
    • /
    • 2000
  • The EPRCA(Enhanced Proportional Rate Control Algorithm) is one of the explicit rate control algorithm recommended by the ATM forum. EPRCA algorithm is using only two threshold to buffer change is not considered for calculating ER value. In this paper to cover the shortage, two more variables are added for considering increase of buffer quantity. So calculating proper ER would avoid before getting into the congestion situation. To analysis the affect, EPRCA and proposed algorithm are compared through simulation by analysis of change of buffer length and ACR change

  • PDF

채널 추정 알고리즘을 이용한 비동기식 IMT-2000 (W-CDMA) 시스템의 성능 분석 (Analysis of Asynchronous IMT-2000 (W-CDMA) Systems Using Channel Estimation Algorithm)

  • 김병기;나인학;전준수;김철성
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 하계종합학술대회 논문집(1)
    • /
    • pp.77-80
    • /
    • 2002
  • In this paper, we analyze a physical layer of W-CDMA .system and design a transmitter and receiver by using ADS (Advanced Design System). Also, we simulated a link level performance with different channel estimation algorithm in Jakes fading channel environment. For the channel estimator, we used the WMSA(Weighted Multi-Slot Averaging) algorithm, EGE(Equal Gain Estimation) algorithm and SSE(Symbol-to-Symbol Estimation) algorithm. This study will be useful in the analysis and design of W-CDMA system.

  • PDF

운전자 주행 특성 파라미터를 고려한 지능화 차량의 적응 제어 (Driver Adaptive Control Algorithm for Intelligent Vehicle)

  • 민석기;이경수
    • 대한기계학회논문집A
    • /
    • 제27권7호
    • /
    • pp.1146-1151
    • /
    • 2003
  • In this paper, results of an analysis of driving behavior characteristics and a driver-adaptive control algorithm for adaptive cruise control systems have been described. The analysis has been performed based on real-world driving data. The vehicle longitudinal control algorithm developed in our previous research has been extended based on the analysis to incorporate the driving characteristics of the human drivers into the control algorithm and to achieve natural vehicle behavior of the adaptive cruise controlled vehicle that would feel comfortable to the human driver. A driving characteristic parameters estimation algorithm has been developed. The driving characteristics parameters of a human driver have been estimated during manual driving using the recursive least-square algorithm and then the estimated ones have been used in the controller adaptation. The vehicle following characteristics of the adaptive cruise control vehicles with and without the driving behavior parameter estimation algorithm have been compared to those of the manual driving. It has been shown that the vehicle following behavior of the controlled vehicle with the adaptive control algorithm is quite close to that of the human controlled vehicles. Therefore, it can be expected that the more natural and more comfortable vehicle behavior would be achieved by the use of the driver adaptive cruise control algorithm.

리눅스에 적용된 해시 및 암호화 알고리즘 분석 (Analysis of the Hashing and Encryption Algorithms Applied to the Linux)

  • 배유미;정성재;소우영
    • 한국항행학회논문지
    • /
    • 제20권1호
    • /
    • pp.72-78
    • /
    • 2016
  • 리눅스는 초창기부터 사용자 패스워드의 암호화를 위해 해시 알고리즘인 MD-5를 사용해 왔다. 최근 보안성이 강화된 패스워드 관리가 요구되면서 엔터프라이즈 리눅스 시스템에서는 MD-5보다 더욱 높은 신뢰성을 보이는 SHA-512 알고리즘을 사용하고 있다. 본 논문에서는 해시 및 암호화 알고리즘의 특징에 대해 비교 분석하고, 리눅스 사용자 정보의 관리 체제에 대해 알아본다. 이러한 분석을 기반으로 사용자 패스워드에 적용된 해시 알고리즘의 보안성에 대해 분석하고, 추가적으로 Apache, PHP, MySQL과 같은 공개 소프트웨어 파일 검증에 사용되는 해시 알고리즘 적용 사례를 분석한다. 마지막으로 관련 보안 도구인 John The Ripper를 분석하여 사용자 패스워드 관리를 통한 시스템 보안 강화 방법을 제시한다.

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

  • Jie, Yan;Yu, Lu;Li-yun, Chen;Wei, Nie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권2호
    • /
    • pp.897-913
    • /
    • 2016
  • Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.

A NODE PREDICTION ALGORITHM WITH THE MAPPER METHOD BASED ON DBSCAN AND GIOTTO-TDA

  • DONGJIN LEE;JAE-HUN JUNG
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • 제27권4호
    • /
    • pp.324-341
    • /
    • 2023
  • Topological data analysis (TDA) is a data analysis technique, recently developed, that investigates the overall shape of a given dataset. The mapper algorithm is a TDA method that considers the connectivity of the given data and converts the data into a mapper graph. Compared to persistent homology, another popular TDA tool, that mainly focuses on the homological structure of the given data, the mapper algorithm is more of a visualization method that represents the given data as a graph in a lower dimension. As it visualizes the overall data connectivity, it could be used as a prediction method that visualizes the new input points on the mapper graph. The existing mapper packages such as Giotto-TDA, Gudhi and Kepler Mapper provide the descriptive mapper algorithm, that is, the final output of those packages is mainly the mapper graph. In this paper, we develop a simple predictive algorithm. That is, the proposed algorithm identifies the node information within the established mapper graph associated with the new emerging data point. By checking the feature of the detected nodes, such as the anomality of the identified nodes, we can determine the feature of the new input data point. As an example, we employ the fraud credit card transaction data and provide an example that shows how the developed algorithm can be used as a node prediction method.

Development of a Period Analysis Algorithm for Detecting Variable Stars in Time-Series Observational Data

  • Kim, Dong-Heun;Kim, Yonggi;Yoon, Joh-Na;Im, Hong-Seo
    • Journal of Astronomy and Space Sciences
    • /
    • 제36권4호
    • /
    • pp.283-292
    • /
    • 2019
  • The purpose of this study was to develop a period analysis algorithm for detecting new variable stars in the time-series data observed by charge coupled device (CCD). We used the data from a variable star monitoring program of the CBNUO. The R filter data of some magnetic cataclysmic variables observed for more than 20 days were chosen to achieve good statistical results. World Coordinate System (WCS) Tools was used to correct the rotation of the observed images and assign the same IDs to the stars included in the analyzed areas. The developed algorithm was applied to the data of DO Dra, TT Ari, RXSJ1803, and MU Cam. In these fields, we found 13 variable stars, five of which were new variable stars not previously reported. Our period analysis algorithm were tested in the case of observation data mixed with various fields of view because the observations were carried with 2K CCD as well as 4K CCD at the CBNUO. Our results show that variable stars can be detected using our algorithm even with observational data for which the field of view has changed. Our algorithm is useful to detect new variable stars and analyze them based on existing time-series data. The developed algorithm can play an important role as a recycling technique for used data

유정압테이블의 정밀도향상을 위한 수정가공 알고리즘 (Corrective Machining Algorithm for Improving the Motion Accuracy of Hydrostatic Table)

  • 박천홍;이찬흥;이후상
    • 한국정밀공학회지
    • /
    • 제19권6호
    • /
    • pp.62-69
    • /
    • 2002
  • For improving the motion accuracy of hydrostatic table, corrective machining algorithm is proposed in this paper. The algorithm consists of three main processes. reverse analysis is performed firstly to estimate rail profile from measured linear and angular motion error, in the algorithm. For the next step, corrective machining information is decided as referring to the estimating rail profile. Finally, motion errors on correctively machined rail are analized by using motion error analysis method proposed in the previous paper. These processes can be iterated until the analized motion errors are satisfied with target accuracy. In order to verify the validity of the algorithm theoretically, motion errors by the estimated rail, after corrective machining, are compared with motion errors by true rail assumed as the measured value. Estimated motion errors show good agreement with assumed values, and it is confirmed that the algorithm is effective to acquire the corrective machining information to improve the accuracy of hydrostatic table.