• 제목/요약/키워드: Bad

Search Result 3,360, Processing Time 0.033 seconds

A Method in Evaluating Mechanical Design Plans With Fuzzy Theory

  • Faliang, Gao
    • 한국지능시스템학회:학술대회논문집
    • /
    • 한국퍼지및지능시스템학회 1993년도 Fifth International Fuzzy Systems Association World Congress 93
    • /
    • pp.1163-1166
    • /
    • 1993
  • This paper studies the evaluation of mechanical design plans through fuzzy cluster. Plans are classified into two sets, 'good' and 'bad'. The membership of a plan to the 'good' set is numerically equal to the distance to the 'bad' set. The central parameter of the 'good' set is defined as '1', and that of the 'bad' set '0'. This will greatly simplify calculations. The result of the calculating example proves the method available.

  • PDF

전력계통 상태주정에서의 불량정보 검출기법 (Bad Data Detection Method in Power System State Estimation)

  • 최상봉;문영현
    • 대한전기학회논문지
    • /
    • 제40권2호
    • /
    • pp.144-153
    • /
    • 1991
  • This paper presents an algorithm to improve accuracy and reliability in the state estimation of contaminated bad data. The conventional algorithms for detection of bad data have the problems of excessive memory requirements and long computation time. In order to overcome these problems, a measurement compensation approach is proposed to reduce computation time, and the partitioned measurement error model has the advantage of remarkable reduction in computation time and memory requirements in estimated error computation. The proposed algorithm has been tested for IEEE sample systems, which shows its applicability to on-line power systems.

칼라 영상처리에 의한 결주 및 불량모 인식 (Recognition of Missing and Bad Seedings via Color Image Precessing)

  • 손재룡;강창호;한길수;정성림;권기영
    • Journal of Biosystems Engineering
    • /
    • 제26권3호
    • /
    • pp.253-262
    • /
    • 2001
  • This study was conducted to develop the vision system of a robotic transplanter for plug-seedling. A color image processing algorithm was developed to identify and locate empty cells and bad plants in the seedling tray. The image of pepper and tomato seedling tray was segmented into regions of plants, frame and soil using threshold technique which utilized Q of YIQ for finding leaves and H of HSI for finding frame of tray in the color coordinate system. The recognition system was able to successfully identify empty cells and bad seeding and locate their two-dimensional locations. The overall success rate of the recognition system was about 99%.

  • PDF

신경회로망을 이용한 불량 Data 처리에 관한 연구 (A Study for Bad Data Processing by a Neural Network)

  • 김익현;박종근
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1989년도 추계학술대회 논문집 학회본부
    • /
    • pp.186-190
    • /
    • 1989
  • A Study for Bad Data Processing in state estimation by a Neural Network is presented. State estimation is the process of assigning a value to an unknown system state variable based on measurement from that system according to some criteria. In this case, the ability to detect and identify bad measurements is extremely valuable, and much time in oder to achieve the state estimation is needed. This paper proposed new bad data processing using Neural Network in order to settle it. The concept of neural net is a parallel distributed processing. In this paper, EBP (Error Back Propagation) algorithm based on three layered feed forward network is used.

  • PDF

NOTE ON THE NEGATIVE DECISION NUMBER IN DIGRAPHS

  • Kim, Hye Kyung
    • East Asian mathematical journal
    • /
    • 제30권3호
    • /
    • pp.355-360
    • /
    • 2014
  • Let D be a finite digraph with the vertex set V (D) and the arc set A(D). A function f : $V(D){\rightarrow}\{-1,\;1\}$ defined on the vertices of a digraph D is called a bad function if $f(N^-(v)){\leq}1$ for every v in D. The weight of a bad function is $f(V(D))=\sum\limits_{v{\in}V(D)}f(v)$. The maximum weight of a bad function of D is the the negative decision number ${\beta}_D(D)$ of D. Wang [4] studied several sharp upper bounds of this number for an undirected graph. In this paper, we study sharp upper bounds of the negative decision number ${\beta}_D(D)$ of for a digraph D.

철도차량의 곡선 구간별 주행안전성 평가 (A Running Safety Assessment for Curved Section for a Railway Vehicle)

  • 이승일;이희성
    • 한국소음진동공학회논문집
    • /
    • 제18권12호
    • /
    • pp.1301-1309
    • /
    • 2008
  • The curved portion fur each section running safety evaluation interpretation according to the track condition for improving the curved portion passage rate of a vehicle by using the multibody analysis model of the Saemaeul train was carried out. As a result, The excess of cant reaches the bad effect to the running safety in case the radius of curvature is small. In case the radius of curvature was large, we could confirm that the deficiency of cant reached the bad effect to the running safety. In the curved portion, the circular curve section most badly showed the running safety. The deficiency of curve length reaches the bad to the running safety. In the curved portion, the circular curve section most badly showed the running safety. Therefore the track condition(cant, transition curve length, etc) can reach the bad effect to the running safety of a vehicle, the exact design is required.

Novel Association of a Familial TGFBR1 Mutation in Loeys-Dietz Syndrome with Concomitant Hematologic Malignancy

  • Disha, Kushtrim;Schulz, Solveig;Breuer, Martin;Owais, Tamer;Girdauskas, Evaldas;Kuntze, Thomas
    • Journal of Chest Surgery
    • /
    • 제52권5호
    • /
    • pp.376-379
    • /
    • 2019
  • Concomitant Loeys-Dietz syndrome (LDS) and hematologic malignancies are exceptionally rare. This is the first report of a patient operated on for aortic root dilation who had been previously diagnosed with LDS and B-cell-lymphoma. After completion of chemotherapy and complete remission, an elective valve-sparing aortic root replacement (using the David-V method) was performed. Due to the positive family history, preoperative genetic counseling was conducted, and revealed LDS with a TGFBR1 (transforming growth factor beta receptor type I) mutation in 6 probands of the family, albeit in 1 of them posthumously. This missense mutation has been previously described in relation to aortic dissection, but a causative relationship to malignancy has so far neither been proposed nor proven.

Energy Bad Smells 기반 소모전력 절감을 위한 코드 리팩토링 기법 (Code Refactoring Techniques Based on Energy Bad Smells for Reducing Energy Consumption)

  • 이제욱;김두환;홍장의
    • 정보처리학회논문지:소프트웨어 및 데이터공학
    • /
    • 제5권5호
    • /
    • pp.209-220
    • /
    • 2016
  • 최근 스마트폰, 태블릿과 같은 기기의 사용량이 증가하면서, 이에 탑재되는 소프트웨어는 더욱 복잡해지고 규모가 커지고 있다. 배터리의 전력으로 구동되는 모바일 기기들은 전력 공급의 한계로 인해 운용시간을 증가시키는 것이 중요한 이슈이다. 최근에는 소프트웨어 동작이 하드웨어 구동을 통해 전력 소모를 일으킨다는 점에서, 효율적인 동작 패턴을 갖는 소프트웨어 개발에 대한 연구들이 진행되고 있다. 그러나 모바일 기기에 탑재되는 소프트웨어는 그 개발 주기가 짧은 경우가 많아 최적화와 전력 소모량을 반영하기 어려운 경우가 많다. 따라서 본 연구에서는 소모전력 절감을 위한 코드 리팩토링 기법을 제안하여, 소프트웨어 개발 및 유지보수에서 보다 용이하게 저전력 요구사항을 충족시키고자 한다. 이를 위해 전력 소모량을 감소시킬 수 있는 코드 패턴에 대하여 Energy Bad Smell을 식별하고, 이를 제거하기 위한 새로운 코드 리팩토링 기법을 제안하며, 실험을 통해 그 효용성을 검증하였다.

BadUSB 취약점 분석 및 대응 방안 (Analysis and Countermeasure for BadUSB Vulnerability)

  • 서준호;문종섭
    • 대한임베디드공학회논문지
    • /
    • 제12권6호
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

일상 생활 중의 나쁜 자세에 따른 흉·요추 관절의 기구학 해석 (Kinematic Analysis of Thoraco-Lumbar Spine in Bad Postures During Daily Life)

  • 한아름;정지인;풍균;김윤혁
    • 대한기계학회논문집B
    • /
    • 제36권11호
    • /
    • pp.1105-1110
    • /
    • 2012
  • 척추는 인간의 근골격계 건강에 큰 영향을 미치는 신체 부위 중 하나이다. 최근에 고령화 사회에 진입하게 되면서 요통과 같은 척추 질환이 급속하게 증가하고 있다. 이러한 척추 질환의 요인에는 선천적인 척추 장애나 스포츠 및 교통사고의 부상뿐만 아니라 일상생활에서 반복적으로 취하는 나쁜 자세도 포함된다. 잘못된 척추 자세는 척추 디스크에 압력을 주어 퇴행성 변화를 가져옴으로써 척추를 변형시키고 척추질환을 일으킨다. 따라서 본 연구에서는 여러 나쁜 자세를 취했을 때 흉추와 요추 관절의 3 차원 관절 각도를 분석하였다. 그 결과로부터 일상생활에서의 나쁜 자세가 굽힘/신전, 측면 굽힘, 축 회전 방향으로 척추 관절에 각도 변형을 일으키고 정상범위에서 벗어날 수 있음을 알 수 있었다. 향후 연구로써 척추관절의 각도변화가 디스크와 인대 및 근육 등에 미치는 영향에 대한 연구가 필요하다 생각된다.