• Title/Summary/Keyword: CA Algorithm

Search Result 228, Processing Time 0.025 seconds

Combustion Control of Refuse Incineration Plant using Fuzzy Model and Genetic Algorithms (퍼지 모델과 유전 알고리즘을 이용한 쓰레기 소각로의 연소 제어)

  • Park, Jong-Jin;Choi, Kyu-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2116-2124
    • /
    • 2000
  • In this paper we propose combustion control of refuse incineration plant using fuzzy model and genetic algorithm. At first fuzzy modelling is performed to obtain fuzzy model of the refuse incineration plant and obtained fuzzy model predicts outputs of the plant when inputs are given. Fuzzy model ca be used to obtain control strategy, and train and enhance operators' skill by simulating the plant. Then genetic algorithms search and find out optimal control inputs over all possible solutions in respect to desired outputs and these are inserted to plant. In order to testify proposed control method, computer simulation was carried out. As a result, ISE of fuzzy model of refuse incineration plant is 0.015 and ITAE of control by proposed method, 352 which is better than that by manual operation.

  • PDF

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Handoff QoS guarnatee on ATM-based wired/wireless integrated network (ATM기반 유무선 통합망에서 이동성으로 인한 핸드오프 QoS보장 방안)

  • 장경훈;강경훈;심재정;김덕진
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.10
    • /
    • pp.33-51
    • /
    • 1997
  • On ATM-based wired/wireless integrated network, we apply the connection re-routing method[1] which reduced the inter-cluster handoff delay by reserving VPI/VCLs for possible inter-cluster handoff calls in advance. Additionally, we propose wired resource reservation methods, which are ausiliary method and split method, for handoff QoS guarantee of various expected services. The characteristics of these methods reserve wired connection resources based on the information on the possible inter-cluster handoff calls. With mathematical analysis, we also propose each algorithm and cost function for deciding an optimal amount in reserving resources. With numberical examples, we can see that the auxiliary method effectively reduces the cost in all cases(.alpha.>.betha., .alpha.=.betha., and .alpha.<.betha.). The split method has a little cost-reduction effects, when handoffs call does not have priority over new calls (that is, .alpha..leq..betha.) and the total capacity is relatively large. In other cases, the split method, however, has effective cost-reduction effects. The numerical resutls show that these reservation methods ca flexibly cope with the time-variant environment and meet the QoS requriements on the inter-cluster handoff calls.

  • PDF

A Simulation of the Myocardium Activation Process using the Discrete Event Cell Space Model (DEVCS 모델을 사용한 심근 활성화과정의 시뮬레이션)

  • Kim Gwang-Nyeon;Jung Dong-Keun;Kim Gi-Ryon;Choi Byeong-Cheol;Lee Jung-Tae;Jeon Gye-Rok
    • Journal of the Korea Society for Simulation
    • /
    • v.13 no.4
    • /
    • pp.1-16
    • /
    • 2004
  • The modelling and simulation of the activation process for the heart system is meaningful to understand special excitatory and conductive system in the heart and to study cardiac functions because the heart activation conducts through this system. This thesis proposes two dimensional cellular automaton(CA) model for the activation process of the myocardium and conducted simulation by means of discrete time and discrete event algorithm. In the model, cells are classified into anatomically similar characteristic parts of the heart and each of cells has a set of cells with preassigned properties. Each cell in this model has state variables to represent the state of the cell and has some state transition rules to change values of state variables executed by state transition function. The state transition rule is simple as follows. First, the myocardium cell at rest stay in passive state. Second, if any one of neighborhood cell in the myocardium cell is active state then the state is change from passive to active state. Third, if cell's state is an active then automatically go to the refractory state after activation phase. Four, if cell's state is refractory then automatically go to the passive state after refractory phase. These state transition is processed repeatedly in all cells through the termination of simulation.

  • PDF

Thank with CA method of biologic algorithm (지문 생체알고리즘을 통한 개인 인증 연구)

  • Jung, Ji-Moon; Shin, Jung-Gil;Jang, Dong-Jin;Choi, Sung
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.253-258
    • /
    • 2000
  • 오늘날 많은 국가들이 전자상거래 부문을 세계 여러 국가들 보다 빨리 선점하기 위해서 많이 노력하고 있다. 그리고 전자상거래가 활성화된 국가에서는 앞선 기술로서 가상공간에서의 자국의 위치를 높이고 있다. 우리나라도 전자상거래가 활성화되는 과정에 있다. 그러나 가상공간 즉, 인터넷에서 해결되지 못한 문제들이 많이 있다. 그 중에서도 세계 여러 나라들도 해결하지 못한 문제 바로 보안에 관한 문제이다. 인터넷에서의 보안문제는 여러 가지 문제들이 있다. 그러나 본 논문에서는 개인 인증에 관하여 중점적으로 다루려 한다. 개인 인증 방법에는 PKI 개념에서 RSA 암호알고리즘과, 전자서명 등이 있다. 그리고 공인 인증기관에서 개인에 대한 인증을 해 주는 경우가 있다. 현재 이러한 인증방법에 대해서 알아보고, 문제점과 함께 해결방안으로 생체알고리즘을 통한 인증 방법, 특히 지문에 대해서 개인 인증 방법을 다루려 한다. 특히 지문을 통한 생체알고리즘은 패턴 인식방향 보다 이미지에 대한 직접적인 의미 부여를 통해서 전송속도와 전송량을 줄이려고 노력했다. 이런 방식으로 얻어낸 이미지를 전자주민 카드 지문 시스템과 상호 호환이 될 수 있도록 연구하였다.

  • PDF

Algorithms for Classifying the Results at the Baccalaureate Exam-Comparative Analysis of Performances

  • Marcu, Daniela;Danubianu, Mirela;Barila, Adina;Simionescu, Corina
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.35-42
    • /
    • 2021
  • In the current context of digitalization of education, the use of modern methods and techniques of data analysis and processing in order to improve students' school results has a very important role. In our paper, we aimed to perform a comparative study of the classification performances of AdaBoost, SVM, Naive Bayes, Neural Network and kNN algorithms to classify the results obtained at the Baccalaureate by students from a college in Suceava, during 2012-2019. To evaluate the results we used the metrics: AUC, CA, F1, Precision and Recall. The AdaBoost algorithm achieves incredible performance for classifying the results into two categories: promoted / rejected. Next in terms of performance is Naive Bayes with a score of 0.999 for the AUC metric. The Neural Network and kNN algorithms obtain scores of 0.998 and 0.996 for AUC, respectively. SVM shows poorer performance with the score 0.987 for AUC. With the help of the HeatMap and DataTable visualization tools we identified possible correlations between classification results and some characteristics of data.

Design and characterization of a Muon tomography system for spent nuclear fuel monitoring

  • Park, Chanwoo;Baek, Min Kyu;Kang, In-soo;Lee, Seongyeon;Chung, Heejun;Chung, Yong Hyun
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.601-607
    • /
    • 2022
  • In recent years, monitoring of spent nuclear fuel inside dry cask storage has become an important area of national security. Muon tomography is a useful method for monitoring spent nuclear fuel because it uses high energy muons that penetrate deep into the target material and provides a 3-D structure of the inner materials. We designed a muon tomography system consisting of four 2-D position sensitive detector and characterized and optimized the system parameters. Each detector, measuring 200 × 200 cm2, consists of a plastic scintillator, wavelength shifting (WLS) fibers and, SiPMs. The reconstructed image is obtained by extracting the intersection of the incoming and outgoing muon tracks using a Point-of-Closest-Approach (PoCA) algorithm. The Geant4 simulation was used to evaluate the performance of the muon tomography system and to optimize the design parameters including the pixel size of the muon detector, the field of view (FOV), and the distance between detectors. Based on the optimized design parameters, the spent fuel assemblies were modeled and the line profile was analyzed to conduct a feasibility study. Line profile analysis confirmed that muon tomography system can monitor nuclear spent fuel in dry storage container.

Metaheuristic-reinforced neural network for predicting the compressive strength of concrete

  • Hu, Pan;Moradi, Zohre;Ali, H. Elhosiny;Foong, Loke Kok
    • Smart Structures and Systems
    • /
    • v.30 no.2
    • /
    • pp.195-207
    • /
    • 2022
  • Computational drawbacks associated with regular predictive models have motivated engineers to use hybrid techniques in dealing with complex engineering tasks like simulating the compressive strength of concrete (CSC). This study evaluates the efficiency of tree potential metaheuristic schemes, namely shuffled complex evolution (SCE), multi-verse optimizer (MVO), and beetle antennae search (BAS) for optimizing the performance of a multi-layer perceptron (MLP) system. The models are fed by the information of 1030 concrete specimens (where the amount of cement, blast furnace slag (BFS), fly ash (FA1), water, superplasticizer (SP), coarse aggregate (CA), and fine aggregate (FA2) are taken as independent factors). The results of the ensembles are compared to unreinforced MLP to examine improvements resulted from the incorporation of the SCE, MVO, and BAS. It was shown that these algorithms can considerably enhance the training and prediction accuracy of the MLP. Overall, the proposed models are capable of presenting an early, inexpensive, and reliable prediction of the CSC. Due to the higher accuracy of the BAS-based model, a predictive formula is extracted from this algorithm.

Key-based dynamic S-Box approach for PRESENT lightweight block cipher

  • Yogaraja CA;Sheela Shobana Rani K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3398-3415
    • /
    • 2023
  • Internet-of-Things (IoT) is an emerging technology that interconnects millions of small devices to enable communication between the devices. It is heavily deployed across small scale to large scale industries because of its wide range of applications. These devices are very capable of transferring data over the internet including critical data in few applications. Such data is exposed to various security threats and thereby raises privacy-related concerns. Even devices can be compromised by the attacker. Modern cryptographic algorithms running on traditional machines provide authentication, confidentiality, integrity, and non-repudiation in an easy manner. IoT devices have numerous constraints related to memory, storage, processors, operating systems and power. Researchers have proposed several hardware and software implementations for addressing security attacks in lightweight encryption mechanism. Several works have made on lightweight block ciphers for improving the confidentiality by means of providing security level against cryptanalysis techniques. With the advances in the cipher breaking techniques, it is important to increase the security level to much higher. This paper, focuses on securing the critical data that is being transmitted over the internet by PRESENT using key-based dynamic S-Box. Security analysis of the proposed algorithm against other lightweight block cipher shows a significant improvement against linear and differential attacks, biclique attack and avalanche effect. A novel key-based dynamic S-Box approach for PRESENT strongly withstands cryptanalytic attacks in the IoT Network.

Application of Texture Features algorithm using Computer Aided Diagnosis of Papillary Thyroid Cancer in the Ultrasonography (초음파영상에서 갑상선 결절의 컴퓨터자동진단을 위한 Texture Features 알고리즘 응용)

  • Ko, Seong-Jin;Lee, Jin-Soo;Ye, Soo-Young;Kim, Changsoo
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.303-310
    • /
    • 2013
  • Thyroid nodular disease is the most frequently appeared in thyroid disease. Thyroid ultrasonography offers location of nodules, size, the number, information of internal echo characteristic. Thus, it makes possible to sort high-risk nodule containing high possibility about thyroid cancer and to induct precisely when take a Fine Needle Biopsy Aspiration. On thyroid nodule, the case which is diagnosed as malignant is less than 5% but screening test is very important on ultrasound and also must be reduced unnecessary procedure. Therefore, in this study an approach for describing a region is to quantity its texture content. We applied TFA algorithm on case which has been pathologically diagnosed as papillary thyroid cancer. we obtained experiment image which set the ROI on ultrasound and cut the $50{\times}50$ pixel size, histogram equalization. Consequently, Disease recognition detection efficiency of GLavg, SKEW, UN, ENT parameter were high as 91~100%. It is suggestion about possibility on CAD which distinguishes thyroid nodule. In addition, it will be helpful to differential diagnosis of thyroid nodule. If the study on additional parameter algorithm is continuously progressed from now on, it is able to arrange practical base on CAD and it is possible to apply various disease in the thyroid US.