• Title/Summary/Keyword: Cosine Rule

Search Result 17, Processing Time 0.03 seconds

A Study on the Vector Space by Taking the Tetra-cosine Rule (Tetra-cosine Rule 에 의한 Vector Space고찰)

  • 김건희;이수종;김홍건
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1997.04a
    • /
    • pp.389-394
    • /
    • 1997
  • Consider a tetrhedron is composed of six dihedral angles .phi.(i=1,2..., 6), and a vertex of a tetrahedron is also three dihedral angles. It will assume that a vertex A, for an example, is composed of there angles definded such as .alpha..betha. and .gamma. !. then there is a corresponding angle can be given as .phi1.,.phi2.,.phi3.. Here, in order to differentiate between a conventional triangle and dihedral angle, if a dihedral angle degined in this paper is symbolized as .phi..LAMBDA.,the value of cos.theta.of .phi./sab a/, in a trigonometric function rule,can be defined to tecos.phi..LAMBD/sab A/., and it is defined as a tetradedral cosine .phi. or simply called a tecos.phi.. Moreover, in a simillar method, the dihedral angle of tetrahedron .phi..LAMBDA. is given as : value of sin .theta. can defind a tetra-sin.phi..LAMBDA., and value of tan .theta. of .phi..LAMBDA. is a tetra-tan .phi..LAMBDA. By induction it can derive that a tetrahedral geometry on the basis of suggesting a geometric tetrahedron

  • PDF

Aerostatic load on the deck of cable-stayed bridge in erection stage under skew wind

  • Li, Shaopeng;Li, Mingshui;Zeng, Jiadong;Liao, Haili
    • Wind and Structures
    • /
    • v.22 no.1
    • /
    • pp.43-63
    • /
    • 2016
  • In conventional buffeting theory, it is assumed that the aerostatic coefficients along a bridge deck follow the strip assumption. The validity of this assumption is suspect for a cable-stayed bridge in the construction stages, due to the effect of significant aerodynamic interference from the pylon. This situation may be aggravated in skew winds. Therefore, the most adverse buffeting usually occurs when the wind is not normal to bridge axis, which indicates the invalidity of the traditional "cosine rule". In order to refine the studies of static wind load on the deck of cable-stayed bridge under skew wind during its most adverse construction stage, a full bridge 'aero-stiff' model technique was used to identify the aerostatic loads on each deck segment, in smooth oncoming flow, with various yaw angles. The results show that the shelter effect of the pylon may not be ignored, and can amplify the aerostatic loading on the bridge deck under skew winds ($10^{\circ}-30^{\circ}$) with certain wind attack angles, and consequently results in the "cosine rule" becoming invalid for the buffeting estimation of cable-stayed bridge during erection for these wind directions.

A Study on Teaching Methods of Extension of Cosine Rule Using Analogy (유추를 활용한 코사인 법칙의 일반화 지도방안)

  • Kim, Sungsoo;Park, Dal-Won
    • Journal of the Korean School Mathematics Society
    • /
    • v.16 no.4
    • /
    • pp.927-941
    • /
    • 2013
  • In this paper, we investigate and analysis high school students' generalization of cosine rule using analogy, and we study teaching and learning methods improving students' analogical thinking ability to improve mathematical thinking process. When students can reproduce what they have learned through inductive reasoning process or analogical thinking process and when they can justify their own mathematical knowledge through logical inference or deductive reasoning process, they can truly internalize what they learn and have an ability to use it in various situations.

  • PDF

The proposition of cosine net confidence in association rule mining (연관 규칙 마이닝에서의 코사인 순수 신뢰도의 제안)

  • Park, Hee Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.25 no.1
    • /
    • pp.97-106
    • /
    • 2014
  • The development of big data technology was to more accurately predict diversified contemporary society and to more efficiently operate it, and to enable impossible technique in the past. This technology can be utilized in various fields such as the social science, economics, politics, cultural sector, and science technology at the national level. It is a prerequisite to find valuable information by data mining techniques in order to analyze big data. Data mining techniques associated with big data involve text mining, opinion mining, cluster analysis, association rule mining, and so on. The most widely used data mining technique is to explore association rules. This technique has been used to find the relationship between each set of items based on the association thresholds such as support, confidence, lift, similarity measures, etc.This paper proposed cosine net confidence as association thresholds, and checked the conditions of interestingness measure proposed by Piatetsky-Shapiro, and examined various characteristics. The comparative studies with basic confidence and cosine similarity, and cosine net confidence were shown by numerical example. The results showed that cosine net confidence are better than basic confidence and cosine similarity because of the relevant direction.

An Extended Work Architecture for Online Threat Prediction in Tweeter Dataset

  • Sheoran, Savita Kumari;Yadav, Partibha
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.97-106
    • /
    • 2021
  • Social networking platforms have become a smart way for people to interact and meet on internet. It provides a way to keep in touch with friends, families, colleagues, business partners, and many more. Among the various social networking sites, Twitter is one of the fastest-growing sites where users can read the news, share ideas, discuss issues etc. Due to its vast popularity, the accounts of legitimate users are vulnerable to the large number of threats. Spam and Malware are some of the most affecting threats found on Twitter. Therefore, in order to enjoy seamless services it is required to secure Twitter against malicious users by fixing them in advance. Various researches have used many Machine Learning (ML) based approaches to detect spammers on Twitter. This research aims to devise a secure system based on Hybrid Similarity Cosine and Soft Cosine measured in combination with Genetic Algorithm (GA) and Artificial Neural Network (ANN) to secure Twitter network against spammers. The similarity among tweets is determined using Cosine with Soft Cosine which has been applied on the Twitter dataset. GA has been utilized to enhance training with minimum training error by selecting the best suitable features according to the designed fitness function. The tweets have been classified as spammer and non-spammer based on ANN structure along with the voting rule. The True Positive Rate (TPR), False Positive Rate (FPR) and Classification Accuracy are considered as the evaluation parameter to evaluate the performance of system designed in this research. The simulation results reveals that our proposed model outperform the existing state-of-arts.

An Innovative Approach of Bangla Text Summarization by Introducing Pronoun Replacement and Improved Sentence Ranking

  • Haque, Md. Majharul;Pervin, Suraiya;Begum, Zerina
    • Journal of Information Processing Systems
    • /
    • v.13 no.4
    • /
    • pp.752-777
    • /
    • 2017
  • This paper proposes an automatic method to summarize Bangla news document. In the proposed approach, pronoun replacement is accomplished for the first time to minimize the dangling pronoun from summary. After replacing pronoun, sentences are ranked using term frequency, sentence frequency, numerical figures and title words. If two sentences have at least 60% cosine similarity, the frequency of the larger sentence is increased, and the smaller sentence is removed to eliminate redundancy. Moreover, the first sentence is included in summary always if it contains any title word. In Bangla text, numerical figures can be presented both in words and digits with a variety of forms. All these forms are identified to assess the importance of sentences. We have used the rule-based system in this approach with hidden Markov model and Markov chain model. To explore the rules, we have analyzed 3,000 Bangla news documents and studied some Bangla grammar books. A series of experiments are performed on 200 Bangla news documents and 600 summaries (3 summaries are for each document). The evaluation results demonstrate the effectiveness of the proposed technique over the four latest methods.

Pedagogical implication of Euclid's proof about Pythagorean theorem (피타고라스 정리에 대한 Euclid의 증명이 갖는 교육적 함의)

  • 박문환;홍진곤
    • School Mathematics
    • /
    • v.4 no.3
    • /
    • pp.347-360
    • /
    • 2002
  • This study analyzed the mathematical and didactical contexts of the Euclid's proof about Pythagorean theorem and compared with the teaching methods about Pythagorean theorem in school mathematics. Euclid's proof about Pythagorean theorem which does not use the algebraic methods provide students with the spatial intuition and the geometric thinking in school mathematics. Furthermore, it relates to various mathematical concepts including the cosine rule, the rotation, and the transfor-mation which preserve the area, and so forth. Visual demonstrations can help students analyze and explain mathematical relationship. Compared with Euclid's proof, Algebraic proof about Pythagorean theorem is very simple and it supplies the typical example which can give the relationship between algebraic and geometric representation. However since it does not include various spatial contexts, it forbid many students to understand Pythagorean theorem intuitively. Since both approaches have positive and negative aspects, reciprocal complementary role is required in pedagogical aspects.

  • PDF

Adaptive Postprocessing Technique for Enhancement of DCT-coded Images (DCT 기반 압축 영상의 화질 개선을 위한 적응적 후처리 기법)

  • Kim, Jong-Ho;Park, Sang-Hyun;Kang, Eui-Sung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.930-933
    • /
    • 2011
  • This paper addresses an adaptive postprocessing method applied in the spatial domain for block-based discrete cosine transform (BDCT) coded images. The proposed algorithm is designed by a serial concatenation of a 1D simple smoothing filter and a 2D directional filter. The 1D smoothing filter is applied according to the block type, which is determined by an adaptive threshold. It depends on local statistical properties, and updates block types appropriately by a simple rule, which affects the performance of deblocking processes. In addition, the 2D directional filter is introduced to suppress the ringing effects at the sharp edges and the block discontinuities while preserving true edges and textural information. Comprehensive experiments indicate that the proposed algorithm outperforms many deblocking methods in the literature, in terms of PSNR and subjective visual quality evaluated by GBIM.

  • PDF

Analysis of High School Mathematics Curricula of Japan, Taiwan, Hongkong, Finland, and China (고등학교 수학과 교육과정 개선을 위한 외국 교육과정의 탐색 - 일본, 대만, 홍콩, 핀란드, 중국을 중심으로 -)

  • Kim, Sun Hee
    • Journal of Educational Research in Mathematics
    • /
    • v.24 no.4
    • /
    • pp.481-498
    • /
    • 2014
  • This study analyzed Japan, Taiwan, Hongkong, Finland, and China National Mathematics Curriculums to find the implications to improve Korean High school Mathematics curriculum. First, at the aspect of mathematics education goals, we can consider to select the logical thinking, the use of mathematics, and the mathematical inquiry in the cognitive domain and self-confidence, brevity, a sense of accomplishment, and the value of mathematics in the affective domain. Second, when high students consider their course, he/she should be able to select mathematics subjects according to her/his desired career and/or major. Third, I found that sine rule, cosine rule and correlation were included as compulsory contents of Japan, Taiwan and China but not Korea. Finally I suggest that we need to show and explain kindly the range of the contents and to develop the Korean mathematics curriculum model.

  • PDF

Similarity Measurement Between Titles and Abstracts Using Bijection Mapping and Phi-Correlation Coefficient

  • John N. Mlyahilu;Jong-Nam Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.3
    • /
    • pp.143-149
    • /
    • 2022
  • This excerpt delineates a quantitative measure of relationship between a research title and its respective abstract extracted from different journal articles documented through a Korean Citation Index (KCI) database published through various journals. In this paper, we propose a machine learning-based similarity metric that does not assume normality on dataset, realizes the imbalanced dataset problem, and zero-variance problem that affects most of the rule-based algorithms. The advantage of using this algorithm is that, it eliminates the limitations experienced by Pearson correlation coefficient (r) and additionally, it solves imbalanced dataset problem. A total of 107 journal articles collected from the database were used to develop a corpus with authors, year of publication, title, and an abstract per each. Based on the experimental results, the proposed algorithm achieved high correlation coefficient values compared to others which are cosine similarity, euclidean, and pearson correlation coefficients by scoring a maximum correlation of 1, whereas others had obtained non-a-number value to some experiments. With these results, we found that an effective title must have high correlation coefficient with the respective abstract.