• Title/Summary/Keyword: Data systems

Search Result 25,314, Processing Time 0.052 seconds

Data-based Control for Linear Time-invariant Discrete-time Systems

  • Park, U. S.;Ikeda, M.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1993-1998
    • /
    • 2004
  • This paper proposes a new framework for control system design, called the data-based control approach or data space approach, in which the input and output data of a dynamical system is directly and solely used to analyze or design a control system without the employment of any mathematical models like transfer functions, state space equations, and kernel representations. Since, in this approach, most of the analysis and design processes are carried out in the domain of the data space, we introduce some notions of geometrical objects, e.g., the openloop and closed-loop data spaces, which serve as the system representations in the data space. In addition, we establish a relationship between the open-loop and closed-loop data spaces that the closed-loop data space is contained in the open-loop data space as one of its subspaces. By using this relationship, we can derive the data-based stabilization condition for a linear time-invariant discrete-time system, which leads to a linear matrix inequality with a rank constraint.

  • PDF

Selection Criteria of Target Systems for Quality Management of National Defense Data (국방데이터 품질관리를 위한 대상 체계 선정 기준)

  • Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.155-160
    • /
    • 2023
  • In principle, data from all databases and systems managed by the Ministry of Defense or public institutions must be guaranteed to have a certain level of quality or higher, but since most information systems are built and operated, data quality management for all systems is realistically limited. Most defense data is not disclosed due to the nature of the work, and many systems are strategically developed or integrated and managed by the military depending on the need and importance of the work. In addition, many types of data that require data quality management are being accumulated and generated, such as sensor data generated from weapon systems, unstructured data, and artificial intelligence learning data. However, there is no data quality management guide for defense data and a guide for selecting quality control targets, and the selection criteria are ambiguous to select databases and systems for quality control of defense data according to the standards of the public data quality management manual. Depends on the person in charge. Therefore, this paper proposes criteria for selecting a target system for quality control of defense data, and describes the relationship between the proposed selection criteria and the selection criteria in the existing manual.

Genetic Algorithm Application to Machine Learning

  • Han, Myung-mook;Lee, Yill-byung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.11 no.7
    • /
    • pp.633-640
    • /
    • 2001
  • In this paper we examine the machine learning issues raised by the domain of the Intrusion Detection Systems(IDS), which have difficulty successfully classifying intruders. There systems also require a significant amount of computational overhead making it difficult to create robust real-time IDS. Machine learning techniques can reduce the human effort required to build these systems and can improve their performance. Genetic algorithms are used to improve the performance of search problems, while data mining has been used for data analysis. Data Mining is the exploration and analysis of large quantities of data to discover meaningful patterns and rules. Among the tasks for data mining, we concentrate the classification task. Since classification is the basic element of human way of thinking, it is a well-studied problem in a wide variety of application. In this paper, we propose a classifier system based on genetic algorithm, and the proposed system is evaluated by applying it to IDS problem related to classification task in data mining. We report our experiments in using these method on KDD audit data.

  • PDF

A Study of Data Slaving Software Module for Instrumentation Systems on Multi-Target Environment (다중표적 환경에서 추적시스템을 위한 연동 소프트웨어 모듈 연구)

  • Oh, Se-Jin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.14 no.4
    • /
    • pp.622-629
    • /
    • 2011
  • In this paper, you can see the structure of data slaving software module that is in use on flight test and result of the test with the slaving. The data slaving software module has many functions, data slaving for various instrumentation systems(instrumentation radars, telemetry systems for missile, aircraft and so on), setting some slaving group for multi-target, communicating with the instrumentation systems in a far away site and sending a specific value as slaving data. This fits the requests for flight test that is being performed and improves performance of the instrumentation systems.

DSS Architectures to Support Data Mining Activities for Supply Chain Management (데이터 마이닝을 활용한 공급사슬관리 의사결정지원시스템의 구조에 관한 연구)

  • Jhee, Won-Chul;Suh, Min-Soo
    • Asia pacific journal of information systems
    • /
    • v.8 no.3
    • /
    • pp.51-73
    • /
    • 1998
  • This paper is to evaluate the application potentials of data mining in the areas of Supply Chain Management (SCM) and to suggest the architectures of Decision Support Systems (DSS) that support data mining activities. We first briefly introduce data mining and review the recent literatures on SCM and then evaluate data mining applications to SCM in three aspects: marketing, operations management and information systems. By analyzing the cases about pricing models in distribution channels, demand forecasting and quality control, it is shown that artificial intelligence techniques such as artificial neural networks, case-based reasoning and expert systems, combined with traditional analysis models, effectively mine the useful knowledge from the large volume of SCM data. Agent-based information system is addressed as an important architecture that enables the pursuit of global optimization of SCM through communication and information sharing among supply chain constituents without loss of their characteristics and independence. We expect that the suggested architectures of intelligent DSS provide the basis in developing information systems for SCM to improve the quality of organizational decisions.

  • PDF

Information Strategy Planning for Fisheries Policy Information Systems Using the Data Warehouse (Data Warehouse 기법을 이용한 수산정책정보시스템 구축)

  • 어윤양;김하균;이재정
    • The Journal of Fisheries Business Administration
    • /
    • v.31 no.2
    • /
    • pp.119-132
    • /
    • 2000
  • One of most important wort to build Fisheries Policy Information Systems(FPIS) is related to connect the data warehouse between fisheries departments, This paper presents the developing strategies to build the FPIS. First, developing the FPIS needs to compensate the laws and regulations with assistance of fisheries departments. Second, FPIS developer needs to cooperate the related fisheries departments deeply, Third, developing the data warehouse will be contribute to improve criterion and statistics of fisheries data. Forth, For experts of systems use the FPIS, they are needed to educate for appling the systems in the fisheries environments.

  • PDF

Use of Nondestructive Evaluation Methods in Bridge Management Systems (교량유지관리시스템에 있어서 비파괴 시험의 효율적 활용 방안)

  • 심형섭
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2000.10b
    • /
    • pp.1291-1296
    • /
    • 2000
  • A basis for the direct use of data from nondestructive evaluation methods in bridge management systems is presented. Bridge management systems use integer-valued condition ratings to recognize conditions of bridge elements, to model progression of deterioration, and to determine repair needs. Data from nondestructive evaluation methods can inform management systems on the extent of damage, on the initiation of deterioration processes, and on the exposure of bridge elements to aggressive agents. In addition, data obtained through nondestructive evaluation methods allow the formation of models of specific deterioration process. The use of these data in bridge management systems requires redefinition of condition ratings together with the creation of procedures for automated interpretation of data. By these action, nondestructive evaluation methods are directly used to assign condition ratings, and condition ratings are made into terse form of NDE data that are compatible with present day bridge management systems. This paper reports work in progress to strategic use of nondestructive evaluation methods in bridge management system.

A Design of the Active Web Server Supporting Synchronous Collaboration in the Web-Based Group Collaboration Systems (웹 기반 그룹 협동 시스템에서 동기화된 협동을 지원하기 위한 능동형 웹 서버 설계)

  • 허순영;배경일
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.95-102
    • /
    • 1999
  • The web-based group collaborative systems are emerging as enterprise-wide information systems. Since data in group collaborative systems are apt to be shared among multiple concurrent users and modified simutaneously by them, the web-based group collaborative systems must support synchronous collaboration in order to provide users with synchronized and consistent views of shared data. This Paper proposes an active web server which can facilitate synchronous collaboration in web-based group collaborative systems. To accomplish such a goal, the active web server manages dependency relationships between shared data and web browsers referencing them and actively propagates changing details of the shared data to all web browsers referencing them. And, this paper examines usefullness and effectiveness of the active web server to apply it to the ball-bearing design example of concurrent engineering design systems. The prototype system of the active web server is developed on a commercial Object-oriented Database Management System (ODBMS) called OBJECTSTORE using the C++ programming language.

  • PDF

Intelligent Intrusion Detection Systems Using the Asymmetric costs of Errors in Data Mining (데이터 마이닝의 비대칭 오류비용을 이용한 지능형 침입탐지시스템 개발)

  • Hong, Tae-Ho;Kim, Jin-Wan
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.211-224
    • /
    • 2006
  • This study investigates the application of data mining techniques such as artificial neural networks, rough sets, and induction teaming to the intrusion detection systems. To maximize the effectiveness of data mining for intrusion detection systems, we introduced the asymmetric costs with false positive errors and false negative errors. And we present a method for intrusion detection systems to utilize the asymmetric costs of errors in data mining. The results of our empirical experiment show our intrusion detection model provides high accuracy in intrusion detection. In addition the approach using the asymmetric costs of errors in rough sets and neural networks is effective according to the change of threshold value. We found the threshold has most important role of intrusion detection model for decreasing the costs, which result from false negative errors.

  • PDF