• Title/Summary/Keyword: Discrete Support

Search Result 165, Processing Time 0.023 seconds

Vessel and Navigation Modeling and Simulation based on DEVS Formalism : Case Studies in Collision Avoidance Simulation of Vessels by COLREG (DEVS 형식론 기반의 선박 항해 모델링 및 시뮬레이션 (II) : COLREG 기반 선박 충돌회피 시뮬레이션을 통한 사례연구)

  • Hwang, Hun-Gyu;Woo, Sang-Min;Lee, Jang-Se
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1700-1709
    • /
    • 2019
  • Recently, many researches have been under way to develop systems (services) to support the safety navigation of ships, and in these studies, common difficulties have been encountered in assessing the usefulness and effectiveness of the developed system. To solve these problems, we propose the DEVS-based ship navigation modeling and simulation technique. Following the preceding study, we analyze the COLREG rules and reflected to officer and helmsman agent models for decision making. Also we propose estimation and interpolation techniques to adopt the motion characteristics of the actual vessel to simulation. In addition, we implement the navigation simulation system to reflect the designed proposed methods, and we present five-scenarios to verify the developed simulation system. And we conduct simulations according to each scenario and the results were reconstructed. The simulation results confirm that the components modelled in each scenario enable to operate according to the navigation relationships.

Why Do Some People Become Poor? The Characteristics and Determinants of Poverty Entry (누가 왜 빈곤에 빠지는가? 빈곤진입자의 특성 및 요인)

  • Kim, Hwanjoon
    • Korean Journal of Social Welfare Studies
    • /
    • v.42 no.4
    • /
    • pp.365-388
    • /
    • 2011
  • By analyzing 1998~2008 Korean Labor and Income Panel Study(KLIPS), this study examines socio-economic characteristics of people who become poor. The study also explores the reason why they are in the state of poverty. To find determinants affecting poverty entrance, discrete-time hazard models are applied. Major findings are as follows. The socio-economic characteristics driving people into poverty are in the middle way of the long-term poor and the non-poor, combining the characteristics of both groups. This implies that many cases of the newly poor tend to enter and exit from poverty repeatedly. Poverty entry rate was at a high level right after the economic crises, then was a downturn and remained fairly stable since 2000. However, the young, the high-educated, and even the professional are on the rise as a new poverty group. The major reason people become poor is temporary job loss. This factor is confirmed again by multi-variate analyses. In building anti-poverty policies, it is important to distinguish the long-term poor from the short-term poor. For the long-term poor, virtually the only affective policy will be income support. On the other hand, a labor-market strategy for jos security will be more effective for the short-term poor. The characteristics and determinants of poverty entry may affect poverty duration and exit in the future. Future research will be needed to investigate the relationship among these factors.

A Ligthtweight Experimental Frame based on Microservice Architecture (마이크로서비스아키텍처 기반 경량형 모의실험환경)

  • Gyu-Sik Ham;Hyeon-Gi Kim;Jin-Woo Kim;Soo-Young Jang;Eun-Kyung Kim;Chang-beom Choi
    • Journal of IKEEE
    • /
    • v.28 no.2
    • /
    • pp.123-130
    • /
    • 2024
  • As technology advances swiftly and the lifespan of products becomes increasingly short, there is a demand to fasten the pace of research outcomes, product development, and market introduction. As a result, the researchers and developers need a computational experiment environment that enables rapid verification of the experiment and application of research findings. Such an environment must efficiently harness all available computational resources, manage simulations across diverse test scenarios, and support the experimental data collection. This research introduces the design and implementation of an experimental frame based on a microservice architecture. The experimental frame leverages scripts to utilize computing resources optimally, making it more straightforward for users to conduct simulations. It features an experimental frame capable of automatically deploying scenarios to the computing components. This setup allows for the automatic configuration of both the computing environment and experiments based on user-provided scenarios and experimental software, facilitating effortless execution of simulations.

Feature Vector Extraction and Classification Performance Comparison According to Various Settings of Classifiers for Fault Detection and Classification of Induction Motor (유도 전동기의 고장 검출 및 분류를 위한 특징 벡터 추출과 분류기의 다양한 설정에 따른 분류 성능 비교)

  • Kang, Myeong-Su;Nguyen, Thu-Ngoc;Kim, Yong-Min;Kim, Cheol-Hong;Kim, Jong-Myon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.30 no.8
    • /
    • pp.446-460
    • /
    • 2011
  • The use of induction motors has been recently increasing with automation in aeronautical and automotive industries, and it playes a significant role. This has motivated that many researchers have studied on developing fault detection and classification systems of an induction motor in order to minimize economical damage caused by its fault. With this reason, this paper proposed feature vector extraction methods based on STE (short-time energy)+SVD (singular value decomposition) and DCT (discrete cosine transform)+SVD techniques to early detect and diagnose faults of induction motors, and classified faults of an induction motor into different types of them by using extracted features as inputs of BPNN (back propagation neural network) and multi-layer SVM (support vector machine). When BPNN and multi-lay SVM are used as classifiers for fault classification, there are many settings that affect classification performance: the number of input layers, the number of hidden layers and learning algorithms for BPNN, and standard deviation values of Gaussian radial basis function for multi-layer SVM. Therefore, this paper quantitatively simulated to find appropriate settings for those classifiers yielding higher classification performance than others.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Analysis of Trading Performance on Intelligent Trading System for Directional Trading (방향성매매를 위한 지능형 매매시스템의 투자성과분석)

  • Choi, Heung-Sik;Kim, Sun-Woong;Park, Sung-Cheol
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.3
    • /
    • pp.187-201
    • /
    • 2011
  • KOSPI200 index is the Korean stock price index consisting of actively traded 200 stocks in the Korean stock market. Its base value of 100 was set on January 3, 1990. The Korea Exchange (KRX) developed derivatives markets on the KOSPI200 index. KOSPI200 index futures market, introduced in 1996, has become one of the most actively traded indexes markets in the world. Traders can make profit by entering a long position on the KOSPI200 index futures contract if the KOSPI200 index will rise in the future. Likewise, they can make profit by entering a short position if the KOSPI200 index will decline in the future. Basically, KOSPI200 index futures trading is a short-term zero-sum game and therefore most futures traders are using technical indicators. Advanced traders make stable profits by using system trading technique, also known as algorithm trading. Algorithm trading uses computer programs for receiving real-time stock market data, analyzing stock price movements with various technical indicators and automatically entering trading orders such as timing, price or quantity of the order without any human intervention. Recent studies have shown the usefulness of artificial intelligent systems in forecasting stock prices or investment risk. KOSPI200 index data is numerical time-series data which is a sequence of data points measured at successive uniform time intervals such as minute, day, week or month. KOSPI200 index futures traders use technical analysis to find out some patterns on the time-series chart. Although there are many technical indicators, their results indicate the market states among bull, bear and flat. Most strategies based on technical analysis are divided into trend following strategy and non-trend following strategy. Both strategies decide the market states based on the patterns of the KOSPI200 index time-series data. This goes well with Markov model (MM). Everybody knows that the next price is upper or lower than the last price or similar to the last price, and knows that the next price is influenced by the last price. However, nobody knows the exact status of the next price whether it goes up or down or flat. So, hidden Markov model (HMM) is better fitted than MM. HMM is divided into discrete HMM (DHMM) and continuous HMM (CHMM). The only difference between DHMM and CHMM is in their representation of state probabilities. DHMM uses discrete probability density function and CHMM uses continuous probability density function such as Gaussian Mixture Model. KOSPI200 index values are real number and these follow a continuous probability density function, so CHMM is proper than DHMM for the KOSPI200 index. In this paper, we present an artificial intelligent trading system based on CHMM for the KOSPI200 index futures system traders. Traders have experienced on technical trading for the KOSPI200 index futures market ever since the introduction of the KOSPI200 index futures market. They have applied many strategies to make profit in trading the KOSPI200 index futures. Some strategies are based on technical indicators such as moving averages or stochastics, and others are based on candlestick patterns such as three outside up, three outside down, harami or doji star. We show a trading system of moving average cross strategy based on CHMM, and we compare it to a traditional algorithmic trading system. We set the parameter values of moving averages at common values used by market practitioners. Empirical results are presented to compare the simulation performance with the traditional algorithmic trading system using long-term daily KOSPI200 index data of more than 20 years. Our suggested trading system shows higher trading performance than naive system trading.

Agent-based SAF Modeling Tool for DEVS M&S (DEVS M&S 환경을 위한 에이전트 기반의 SAF 모델링 도구)

  • Shin, Suk-Hoon;Park, Kang-Moon;Lee, Eun-Bog;Chi, Sung-Do;Han, Seung-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.49-55
    • /
    • 2013
  • Recently the CGF/SAF (Computer Generated Force / Semi-Automated Force) technology has been getting attention to deal with the increasing complexity in a DM&S(Defence Modeling and Simulation) environment. OneSAF is one of well-known CGF/SAF systems, however, it is not able to support the DEVS framework which is an advanced discrete event based modeling and simulation environment. Especially, most DM&S systems in Korea has been developed on the basis of the DEVS framework. In this paper, we have proposed the agent-based SAF design methodology and tool for supporting DEVS M&S environment. The proposed SAF modeling tool is divided into two parts; the agent modeling part and SAF modeling part. In the agent modeling environment, the modeler can simply create the agent model by writing down the necessary rules. It also provides the agent testing environment so that the modeler maybe conveniently verify the prescribed agent model. The SAF model is finally created by combing the individual agents based on the pre-defined structure. DM&S engineers will be able to employ our tools and modeling methodology to design the DEVS-based DM&S system to be developed.

Effective Routing Protocol Implementation Framework on Riverbed (OPNET) Modeler and its Example for AntHocNet (Riverbed (OPNET) Modeler의 효과적인 라우팅 프로토콜 추가 프레임워크 및 이를 이용한 AntHocNet 라우팅 구현)

  • Kim, Kwangsoo;Lee, Cheol-Woong;Shin, Seung-hun;Roh, Byeong-hee;Roh, Bongsoo;Han, Myoung-hun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.8
    • /
    • pp.974-985
    • /
    • 2016
  • Riverbed Modeler, which is a commercial packet-level discrete event simulator is used to model, design, and simulate complicated communication protocols and large-scale network. Riverbed Modeler got credit for its reliability in field of network simulation. In the MANET simulation environment using Riverbed Modeler, it is very complicated to add a new routing protocol into existing architecture of routing protocols because it is required lots of modifications of protocol recognition. In this paper, we propose Routing Adding Framework which can reduce errors or mistakes during modifying the existing routing support architecture. Routing Adding Framework is provided as a adapter API for protocol recognition. and it is only minimum modifications for protocol identifiers when a new routing protocol is added to the child process of manet_mgr process which manages routing protocols for IP layer. With Routing Adding Framework, we can reduce less than half modification. Then, we shows an example of implementation of a hybrid routing protocol AntHocNet using Routing Adding Framework, and we verify its design and application of the Routing Adding Framework by obtaining simulation result with similar result given by AntHocNet.

A Review of the Neurocognitive Mechanisms of Number Sense (수 감각의 인지신경학적 기반에 관한 연구 개관)

  • Cho, Soohyun
    • Korean Journal of Cognitive Science
    • /
    • v.24 no.3
    • /
    • pp.271-300
    • /
    • 2013
  • Human and animals are born with an intuitive ability to determine approximate numerosity. This ability is termed approximate number sense (hereafter, number sense). Evolutionarily, number sense is thought to be an essential ability for hunting, gathering and survival. According to previous research, children with mathematical learning disability have impaired number sense. On the other hand, individuals with more accurate number sense have higher mathematical achievement. These results support the hypothesis that number sense provides a basis for the development of mathematical cognition. Recently, researchers have been examining whether number sense training can lead to enhancement in mathematical achievement and changes in brain activity in relation to mathematical problem solving. Numerosity which basically represents discontinuous quantity is expected to be closely related to continuous quantity such as representations of space and time. A theory of magnitude (ATOM) states that processing of number, space and time is based on a common magnitude system in the posterior parietal cortex, especially the intraparietal sulcus. The present paper introduces current literature and future directions for the study of the common magnitude system.

  • PDF

Comparison of Deterministic and Probabilistic Approaches through Cases of Exposure Assessment of Child Products (어린이용품 노출평가 연구에서의 결정론적 및 확률론적 방법론 사용실태 분석 및 고찰)

  • Jang, Bo Youn;Jeong, Da-In;Lee, Hunjoo
    • Journal of Environmental Health Sciences
    • /
    • v.43 no.3
    • /
    • pp.223-232
    • /
    • 2017
  • Objectives: In response to increased interest in the safety of children's products, a risk management system is being prepared through exposure assessment of hazardous chemicals. To estimate exposure levels, risk assessors are using deterministic and probabilistic approaches to statistical methodology and a commercialized Monte Carlo simulation based on tools (MCTool) to efficiently support calculation of the probability density functions. This study was conducted to analyze and discuss the usage patterns and problems associated with the results of these two approaches and MCTools used in the case of probabilistic approaches by reviewing research reports related to exposure assessment for children's products. Methods: We collected six research reports on exposure and risk assessment of children's products and summarized the deterministic results and corresponding underlying distributions for exposure dose and concentration results estimated through deterministic and probabilistic approaches. We focused on mechanisms and differences in the MCTools used for decision making with probabilistic distributions to validate the simulation adequacy in detail. Results: The estimation results of exposure dose and concentration from the deterministic approaches were 0.19-3.98 times higher than the results from the probabilistic approach. For the probabilistic approach, the use of lognormal, Student's T, and Weibull distributions had the highest frequency as underlying distributions of the input parameters. However, we could not examine the reasons for the selection of each distribution because of the absence of test-statistics. In addition, there were some cases estimating the discrete probability distribution model as the underlying distribution for continuous variables, such as weight. To find the cause of abnormal simulations, we applied two MCTools used for all reports and described the improper usage routes of MCTools. Conclusions: For transparent and realistic exposure assessment, it is necessary to 1) establish standardized guidelines for the proper use of the two statistical approaches, including notes by MCTool and 2) consider the development of a new software tool with proper configurations and features specialized for risk assessment. Such guidelines and software will make exposure assessment more user-friendly, consistent, and rapid in the future.