• Title/Summary/Keyword: Effective Data Length

Search Result 501, Processing Time 0.029 seconds

Development of a Probability Model for Burst Risks of Water Main using the Analysis Methods of Leakage Type (매설환경에 따른 배수관망의 누수발생원인 특성분석)

  • Park, Sang-Bong;Choi, Tae-Ho;Koo, Ja-Yong
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.25 no.2
    • /
    • pp.141-152
    • /
    • 2011
  • In this study, we extracted effective factors of pipe burst from the status data of water asset, operating data of pressure, volume and etc. and 7 years' pipe burst and repair records. The extracted factors were sorted by each attribution and then a statistical analysis was performed to generate a pipe burst probability function using the logistic regression model. As the result, material, diameter, length, laying year, pressure and road width affected to pipe burst significantly. Especially, in case of small diameter, laying year was most effective factor and in case of steel pipe, external loading was main cause of burst, and in case of cast iron, PE, PC, HP pipes, the deterioration of joint was main cause. The other side, as a result of Hosmer-Lemeshow goodness of fit test the models are turned out significant statistically. Also the classification criteria were determined to minimize the total cost from classification errors, when the predicted probability was more than 18% this pipe could have a chance of burst.

Structural damage identification of plates based on modal data using 2D discrete wavelet transform

  • Bagheri, A.;Ghodrati Amiri, G.;Khorasani, M.;Bakhshi, H.
    • Structural Engineering and Mechanics
    • /
    • v.40 no.1
    • /
    • pp.13-28
    • /
    • 2011
  • An effective method for detection linear flaws in plate structures via two-dimensional discrete wavelet transform is proposed in this study. The proposed method was applied to a four-fixed supported rectangular plate containing damage with arbitrary length, depth and location. Numerical results identifying the damage location are compared with the actual results to demonstrate the effectiveness of the proposed method. Also, a wavelet-based method presented for de-noising of mode shape of plate. Finally, the performance of the proposed method for de-noising and damage identification was verified using experimental data. Comparison between the location detected by the proposed method, and the plate's actual damage location revealed that the methodology can be used as an accessible and effective technique for damage identification of actual plate structures.

Bead Visualization Using Spline Algorithm (스플라인 알고리즘을 이용한 비드 가시화)

  • Koo, Chang-Dae;Yang, Hyeong-Seok;Kim, Maeng-Nam
    • Journal of Welding and Joining
    • /
    • v.34 no.1
    • /
    • pp.54-58
    • /
    • 2016
  • In this research paper, suggest method of generate same bead as an actual measurement data in virtual welding conditions, exploit morphology information of the bead that acquired through robot welding. It has many multiple risk factors to Beginners welding training, by we make possible to train welding in virtual reality, we can reduce welding training risk and welding material to exploit bead visualization algorithm that we suggest so it will be expected to achieve educational, environmental and economical effect. The proposed method is acquire data to each case performing robot welding by set the voltage, current, working angle, process angle, speed and arc length of welding condition value. As Welding condition value is most important thing in decide bead form, we would selected one of baseline each item and then acquired metal followed another factors change. Welding type is FCAW, SMAW and TIG. When welding trainee perform the training, it's difficult to save all of changed information into database likewise working angle, process angle, speed and arc length. So not saving data into database are applying the method to infer the form of bead using a neural network algorithm. The way of bead's visualization is applying the spline algorithm. To accurately represent Morphological information of the bead, requires much of morphological information, so it can occur problem to save into database that is why we using the spline algorithm. By applying the spline algorithm, it can make simplified data and generate accurate bead shape. Through the research paper, the shape of bead generated by the virtual reality was able to improve the accuracy when compared using the form of bead generated by the robot welding to using the morphological information of the bead generated through the robot welding. By express the accurate shape of bead and so can reduce the difference of the actual welding training and virtual welding, it was confirmed that it can be performed safety and high effective virtual welding education.

Multivariate CUSUM control charts for monitoring the covariance matrix

  • Choi, Hwa Young;Cho, Gyo-Young
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.2
    • /
    • pp.539-548
    • /
    • 2016
  • This paper is a study on the multivariate CUSUM control charts using three different control statistics for monitoring covariance matrix. We get control limits and ARLs of the proposed multivariate CUSUM control charts using three different control statistics by using computer simulations. The performances of these proposed multivariate CUSUM control charts have been investigated by comparing ARLs. The purpose of control charts is to detect assignable causes of variation so that these causes can be found and eliminated from process, variability will be reduced and the process will be improved. We show that the charts based on three different control statistics are very effective in detecting shifts, especially shifts in covariances when the variables are highly correlated. When variables are highly correlated, our overall recommendation is to use the multivariate CUSUM control charts using trace for detecting changes in covariance matrix.

Evaluation of Shortening the Stay Time of Patients in an Emergency Medical Center (EMC) (응급실 환자의 응급의료센터 체류시간 단축프로그램 개발 및 효과)

  • Kim, Eun-Joo;Lim, Ji-Young
    • Journal of Home Health Care Nursing
    • /
    • v.17 no.1
    • /
    • pp.21-27
    • /
    • 2010
  • Purpose: The study evaluated a program to shorten EMC stay time. Methods: The subjects were EMC patients, and comprised a control group of 8,477 and an experimental group of 8,378. Data were collected from June 2006 to August 2007, and analyzed concerning stay time for doctor visit, decision making, and discharge. The data were analyzed by $X^2$-test and ANCOVA using SPSS14.0. Result: The stay time of doctor visit, decision making and discharge of the experimental group was significantly less compared to the control group. Using second and third grade triage criteria, the stay time of experimental group was statistically reduced from the control. Conclusion: The implemented shortening program was effective in reducing EMC stay time and increasing EMC effectiveness.

  • PDF

A Study on Emergency Short Term Shelters (단기 아동보호시설 연구 - 아동상담소와 청소년쉼터를 중심으로 -)

  • Rhee, Ock
    • Korean Journal of Child Studies
    • /
    • v.21 no.1
    • /
    • pp.163-178
    • /
    • 2000
  • Institutions included in this study of emergency short term shelters for children in crisis included 2 public counseling centers providing short term protection services for children and 12 emergency shelters for runaway children located in a metropolitan city in Korea. The institutions were examined with respect to their establishment, management, and programs. The researcher visited and interviewed workers employed in the institutions. In additions, 12 children who had been cared for emergency shelters were surveyed with open-ended questions. The data consisted of information on founders, locations, purpose, current management, personnel, length of care, and number and grouping of children. Programs and daily schedules were also examined. Effective models of emergency short term shelters were discussed on the basis of the collected data.

  • PDF

Study on gesture recognition based on IIDTW algorithm

  • Tian, Pei;Chen, Guozhen;Li, Nianfeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6063-6079
    • /
    • 2019
  • When the length of sampling data sequence is too large, the method of gesture recognition based on traditional Dynamic Time Warping (DTW) algorithm will lead to too long calculation time, and the accuracy of recognition result is not high.Support vector machine (SVM) has some shortcomings in precision, Edit Distance on Real Sequences(EDR) algorithm does not guarantee that noise suppression will not suppress effective data.A new method based on Improved Interpolation Dynamic Time Warping (IIDTW)algorithm is proposed to improve the efficiency of gesture recognition and the accuracy of gesture recognition. The results show that the computational efficiency of IIDTW algorithm is more than twice that of SVM-DTW algorithm, the error acceptance rate is FAR reduced by 0.01%, and the error rejection rate FRR is reduced by 0.5%.Gesture recognition based on IIDTW algorithm can achieve better recognition status. If it is applied to unlock mobile phone, it is expected to become a new generation of unlock mode.

A Simple Method to Overcome the Restriction of the SACK Blocks' Number in SACK TCP

  • Lin, Cui;Hong, Choong-Seon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.337-339
    • /
    • 2005
  • By definition of RFC 2018, each segments block of data queued at the data receiver is defined in the SACK option by two 32-bit unsigned integers in network byte order. Since TCP Options field has a 40-byte maximum length, when error bursts occur we note that the limitation of maximum available option space may not be sufficient to report all blocks present in the receiver's queue and lead to unnecessarily force the TCP sender to retransmit packets that have actually been received but not carried related information in SACK option field. For overcoming this restriction, in this paper, a new solution is designed to further improve the performance of TCP SACK and prevent those unwanted retransmissions. Simulation result shows that the implementation of our proposal is effective.

  • PDF

Region Growing Segmentation with Directional Features

  • Lee, Sang-Hoon
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.6
    • /
    • pp.731-740
    • /
    • 2010
  • A region merging technique is suggested in this paper for the segmentation of high-spatial resolution imagery. It employs a region growing scheme based on the region adjacency graph (RAG). The proposed algorithm uses directional neighbor-line average feature vectors to improve the quality of segmentation. The feature vector consists of 9 components which includes an observation and 8 directional averages. Each directional average is the average of the pixel values along the neighbor line for a given neighbor line length at each direction. The merging coefficients of the segmentation process use a part of the feature components according to a given merging coefficient order. This study performed the extensive experiments using simulation data and a real high-spatial resolution data of IKONOS. The experimental results show that the new approach proposed in this study is quite effective to provide segments of high quality for the object-based analysis of high-spatial resolution images.

Research on Personalized Course Recommendation Algorithm Based on Att-CIN-DNN under Online Education Cloud Platform

  • Xiaoqiang Liu;Feng Hou
    • Journal of Information Processing Systems
    • /
    • v.20 no.3
    • /
    • pp.360-374
    • /
    • 2024
  • A personalized course recommendation algorithm based on deep learning in an online education cloud platform is proposed to address the challenges associated with effective information extraction and insufficient feature extraction. First, the user potential preferences are obtained through the course summary, course review information, user course history, and other data. Second, by embedding, the word vector is turned into a low-dimensional and dense real-valued vector, which is then fed into the compressed interaction network-deep neural network model. Finally, considering that learners and different interactive courses play different roles in the final recommendation and prediction results, an attention mechanism is introduced. The accuracy, recall rate, and F1 value of the proposed method are 0.851, 0.856, and 0.853, respectively, when the length of the recommendation list K is 35. Consequently, the proposed strategy outperforms the comparison model in terms of recommending customized course resources.