• Title/Summary/Keyword: Random Code

Search Result 329, Processing Time 0.019 seconds

Prediction of Barge Ship Roll Response Amplitude Operator Using Machine Learning Techniques

  • Lim, Jae Hwan;Jo, Hyo Jae
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.3
    • /
    • pp.167-179
    • /
    • 2020
  • Recently, the increasing importance of artificial intelligence (AI) technology has led to its increased use in various fields in the shipbuilding and marine industries. For example, typical scenarios for AI include production management, analyses of ships on a voyage, and motion prediction. Therefore, this study was conducted to predict a response amplitude operator (RAO) through AI technology. It used a neural network based on one of the types of AI methods. The data used in the neural network consisted of the properties of the vessel and RAO values, based on simulating the in-house code. The learning model consisted of an input layer, hidden layer, and output layer. The input layer comprised eight neurons, the hidden layer comprised the variables, and the output layer comprised 20 neurons. The RAO predicted with the neural network and an RAO created with the in-house code were compared. The accuracy was assessed and reviewed based on the root mean square error (RMSE), standard deviation (SD), random number change, correlation coefficient, and scatter plot. Finally, the optimal model was selected, and the conclusion was drawn. The ultimate goals of this study were to reduce the difficulty in the modeling work required to obtain the RAO, to reduce the difficulty in using commercial tools, and to enable an assessment of the stability of medium/small vessels in waves.

Reliability-based assessment of American and European specifications for square CFT stub columns

  • Lu, Zhao-Hui;Zhao, Yan-Gang;Yu, Zhi-Wu;Chen, Cheng
    • Steel and Composite Structures
    • /
    • v.19 no.4
    • /
    • pp.811-827
    • /
    • 2015
  • This paper presents a probabilistic investigation of American and European specifications (i.e., AISC and Eurocode 4) for square concrete-filled steel tubular (CFT) stub columns. The study is based on experimental results of 100 axially loaded square CFT stub columns from the literature. By comparing experimental results for ultimate loads with code-predicted column resistances, the uncertainty of resistance models is analyzed and it is found that the modeling uncertainty parameter can be described using random variables of lognormal distribution. Reliability analyses were then performed with/without considering the modeling uncertainty parameter and the safety level of the specifications is evaluated in terms of sufficient and uniform reliability criteria. Results show that: (1) The AISC design code provided slightly conservative results of square CFT stub columns with reliability indices larger than 3.25 and the uniformness of reliability indices is no better because of the quality of the resistance model; (2) The uniformness of reliability indices for the Eurocode 4 was better than that of AISC, but the reliability indices of columns designed following the Eurocode 4 were found to be quite below the target reliability level of Eurocode 4.

AN ASSESSMENT OF UNCERTAINTY ON A LOFT L2-5 LBLOCA PCT BASED ON THE ACE-RSM APPROACH: COMPLEMENTARY WORK FOR THE OECD BEMUSE PHASE-III PROGRAM

  • Ahn, Kwang-Il;Chung, Bub-Dong;Lee, John C.
    • Nuclear Engineering and Technology
    • /
    • v.42 no.2
    • /
    • pp.163-174
    • /
    • 2010
  • As pointed out in the OECD BEMUSE Program, when a high computation time is taken to obtain the relevant output values of a complex physical model (or code), the number of statistical samples that must be evaluated through it is a critical factor for the sampling-based uncertainty analysis. Two alternative methods have been utilized to avoid the problem associated with the size of these statistical samples: one is based on Wilks' formula, which is based on simple random sampling, and the other is based on the conventional nonlinear regression approach. While both approaches provide a useful means for drawing conclusions on the resultant uncertainty with a limited number of code runs, there are also some unique corresponding limitations. For example, a conclusion based on the Wilks' formula can be highly affected by the sampled values themselves, while the conventional regression approach requires an a priori estimate on the functional forms of a regression model. The main objective of this paper is to assess the feasibility of the ACE-RSM approach as a complementary method to the Wilks' formula and the conventional regression-based uncertainty analysis. This feasibility was assessed through a practical application of the ACE-RSM approach to the LOFT L2-5 LBLOCA PCT uncertainty analysis, which was implemented as a part of the OECD BEMUSE Phase III program.

Design of Synchronization_Word Generator in a Bluetooth System (블루투스 동기워드 생성기의 구현)

  • Hwang, Sun-Won;Cho, Sung;Ahn, Jin-Woo;Lee, Sang-Hoon;Kim, Seong-Jeen
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.214-217
    • /
    • 2003
  • In this paper, we deal with implementing design for a correlator access code generator module which they are used for setting up a connection between units, a packet decision, a clock syncronization, by FPGA. The orrelator module which is composed of the Wallace Tree's CSA and threshold value decision device decides useful a packet and syncronizes a clock, after it correlates an input signal of 1 Mbps transmission rate by a sliding window. An access code generator module which is composed of a BCH (Bose-Chadhuri-Hocquenghem) cyclic encoder and control device was designed according as a four steps' generation process proposed in the bluetooth standard. The pseudo random sequence which solves syncronization problem saved a voluntary device Proposed the module was designed by VHDL. An simulation and test are inspected by Xilinx FPGA.

  • PDF

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

4-level Error Correcting Modulation Codes for Holographic Data Storage System (홀로그래픽 데이터 저장장치를 위한 4-레벨 오류정정 변조부호)

  • Lee, Jaehun;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.10
    • /
    • pp.610-612
    • /
    • 2014
  • Mutilevel holographic data storage systems have a big advantage for capacity since it can store more than one bit per pixel. For instance, 2/3 modulation code stores 2/3(symbol/pixel) and 4/3(bit/pixel). Then it is about 1.3 bits per one pixel. In this paper, we propose two 4-level modulation codes, which have the minimum Euclidean distances of 3 and 4, respectively. The proposed codes perform better than random data. The performance of larger minimum distance code shows better than that of shorter one.

Sensitivity Analysis of Fabrication Parameters for Dry Process Fuel Performance Using Monte Carlo Simulations

  • Park Chang Je;Song Kee Chan;Yang Myung Seung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.338-345
    • /
    • 2004
  • This study examines the sensitivity of several fabrication parameters for dry process fuel, using a random sampling technique. The in-pile performance of dry process fuel with irradiation was calculated by a modified ELESTRES code, which is the CANDU fuel performance code system. The performance of the fuel rod was then analyzed using a Monte Carlo simulation to obtain the uncertainty of the major outputs, such as the fuel centerline temperature, the fission gas pressure, and the plastic strain. It was proved by statistical analysis that for both the dry process fuel and the $UO_2$ fuel, pellet density is one of the most sensitive parameters, but as for the fission gas pressure, the density of the $UO_2$ fuel exhibits insensitive behavior compared to that of the dry process fuel. The grain size of the dry process fuel is insensitive to the fission gas pressure, while the grain size of the $UO_2$ fuel is correlative to the fission gas pressure. From the calculation with a typical CANDU reactor power envelop, the centerline temperature, fission gas pressure, and plastic strain of the dry process fuel are higher than those of the $UO_2$ fuel.

Multiple Access Interference Suppressed Sensor Network Using Optical CDMA with Bipolar Receiver and Modified PN Code (간섭잡음을 억압한 양극성 수신기와 PN 부호에 의한 광 CDMA 방식을 사용한 센서 네트워크)

  • Park Sang-Jo;Kim Bong-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.13C no.3 s.106
    • /
    • pp.311-316
    • /
    • 2006
  • We propose the optical sensor network using optical CDMA with bipolar receiver and modified Pseudorandom Noise codes which are widely used in the wireless communication network. We numerically analyze the performances in the optical sensor network. In the proposed network, multiple access interferences between two sensors are suppressed by performing synchronization between the optical encoder and the optical decoder and adjusting the delay times of optical delay lines. Numerical simulations confirm that the performance can be acquired by suppressing the beat noise among optical signals as the number of sensors increases.

Fiber Sensor Network for Vessel Monitoring based on Code Division Multiple Access (코드분할 다중방식을 기반으로 하는 선박 상태 모니터링 광섬유 센서 네트워크)

  • Kim, Young-Bok;Lee, Seong-Ro;Jeon, Sie-Wook;Park, Chang-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10B
    • /
    • pp.1216-1221
    • /
    • 2011
  • We propose a multiplexed fiber Bragg grating (FBG) sensor network for vessel monitoring to measure the variation of strain and temperature by environmental perturbation based on code division multiple access (CDMA). The center wavelength of FBG was linearly changed by environmental perturbation such as strain and temperature variation so that we could be monitoring the state of sensors. A RSOA was used as optical broadband source and which was modulated by using pseudo random binary sequence (PRBS) signal. The correlation peak of reflected signal from sensor networks was measured. In this paper, we used the sliding correlation techniques for high speed response and dynamic rage of sensors.

Data Scrambling Scheme that Controls Code Density with Data Occurrence Frequency (데이터 출현 빈도를 이용하여 코드 밀도를 조절하는 데이터 스크램블링 기법)

  • Hyun, Choulseung;Jeong, Gwanil;You, Soowon;Lee, Donghee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.235-242
    • /
    • 2021
  • Most data scrambling schemes generate pure random codes. Unlike these schemes, we propose a variable density scrambling scheme (VDSC) that differentiates densities of generated codes. First, we describe conditions and methods to translate plain codes to cipher codes with different densities. Then we apply the VDSC to flash memory such that preferred cell states occur more than others. To restrain error rate, specifically, the VDSC controls code densities so as to increase the ratio of center state among all possible cell states in flash memory. Scrambling experiments of data in Windows and Linux systems show that the VDSC increases the ratio of cells having near-center states in flash memory.