• Title/Summary/Keyword: Recommended Algorithm

Search Result 271, Processing Time 0.025 seconds

Combination of Preconditioned Krylov Subspace Methods and Multi-grid Method for Convergence Acceleration of the incompressible Navier-Stokes Equations (비압축성 Navier-Stokes 방정식의 수렴 가속을 위한 예조건화 Krylov 부공간법과 다중 격자법의 결합)

  • Maeng Joo Sung;Choi IL Kon;Lim Youn Woo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1999.05a
    • /
    • pp.106-112
    • /
    • 1999
  • In this article, combination of the FAS-FMG multi-grid method and the Krylov subspace method was presented in solving two dimensional driven-cavity flows. Three algorithms of the Krylov subspace method, CG, CGSTAB(Bi-CG Stabilized) and GMRES method were tested with MILU preconditioner. As a smoother of the pressure correction equation, the MILU-CG is recommended rather than MILU-GMRES(k) or MILU-CGSTAB, since the MILU-GMRES(k) preconditioner has too much computation on the coarse grid compared to the MILU-CG one. As for the momentum equation, relatively cheap smoother like SIP solver may be sufficient.

  • PDF

A Study on the Kalman Filter ; AR Model (자기회귀 모형에 대한 Kalman Filter 적용에 관한 연구)

  • 신용백;윤상원;윤석환;변화성
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.16 no.28
    • /
    • pp.31-37
    • /
    • 1993
  • Box-Jenkins models have some important limitations to the procedure : (a) They require a great deal of time, efforts and expertise for the model identification. (b) They require an extensive amount of past observations to identify an acceptable model. (c) The model selected is a constant model in time. Therefore, the Kalman Filter is recommended as a technique to overcome the three problems mentioned above. The research reported here uses the Kalman Filter algorithm to propose Kalman-AR(p) model. The data analysis shows that the Kalman-AR(p) model proposed can be used to resolve the problems of Box-Jenkins AR(p)model. It is seen that the Kalman Filter has great potentials for real-time industrial applications.

  • PDF

Comparison of EM and Multiple Imputation Methods with Traditional Methods in Monotone Missing Pattern

  • Kang, Shin-Soo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.1
    • /
    • pp.95-106
    • /
    • 2005
  • Complete-case analysis is easy to carry out and it may be fine with small amount of missing data. However, this method is not recommended in general because the estimates are usually biased and not efficient. There are numerous alternatives to complete-case analysis. A natural alternative procedure is available-case analysis. Available-case analysis uses all cases that contain the variables required for a specific task. The EM algorithm is a general approach for computing maximum likelihood estimates of parameters from incomplete data. These methods and multiple imputation(MI) are reviewed and the performances are compared by simulation studies in monotone missing pattern.

  • PDF

Intention-Oriented Itinerary Recommendation Through Bridging Physical Trajectories and Online Social Networks

  • Meng, Xiangxu;Lin, Xinye;Wang, Xiaodong;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3197-3218
    • /
    • 2012
  • Compared with traditional itinerary planning, intention-oriented itinerary recommendations can provide more flexible activity planning without requiring the user's predetermined destinations and is especially helpful for those in unfamiliar environments. The rank and classification of points of interest (POI) from location-based social networks (LBSN) are used to indicate different user intentions. The mining of vehicles' physical trajectories can provide exact civil traffic information for path planning. This paper proposes a POI category-based itinerary recommendation framework combining physical trajectories with LBSN. Specifically, a Voronoi graph-based GPS trajectory analysis method is utilized to build traffic information networks, and an ant colony algorithm for multi-object optimization is implemented to locate the most appropriate itineraries. We conduct experiments on datasets from the Foursquare and GeoLife projects. A test of users' satisfaction with the recommended items is also performed. Our results show that the satisfaction level reaches an average of 80%.

Equitable Peer Assessment Method in Collaboration Project Using Statistical Technique (통계적 기법을 이용한 집단 협업 프로젝트에서의 공정한 동료 평가 방법론에 대한 연구)

  • Cho, Miyeon;Ko, Sung-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.36 no.1
    • /
    • pp.44-52
    • /
    • 2013
  • For evaluating participation in collaboration project, the peer assement method is mostly used and various scoring methods have been proposed. But, the reliability and validity of the peer assessment method are still doubted for all most method. In order to overcome these weaknesss, some guidelines and training methods have been recommended. In this article, however, statistical technique is proposed for measuring individual contributions to collaboration projects considering each assessor's reliability. The gist of our proposed algorithm is that an assessor's reliability depends on the evaluation policy, and this reliability is evaluated by an analysis of variance of the scores assigned by the assessor. We also show that the proposed method is very efficient by case study in university class.

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

Movie Recommendation Algorithm Using Social Network Analysis to Alleviate Cold-Start Problem

  • Xinchang, Khamphaphone;Vilakone, Phonexay;Park, Doo-Soon
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.616-631
    • /
    • 2019
  • With the rapid increase of information on the World Wide Web, finding useful information on the internet has become a major problem. The recommendation system helps users make decisions in complex data areas where the amount of data available is large. There are many methods that have been proposed in the recommender system. Collaborative filtering is a popular method widely used in the recommendation system. However, collaborative filtering methods still have some problems, namely cold-start problem. In this paper, we propose a movie recommendation system by using social network analysis and collaborative filtering to solve this problem associated with collaborative filtering methods. We applied personal propensity of users such as age, gender, and occupation to make relationship matrix between users, and the relationship matrix is applied to cluster user by using community detection based on edge betweenness centrality. Then the recommended system will suggest movies which were previously interested by users in the group to new users. We show shown that the proposed method is a very efficient method using mean absolute error.

Interface slip of post-tensioned concrete beams with stage construction: Experimental and FE study

  • Low, Hin Foo;Kong, Sih Ying;Kong, Daniel;Paul, Suvash Chandra
    • Computers and Concrete
    • /
    • v.24 no.2
    • /
    • pp.173-183
    • /
    • 2019
  • This study presents experimental and numerical results of prestressed concrete composite beams with different casting and stressing sequence. The beams were tested under three-point bending and it was found that prestressed concrete composite beams could not achieve monolith behavior due to interface slippage between two layers. The initial stress distribution due to different construction sequence has little effect on the maximum load of composite beams. The multi-step FE analyses could simulate different casting and stressing sequence thus correctly capturing the initial stress distribution induced by staged construction. Three contact algorithms were considered for interaction between concrete layers in the FE models namely tie constraint, cohesive contact and surface-to-surface contact. It was found that both cohesive contact and surface-to-surface contact could simulate the interface slip even though each algorithm considers different shear transfer mechanism. The use of surface-to-surface contact for beams with more than 2 layers of concrete is not recommended as it underestimates the maximum load in this study.

POI Recommendation Method Based on Multi-Source Information Fusion Using Deep Learning in Location-Based Social Networks

  • Sun, Liqiang
    • Journal of Information Processing Systems
    • /
    • v.17 no.2
    • /
    • pp.352-368
    • /
    • 2021
  • Sign-in point of interest (POI) are extremely sparse in location-based social networks, hindering recommendation systems from capturing users' deep-level preferences. To solve this problem, we propose a content-aware POI recommendation algorithm based on a convolutional neural network. First, using convolutional neural networks to process comment text information, we model location POI and user latent factors. Subsequently, the objective function is constructed by fusing users' geographical information and obtaining the emotional category information. In addition, the objective function comprises matrix decomposition and maximisation of the probability objective function. Finally, we solve the objective function efficiently. The prediction rate and F1 value on the Instagram-NewYork dataset are 78.32% and 76.37%, respectively, and those on the Instagram-Chicago dataset are 85.16% and 83.29%, respectively. Comparative experiments show that the proposed method can obtain a higher precision rate than several other newer recommended methods.

A Systems Engineering Approach for CEDM Digital Twin to Support Operator Actions

  • Mousa, Mostafa Mohammed;Jung, Jae Cheon
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.16 no.2
    • /
    • pp.16-26
    • /
    • 2020
  • Improving operator performance in complex and time-critical situations is critical to maintain plant safety and operability. These situations require quick detection, diagnosis, and mitigation actions to recover from the root cause of failure. One of the key challenges for operators in nuclear power plants is information management and following the control procedures and instructions. Nowadays Digital Twin technology can be used for analyzing and fast detection of failures and transient situations with the recommender system to provide the operator or maintenance engineer with recommended action to be carried out. Systems engineering approach (SE) is used in developing a digital twin for the CEDM system to support operator actions when there is a misalignment in the control element assembly group. Systems engineering is introduced for identifying the requirements, operational concept, and associated verification and validation steps required in the development process. The system developed by using a machine learning algorithm with a text mining technique to extract the required actions from limiting conditions for operations (LCO) or procedures that represent certain tasks.