• Title/Summary/Keyword: Rule Operation 기법

Search Result 63, Processing Time 0.03 seconds

On the Optimal Operation of a Storage Reservoir for Flood Control by Dynamic Programming (홍수시 Dynamic Programming에 의한 저수지의 최적운영에 관한 연구)

  • 오영민;이길성
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 1986.07a
    • /
    • pp.147-158
    • /
    • 1986
  • 본 논문에서는 북한강 수계의 소양강댐 및 최근에 건설된 남한강 수계의 충주댐의 홍수조절 모형을 개발하였으며, 그 방법으로는 mini-max Dynamic Programming(DP)에 의한 Optimization기법을 사용하였다. 즉 각댐의 유입량을 이용하여 소양강댐 및 충주댐에서의 최대 방류량을 최소화시키는 목적 함수를 사용하였으며, 각 댐 및 하도의 특성에 따른 제약 조건을 고려하였다. DP에 의한 소양강댐 및 충주댐의 최적 운영 결과를 조절율과 이용율을 사용하여 Simulation방법중 Technical ROM, Rigid ROM, Linear Decision Rule(LDR)과 비교한 결과 모든 빈도에 대해서 DP에 의한 방법이 더 좋은 것으로 나타났다. 소양강댐의 각 빈도별 유입량에 대한 방류 형태중, 5년 빈도의 경우에는 방류를 전혀 하지 않아도 저수위가 홍수위 198m를 넘지 않으므로 사실상 5년 빈도의 홍수에 대해서는 저수지 조작이 필요없다. 충주댐의 각 빈도별 유입량에 대한 방류 형태는 초반부와 후반부에서는 방유량-유입량으로 방출하고 중반부에서는 일정한 양을 방류한다. 이에 따라 저수위도 초반부와 후반부에서는 각각 제한수위 138m와 홍수위 145m로 유지된다.

  • PDF

Image Encryption Scheme using Complemented MLCA and Special Chaos Map (여원 MLCA와 특수 혼돈 함수를 이용한 영상 암호화 기법)

  • Jeong, Hyun-Soo;Park, Kyu-Chil;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.873-880
    • /
    • 2020
  • The proposed encryption algorithm strengthens its security by converting pixel-specific values and changing pixel positions. The state transition matrix created by Wolfram's rule creates a complemented CA sequence with the maximum length. Then, we convert the sequence into a 2D basis image and go through a XOR operation with the original image. The final encrypted image is created by shear stressing and rearranging. The image stability analysis verified that the proposed encryption method has high security.

A Study on Korean Local Governments' Operation of Participatory Budgeting System : Classification by Support Vector Machine Technique (한국 지방자치단체의 주민참여예산제도 운영에 관한 연구 - Support Vector Machine 기법을 이용한 유형 구분)

  • Junhyun Han;Jaemin Ryou;Jayon Bae;Chunghyeok Im
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.461-466
    • /
    • 2024
  • Korean local governments operates the participatory budgeting system autonomously. This study is to classify these entities into clusters. Among the diverse machine learning methodologies(Neural Network, Rule Induction(CN2), KNN, Decision Tree, Random Forest, Gradient Boosting, SVM, Naïve Bayes), the Support Vector Machine technique emerged as the most efficacious in the analysis of 2022 Korean municipalities data. The first cluster C1 is characterized by minimal committee activity but a substantial allocation of participatory budgeting; another cluster C3 comprises cities that exhibit a passive stance. The majority of cities falls into the final cluster C2 which is noted for its proactive engagement in. Overall, most Korean local government operates the participatory busgeting system in good shape. Only a small number of cities is less active in this system. We anticipate that analyzing time-series data from the past decade in follow-up studies will further enhance the reliability of classifying local government types regarding participatory budgeting.

Complemented Maximum-Length Cellular Automata Applied on Video Encryption (비디오 암호화를 위한 여원 최대길이 셀룰라 오토마타)

  • Li, Gao-Yong;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.13-18
    • /
    • 2017
  • With the advancement of internet technology, the importance of data protection is gaining more attention. As a possible data protection solution, we propose a novel video encryption method using complemented maximum-length cellular automata (C-MLCA). The first step for encryption is to use 90/150 CA rule to generate a transition matrix T of a C-MLCA state followed by a 2D C-MLCA basis image. Then, we divide the video into multiple frames. Once, we perform exclusive-OR operation with the split frames and the 2D basis image, the final encrypted video can be obtained. By altering values of pixel, the fundamental information in visualizing image data, the proposed method provides improved security. Moreover, we carry out some computational experiments to further evaluate our method where the results confirm its feasibility.

Fault Tolerant System based on Recovery Agents (회복 에이전트 기반 결함 포용 시스템)

  • Lee, Hwa-Min;Jung, Soon-Young;Yu, Heon-Chang
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.2
    • /
    • pp.21-28
    • /
    • 2002
  • This paper proposes a new approach to rollback-recovery using multi-agent in distributed computing system. Previous rollback-recovery protocols are dependent on inherent communication and operating system, which causes a decline of computing performance in distributed computing system. By using multi-agent, we propose rollback-recovery protocol that is independent on operating system. We define three kinds of agent. One is a recovery agent that performs rollback-recovery protocol after a failure. Other is an information agent that constructs domain knowledge as a rule of fault tolerance and information during failure-free operation. The other is facilitator agent that controls the efficient communication between agents. Also we propose rollback-recovery protocol using multi-agent and simulated the proposed rollback-recovery protocol using JAVA and agent communication language in CORBA environment.

  • PDF

Comparision of metaheuristic methods for generating long-term reservoir operation rule (장기 저수지운영률 도출을 위한 메타휴리스틱 기법의 비교)

  • Kang, Shin-Uk;Lee, Sang-Ho;Kim, Hyeon-Sik
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.226-226
    • /
    • 2011
  • 최적 저수지운영을 위한 운영률 도출이나 강우-유출 및 수질 모형의 매개변수 추정 문제처럼 비선형적이고 추정해야할 변수의 수가 많은 경우, 수학적으로 모형화하기에 너무 복잡해서 선형계획법, 비선형계획법, 동적계획법 등을 사용하여 최적해를 구할 수 없는 경우도 있다. 이러한 문제에 대해서는 구조적 진화를 통해 최적해를 구하는 방법들이 사용된다. 일반적으로 미지수의 개수가 많아지면 전역최적해를 찾기가 어려워진다. 전역최적해를 찾는 여러 가지 방법들이 수자원 분야에서는 강우-유출모형의 매개변수를 추정하는데 많이 사용되고 있으며, 특히 유전자 알고리즘, SCE-UA 알고리즘 등 전역최적해를 찾는 메타휴리스틱 방법이 많이 사용되고 있다. 전역최적화 방법을 개발하는 연구자들은 최적화방법의 성능을 평가하기 위해 다양한 검사함수(test function)를 만들어 성능을 평가하고 있다. 본 연구에 사용한 검사함수는 Mishra의 연구(2006a, 2006b)에서 사용한 중요하고 복잡한 검사함수이다. 유전자 알고리즘, SCE-UA 알고리즘, DDS 알고리즘을 검사함수 중 전역해를 찾기 어려운 2 차원 함수 2 가지, 다차원 함수 4 가지 함수에 적용하여 각각의 탐색 성능을 평가하였다. 2차원 함수인 Bukin 함수에 대해서는 모든 최적화 방법이 전역최적해를 찾을 수 없었지만, 유전자 알고리즘이 가장 전역최적해에 가까웠고 다음으로 DDS 알고리즘 순서였다. 지역수렴 영역이 많을 것으로 판단되는 10, 30, 50 차원 Michalewicz 함수에 대해서는 DDS 알고리즘으로 구한 최적해가 전역최적해와 매우 근접하였고 다음으로 SCE-UA 알고리즘, 유전자 알고리즘 순이었다. 지역수렴 영역이 상대적으로 다른 함수보다 넓은 10 차원 Schwefel 함수에 대해서는 DDS 알고리즘으로 구한 최적해가 전역최적해와 거의 근접하였고 유전자 알고리즘과 SCE-UA 알고리즘은 매우 큰 편차를 보였다. 40, 80 차원 Schwefel 함수에 대해서는 3 가지 알고리즘 모두 전역최적해와 편차를 보였지만 DDS 알고리즘에 의한 최적해와 다른 두 알고리즘에 의한 최적해는 1 오더(order) 정도의 차이가 났다. 지역수렴 영역이 큰 Michalewicz 함수와 Schwefel 함수에 대한 결과는 매우 흡사한 결과이다. 이상과 같은 결과로, 유전자 알고리즘은 매개변수의 수가 적을 경우 우수한 탐색성능을 가졌으며, SCE-UA 알고리즘은 Griewank, Rastrigin 함수와 같은 형태인 경우 우수한 성능을 보였다. DDS 알고리즘은 전체적으로 우수한 탐색 능력을 가진 것으로 판단된다. 그러므로 수위구간 영역별 저수지운영률 도출을 위한 적절한 최적화방법으로 DDS 알고리즘을 선정하였다.

  • PDF

A study on the Alarm Processing System for Elevator Facility using Neural Network at Apartment (공동주택에서 신경 회로망을 이용한 승강기 계통 경보처리 시스템 개발 연구)

  • 홍규장;유건수;홍성우;정찬수
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.11 no.4
    • /
    • pp.92-99
    • /
    • 1997
  • This paper proposed a control method to improve the efficiency of monitoring method by applying the nural network for an alarm processing method(APM)in an elevator facility of apartment complex. This APM is based on the cumulative generalized delta rule of backpropagation in neural network.It was used to infer the minimum alarms among multi-fired alarms, and then the inferred alarm can be dis¬played maintenance information of facility by using a pre-defined troubleshoot knowledge base. For validating the proposed monitoring method of this thesis, simulation results are compared with the operation of existing monitoring system and the way of alarm processing. The simulation method used to the three case of virtual scenario. As comparison results, a proposed method in this paper could be proved the applied possibility of an neural network and the performance in fields of facilities maintenance.

  • PDF

Unsteady Flow Model Including a Dam Operation Rule for Flood Control as Internal Boundary Condition (홍수시 댐 운영방안을 내부 경계조건으로 포함하는 부정류 계산모형)

  • Yu, Myoung-Kwan;Jun, Kyung-Soo
    • Journal of Korea Water Resources Association
    • /
    • v.37 no.12
    • /
    • pp.1043-1054
    • /
    • 2004
  • An unsteady flow model for channel network including various internal boundaries if developed. It is a multiply-connected network model based on the Preissmann's four-point scheme and the Newton-Raphson method, where looped double-sweep algorithm is used. The model is capable of simulating flow through hydraulic structures such as dams and submerged weirs. It can also simulate automatic reservoir operation method (Auto ROM) for flood control, that is to maintain a target water level, by incorporating the strategy to the unsteady flow model as internal boundary condition. The model is applied to the Han River system that includes the downstream reaches of Choongju dam and Hwacheon dam as well as the downstream reach of the Paldang dam. Roughness coefficient for the downstream reach of Choongju dam is estimated. Automatic ROM is presumed for the Paldang, Chungpyung, Euiam, and Choonchun dams. The model is tested using historical flood records, and the flood control strategy is successfully simulated.

A Fuzzy Morphological Neural Network : Principles and Implementation (퍼지 수리 형태학적 신경망 : 원리 및 구현)

  • Won, Yong-Gwan;Lee, Bae-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.449-459
    • /
    • 1996
  • The main goal of this paper is to introduce a novel definition for fuzzy mathematical morphology and a neural network implementation. The generalized- mean operator plays the key role for the definition. Such definition is well suited for neural network implementation. The first stage of the shared-weight neural network has adequate architecture to perform morphological operation. The shared- weight network performs classification based on the features extracted with the fuzzy morphological operation defined in this paper. Therefore, the parameters for the fuzzy definition can be optimized using neural network learning paradigm. Learning rules for the structuring elements, degree of membership, and weighting factors are precisely described. In application to handwritten digit recognition problem, the fuzzy morphological shared-weight neural network produced the results which are comparable to the state-of art for this problem.

  • PDF

Assessment of Additional Water Supply Capacity Using a Reservoir Optimal Operation Model (저수지 최적 운영 모형을 이용한 추가 용수 공급 능력 평가)

  • Kang, Min-Goo;Park, Seung-Woo
    • Journal of Korea Water Resources Association
    • /
    • v.38 no.11
    • /
    • pp.937-946
    • /
    • 2005
  • The objective of the study is to develop a reservoir optimal operation model and to suggest the appropriate amount of additional water supply and optimal operation rule. The model uses multiple objective function and a global search method, SCE-UA method. The objective function is set up to maintain the storage at target level, to satisfy the water demand, and to maximize the hydropower product. To evaluate the model's applicability, the model was applied for allocating the optimal water depending on storage level changes of Seomjin dam. The results comparing optimal operation and historical data showed that hydropower product increased from $-2.29\%$ to $14.51\%$, $-5.94\%$ to $3.98\%$, and $-0.43\%$ to $6.35\%$ with varying target levels in wet, dry, and normal period, respectively. Also, The model was applied for assessing water supply capacity of Seomjin dam to satisfy increasing water demand. The dam was operated by the model on consideration of downstream flow as 0.17, 0.50, 0.70, 1.0, 1.5, and $3.0\;m^3/sec$. The results showed that in case of operating the dam with downstream flow less than $0.70\;m^3/sec$ and with target water level lower than 194.0 m, hydropower product was more than the historical operation data and existing amount of water supply was less influenced.