• Title/Summary/Keyword: Similar Evaluation Function

Search Result 245, Processing Time 0.021 seconds

Feature Extraction and Similarity Measure Function Define For Beauty Evaluation of Korean Character (한글의 미적 평가를 위한 특징 추출 및 유사도 함수 정의)

  • 한군희;오명관;이형우;전병민
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.1
    • /
    • pp.59-67
    • /
    • 2002
  • This study pre-processed the characters, performed the feature extraction for the beauty evaluation, and then defined the similarity function. It suggested the definition of the similarity function, and the extraction of the features of character elements. it experimented how much the various input character patterns were similar with the standard character patterns, found their results were almost similar with the expected ones and the results of beauty evaluation on general people through the questionaire with the results of the methods suggested here.

  • PDF

Multiple Trait Evaluation of Bivoltine Hybrids of Silkworm(Bombyx mori L.)

  • Babu, M.Ramesh;Chandrashekharaiah;Lakshmi, H.;Prasad, J.
    • International Journal of Industrial Entomology and Biomaterials
    • /
    • v.5 no.1
    • /
    • pp.37-43
    • /
    • 2002
  • Eighteen new bivoltine silkworm (Bombyx mori L.) hybrids developed at Andhra Pradesh State Sericul-ture Research and Development Institute, Hindupur are evaluated for 10 economic traits by following two multiple trait index methods, i.e., Subordinate Function and Evaluation Index for their economic merit. The hybrid genotype, APS6${\times}$APS11 with highest Subordinate function value of 8.2432 and highest average Evaluation Index of 61.67 ranked first. This hybrid is adjudicated as most promising hybrid and recommended for commercial use. Further, applicability of Subordinate Function Index Method is tested and recommended for application of multiple trait evaluation similar to Evaluation Index Method as the results obtained are comparable. Further, both these methods can be applied for confirmation of results.

Globally Optimal Recommender Group Formation and Maintenance Algorithm using the Fitness Function (적합도 함수를 이용한 최적의 추천자 그룹 생성 및 유지 알고리즘)

  • Kim, Yong-Ku;Lee, Min-Ho;Park, Soo-Hong;Hwang, Cheol-Ju
    • Journal of KIISE:Information Networking
    • /
    • v.36 no.1
    • /
    • pp.50-56
    • /
    • 2009
  • This paper proposes a new algorithm of clustering similar nodes defined as nodes having similar characteristic values in pure P2P environment. To compare similarity between nodes, we introduce a fitness function whose return value depends only on the two nodes' characteristic values. The higher the return value is, the more similar the two nodes are. We propose a GORGFM algorithm newly in conjunction with the fitness function to recommend and exchange nodes' characteristic values for an interest group formation and maintenance. With the GORGFM algorithm, the interest groups are formed dynamically based on the similarity of users, and all nodes will highly satisfy with the information recommended and received from nodes of the interest group. To evaluate of performance of the GORGFM algorithm, we simulated a matching rate by the total number of nodes of network and the number of iterations of the algorithm to find similar nodes accurately. The result shows that the matching rate is highly accurate. The GORGFM algorithm proposed in this paper is highly flexible to be applied for any searching system on the web.

COMBINATORIAL INTERPRETATIONS OF THE ORTHOGONALITY RELATIONS FOR SPIN CHARACTERS OF $\tilde{S}n$

  • Lee, Jaejin
    • Korean Journal of Mathematics
    • /
    • v.22 no.2
    • /
    • pp.325-337
    • /
    • 2014
  • In 1911 Schur[6] derived degree and character formulas for projective representations of the symmetric groups remarkably similar to the corresponding formulas for ordinary representations. Morris[3] derived a recurrence for evaluation of spin characters and Stembridge[8] gave a combinatorial reformulation for Morris' recurrence. In this paper we give combinatorial interpretations for the orthogonality relations of spin characters based on Stembridge's combinatorial reformulation for Morris' rule.

The Study of the Test and Evaluation Item Applies QFD in Research & Development Progject (연구개발사업에 QFD(품질기능전개)를 적용한 시험평가 항목 선정에 관한 연구)

  • Park, Jongwan;Lee, Jaewoo
    • Journal of Applied Reliability
    • /
    • v.18 no.2
    • /
    • pp.161-172
    • /
    • 2018
  • Purpose: Test & Evaluation items are main contents which verify performance of the development system and they are deduced going through project management system stages. However, there is no systematic or standardized framework for Test & Evaluation items, so a lot of differences occur between projects and people are questioning whether verification items are selected for the optimization of the development system. In this regard, this research proposes the process of deducing Test & Evaluation items in a systematic way during a development stage by applying QFD (Quality Function Deployment) technique which reflects customers' requirements. Methods: Test & Evaluation items are recognized as customers' requirements, and QFD technique which refines and gathers various requirements of customers effectively during general products' development stage is applied to complete HOQ (House of Quality) Conclusion: There is no specific methodology for Test & Evaluation items, so currently, they are selected by including items which are given by similar projects or higher authorities. However, by utilizing QFD technique, selection of evaluation items which goes through more systematic process is expected to be possible.

The Congestion Control using Multiple Time Scale under Self-Similar Traffic of TCP (TCP의 자기 유사성 트래픽 조건하에서 다중 시간 간격을 이용한 혼잡 제어)

  • 김광준;윤찬호;김천석
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.2
    • /
    • pp.310-323
    • /
    • 2004
  • In this paper, we extend the multiple time scale control framework to window-based congestion control, in particular, TCP This is performed by interfacing TCP with a large tine scale control nodule which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT Our contribution is threefold. First, we define a modular extension of TCP-a function call with a simple interface-that applies to various flavors of TCP-e.g., Tahoe, Reno, Vegas and show that it significantly improves performance. Second, we show that multiple time scale TCP endows the underlying feedback control with preactivity by bridging the uncertainty gap associated with reactive controls which is exacerbated by the high delay-bandwidth product in broadband wide area networks. Third, we investigate the influence of three traffic control dimensions-tracking ability, connection duration, and fairness-on performance. Performance evaluation of multiple time scale TCP is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic.

A Freedom Inquiry Method by Revised Science Curriculum in 2007 (2007년 개정 과학과 교육과정에서 자유탐구 방안)

  • Lee, Yong-Seob;Park, Mi-Jin
    • Journal of the Korean Society of Earth Science Education
    • /
    • v.3 no.1
    • /
    • pp.65-75
    • /
    • 2010
  • The purpose of this study is to present a Freedom Inquiry Method by Revised Science Curriculum in 2007. This study introduced IIM(Independent Inquiry Method), PBL(Problem Based Learning), Small Inquiry Method, Science Notebooks, Project Learning Method about Freedom Inquiry Method. The results of this study are as follows: First, IIM(Independent Inquiry Method) is studying method in the inquiry process center. The inquiry process is composed of total 9 phases, inquiry subject really it is, detailed aim deciding, information searching, it searches, quest result it arranges, aim evaluation, the report making, it announces, it evaluates, it is become accomplished. Second, It is a studying method which it starts with the problem which is Problem Based Learning, study atmosphere creation phase, problematic presentation phase and sleep static problem solving the phase which it attempts, it is become accomplished with autonomous studying phase, coordinated studying and discussion studying phase, discussion resultant announcement studying phase, arrangement and evaluation. Third, Small Inquiry Method, Call it accomplishes the call grade of the students among ourselves 4~8 people degree where only the quest learning capability is similar within class. Also interaction and coordinated function of the members between it leads and the subject which is given in the group it cooperates and it solves with it is a quest method which arrives to aim of commonness. This method divides on a large scale in three parts, it becomes accomplished in programming phase, quest accomplishment and resultant announcement. Fourth, Science Notebooks learns a scientific contents and a scientific quest function and the possibility of decreasing in order to be, from the fact that the help which it understands. This planing, data searching, it searches, becomes accomplished with resultant arrangement, announcement and evaluation. Fifth, The Project Learning Method the studying person oneself studying contents, it establishes a plan and it collects it accomplishes process of etc. it evaluates it leads and a subject and information and with real life it is a method which it studies naturally from the learning environment inside which is similar. This is preliminary phase, project start, project activity and project arrangement.

  • PDF

The Evaluation-based CBR Model for Security Risk Analysis (보안위험분석을 위한 평가기반 CBR모델)

  • Bang, Young-Hwan;Lee, Gang-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.282-287
    • /
    • 2007
  • Information society is dramatically developing in the various areas of finance, trade, medical service, energy, and education using information system. Evaluation for risk analysis should be done before security management for information system and security risk analysis is the best method to safely prevent it from occurrence, solving weaknesses of information security service. In this paper, Modeling it did the evaluation-base CBD function it will be able to establish the evaluation plan of optimum. Evaluation-based CBD(case-based reasoning) functions manages a security risk analysis evaluation at project unit. it evaluate the evaluation instance for beginning of history degree of existing. It seeks the evaluation instance which is similar and Result security risk analysis evaluation of optimum about under using planning.

Plan for the Development of a Standardized Dummy for Persons in Need of Rescue in a Confined Space (밀폐공간 구조 요구자를 위한 더미 표준화 개발 방안)

  • Choi, Seo-Yeon;Rie, Dong-Ho;Kim, Hyung-Jun
    • Journal of the Korea Safety Management & Science
    • /
    • v.18 no.4
    • /
    • pp.99-105
    • /
    • 2016
  • This study was conducted to develop a dummy in an environment similar to the human body, to prepare a standard for evaluation and to present the process of the production in order to evaluate the performance of the robot that can detect the persons needing rescue in a confined space, who are difficult for fire-fighting officials to rescue in case of fire and disaster. As a result, a standard for evaluation was developed and standardized into four parts 'Normal,' 'Risk Stage 1,' 'Risk Stage 2' and 'Risk Stage 3'based on the number of breath cycles, carbon dioxide concentration, core temperature and criteria for hearing to recognize the voice. In addition, in order to produce a dummy, fever, breathing capacity and voice output function were compared and analyzed. This study has significance that it built up basic data of the method of producing the actual dummy, by presenting characteristics and controlling methods using the waterproof insulation heating coil for the function, solenoid valve for the consecutive output of breathing capacity and USB program sound board for voice output.

Visualization of Tooth for Non-Destructive Evaluation from CT Images

  • Gao, Hui;Chae, Oksam
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.3
    • /
    • pp.207-213
    • /
    • 2009
  • This paper reports an effort to develop 3D tooth visualization system from CT sequence images as a part of the non-destructive evaluation suitable for the simulation of endodontics, orthodontics and other dental treatments. We focus on the segmentation and visualization for the individual tooth. In dental CT images teeth are touching the adjacent teeth or surrounded by the alveolar bones with similar intensity. We propose an improved level set method with shape prior to separate a tooth from other teeth as well as the alveolar bones. Reconstructed 3D model of individual tooth based on the segmentation results indicates that our technique is a very conducive tool for tooth visualization, evaluation and diagnosis. Some comparative visualization results validate the non-destructive function of our method.