• Title/Summary/Keyword: Techniques for Decision Weights in Each Step.

Search Result 4, Processing Time 0.02 seconds

A Study on the Subject Selection of VE Using Decision Weights Techniques (VE 대상선정을 위한 평가항목의 가중치결정방법에 관한 연구)

  • Yun, Dong-Jin;Sin, Byung-Yoon;Jeong, Yong-Sik;Lee, Sang-Beom
    • Journal of the Korea Institute of Building Construction
    • /
    • v.5 no.3 s.17
    • /
    • pp.83-90
    • /
    • 2005
  • Was used at step space-time mainly after VE technique sponsors in domestic in the 1960s but have been expanded to design step recently. Possibility of value elevation or cost reduction must choose member that is effectively for active and effective application of VE technique. In this study, when enforce design VE examining for weight decision corrosion protection been using in weight grant composition estimation technique, target choice process wishes to suggest formality and method that can be achieved effectively Main conclusion of this study sorts valuation items step by step for weight appropriation of valuation basis and give point on article of high position point after expert which employer is included estimates article by low rank step and this presented high position method that do union item by item and establishes by item weight. Did these techniques for giving weights so that importance for weight appropriation developed estimation program, and data save of target estimation standard and target estimation standard is possible using straight sit.

A Study on the Subject Selection of VE Using Decision Weights Techniques (VE 대상선정을 위한 평가항목의 가중치 결정방법에 관한 연구)

  • Ryu Hyung-Han;Bae Soo-Yong;Hwang Jae-Woo;Yun Dong-Jin;Lee Sang-Beom
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2005.05a
    • /
    • pp.149-155
    • /
    • 2005
  • Was used at step space-time mainly after VE technique sponsors in domestic in the 1960s but have been expanded to design step recently. Possibility of value elevation or cost reduction must choose member that is effectively for active and effective application of VE technique. In this study, when enforce design VE examining for weight decision corrosion protection been using in weight grant composition estimation technique, target choice process wishes to suggest formality and method that can be achieved effectively. Main conclusion of this study sorts valuation items step by step for weight appropriation of valuation basis and give point on article of high position point after expert which employer is included estimates article by low rank step and this presented high position method that do union itembyitemandestablishesbyitemweight. Did these techniques for giving weights so that importance for weight appropriation developed estimation program, and data save of target estimation standard and target estimation standard is possible using straight sit.

  • PDF

A multi-criteria decision-making process for selecting decontamination methods for radioactively contaminated metal components

  • Inhye Hahm ;Daehyun Kim;Ho jin Ryu;Sungyeol Choi
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.52-62
    • /
    • 2023
  • Various decontamination technologies have been developed for removing contaminated areas in industries. Although it is important to consider parameters such as safety, cost, and time when selecting the decontamination technology, till date their comparative study is missing. Furthermore, different decontamination technologies influence the decontamination effects in different ways. Therefore, this study compares different decontamination techniques for the steam generator using a multicriteria decision-making method. A steam generator is a large device comprising both low- and very low-level waste (LLW, VLLW) and reflects the difference in weights of the standards according to the classification of the waste. For LLW and VLLW decontaminations, chemical oxidizing reduction decontamination (CORD) and decontamination grit blasting were used as the preferred techniques, respectively, considering the purpose of decontamination differs based on the initial state of waste. An expert survey revealed that safety in LLW and waste minimization in VLLW exhibited high preference. This evaluation method can be applied not only to the comparison between each process, but also to the creation of process scenarios. Therefore, determining the decontamination approach using logical decision-making methods may improve the safety and economic feasibility of each step in the decommissioning process and ensure a public acceptance.

An Integrated Model based on Genetic Algorithms for Implementing Cost-Effective Intelligent Intrusion Detection Systems (비용효율적 지능형 침입탐지시스템 구현을 위한 유전자 알고리즘 기반 통합 모형)

  • Lee, Hyeon-Uk;Kim, Ji-Hun;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2012
  • These days, the malicious attacks and hacks on the networked systems are dramatically increasing, and the patterns of them are changing rapidly. Consequently, it becomes more important to appropriately handle these malicious attacks and hacks, and there exist sufficient interests and demand in effective network security systems just like intrusion detection systems. Intrusion detection systems are the network security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. Conventional intrusion detection systems have generally been designed using the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. However, they cannot handle new or unknown patterns of the network attacks, although they perform very well under the normal situation. As a result, recent studies on intrusion detection systems use artificial intelligence techniques, which can proactively respond to the unknown threats. For a long time, researchers have adopted and tested various kinds of artificial intelligence techniques such as artificial neural networks, decision trees, and support vector machines to detect intrusions on the network. However, most of them have just applied these techniques singularly, even though combining the techniques may lead to better detection. With this reason, we propose a new integrated model for intrusion detection. Our model is designed to combine prediction results of four different binary classification models-logistic regression (LOGIT), decision trees (DT), artificial neural networks (ANN), and support vector machines (SVM), which may be complementary to each other. As a tool for finding optimal combining weights, genetic algorithms (GA) are used. Our proposed model is designed to be built in two steps. At the first step, the optimal integration model whose prediction error (i.e. erroneous classification rate) is the least is generated. After that, in the second step, it explores the optimal classification threshold for determining intrusions, which minimizes the total misclassification cost. To calculate the total misclassification cost of intrusion detection system, we need to understand its asymmetric error cost scheme. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, total misclassification cost is more affected by FNE rather than FPE. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 10,000 samples from them by using random sampling method. Also, we compared the results from our model with the results from single techniques to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell R4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on GA outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that the proposed model outperformed all the other comparative models in the total misclassification cost perspective. Consequently, it is expected that our study may contribute to build cost-effective intelligent intrusion detection systems.