• Title/Summary/Keyword: approach time

Search Result 10,287, Processing Time 0.03 seconds

도착시점 방법에 의한 이산시간 대기행렬의 분석 (An Arrival Time Approach to Discrete-Time Queues)

  • 김남기;채경철
    • 한국경영과학회지
    • /
    • 제26권4호
    • /
    • pp.47-53
    • /
    • 2001
  • We demonstrate that the arrival time approach of Chae et al. [4], originally proposed for continuous-time queues, is also useful for discrete-time queues. The approach serves as a simple alternative to finding the probability generating functions of the queue lengths for a variety of discrete-time single-server queues with bulk arrivals and bulk services.

  • PDF

주식분할의 장기성과 측정 모델에 대한 연구 (A Study about Measurement Model of Long Term Performance in Stock Split)

  • 신연수
    • 정보학연구
    • /
    • 제9권3호
    • /
    • pp.77-89
    • /
    • 2006
  • The event study analyzes returns around event date at a time. Event study provides estimation periods and cumulative returns. Stock split announcements are generally associated with positive abnormal returns. It is important to investigate the responses of stocks to new information contained in the announcements of stock splits. So It is important to study the long term performance in the case of Stock Split. This Study forced to two approach method in evaluating the performance, the event time portfolio approach and calendar time portfolio approach. The event time portfolio approach exists the CAR model, BHAR model and WR model. And the calendar time portfolio approach has the 3 factor model, 4 factor model, CTAR model, and RATS model.

  • PDF

휴리스틱 방법을 이용한 N정책과 준비기간을 갖는 휴가형 $Geo^x/G/1$ 모형의 평균대기시간 분석 (Heuristic Approach to the Mean Waiting Time of $Geo^x/G/1$ Vacation Queues with N-policy and Setup Time)

  • 이성희;김성진;채경철
    • 한국경영과학회지
    • /
    • 제32권1호
    • /
    • pp.53-60
    • /
    • 2007
  • We consider the discrete-time $Geo^x/G/1$ queues under N-policy with multiple vacations (a single vacation) and setup time. In this queueing system, the server takes multiple vacations (a single vacation) whenever the system becomes empty, and he begins to serve the customers after setup time only if the queue length is at least a predetermined threshold value N. Using the heuristic approach, we derive the mean waiting time for both vacation models. We demonstrate that the heuristic approach is also useful for the discrete-time queues.

Output-only modal identification approach for time-unsynchronized signals from decentralized wireless sensor network for linear structural systems

  • Park, Jae-Hyung;Kim, Jeong-Tae;Yi, Jin-Hak
    • Smart Structures and Systems
    • /
    • 제7권1호
    • /
    • pp.59-82
    • /
    • 2011
  • In this study, an output-only modal identification approach is proposed for decentralized wireless sensor nodes used for linear structural systems. The following approaches are implemented to achieve the objective. Firstly, an output-only modal identification method is selected for decentralized wireless sensor networks. Secondly, the effect of time-unsynchronization is assessed with respect to the accuracy of modal identification analysis. Time-unsynchronized signals are analytically examined to quantify uncertainties and their corresponding errors in modal identification results. Thirdly, a modified approach using complex mode shapes is proposed to reduce the unsynchronization-induced errors in modal identification. In the new way, complex mode shapes are extracted from unsynchronized signals to deal both with modal amplitudes and with phase angles. Finally, the feasibility of the proposed approach is evaluated from numerical and experimental tests by comparing with the performance of existing approach using real mode shapes.

가역접근법을 이용한 일유출량 자료의 비선형 예측 (Nonlinear Forecasting of Daily Runoff Using Inverse Approach Method)

  • 이배성;정동국;정태성;이상진
    • 한국수자원학회논문집
    • /
    • 제39권3호
    • /
    • pp.253-259
    • /
    • 2006
  • 기존의 거의 모든 수문학적 연구에 있어서, 시스템의 특성을 파악한 뒤 예측을 실시하는 표준접근법이 채택되어왔다. 그러나 최근 들어 시스템의 특성분석에 앞서 예측을 실시하고, 상태공간 매개변수가 시스템의 특성분석단계가 아닌 예측단계에서 평가되는 가역접근법이 제안되었다. 본 연구에서는 최근에 제안된 가역접근법과 기존에 널리 적용되어온 표준접근법을 이론적 카오스 시계열과 Idaho주 Bear강의 일유출량 자료에 적용함으로써, 가역접근법의 적용성을 검토하고 카오스 시계열의 특성을 알아보았으며, 카오스이론이 적용된 비선형 예측기법으로는 부분근사화 기법을 이용하였다. 카오스 특성 분석을 통해, 이론적 카오스 시계열과 Idaho주 Bear강의 일유출량 시계열 자료 모두에서 카오스 특성이 나타남을 알 수 있었다. 200일에 대한 1, 3, 5일 예측 결과, 가역접근법이 표준접근법에 비해 우수함을 알 수 있었다.

단일루프 단일벡터 방법을 이용한 신뢰성기반 위상최적설계 (Reliability-Based Topology Optimization Using Single-Loop Single-Vector Approach)

  • 방승현;민승재
    • 대한기계학회논문집A
    • /
    • 제30권8호
    • /
    • pp.889-896
    • /
    • 2006
  • The concept of reliability has been applied to the topology optimization based on a reliability index approach or a performance measure approach. Since these approaches, called double-loop single vector approach, require the nested optimization problem to obtain the most probable point in the probabilistic design domain, the time for the entire process makes the practical use infeasible. In this work, new reliability-based topology optimization method is proposed by utilizing single-loop single-vector approach, which approximates searching the most probable point analytically, to reduce the time cost. The results of design examples show that the proposed method provides efficiency curtailing the time for the optimization process and accuracy satisfying the specified reliability.

Counter-Based Approaches for Efficient WCET Analysis of Multicore Processors with Shared Caches

  • Ding, Yiqiang;Zhang, Wei
    • Journal of Computing Science and Engineering
    • /
    • 제7권4호
    • /
    • pp.285-299
    • /
    • 2013
  • To enable hard real-time systems to take advantage of multicore processors, it is crucial to obtain the worst-case execution time (WCET) for programs running on multicore processors. However, this is challenging and complicated due to the inter-thread interferences from the shared resources in a multicore processor. Recent research used the combined cache conflict graph (CCCG) to model and compute the worst-case inter-thread interferences on a shared L2 cache in a multicore processor, which is called the CCCG-based approach in this paper. Although it can compute the WCET safely and accurately, its computational complexity is exponential and prohibitive for a large number of cores. In this paper, we propose three counter-based approaches to significantly reduce the complexity of the multicore WCET analysis, while achieving absolute safety with tightness close to the CCCG-based approach. The basic counter-based approach simply counts the worst-case number of cache line blocks mapped to a cache set of a shared L2 cache from all the concurrent threads, and compares it with the associativity of the cache set to compute the worst-case cache behavior. The enhanced counter-based approach uses techniques to enhance the accuracy of calculating the counters. The hybrid counter-based approach combines the enhanced counter-based approach and the CCCG-based approach to further improve the tightness of analysis without significantly increasing the complexity. Our experiments on a 4-core processor indicate that the enhanced counter-based approach overestimates the WCET by 14% on average compared to the CCCG-based approach, while its averaged running time is less than 1/380 that of the CCCG-based approach. The hybrid approach reduces the overestimation to only 2.65%, while its running time is less than 1/150 that of the CCCG-based approach on average.

Analysis of decimation techniques to improve computational efficiency of a frequency-domain evaluation approach for real-time hybrid simulation

  • Guo, Tong;Xu, Weijie;Chen, Cheng
    • Smart Structures and Systems
    • /
    • 제14권6호
    • /
    • pp.1197-1220
    • /
    • 2014
  • Accurate actuator tracking is critical to achieve reliable real-time hybrid simulation results for earthquake engineering research. The frequency-domain evaluation approach provides an innovative way for more quantitative post-simulation evaluation of actuator tracking errors compared with existing time domain based techniques. Utilizing the Fast Fourier Transform the approach analyzes the actuator error in terms of amplitude and phrase errors. Existing application of the approach requires using the complete length of the experimental data. To improve the computational efficiency, two techniques including data decimation and frequency decimation are analyzed to reduce the amount of data involved in the frequency-domain evaluation. The presented study aims to enhance the computational efficiency of the approach in order to utilize it for future on-line actuator tracking evaluation. Both computational simulation and laboratory experimental results are analyzed and recommendations on the two decimation factors are provided based on the findings from this study.

Faster Detection of Step Initiation for the Lower Limb Exoskeleton with Vertical GRF Events

  • Cha, Dowan;Kang, Daewon;Kim, Kab Il;Kim, Kyung-Soo;Lee, Bum-Joo;Kim, Soohyun
    • Journal of Electrical Engineering and Technology
    • /
    • 제9권2호
    • /
    • pp.733-738
    • /
    • 2014
  • We propose a new approach called as a peak time approach for faster detection of step initiation for the lower limb exoskeleton. As faster detection of step initiation is an important criterion in evaluating the lower limb exoskeleton, many studies have investigated approaches to detect step initiation faster, including using electromyography, the center of pressure, the heel-off time and the toe-off time. In this study, we will utilize vertical ground reaction force events to detect step initiation, and compare our approach with prior approaches. Additionally, we will predict the first step's heel strike time with vertical ground reaction force events from multiple regression equations to support our approach. The lower limb exoskeleton should assist the operator's movement much faster and more reliably with our approach.

A SYN flooding attack detection approach with hierarchical policies based on self-information

  • Sun, Jia-Rong;Huang, Chin-Tser;Hwang, Min-Shiang
    • ETRI Journal
    • /
    • 제44권2호
    • /
    • pp.346-354
    • /
    • 2022
  • The SYN flooding attack is widely used in cyber attacks because it paralyzes the network by causing the system and bandwidth resources to be exhausted. This paper proposed a self-information approach for detecting the SYN flooding attack and provided a detection algorithm with a hierarchical policy on a detection time domain. Compared with other detection methods of entropy measurement, the proposed approach is more efficient in detecting the SYN flooding attack, providing low misjudgment, hierarchical detection policy, and low time complexity. Furthermore, we proposed a detection algorithm with limiting system resources. Thus, the time complexity of our approach is only (log n) with lower time complexity and misjudgment rate than other approaches. Therefore, the approach can detect the denial-of-service/distributed denial-of-service attacks and prevent SYN flooding attacks.