• 제목/요약/키워드: back calculation

검색결과 272건 처리시간 0.025초

언센티드 칼만필터 훈련 알고리즘에 의한 순환신경망의 파라미터 추정 및 비선형 채널 등화에의 응용 (Parameter Estimation of Recurrent Neural Networks Using A Unscented Kalman Filter Training Algorithm and Its Applications to Nonlinear Channel Equalization)

  • 권오신
    • 한국지능시스템학회논문지
    • /
    • 제15권5호
    • /
    • pp.552-559
    • /
    • 2005
  • 실시간 순환형 훈련 알고리즘(RTRL)과 같이 경사법에 의해 훈련되는 순환형 뉴럴 네트웍(RNN)은 수렴속도가 매우 느린 단점을 지니고 있다. 이 알고리즘은 또한 오차 역전달 처리과정에서 결코 쉽지 않은 미분 계산을 필요로 한다. 본 논문에서는 완전하게 결합된 RNN의 훈련을 위하여 소위 언센티드 칼만필터라고 불리우는 미분없는 칼만필터 훈련 알고리즘을 시스템의 상태공간 상에서 표현하였다. 미분없는 칼만필터 훈련 알고리즘은 순환형 뉴럴 네트웍 훈련시 미분 계산 없이 매우 빠른 수렴속도와 좋은 추정 성능을 보여준다. 비선형 채널 등화 실험을 통하여 미분 없는 칼만필터 훈련 알고리즘을 이용한 RNN의 성능이 향상되었음을 보였다.

Uncertainty quantification in decay heat calculation of spent nuclear fuel by STREAM/RAST-K

  • Jang, Jaerim;Kong, Chidong;Ebiwonjumi, Bamidele;Cherezov, Alexey;Jo, Yunki;Lee, Deokjung
    • Nuclear Engineering and Technology
    • /
    • 제53권9호
    • /
    • pp.2803-2815
    • /
    • 2021
  • This paper addresses the uncertainty quantification and sensitivity analysis of a depleted light-water fuel assembly of the Turkey Point-3 benchmark. The uncertainty of the fuel assembly decay heat and isotopic densities is quantified with respect to three different groups of diverse parameters: nuclear data, assembly design, and reactor core operation. The uncertainty propagation is conducted using a two-step analysis code system comprising the lattice code STREAM, nodal code RAST-K, and spent nuclear fuel module SNF through the random sampling of microscopic cross-sections, fuel rod sizes, number densities, reactor core total power, and temperature distributions. Overall, the statistical analysis of the calculated samples demonstrates that the decay heat uncertainty decreases with the cooling time. The nuclear data and assembly design parameters are proven to be the largest contributors to the decay heat uncertainty, whereas the reactor core power and inlet coolant temperature have a minor effect. The majority of the decay heat uncertainties are delivered by a small number of isotopes such as 241Am, 137Ba, 244Cm, 238Pu, and 90Y.

A Prediction Model of the Sum of Container Based on Combined BP Neural Network and SVM

  • Ding, Min-jie;Zhang, Shao-zhong;Zhong, Hai-dong;Wu, Yao-hui;Zhang, Liang-bin
    • Journal of Information Processing Systems
    • /
    • 제15권2호
    • /
    • pp.305-319
    • /
    • 2019
  • The prediction of the sum of container is very important in the field of container transport. Many influencing factors can affect the prediction results. These factors are usually composed of many variables, whose composition is often very complex. In this paper, we use gray relational analysis to set up a proper forecast index system for the prediction of the sum of containers in foreign trade. To address the issue of the low accuracy of the traditional prediction models and the problem of the difficulty of fully considering all the factors and other issues, this paper puts forward a prediction model which is combined with a back-propagation (BP) neural networks and the support vector machine (SVM). First, it gives the prediction with the data normalized by the BP neural network and generates a preliminary forecast data. Second, it employs SVM for the residual correction calculation for the results based on the preliminary data. The results of practical examples show that the overall relative error of the combined prediction model is no more than 1.5%, which is less than the relative error of the single prediction models. It is hoped that the research can provide a useful reference for the prediction of the sum of container and related studies.

수식 표현의 인식에 관한 연구 (Experimentation on The Recognition of Arithmetic Expressions)

  • 이영교;김영포
    • 디지털산업정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.29-35
    • /
    • 2014
  • The formula contains up between the text and the structural information, as well as their mathematical symbols. Research on-line or off-line recognition formula is underway actively used in various fields, and various forms of the equation are implemented recognition system. Although many documents are included in the various formulas, it is not easy to enter a formula into the computer. Recognition of the expression is divided into two processes of symbol recognition and structural analysis. After analyzing the location information of each character is specified to recognize the effective area after each symbol, and to the structure analysis based on the proximity between the characters is recognized as an independent single formula. Furthermore, analyzing the relationship between the front and back each time a combination of the position relationship between each symbol, and then to add the symbol which was able to easily update the structure of the entire formula. In this paper, by using a scanner to scan the book formula was used to interpret the meaning of the recognized symbol has a relative size and location information of the expression symbol. An algorithm to remove the formulas for calculation of the number of formula is present at the same time is proposed. Using the proposed algorithms to scan the books in the formula in order to evaluate the performance verification as 100% separation and showed the recognition rate equation.

CT 영상재구성을 위한 빠른 선적분 알고리즘 (Fast Calculation Algorithm for Line Integral on CT Reconstruction)

  • 천권수;길준민
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제12권1호
    • /
    • pp.41-46
    • /
    • 2023
  • CT의 반복재구성법은 투영과 역투영을 번갈아 가며 최적의 단면 영상을 얻을 때까지 반복 수행하기 때문에 계산 시간이 오래 걸리는 단점이 있다. 영상재구성 시간을 단축하기 위하여 계산 시간이 많이 소요되는 투영을 빠르게 수행할 수 있는 알고리즘이 필요하다. 본 논문은 Siddon 알고리즘을 개선한 Jacobs 버전보다 대략 10% 빠른 알고리즘을 제안하였다. 제안한 알고리즘은 기존의 Jacobs 버전의 루프 횟수를 줄임으로써 계산 시간을 줄이도록 하였다. 제안한 방법은 계산속도뿐만 아니라 영상 품질 측면에서도 우수한 성능을 보였다. 평행빔의 경우에 대해 조사되었지만 향후 부채살빔 및 콘빔의 경우로 확장이 가능하다.

공동주택 욕실의 타일배면 뒤채움 피착면적에 따른 부착안정성 평가 (Evaluation of the Adhesion Stability According to the Backfilling Area of the Tile back of the Bathroom of an Apartment House)

  • 김범수;송제영;오상근
    • 한국건축시공학회:학술대회논문집
    • /
    • 한국건축시공학회 2021년도 봄 학술논문 발표대회
    • /
    • pp.14-15
    • /
    • 2021
  • Recently, the size of tiles used for bathroom walls in apartment houses is gradually increasing in size. The problem is that when these large-sized tiles are attached by the sticking method, due to the nature of the method, there is a concern about the stability of the attachment to the part (pupil) where the tile and the adhesive are not attached. The problem is serious as it leads to lawsuits in the outbreak court. In addition, it is urgent to verify the adhesion stability of the sticking method because secondary damage occurs due to a safety accident caused by the falling of the tile. Ministry of Land, Infrastructure and Transport [Investigation of defects in apartment houses, calculation of repair cost and defect determination criteria] ① The tile adhesion strength is 0.39N/mm2 or more and ② It is specified to fill 80% or more of the base area of the tile backside, but this is currently trendy. It is considered that large-sized tiles need to be verified from multiple angles, and as part of that, we intend to verify the adhesion stability according to the area to be attached to large-sized tiles.

  • PDF

Identification of Contaminant Injection in Water Distribution Network

  • Marlim, Malvin Samuel;Kang, Doosun
    • 한국수자원학회:학술대회논문집
    • /
    • 한국수자원학회 2020년도 학술발표회
    • /
    • pp.114-114
    • /
    • 2020
  • Water contamination in a water distribution network (WDN) is harmful since it directly induces the consumer's health problem and suspends water service in a wide area. Actions need to be taken rapidly to countermeasure a contamination event. A contaminant source ident ification (CSI) is an important initial step to mitigate the harmful event. Here, a CSI approach focused on determining the contaminant intrusion possible location and time (PLoT) is introduced. One of the methods to discover the PLoT is an inverse calculation to connect all the paths leading to the report specification of a sensor. A filtering procedure is then applied to narrow down the PLoT using the results from individual sensors. First, we spatially reduce the suspect intrusion points by locating the highly suspicious nodes that have similar intrusion time. Then, we narrow the possible intrusion time by matching the suspicious intrusion time to the reported information. Finally, a likelihood-score is estimated for each suspect. Another important aspect that needs to be considered in CSI is that there are inherent uncertainties, such as the variations in user demand and inaccuracy of sensor data. The uncertainties can lead to overlooking the real intrusion point and time. To reflect the uncertainties in the CSI process, the Monte-Carlo Simulation (MCS) is conducted to explore the ranges of PLoT. By analyzing all the accumulated scores through the random sets, a spread of contaminant intrusion PLoT can then be identified in the network.

  • PDF

Data Access Control Scheme Based on Blockchain and Outsourced Verifiable Attribute-Based Encryption in Edge Computing

  • Chao Ma;Xiaojun Jin;Song Luo;Yifei Wei;Xiaojun Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권7호
    • /
    • pp.1935-1950
    • /
    • 2023
  • The arrival of the Internet of Things and 5G technology enables users to rely on edge computing platforms to process massive data. Data sharing based on edge computing refines the efficiency of data collection and analysis, saves the communication cost of data transmission back and forth, but also causes the privacy leakage of a lot of user data. Based on attribute-based encryption and blockchain technology, we design a fine-grained access control scheme for data in edge computing, which has the characteristics of verifiability, support for outsourcing decryption and user attribute revocation. User attributes are authorized by multi-attribute authorization, and the calculation of outsourcing decryption in attribute encryption is completed by edge server, which reduces the computing cost of end users. Meanwhile, We implemented the user's attribute revocation process through the dual encryption process of attribute authority and blockchain. Compared with other schemes, our scheme can manage users' attributes more flexibly. Blockchain technology also ensures the verifiability in the process of outsourcing decryption, which reduces the space occupied by ciphertext compared with other schemes. Meanwhile, the user attribute revocation scheme realizes the dynamic management of user attribute and protects the privacy of user attribute.

On Some Formulae for the Radioisotope Formation (I) - When a Reactor is Operated Regularly at a Certain Time Intervals-

  • Lee, Chang-Kun;Kim, Taeyoung;Yim, Yung-Chang
    • Nuclear Engineering and Technology
    • /
    • 제3권3호
    • /
    • pp.148-154
    • /
    • 1971
  • 원자로를 여러가지 불연속적 방법으로 가동시킬 때 얻어지는 방사성동위원소의 생성량을 구하는 식을 안출하였다. 특히 현재 우리나라 원자로의 가동조건인 월요일부터 목요일까지 매일 평균 8.2시간을 가동하고 금요일과 일요일은 가동치 않고 토요일은 평균 3.2시간으로 가동하는 조건을 중점적으로 다루었다. 이 경우의 activity를 구하는 식은 생성동위원소가 제 2의 핵반응으로 소실되지 않을 경우에는 (equation omitted) 가 된다. 여기서 A: activity (dps), $\Phi$: 중성자속(n $cm^{-2}$ sec$^{-1}$), No: 조사되기전 원자수, $\sigma$: 방사화단면적($\textrm{cm}^2$), λ: 생성방사성동위원소의 붕괴상수($hr^{-1}$), t: 조사하기 시작해서 끄집어낼 때까지의 시간(hr), n: 조사일수, m:금요일이 처음 나타날 때까지의 조사일 수, s, r, q: 조사기간중 금요일, 토요일 및 일요일이 나타난수를 각각 뜻한다. 윗식은 거의 고정항들로 구성되 있으므로 각 동위원소에 대해 이 고정항들을 계산하여 그 값을 구해 도표를 만들어 이 식이 보다 편리하게 이용되도록 하였다.

  • PDF

오류-역전파 신경망 기반의 얼굴 검출 및 포즈 추정 (Back-Propagation Neural Network Based Face Detection and Pose Estimation)

  • 이재훈;전인자;이정훈;이필규
    • 정보처리학회논문지B
    • /
    • 제9B권6호
    • /
    • pp.853-862
    • /
    • 2002
  • 얼굴 검출은 디지털화 된 임의의 정지 영상 혹은 연속된 영상으로부터 얼굴 존재유무를 판단하고, 얼굴이 존재할 경우 영상 내 얼굴의 위치, 방향, 크기 등을 알아내는 기술로 정의된다. 이러한 얼굴 검출은 얼굴 인식이나 표정인식, 헤드 제스쳐 등의 기초 기술로서해당 시스템의 성능에 매우 중요한 변수 중에 하나이다. 그러나 영상 내의 얼굴은 표정, 포즈, 크기, 빛의 방향 및 밝기, 안경, 수염 등의 환경적 변화로 인해 얼굴 모양이 다양해지므로 정확하고 빠른 검출이 어렵다. 따라서 본 논문에서는 오류-역전파 신경망을 사용하여 몇가지 환경적 조건을 극복한 정확하고 빠른 얼굴 검출 방법을 제안한다. 제안된 방법은 표정과 포즈, 배경에 무관하게 얼굴을 검출하면서도 빠른 검출이 가능하다. 이를 위해 신경망을 이용하여 얼굴 검출을 수행하고, 검색 영역의 축소와 신경망 계산 시간의 단축으로 검출 응답 시간을 빠르게 하였다. 검색 영역의 축소는 영상 내 피부색 영역의 분할과 차영상을 이용하였고, 주성분 분석을 통해 신경망의 입력 백터를 축소시킴으로써 신경망 수행 시간과 학습 시간을 단축시켰다. 또, 추출된 얼굴 영상에서 포즈를 추정하고 눈 영역을 검출함으로써 얼굴 정보의 사용에 있어 보다 많은 정보를 추출할 수 있도록 하였다. 얼굴 검출 실험은 마할라노비스 거리를 사용하여 검출된 영상의 얼굴 여부를 판정하고, 성공률과 시간을 측정하였다. 정지 영상과 동영상에서 모두 실험하였으며, 피부색 영역의 분할을 사용할 경우 입력 영상의 칼라 설정의 유무에 다른 검출 성공률의 차를 보였다. 포즈 실험도 같은 조건에서 수행되었으며, 눈 영역의 검출은 안경의 유무에 다른 실험 결과를 보였다. 실험 결과 실시간 시스템에 사용 가능한 수준의 검색률과 검색 시간을 보였다.