• Title/Summary/Keyword: binary analysis

Search Result 1,389, Processing Time 0.026 seconds

Complex Segregation Analysis of Categorical Traits in Farm Animals: Comparison of Linear and Threshold Models

  • Kadarmideen, Haja N.;Ilahi, H.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.18 no.8
    • /
    • pp.1088-1097
    • /
    • 2005
  • Main objectives of this study were to investigate accuracy, bias and power of linear and threshold model segregation analysis methods for detection of major genes in categorical traits in farm animals. Maximum Likelihood Linear Model (MLLM), Bayesian Linear Model (BALM) and Bayesian Threshold Model (BATM) were applied to simulated data on normal, categorical and binary scales as well as to disease data in pigs. Simulated data on the underlying normally distributed liability (NDL) were used to create categorical and binary data. MLLM method was applied to data on all scales (Normal, categorical and binary) and BATM method was developed and applied only to binary data. The MLLM analyses underestimated parameters for binary as well as categorical traits compared to normal traits; with the bias being very severe for binary traits. The accuracy of major gene and polygene parameter estimates was also very low for binary data compared with those for categorical data; the later gave results similar to normal data. When disease incidence (on binary scale) is close to 50%, segregation analysis has more accuracy and lesser bias, compared to diseases with rare incidences. NDL data were always better than categorical data. Under the MLLM method, the test statistics for categorical and binary data were consistently unusually very high (while the opposite is expected due to loss of information in categorical data), indicating high false discovery rates of major genes if linear models are applied to categorical traits. With Bayesian segregation analysis, 95% highest probability density regions of major gene variances were checked if they included the value of zero (boundary parameter); by nature of this difference between likelihood and Bayesian approaches, the Bayesian methods are likely to be more reliable for categorical data. The BATM segregation analysis of binary data also showed a significant advantage over MLLM in terms of higher accuracy. Based on the results, threshold models are recommended when the trait distributions are discontinuous. Further, segregation analysis could be used in an initial scan of the data for evidence of major genes before embarking on molecular genome mapping.

Kinematic Analysis of a Binary Robot Manipulator (2진 로봇 매니퓰레이터의 기구학적 해석)

  • 류길하
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.15 no.12
    • /
    • pp.162-168
    • /
    • 1998
  • The traditional robot manipulators are actuated by continuous range of motion actuators such as motors or hydraulic cylinders. However, there are many applications of mechanisms and robotic manipulators where only a finite number of locations need to be reached, and the robot's trajectory is not important as long as it is bounded. Binary manipulator uses actuators which have only two stable states. As a result, binary manipulators have a finite number of states. The number of states of a binary manipulator grows exponentially with the number of actuators. This kind of robot manipulator has some advantage compared to a traditional one. Feedback control is not required, task repeatability can be very high, and finite state actuators are generally inexpensive. And this kind of robot manipulator has a fault tolerant mechanism because of kinematic redundancy. This paper develops algorithms for kinematics and workspace analysis of a binary manipulator.

  • PDF

THE PERFORMANCE OF THE BINARY TREE CLASSIFIER AND DATA CHARACTERISTICS

  • Park, Jeong-sun
    • Management Science and Financial Engineering
    • /
    • v.3 no.1
    • /
    • pp.39-56
    • /
    • 1997
  • This paper applies the binary tree classifier and discriminant analysis methods to predicting failures of banks and insurance companies. In this study, discriminant analysis is generally better than the binary tree classifier in the classification of bank defaults; the binary tree is generally better than discriminant analysis in the classification of insurance company defaults. This situation can be explained that the performance of a classifier depends on the characteristics of the data. If the data are dispersed appropriately for the classifier, the classifier will show a good performance. Otherwise, it may show a poor performance. The two data sets (bank and insurance) are analyzed to explain the better performance of the binary tree in insurance and the worse performance in bank; the better performance of discriminant analysis in bank and the worse performance in insurance.

  • PDF

Design and Implementation of Framework for Static Execution Flow Trace of Binary Codes (이진 코드의 정적 실행 흐름 추적을 위한 프레임워크 설계 및 구현)

  • Baek, Yeong-Tae;Kim, Ki-Tae;Jun, Sang-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.51-59
    • /
    • 2011
  • In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.

Bayesian Pattern Mixture Model for Longitudinal Binary Data with Nonignorable Missingness

  • Kyoung, Yujung;Lee, Keunbaik
    • Communications for Statistical Applications and Methods
    • /
    • v.22 no.6
    • /
    • pp.589-598
    • /
    • 2015
  • In longitudinal studies missing data are common and require a complicated analysis. There are two popular modeling frameworks, pattern mixture model (PMM) and selection models (SM) to analyze the missing data. We focus on the PMM and we also propose Bayesian pattern mixture models using generalized linear mixed models (GLMMs) for longitudinal binary data. Sensitivity analysis is used under the missing not at random assumption.

Voting Analysis in Political Science

  • Kim, Chang-Bum
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.19 no.4
    • /
    • pp.592-594
    • /
    • 2009
  • In this paper we consider voting analysis in the political science in connection with $B_n$(or $M_n${0, 1}), the semigroup of the binary relations on X with n elements. We also consider it in connection with $M_n$(F) (or $B_n$(F)), the semigroup of all fuzzy binary relations on X. Also we establish a possibility theorem and an impossibility theorem in voting analysis based on preferences in $B_n$ and $M_n$(F).

Static Control Flow Analysis of Binary Codes (이진 코드의 정적 제어 흐름 분석)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.5
    • /
    • pp.70-79
    • /
    • 2010
  • We perform static program analysis for the binary code. The reason you want to analyze at the level of binary code, installed on your local computer, run the executable file without source code. And the reason we want to perform static analysis, static program analysis is to understand what actions to perform on your local computer. In this paper, execution flow graph representing information such as the execution order among functions and the flow of control is generated. Using graph, User can find execution flow of binary file and calls of insecure functions at the same time, and the graph should facilitate the analysis of binary files. In addition, program to be run is ensured the safety by providing an automated way to search the flow of execution, and program to be downloaded and installed from outside is determined whether safe before running.

Inverse Kinematic Analysis of a Binary Robot Manipulator using Neural Network (인공신경망을 이용한 2진 로봇 매니퓰레이터의 역기구학적 해석)

  • Ryu, Gil-Ha;Jung, Jong-Dae
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.1 s.94
    • /
    • pp.211-218
    • /
    • 1999
  • The traditional robot manipulators are actuated by continuous range of motion actuators such as motors or hydraulic cylinders. However, there are many applications of mechanisms and robotic manipulators where only a finite number of locations need to be reached, and the robot’s trajectory is not important as long as it is bounded. Binary manipulator uses actuators which have only two stable states. As a result, binary manipulators have a finite number of states. The number of states of a binary manipulator grows exponentially with the number of actuators. This kind of robot manipulator has some advantage compared to a traditional one. Feedback control is not required, task repeatability can be very high, and finite state actuators are generally inexpensive. And this kind of robot manipulator has a fault tolerant mechanism because of kinematic redundancy. In this paper, we solve the inverse kinematic problem of a binary parallel robot manipulator using neural network and test the validity of this structure using some arbitrary points m the workspace of the robot manipulator. As a result, we can show that the neural network can find the nearest feasible points and corresponding binary states of the joints of the robot manipulator

  • PDF

Efficient Similarity Analysis Methods for Same Open Source Functions in Different Versions (서로 다른 버전의 동일 오픈소스 함수 간 효율적인 유사도 분석 기법)

  • Kim, Yeongcheol;Cho, Eun-Sun
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1019-1025
    • /
    • 2017
  • Binary similarity analysis is used in vulnerability analysis, malicious code analysis, and plagiarism detection. Proving that a function is equal to a well-known safe functions of different versions through similarity analysis can help to improve the efficiency of the binary code analysis of malicious behavior as well as the efficiency of vulnerability analysis. However, few studies have been carried out on similarity analysis of the same function of different versions. In this paper, we analyze the similarity of function units through various methods based on extractable function information from binary code, and find a way to analyze efficiently with less time. In particular, we perform a comparative analysis of the different versions of the OpenSSL library to determine the way in which similar functions are detected even when the versions differ.

A kinematic Analysis of Binary Robot Manipulator using Genetic Algorithms

  • Gilha Ryu;Ihnseok Rhee
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.2 no.1
    • /
    • pp.76-80
    • /
    • 2001
  • A binary parallel robot manipulator uses actuators that have only two stable states being built by stacking variable geometry trusses on top of each other in a long serial chain. Discrete characteristics of the binary manipulator make it impossible to analyze an inverse kinematic problem in conventional ways. We therefore introduce new definitions of workspace and inverse kinematic solution, and the apply a genetic algorithm to the newly defied inverse kinematic problem. Numerical examples show that our genetic algorithm is very efficient to solve the inverse kinematic problem of binary robot manipulators.

  • PDF