• Title/Summary/Keyword: deterministic model

Search Result 584, Processing Time 0.027 seconds

A Two-Stage Stochastic Approach to the Artillery Fire Sequencing Problem (2단계 추계학적 야전 포병 사격 순서 결정 모형에 관한 연구)

  • Jo, Jae-Young
    • Journal of the military operations research society of Korea
    • /
    • v.31 no.2
    • /
    • pp.28-44
    • /
    • 2005
  • The previous studies approach the field artillery fire scheduling problem as deterministic and do not explicitly include information on the potential scenario changes. Unfortunately, the effort used to optimize fire sequences and reduce the total time of engagement is often inefficient as the collected military intelligence changes. Instead of modeling the fire sequencing problem as deterministic model, we consider a stochastic artillery fire scheduling model and devise a solution methodology to integrate possible enemy attack scenarios in the evaluation of artillery fire sequences. The goal is to use that information to find robust solutions that withstand disruptions in a better way, Such an approach is important because we can proactively consider the effects of certain unique scheduling decisions. By identifying more robust schedules, cascading delay effects will be minimized. In this paper we describe our stochastic model for the field artillery fire sequencing problem and offer revised robust stochastic model which considers worst scenario first. The robust stochastic model makes the solution more stable than the general two-stage stochastic model and also reduces the computational cost dramatically. We present computational results demonstrating the effectiveness of our proposed method by EVPI, VSS, and Variances.

Mathematical Modeling of the Novel Influenza A (H1N1) Virus and Evaluation of the Epidemic Response Strategies in the Republic of Korea (수학적 모델을 이용한 신종인플루엔자 환자 예측 및 대응 전략 평가)

  • Suh, Min-A;Lee, Jee-Hyun;Chi, Hye-Jin;Kim, Young-Keun;Kang, Dae-Yong;Hur, Nam-Wook;Ha, Kyung-Hwa;Lee, Dong-Han;Kim, Chang-Soo
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.2
    • /
    • pp.109-116
    • /
    • 2010
  • Objectives: The pandemic of novel influenza A (H1N1) virus has required decision-makers to act in the face of the substantial uncertainties. In this study, we evaluated the potential impact of the pandemic response strategies in the Republic of Korea using a mathematical model. Methods: We developed a deterministic model of a pandemic (H1N1) 2009 in a structured population using the demographic data from the Korean population and the epidemiological feature of the pandemic (H1N1) 2009. To estimate the parameter values for the deterministic model, we used the available data from the previous studies on pandemic influenza. The pandemic response strategies of the Republic of Korea for novel influenza A (H1N1) virus such as school closure, mass vaccination (70% of population in 30 days), and a policy for anti-viral drug (treatment or prophylaxis) were applied to the deterministic model. Results: The effect of two-week school closure on the attack rate was low regardless of the timing of the intervention. The earlier vaccination showed the effect of greater delays in reaching the peak of outbreaks. When it was no vaccination, vaccination at initiation of outbreak, vaccination 90 days after the initiation of outbreak and vaccination at the epidemic peak point, the total number of clinical cases for 400 days were 20.8 million, 4.4 million, 4.7 million and 12.6 million, respectively. The pandemic response strategies of the Republic of Korea delayed the peak of outbreaks (about 40 days) and decreased the number of cumulative clinical cases (8 million). Conclusions: Rapid vaccination was the most important factor to control the spread of pandemic influenza, and the response strategies of the Republic of Korea were shown to delay the spread of pandemic influenza in this deterministic model.

A Study on the Method of Combining Empirical Data and Deterministic Model for Fuel Failure Prediction (핵연료 파손 예측을 위한 경험적 자료와 결정론적 모델의 접합 방법)

  • Cho, Byeong-Ho;Yoon, Young-Ku;Chang, Soon-Heung
    • Nuclear Engineering and Technology
    • /
    • v.19 no.4
    • /
    • pp.233-241
    • /
    • 1987
  • Difficulties are encountered when the behavior of complex systems (i.e., fuel failure probability) that have unreliable deterministic models is predicted. For more realistic prediction of the behavior of complex systems with limited observational data, the present study was undertaken to devise an approach of combining predictions from the deterministic model and actual observational data. Predictions by this method of combining are inferred to be of higher reliability than separate predictions made by either model taken independently. A systematic method of hierarchical pattern discovery based on the method developed in the SPEAR was used for systematic search of weighting factors and pattern boundaries for the present method. A sample calculation was performed for prediction of CANDU fuel failures that had occurred due to power ramp during refuelling process. It was demonstrated by this sample calculation that there exists a region of feature space in which fuel failure probability from the PROFIT model nearly agree with that from observational data.

  • PDF

Jeju Jong Nang Channel Code II (제주 정낭 채널 Code II)

  • Lee, Moon Ho;Khan, Md. Hashem Ali;Park, Ju Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.36-44
    • /
    • 2012
  • We had introduced the backgrounds, history and physical meanings of Jong Nang in "Jeju Jong Nang Channel Code I". In this paper, we introduce practical the root of digital human binary coded Jong Nang communications as the wooden gate in Korea Jeju Island custom. We investigate Jong Nang gatemodels as an approximation of the AWGN model. The objective is to find a deterministic model, which is accessible to capacity analysis. Furthermore, this analysis should provide insights on the capacity of the AWGN model. Motivated by backhaul cooperation in cellular networks where cooperation is among base stations, we term the interference channel with conferencing transmitters. Jong Nang communicationsis normal 3 rafters placed on two vertical stones with three holes to convey the family's whereabouts that is deterministic signal, nowadays it is applied to backhaul in mobile base station and traffic signal.

A fuzzy residual strength based fatigue life prediction method

  • Zhang, Yi
    • Structural Engineering and Mechanics
    • /
    • v.56 no.2
    • /
    • pp.201-221
    • /
    • 2015
  • The fatigue damage problems are frequently encountered in the design of civil engineering structures. A realistic and accurate fatigue life prediction is quite essential to ensure the safety of engineering design. However, constructing a reliable fatigue life prediction model can be quite challenging. The use of traditional deterministic approach in predicting the fatigue life is sometimes too dangerous in the real practical designs as the method itself contains a wide range of uncertain factors. In this paper, a new fatigue life prediction method is going to be proposed where the residual strength is been utilized. Several cumulative damage models, capable of predicting the fatigue life of a structural element, are considered. Based on Miner's rule, a randomized approach is developed from a deterministic equation. The residual strength is used in a one to one transformation methodology which is used for the derivation of the fatigue life. To arrive at more robust results, fuzzy sets are introduced to model the parameter uncertainties. This leads to a convoluted fuzzy based fatigue life prediction model. The developed model is illustrated in an example analysis. The calculated results are compared with real experimental data. The applicability of this approach for a required reliability level is also discussed.

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Performance Analysis of the Multiplexer for Shaped Video Traffic Sources (쉐이퍼를 사용한 비디오 트래픽원의 다중화기 성능 분석)

  • Lee, S.C.;Hong, J.W.;Kim, C.S.
    • IE interfaces
    • /
    • v.18 no.4
    • /
    • pp.494-503
    • /
    • 2005
  • This paper considers the problem of performance analysis for the multiplexer, when homogeneous periodic on-off sources are statistically multiplexed. Periodic on-off source model is defined that on-period and off-period are repeated by once in a deterministic periodic time and in on-period, cell arrives with deterministic time interval. In order to reflect periodicity of source model, we consider two multiplexing situation, such as random multiplexing and synchronized multiplexing. In both case, we obtain the overload-period distribution in the multiplexer, and an approximate method using the overload period distribution is suggested for obtaining the CLP(Cell Loss Probability) in the buffer of the multiplexer. A numerical example using MPEG-I real traffic samples and the results are also presented.

On Fleet Sizing and Distribution Policy of Transportation Equipments in Pure Hub-and-Spoke Networks : The Case of Compound Poisson Process (순 방사형 물류체계에서 수송장비의 보유대수 결정과 분배정책 : 복합포아송과정을 따를 경우)

  • 서순근;이병호
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.24 no.3
    • /
    • pp.109-123
    • /
    • 1999
  • Fleet sizing and empty equipment redistribution are two of the most critical problems in managing a fleet of equipment over a transportation network. Where the demand pattern followed the compound Poisson process(CPP) which can be generated one or more at a time under homogeneous Poisson process(HPP), this paper presented a mathematical model to determine control parameters of a decentralized distribution policy and fleet size in case of the pure hub-and-spoke system, a popular form of a logistics system. and validated this model by simulation. That is, where the number of demanded equipments followed geometric and binomial distributions, respectively, cost models on the pure hub-and-spoke logistics system with deterministic trans-portation times, which could be solved analytically, were established and analyzed. We also compared the deterministic case with stochastic one that the transportation time follows some probability distributions.

  • PDF

A Study on the Stochastic User Equilibrium Assignment (확솔적 이용자 평형통행 배분에 관한 연구)

  • 이승재;전경수;임강원
    • Journal of Korean Society of Transportation
    • /
    • v.8 no.1
    • /
    • pp.55-71
    • /
    • 1990
  • The behavioral mechanism underlying the traffic assignment model is a choice, or decision-making process of traveling paths between origins and destinations. The deterministic approach to traffic assignment assumes that travelers choose shortest path from their origin-destination pair. Although this assumption seems reasonable, it presumes that all travelers have perfect information regarding travel time, that they make consistently correct decision, and that they all behave in identical fashion. Stochastic user equilibrium assignment relaxes these presumptions by including a random component in traveler's perception of travel time. The objective of this study is to compare "A Model of Deterministic User Equilibrium Assignment" with "Models of Stochastic User Equilibrium Assignment" in the theoretical and practical aspects. Specifically, SUE models are developed to logit and probit based models according to discrete choice functions. The models were applied to sioux Falls net ork consisting of 24 zones, 24 nodes and 76 links. The distribution of perceived travel time was obtained by using the relationship between speed and traffic flow.

  • PDF

Attitude Control of Planar Space Robot based on Self-Organizing Data Mining Algorithm

  • Kim, Young-Woo;Matsuda, Ryousuke;Narikiyo, Tatsuo;Kim, Jong-Hae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.377-382
    • /
    • 2005
  • This paper presents a new method for the attitude control of planar space robots. In order to control highly constrained non-linear system such as a 3D space robot, the analytical formulation for the system with complex dynamics and effective control methodology based on the formulation, are not always obtainable. In the proposed method, correspondingly, a non-analytical but effective self-organizing modeling method for controlling a highly constrained system is proposed based on a polynomial data mining algorithm. In order to control the attitude of a planar space robot, it is well known to require inputs characterized by a special pattern in time series with a non-deterministic length. In order to correspond to this type of control paradigm, we adopt the Model Predictive Control (MPC) scheme where the length of the non-deterministic horizon is determined based on implementation cost and control performance. The optimal solution to finding the size of the input pattern is found by a solving two-stage programming problem.

  • PDF