• Title/Summary/Keyword: discrete model

Search Result 2,048, Processing Time 0.025 seconds

A Study on the Influences of Korean Consumer Characteristics and Propensity to Purchase in Brand Choice (한국소비자 특성과 구매성향이 브랜드 선택에 미치는 영향에 관한 연구)

  • Lee, Hyung-Suk;Kim, Chur
    • International Area Studies Review
    • /
    • v.12 no.3
    • /
    • pp.321-339
    • /
    • 2008
  • The purpose of this study to the analyze characteristics and purchasing activities of consumers by using the Multinomial Logit model, which is a well-known discrete selection model to explain and forecast consumers' selection activities(patterns). The study aims to determine the state of competition between National Brand and Private Band and how some demographic characters and marketing variables influence consumers' brand selections within the facial tissue market. Our analysis process includes reorganization of panel data(individuals' purchasing record at each point) to fit the purpose of our study as well as analysis of probability and influencing factors of consumers' brand selection at each point of purchases. The result showed that consumers at higher age and with higher income hold better probability to purchase National Brand. Likewise, locations also had considerable effect on selecting brand, and Private Brand was preferred in department store and discount stores. On the other hand, consumers loyal to National Brand reported higher probability to purchase if the product prices were higher while Private Brand buyers were more promoted the purchase under price discount.

Multiscale Finite Element Analysis of Needle-Punched C/SiC Composites through Subcell Modeling (서브셀 모델링을 통한 니들 펀치 C/SiC 복합재료의 멀티스케일 유한요소해석)

  • Lim, Hyoung Jun;Choi, Ho-Il;Lee, Min-Jung;Yun, Gun Jin
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.34 no.1
    • /
    • pp.51-58
    • /
    • 2021
  • In this paper, a multi-scale finite element (FE) modeling methodology for three-dimensional (3D) needle-punched (NP) C/SiC with a complex microstructure is presented. The variations of the material properties induced by the needle-punching process and complex geometrical features could pose challenges when estimating the material behavior. For considering these features of composites, a 3D microscopic FE approach is introduced based on micro-CT technology to produce a 3D high fidelity FE model. The image processing techniques of micro-CT are utilized to generate discrete-gray images and reconstruct the high fidelity model. Furthermore, a subcell modeling technique is developed for the 3D NP C/SiC based on the high fidelity FE model to expand to the macro-scale structural problem. A numerical homogenization approach under periodic boundary conditions (PBCs) is employed to estimate the equivalent behavior of the high fidelity model and effective properties of subcell components, considering geometry continuity effects. For verification, proposed models compare excellently with experimental results for the mechanical behavior of tensile, shear, and bending under static loading conditions.

The Effect of Technology-Based Entrepreneurship(TBE) Activities on Firms Growth (기술기반창업기업의 기업활동이 기업성장에 미치는 영향)

  • Lee, Myung-Jong;Joo, Youngjn
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.6
    • /
    • pp.59-76
    • /
    • 2019
  • Most technology-based entrepreneurship(TBE) go through an process of decline or disappear without overcoming the valley of death(VoD). The purpose of this study is to identify the growth dimension of TBE and to test the influence of firms activities on firms growth over time. This study identified the two-dimensional growth dimension divided by size and profit through exploratory factor analysis(EFA) of a number of growth indicators. Then, we defined the discrete state of growth firm in four states, divided by size and profit, and five states, including the closure of business. Multi-nomial logit model is used to predict the effect of TBE activities on a discrete state of growth firm(size×profit, closure of business) based on multiple independent variables. The independent variables are based on five representative firms activities: employment, marketing, R&D, financial activities, and general management activities. The growth stage of TBE over time has been categorized into three stages: early stage, middle stage, and late stage of business, taking into account the main periods during which the survival rate of startups sharply decreases. The analytical data of this study was based on the secondary data of the start-up supporting companies of government and public institutions. The subjects of analysis were TBE within 10 years. As a result of the empirical analysis, the employment and marketing activities of TBE show that early and mid-term activities had an effect on the state of firms growth. However, if there is a difference, employment activities have both positive and negative effects, while marketing activities have only a positive effect on size and profit growth. And besides, R&D activities, financial activities, and general management activities throughout the entire process of firms growth were found to be firms activities that have both positive and negative effects on firms growth. In addition, the age of the founder, the firms' industry, and the geographic location of the firms, which are general characteristics of the company, were found to have a distinctive effect on the growth status of the firms according to the growth stage.

CALPUFF Modeling of Odor/suspended Particulate in the Vicinity of Poultry Farms (축사 주변의 악취 및 부유분진의 CALPUFF 모델링: 계사 중심으로)

  • Lim, Kwang-Hee
    • Korean Chemical Engineering Research
    • /
    • v.57 no.1
    • /
    • pp.90-104
    • /
    • 2019
  • In this study, CALPUFF modeling was performed, using a real surface and upper air meterological data to predict trustworthy modeling-results. Pollutant-releases from windscreen chambers of enclosed poultry farms, P1 and P2, and from a open poultry farm, P3, and their diffusing behavior were modeled by CALPUFF modeling with volume sources as well as by finally-adjusted CALPUFF modeling where a linear velocity of upward-exit gas averaged with the weight of each directional-emitting area was applied as a model-linear velocity ($u^M_y$) at a stack, with point sources. In addition, based upon the scenario of poultry farm-releasing odor and particulate matter (PM) removal efficiencies of 0, 20, 50 and 80% or their corresponding emission rates of 100, 80, 50 and 20%, respectively, CALPUFF modeling was performed and concentrations of odor and PM were predicted at the region as a discrete receptor where civil complaints had been frequently filed. The predicted concentrations of ammonia, hydrogen sulfide, $PM_{2.5}$ and $PM_{10}$ were compared with those required to meet according to the offensive odor control law or the atmospheric environmental law. Subsequently their required removal efficiencies at poultry farms of P1, P2 and P3 were estimated. As a result, a priori assumption that pollutant concentrations at their discrete receptors are reduced by the same fraction as pollutant concentrations at P1, P2 and P3 as volume source or point source, were controlled and reduced, was proven applicable in this study. In case of volume source-adopted CALPUFF modeling, its required removal efficiencies of P1 compared with those of point source-adopted CALPUFF modeling, were predicted similar each other. However, In case of volume source-adopted CALPUFF modeling, its required removal efficiencies of both ammonia and $PM_{10}$ at not only P2 but also P3 were predicted higher than those of point source-adopted CALPUFF modeling. Nonetheless, the volume source-adopted CALPUFF modeling was preferred as a safe approach to resolve civil complaints. Accordingly, the required degrees of pollution prevention against ammonia, hydrogen sulfide, $PM_{2.5}$ and $PM_{10}$ at P1 and P2, were estimated in a proper manner.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Validation Technique of Simulation Model using Weighted F-measure with Hierarchical X-means (WF-HX) Method (계층적 X-means와 가중 F-measure를 통한 시뮬레이션 모델 검증 기법)

  • Yang, Dae-Gil;HwangBo, Hun;Cheon, Hyun-Jae;Lee, Hong-Chul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.562-574
    • /
    • 2012
  • Simulation validation techniques which have been employed in most studies are statistical analysis, which validate a model with mean or variance of throughput and resource utilization as an evaluation object. However, these methods have not been able to ensure the reliability of individual elements of the model well. To overcome the problem, the weighted F-measure method was proposed, but this technique also had some limitations. First, it is difficult to apply the technique to complex system environment with numerous values of interarrival time because it assigns a class to an individual value of interarrival time. In addition, due to unbounded weights, the value of weighted F-measure has no lower bound, so it is difficult to determine its threshold. Therefore, this paper propose weighted F-measure technique with cluster analysis to solve these problems. The classes for the technique are defined by each cluster, which reduces considerable number of classes and enables to apply the technique to various systems. Moreover, we improved the validation technique in the way of assigning minimum bounded weights without any lack of objectivity.

The DEVS Integrated Development Environment for Simulation-based Battle experimentation (시뮬레이션 기반 전투실험을 위한 DEVS 통합 개발 환경)

  • Hwang, Kun-Chul;Lee, Min-Gyu;Han, Seung-Jin;Yoon, Jae-Moon;You, Yong-Jun;Kim, Sun-Bum;Kim, Jung-Hoon;Nah, Young-In;Lee, Dong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.39-47
    • /
    • 2013
  • Simulation based Battle Experimentation is to examine the readiness for a battle using simulation technology. It heavily relies on the weapon systems modeling and simulation. To analyze the characteristics and complexity of the weapon systems in the experiment, the modeling & simulation environment has to be able to break down the system of systems into components and make the use of high fidelity components such as real hardware in simulation. In that sense, the modular and hierarchical structure of DEVS (Discrete EVent System Specification) framework provides potentials to meet the requirements of the battle experimentation environment. This paper describes the development of the DEVS integrated development environment for Simulation based Battle Experimentation. With the design principles of easy, flexible, and fast battle simulation, the newly developed battle experimentation tool mainly consists of 3 parts - model based graphical design tool for making DEVS models and linking them with external simulators easily through diagrams, the experiment plan tool for speeding up a statistic analysis, the standard components model libraries for lego-like building up a weapon system. This noble simulation environment is to provide a means to analyze complex simulation based experiments with different levels of models mixed in a simpler and more efficient way.

Agent-based SAF Modeling Tool for DEVS M&S (DEVS M&S 환경을 위한 에이전트 기반의 SAF 모델링 도구)

  • Shin, Suk-Hoon;Park, Kang-Moon;Lee, Eun-Bog;Chi, Sung-Do;Han, Seung-Jin
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.49-55
    • /
    • 2013
  • Recently the CGF/SAF (Computer Generated Force / Semi-Automated Force) technology has been getting attention to deal with the increasing complexity in a DM&S(Defence Modeling and Simulation) environment. OneSAF is one of well-known CGF/SAF systems, however, it is not able to support the DEVS framework which is an advanced discrete event based modeling and simulation environment. Especially, most DM&S systems in Korea has been developed on the basis of the DEVS framework. In this paper, we have proposed the agent-based SAF design methodology and tool for supporting DEVS M&S environment. The proposed SAF modeling tool is divided into two parts; the agent modeling part and SAF modeling part. In the agent modeling environment, the modeler can simply create the agent model by writing down the necessary rules. It also provides the agent testing environment so that the modeler maybe conveniently verify the prescribed agent model. The SAF model is finally created by combing the individual agents based on the pre-defined structure. DM&S engineers will be able to employ our tools and modeling methodology to design the DEVS-based DM&S system to be developed.

A Study on Reactive Congestion Control with Loss Priorities in ATM Network (ATM 네트워크에서 우선권을 갖는 반응 혼잡 제어에 관한 연구)

  • Park, Dong-Jun;Kim, Hyeong-Ji
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.4
    • /
    • pp.697-708
    • /
    • 1996
  • In this paper, we study reactive congestion control with priority in ATM network. The priority schemes for buffer access, partial buffer sharing have been investigated in order to improve the utilization of ATM network resources the network and to satisfy the most demanding traffic class. We consider in this paper a discrete-time queueing model for partial buffer sharing with two Markov modulated Poisson inputs. This model can be used to analyze the the effects of the partial buffer sharing priority scheme on system performance for realistic cases of bursty services. Explicit formulae are derived for the number of cells in the system and the loss probabilities for the traffic. Congestion may still occur because of unpredictable statistical fluctuation of traffic sources even when preventive control is performed in the network. In this Paper, we study reactive congestion control, in which each source changes its cell emitting rate a daptively to the traffic load at the switching node. Our intention is that,by incorporating such a congcstion control method in ATM network,more efficient congsestion control is established. We develope an analytical model,and carry out an approximateanalysis of reactive congestion con-trol with priority.Numerical results show that several orders of magnitude improvement in the loss probability can be achieved for the high priority class with little impact on the low priority class performance.And the results show that the reactive congestion control with priority are very effective in avoiding congestion and in achieving the statistical gain.

  • PDF

동굴생물의 특성과 보전

  • 김병우
    • Proceedings of the Speleological Society Conference
    • /
    • 1995.09a
    • /
    • pp.39-44
    • /
    • 1995
  • $\bigcirc$ 동굴생물은 식물과 동물, 미생물로 크게 구분되지만 태양광선이 완전히 차단된 동굴내 환경에서는 동굴 동물들이 주종을 이루고 있다. $\bigcirc$ 동굴내의 동물에 관한 연구는 1966년 고씨동굴, 용담굴을 시발로 고수굴, 천동굴, 노동굴, 백룡글, 대이굴, 환선굴 등 강원도내에 분포하는 동굴 중 약 30% 정도는 동물을 포함한 생물상이 조사되었다. $\bigcirc$ 강원도의 동굴동물로서 확인된 것은 9강 30목 141종이며 강별로는 곤충강이 9목 50종 주형강이 4목 49종 갑각강이 6목 18종의 순으로 우세하고 목별로는 거미목이 15과 39종, 톡토기목이 7과 20종, 딱정벌레목이 8과 15종으로 우세한 편이다(남, 1987). $\bigcirc$ 동굴생물에 관한 연구는 육상생태계와 격리된 환경에서 생리, 생태적 적응을 통한 종의 분화나 유전, 진화문제를 추구하며 지하생태계와 육상생태계의 생물적인 유연관계 규명에 중요한 분야로 인정되며 아울러 독특한 특성을 지닌 동굴생물의 생존을 위한 방안과 노력이 일부동굴의 개방 및 개발에 앞서 더욱 구체적으로 모색되고 증대되어야 한다. $\bigcirc$ 동굴환경의 주요 특성은 첫째 햇빛에 차단되어 암흑상태이며, 둘째 내부습도가 높고 기온이나 수온의 년중변화가 심하지 않고, 셋째 먹이연쇄에 필수적인 영양공급원이 제한되어 있다. 따라서 광합성작용으로 성장하는 녹색식물은 태양광선이 유입되는 곳이나 인공조명시설 지역을 제외한 곳에서는 서식이 불가능하고 대형동물이나 초식동물은 생존이 어렵다. $\bigcirc$ 동굴내에는 환경에 적응하는 종들만이 서식할 수 있고 이들을 생태적 특성에 따라 세가지로 구분 할 수 있다. 환경적응 요인으로는 광도, 습도, 온도 영양공급원과 섭식장소, 수중생물의 경우는 특히 수온, 수량 영양원등이다.(중략). 본 연구의 접근방법으로는 ASRS의 개념적인 Reference Model을 수립하고 이 Reference Model에 대한 Formal Model로 DEVS(Discrete Event System Specification)을 이용하여 시스템을 Modeling하였다. 이의 Computer Simulation을 위하여 DEVS형식론 환경에서의 Simulation Language인 DEVSim ++ⓒ를 이용하여 시스템을 구현하였다.. 실형 결과로는 먼저 선형 상미분방정식의 예로 mass-damper-spring system, 비선형 상미분방정식의 예로는 van der Pol 방정식, 연립 상미분방정식의 예로는 mixing tank problem 등을 보였으며, 그의 공학에서 일어나는 여러 가지 문제들도 다루었다.화물에 대한 방어력이 증가되어 나타난 결과로 여겨지며, 또한 혈청중의 ALT, ALP 및 LDH활성을 유의성있게 감소시키므로서 감잎 phenolic compounds가 에탄올에 의한 간세포 손상에 대한 해독 및 보호작용이 있는 것으로 사료된다.반적으로 홍삼 제조시 내공의 발생은 제조공정에서 나타나는 경우가 많으며, 내백의 경우는 홍삼으로 가공되면서 발생하는 경우가 있고, 인삼이 성장될 때 부분적인 영양상태의 불충분이나 기후 등에 따른 영향을 받을 수 있기 때문에 앞으로 이에 대한 많은 연구가 이루어져야할 것으로 판단된다.태에도 불구하고 [-wh]의미의 겹의문사는 병렬적 관계의 합성어가 아니라 내부구조를 지니지 않은 단순한 단어(minimal $X^{0}$ elements)로 가정한다. 즉, [+wh] 의미의 겹의문사는 동일한 구성요 소를 지닌 병렬적 합성어([$[W1]_{XO-}$ $[W1]_{XO}$ ]$_{XO}$)로 그리고 [-wh] 의미의 겹의문사는 중복된 발은을 지닌 한 단어로 ([W]$_{XO}$

  • PDF