• 제목/요약/키워드: graphical approach

검색결과 186건 처리시간 0.023초

SVG를 이용한 마이크로네시아 코스레 주변해역 Web MGIS 구축 (Web MGIS with SVG of Kosrae Costal Waters, Micronesia)

  • 박상우;김정현;이문옥;김현주;김종규
    • 수산해양교육연구
    • /
    • 제26권3호
    • /
    • pp.485-491
    • /
    • 2014
  • The study of Web MGIS(Marine Geographic Information System) based on the SVG(Scalable Vector Graphics) is mainly performed on effective methodologies which transform real world data to computing world data. Web GUI system has its own target on reliable data service by acquisition of geometric information using HYCOM(HYbrid Coordinate Ocean Model), accurate measurement and graphical visualization. This type of raw data visualization can be built without software tools, yet is incredibly useful for interpreting and communicating data. Even simple visualizations can aid in the interpretation of complex hydrodynamic relationships that are frequently encountered in the marine environment. The Web MGIS provides an easy way for hydrodynamic geoscientists to construct complex visualizations that can be viewed with free software. This study proposes a Web GUI MGIS using FVCOM(Finite Volume Coastal Ocean Model). Finally, we design a Marine Web GUI system of Kosrae Coastal Waters integrating above data models. It must adds more ecological information and the various service item for approach more easily in order to user.

객체지향방식에 의한 자동화제조시스템 시뮬레이터의 설계 및 구현 (Development of a Simulator for Automated Manufacturing Systems)

  • 이진규;이진환;이태억;오부경;오석찬
    • 한국시뮬레이션학회:학술대회논문집
    • /
    • 한국시뮬레이션학회 1997년도 춘계 학술대회 발표집
    • /
    • pp.23-28
    • /
    • 1997
  • We discuss development of a simulator for automated manufacturing systems (AMSs) which have sophisticated automated material handling equipments and complicated work flows. The simulator is designed to satisfy the following requirements. A user should be able to easily configure or specify an AMS through a graphical user interface (GUI) and minimal data input. The user should be able to model diverse and complied control logic for automated material handling systems like automated guided vehicle (AGV) systems, robot workcell systems and conveyor systems as well as complicated job flow program. Real time animation is desired. Finally, the simulator should be easily maintained and extended. To satisfy the requirements, we use an object-oriented paradigm for modeling, designing, and programming of the simulator. We use an object-oriented modeling framework to design the modeling elements library, and take the process interaction approach for scheduling processes and events. To model a user-defined diverse control logic, we also develop a script language and its interpreter. We explain design and implementation strategies. We implement the simulator using Visual C++ 4.2 and Open GL on Windows NT and the Windows95. Some modeling examples will be demonstrated.

  • PDF

A Role-driven Security and Access Control Model for Secured Business Process Management Systems

  • Won Jae-Kang;Kim Kwang-Hoon
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제14권3호
    • /
    • pp.1-8
    • /
    • 2005
  • This paper formally defines a role-driven security and access control model of a business process in order eventually to provide a theoretical basis for realizing the secured business process management systems. That is, we propose a graphical representation and formal description of the mechanism that generates a set of role-driven security and access control models from a business process modeled by the information control net(ICN) modeling methodology that is a typical business process modeling approach for defining and specifying business processes. Based upon the mechanism, we are able to design and accomplish a secured business process management system that provides an unified resource access control mechanism of the business process management engine domain's and the application domain's. Finally, we strongly believe that the secured access control policies from the role-driven security and access control model can be easily transformed into the RBAC(Role-based Access Control) model that is a standardized security technology for computer and communications systems of commercial and civilian government organizations.

  • PDF

Stochastic MAC-layer Interference Model for Opportunistic Spectrum Access: A Weighted Graphical Game Approach

  • Zhao, Qian;Shen, Liang;Ding, Cheng
    • Journal of Communications and Networks
    • /
    • 제18권3호
    • /
    • pp.411-419
    • /
    • 2016
  • This article investigates the problem of distributed channel selection in opportunistic spectrum access networks from a perspective of interference minimization. The traditional physical (PHY)-layer interference model is for information theoretic analysis. When practical multiple access mechanisms are considered, the recently developed binary medium access control (MAC)-layer interference model in the previous work is more useful, in which the experienced interference of a user is defined as the number of competing users. However, the binary model is not accurate in mathematics analysis with poor achievable performance. Therefore, we propose a real-valued one called stochastic MAC-layer interference model, where the utility of a player is defined as a function of the aggregate weight of the stochastic interference of competing neighbors. Then, the distributed channel selection problem in the stochastic MAC-layer interference model is formulated as a weighted stochastic MAC-layer interference minimization game and we proved that the game is an exact potential game which exists one pure strategy Nash equilibrium point at least. By using the proposed stochastic learning-automata based uncoupled algorithm with heterogeneous learning parameter (SLA-H), we can achieve suboptimal convergence averagely and this result can be verified in the simulation. Moreover, the simulated results also prove that the proposed stochastic model can achieve higher throughput performance and faster convergence behavior than the binary one.

부분모드 방법을 이용한 점탄성 감쇠기가 설치된 건물의 고유치 해석 (Eigenvalue Analysis of the Building with Viscoelastic Dampers Using Component Mode Method)

  • 민경원;김진구;조한욱;이성경
    • 한국지진공학회논문집
    • /
    • 제2권1호
    • /
    • pp.71-78
    • /
    • 1998
  • 본 연구는 점탄성 감소기가 설치된 건물의 고유치 해석을 위하여 라그라란지 승수 방법(Lagrage multiplier formulating)을 이용하였다. 특성방정식은 건물의 고유진동수, 감소기가 설치된 층의 모드 성분, 감쇠기의 점성 및 강성에 관계된 식으로 나타났으며, 감쇠기의 점성으로 인하여 복소수의 형태로 표현이 되었다. 유도된 특성방정식은 고유치 해석을 위한 일반적인 형태의 식이 아니므로 본 연구에서는 그림 해석을 통하여 감쇠기의 설치로 인한 점성과 증가로 건물의 복소 고유진동수의 변화를 분석하는 방법을 제시하였다. 그림 해석으 결과에 따르면 감쇠기의 점성과 강성으로 인한 복소 고유진동수의 물리적인 의미를 확인할 수 있으며, 최소 및 최대값을 예측할 수 있다. 또한, 복소 고유진동수를 실수의 고유진동수와 모드 감쇠비로 변환하여 상태방정식에 의한 방법의 결과와 비교하여 정확성을 검증하였다.

  • PDF

Development of ensemble machine learning models for evaluating seismic demands of steel moment frames

  • Nguyen, Hoang D.;Kim, JunHee;Shin, Myoungsu
    • Steel and Composite Structures
    • /
    • 제44권1호
    • /
    • pp.49-63
    • /
    • 2022
  • This study aims to develop ensemble machine learning (ML) models for estimating the peak floor acceleration and maximum top drift of steel moment frames. For this purpose, random forest, adaptive boosting, gradient boosting regression tree (GBRT), and extreme gradient boosting (XGBoost) models were considered. A total of 621 steel moment frames were analyzed under 240 ground motions using OpenSees software to generate the dataset for ML models. From the results, the GBRT and XGBoost models exhibited the highest performance for predicting peak floor acceleration and maximum top drift, respectively. The significance of each input variable on the prediction was examined using the best-performing models and Shapley additive explanations approach (SHAP). It turned out that the peak ground acceleration had the most significant impact on the peak floor acceleration prediction. Meanwhile, the spectral accelerations at 1 and 2 s had the most considerable influence on the maximum top drift prediction. Finally, a graphical user interface module was created that places a pioneering step for the application of ML to estimate the seismic demands of building structures in practical design.

Supremacy of Value-Added Tax: A Perspective from South Asian Nations

  • Md Noor Uddin, MILON;Yousuf, KAMAL;Tahmina Akter, POL
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제10권2호
    • /
    • pp.49-60
    • /
    • 2023
  • The study attempts to examine the relationship among revenue growth factors from different angles and provides a comprehensive overview of tax revenue collection for developing countries. The impact of income tax, customs duty, and value-added tax on the gross domestic product is examined using the ordinary least-square (OLS) multiple regression approach. To confirm the association, a multiple regression model is applied to time-series data. SPSS software, MS Excel, is used to draw the empirical results, trend analysis, and some graphical presentation to reach the study's objective. The findings show that while the value-added tax has a significant impact and the highest coefficient, regardless of country, income tax and customs duty may or may not be significant depending on the circumstances. It triggers effectual and efficacious economic growth. The paper has implications in policy-making areas where governments are seeking how to stimulate revenue growth effectively and efficiently. To promote economic growth, the tax net and tax rate on luxury goods should be increased along with human resources in the tax administration for the short term. But in the long term, decentralization & digitization of tax administration, dismantling the existing tax barriers and good governance are necessary.

An Analysis of the Exchange Rate Regime of Nepal: Determinants and Inter-Dynamic Relationship with Macroeconomic Fundamentals

  • DAHAL, Suresh Kumar;RAJU, G. Raghavender
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권7호
    • /
    • pp.27-39
    • /
    • 2022
  • The exchange rate is an important macroeconomic variable that influences internal and external balances. Nepal follows a dual exchange rate such that the Nepali rupee (NPR) is pegged with the Indian rupee (INR) but floats with the United States dollar (USD) and all other currencies. There have been very few studies on the exchange rate of Nepal, of which the majority focus on the bivariate relationship between exchange rate and another variable. However, this paper analyses the multivariate relationship between the USD-NPR exchange rate and major macroeconomic variables. Determinants of Nepal's exchange rate have been derived with multiple regression using the ordinary least square (OLS) approach. Since the explanatory variables could not significantly capture the movement of the dependent variable, a long-run relationship between Nepal and India's exchange rate has been analyzed using Engle-Granger cointegration to establish a relationship as suggested by a graphical representation. This explains that Nepal's exchange rate long run is determined by India's exchange rate than its own fundamentals. In addition, the macro-linkages of Nepal's macroeconomic variables have been analyzed using Standard Vector Autoregressive models followed by impulse response analysis which is useful for policy decisions. Some policy implications indicating the sustainability of Nepal's pegged regime have been drawn based on the empirical analysis.

An innovative fraction laws with ring support: Active vibration control of rotating FG cylindrical shell

  • Mohamed A. Khadimallah;Abdelhakim Benslimane;Imene Harbaoui;Sofiene Helaili;Muzamal Hussain;Mohamed R. Ali;Zafer Iqbal;Abdelouahed Tounsi
    • Earthquakes and Structures
    • /
    • 제24권4호
    • /
    • pp.237-245
    • /
    • 2023
  • Based on novel Galerkin's technique, the theoretical study gives a prediction to estimate the vibrations of FG rotating cylindrical shell. Terms of ring supports have been introduced by a polynomial function. Three different laws of volume fraction are utilized for the vibration of cylindrical shells. Variation frequencies with the locations of ring supports have been analyzed and these ring supports are placed round the circumferential direction. The base of this approach is an approximate estimation of eigenvalues of proper functions which are the results of solutions of vibrating equation. Each longitudinal wave number corresponds to a particular boundary condition. The results are given in tabular and graphical forms. By increasing different value of height-to-radius ratio, the resulting backward and forward frequencies increase and frequencies decrease on increasing length-to-radius ratio. There is a new form of frequencies is obtained for different positions of ring supports, which is bell shaped. Moreover, on increasing the rotating speed, the backward frequencies increase and forward frequencies decreases.

Improving the Cyber Security over Banking Sector by Detecting the Malicious Attacks Using the Wrapper Stepwise Resnet Classifier

  • Damodharan Kuttiyappan;Rajasekar, V
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1657-1673
    • /
    • 2023
  • With the advancement of information technology, criminals employ multiple cyberspaces to promote cybercrime. To combat cybercrime and cyber dangers, banks and financial institutions use artificial intelligence (AI). AI technologies assist the banking sector to develop and grow in many ways. Transparency and explanation of AI's ability are required to preserve trust. Deep learning protects client behavior and interest data. Deep learning techniques may anticipate cyber-attack behavior, allowing for secure banking transactions. This proposed approach is based on a user-centric design that safeguards people's private data over banking. Here, initially, the attack data can be generated over banking transactions. Routing is done for the configuration of the nodes. Then, the obtained data can be preprocessed for removing the errors. Followed by hierarchical network feature extraction can be used to identify the abnormal features related to the attack. Finally, the user data can be protected and the malicious attack in the transmission route can be identified by using the Wrapper stepwise ResNet classifier. The proposed work outperforms other techniques in terms of attack detection and accuracy, and the findings are depicted in the graphical format by employing the Python tool.