• 제목/요약/키워드: linear algorithm

검색결과 4,036건 처리시간 0.038초

Cleaning Noises from Time Series Data with Memory Effects

  • Cho, Jae-Han;Lee, Lee-Sub
    • 한국컴퓨터정보학회논문지
    • /
    • 제25권4호
    • /
    • pp.37-45
    • /
    • 2020
  • 딥러닝의 개발 프로세스는 대량의 수작업이 요구되는 반복적인 작업으로 그 중 학습 데이터 전처리는 매우 큰 비용이 요구되며 학습 결과에 중요한 영향을 주는 단계이다. AI의 알고리즘 연구 초기에는 주로 데이터 과학자들에 의해 완벽하게 정리하여 제공된 공개 DB형태의 학습데이터를 주로 사용하였다. 실제 환경에서 수집된 학습 데이터는 주로 센서들의 운영 데이터이며 필연적으로 노이즈가 많이 발생할 수 있다. 따라서 노이즈를 제거하기 위한 다양한 데이터 클리닝 프레임워크와 방법들이 연구되었다. 본 논문에서는 IoT환경에서 발생 될 수 있는 센서 데이터와 같은 시계열 데이터에서 노이즈를 감지하고 제거하는 방법을 제안하였다. 이 방법은 선형회귀 방법을 사용하여 시스템이 반복적으로 노이즈를 찾아내고, 이를 대체할 수 있는 데이터를 제공하여 학습데이터를 클리닝한다. 제안된 방법의 효과를 검증하기 위해서 본 연구에서 시뮬레이션을 수행하여, 최적의 클리닝 결과를 얻을 수 있는 인자들의 결정 방법을 확인하였다.

Nonlinear boundary parameter identification of bridges based on temperature-induced strains

  • Wang, Zuo-Cai;Zha, Guo-Peng;Ren, Wei-Xin;Hu, Ke;Yang, Hao
    • Structural Engineering and Mechanics
    • /
    • 제68권5호
    • /
    • pp.563-573
    • /
    • 2018
  • Temperature-induced responses, such as strains and displacements, are related to the boundary conditions. Therefore, it is required to determine the boundary conditions to establish a reliable bridge model for temperature-induced responses analysis. Particularly, bridge bearings usually present nonlinear behavior with an increase in load, and the nonlinear boundary conditions cause significant effect on temperature-induced responses. In this paper, the bridge nonlinear boundary conditions were simulated as bilinear translational or rotational springs, and the boundary parameters of the bilinear springs were identified based on the measured temperature-induced responses. First of all, the temperature-induced responses of a simply support beam with nonlinear translational and rotational springs subjected to various temperature loads were analyzed. The simulated temperature-induced strains and displacements were assumed as measured data. To identify the nonlinear translational and rotational boundary parameters of the bridge, the objective function based on the temperature-induced responses is then created, and the nonlinear boundary parameters were further identified by using the nonlinear least squares optimization algorithm. Then, a beam structure with nonlinear translational and rotational springs was simulated as a numerical example, and the nonlinear boundary parameters were identified based on the proposed method. The numerical results show that the proposed method can effectively identify the parameters of the nonlinear boundary conditions. Finally, the boundary parameters of a real arch bridge were identified based on the measured strain data and the proposed method. Since the bearings of the real bridge do not perform nonlinear behavior, only the linear boundary parameters of the bridge model were identified. Based on the bridge model and the identified boundary conditions, the temperature-induced strains were recalculated to compare with the measured strain data. The recalculated temperature-induced strains are in a good agreement with the real measured data.

효율적인 신호개수 추정을 위한 빔공간 기반 AIC 및 MDL 알고리즘 (AIC & MDL Algorithm Based on Beamspace, for Efficient Estimation of the Number of Signals)

  • 박희선;황석승
    • 한국전자통신학회논문지
    • /
    • 제16권4호
    • /
    • pp.617-624
    • /
    • 2021
  • 도래각 추정, 간섭제거, 신호 수신 등을 위해 수신신호에 포함되는 신호의 개수를 정확히 파악하는 것이 필요하다. 대표적인 신호 개수 추정 알고리즘으로 AIC(: Akaike Information Criterion)와 MDL(: Minimum Description Length) 알고리즘이 있는데, 이들 알고리즘은 각 기준이 최소화되는 값을 찾아 신호의 개수를 추정한다. 수신기의 배열 안테나 요소 개수가 증가하면 추정 성능이 향상되지만, 최소값을 찾기 위해 모든 안테나 요소에 대한 기준값을 계산하여야 하므로 복잡도가 크게 증가한다. 이러한 문제를 해결하기 위해, 본 논문에서는 빔공간 처리를 통해 차원을 축소시켜 계산량을 줄이면서 효율적으로 신호의 개수를 추정할 수 있는 빔공간 기반의 AIC와 MDL 알고리즘을 제안한다. 또한, 다양한 시나리오 기반의 컴퓨터 시뮬레이션을 통해 제안된 알고리즘의 성능을 평가하고 분석한다.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권6호
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

차분 전력분석 공격에 안전한 논리 게이트 및 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수에의 응용 (DPA-Resistant Logic Gates and Secure Designs of SEED and SHA-1)

  • 백유진
    • 정보보호학회논문지
    • /
    • 제18권6A호
    • /
    • pp.17-25
    • /
    • 2008
  • 차분 전력 분석 공격[8]은 암호시스템에 대한 강력한 부채널 공격 방법 중의 하나이며 마스킹 방법[10]은 이러한 차분전력 분석 공격에 대한 알고리즘적인 대응 기법의 하나로 잘 알려져 있다. 그러나 마스킹 방법을 산술 덧셈기와 같은 비선형 함수에 적용하는 것은 쉽지 않다. 본 논문은 이러한 마스킹 방법을 산술 덧셈기에 효율적으로 적용하는 새로운 방법을 제안한다. 이를 위해서 본 논문은 먼저 기본 논리 게이트 (AND, OR, NAND, NOR, XOR, XNOR, NOT)에 마스킹 방법을 적용하는 방법을 먼저 제안하고 이러한 기본 게이트들의 조합으로 산술 덧셈기를 구성함으로써 산술 덧셈기에 적용 가능한 새로운 마스킹 방법을 제시한다. 제안된 방법의 응용으로서 본 논문은 SEED 블록 암호 알고리즘과 SHA-1 해쉬 함수를 차분 전력 분석 공격에 안전하게 구현하는 방법과 그 상세한 하드웨어적인 구현 결과를 제시한다.

분해옵션 포함 서비스부품 로트사이징 휴리스틱 (A Heuristic for Service-Parts Lot-Sizing with Disassembly Option)

  • 장진명;김화중;손동훈;이동호
    • 산업경영시스템학회지
    • /
    • 제44권2호
    • /
    • pp.24-35
    • /
    • 2021
  • Due to increasing awareness on the treatment of end-of-use/life products, disassembly has been a fast-growing research area of interest for many researchers over recent decades. This paper introduces a novel lot-sizing problem that has not been studied in the literature, which is the service-parts lot-sizing with disassembly option. The disassembly option implies that the demands of service parts can be fulfilled by newly manufactured parts, but also by disassembled parts. The disassembled parts are the ones recovered after the disassembly of end-of-use/life products. The objective of the considered problem is to maximize the total profit, i.e., the revenue of selling the service parts minus the total cost of the fixed setup, production, disassembly, inventory holding, and disposal over a planning horizon. This paper proves that the single-period version of the considered problem is NP-hard and suggests a heuristic by combining a simulated annealing algorithm and a linear-programming relaxation. Computational experiment results show that the heuristic generates near-optimal solutions within reasonable computation time, which implies that the heuristic is a viable optimization tool for the service parts inventory management. In addition, sensitivity analyses indicate that deciding an appropriate price of disassembled parts and an appropriate collection amount of EOLs are very important for sustainable service parts systems.

xy 색도좌표 표현을 위한 방송 조명용 LED 신경망 제어기 (Neuro-controller for Broadcast Lighting LED to Express xy Chromaticity Coordinates)

  • 박성찬;박진현
    • 한국정보통신학회논문지
    • /
    • 제24권6호
    • /
    • pp.706-713
    • /
    • 2020
  • 기존 방송용 LED 조명 제어방법은 RGB LED에 3자극치 이론을 적용한 LED 전류제어를 사용한다. 제어의 편의성을 위해 이러한 제어방법은 1차 선형함수로 근사하거나 시행착오를 통해 적절한 값을 사용한다. 그리고 실제 방송 조명에서 요구되는 충분한 광량과 색 혼합을 위해 적용되는 확산 판 등을 사용하지 않아 방송 조명으로는 적합하지 않다. 본 연구에서는 방송 조명용 LED 패널 제어방법으로 비선형함수 근사 능력이 뛰어난 순방향신경망을 사용하여 원하는 색도좌표 값과 조도의 디밍 값에 맞는 RGBW LED 패널 제어기를 구현하고자 한다. 성능 평가 결과 xy 색도좌표의 오차가 대부분 ±0.02 이내이며, ANSI C78.377A의 허용범위를 만족하였다. xy 색도좌표 값의 평균 오차는 xerror=0.0044, yerror=0.0030로 제안한 알고리즘의 우수함과 안정적인 성능을 확인하였다.

Application of POD reduced-order algorithm on data-driven modeling of rod bundle

  • Kang, Huilun;Tian, Zhaofei;Chen, Guangliang;Li, Lei;Wang, Tianyu
    • Nuclear Engineering and Technology
    • /
    • 제54권1호
    • /
    • pp.36-48
    • /
    • 2022
  • As a valid numerical method to obtain a high-resolution result of a flow field, computational fluid dynamics (CFD) have been widely used to study coolant flow and heat transfer characteristics in fuel rod bundles. However, the time-consuming, iterative calculation of Navier-Stokes equations makes CFD unsuitable for the scenarios that require efficient simulation such as sensitivity analysis and uncertainty quantification. To solve this problem, a reduced-order model (ROM) based on proper orthogonal decomposition (POD) and machine learning (ML) is proposed to simulate the flow field efficiently. Firstly, a validated CFD model to output the flow field data set of the rod bundle is established. Secondly, based on the POD method, the modes and corresponding coefficients of the flow field were extracted. Then, an deep feed-forward neural network, due to its efficiency in approximating arbitrary functions and its ability to handle high-dimensional and strong nonlinear problems, is selected to build a model that maps the non-linear relationship between the mode coefficients and the boundary conditions. A trained surrogate model for modes coefficients prediction is obtained after a certain number of training iterations. Finally, the flow field is reconstructed by combining the product of the POD basis and coefficients. Based on the test dataset, an evaluation of the ROM is carried out. The evaluation results show that the proposed POD-ROM accurately describe the flow status of the fluid field in rod bundles with high resolution in only a few milliseconds.

VM Scheduling for Efficient Dynamically Migrated Virtual Machines (VMS-EDMVM) in Cloud Computing Environment

  • Supreeth, S.;Patil, Kirankumari
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권6호
    • /
    • pp.1892-1912
    • /
    • 2022
  • With the massive demand and growth of cloud computing, virtualization plays an important role in providing services to end-users efficiently. However, with the increase in services over Cloud Computing, it is becoming more challenging to manage and run multiple Virtual Machines (VMs) in Cloud Computing because of excessive power consumption. It is thus important to overcome these challenges by adopting an efficient technique to manage and monitor the status of VMs in a cloud environment. Reduction of power/energy consumption can be done by managing VMs more effectively in the datacenters of the cloud environment by switching between the active and inactive states of a VM. As a result, energy consumption reduces carbon emissions, leading to green cloud computing. The proposed Efficient Dynamic VM Scheduling approach minimizes Service Level Agreement (SLA) violations and manages VM migration by lowering the energy consumption effectively along with the balanced load. In the proposed work, VM Scheduling for Efficient Dynamically Migrated VM (VMS-EDMVM) approach first detects the over-utilized host using the Modified Weighted Linear Regression (MWLR) algorithm and along with the dynamic utilization model for an underutilized host. Maximum Power Reduction and Reduced Time (MPRRT) approach has been developed for the VM selection followed by a two-phase Best-Fit CPU, BW (BFCB) VM Scheduling mechanism which is simulated in CloudSim based on the adaptive utilization threshold base. The proposed work achieved a Power consumption of 108.45 kWh, and the total SLA violation was 0.1%. The VM migration count was reduced to 2,202 times, revealing better performance as compared to other methods mentioned in this paper.

Decision based uncertainty model to predict rockburst in underground engineering structures using gradient boosting algorithms

  • Kidega, Richard;Ondiaka, Mary Nelima;Maina, Duncan;Jonah, Kiptanui Arap Too;Kamran, Muhammad
    • Geomechanics and Engineering
    • /
    • 제30권3호
    • /
    • pp.259-272
    • /
    • 2022
  • Rockburst is a dynamic, multivariate, and non-linear phenomenon that occurs in underground mining and civil engineering structures. Predicting rockburst is challenging since conventional models are not standardized. Hence, machine learning techniques would improve the prediction accuracies. This study describes decision based uncertainty models to predict rockburst in underground engineering structures using gradient boosting algorithms (GBM). The model input variables were uniaxial compressive strength (UCS), uniaxial tensile strength (UTS), maximum tangential stress (MTS), excavation depth (D), stress ratio (SR), and brittleness coefficient (BC). Several models were trained using different combinations of the input variables and a 3-fold cross-validation resampling procedure. The hyperparameters comprising learning rate, number of boosting iterations, tree depth, and number of minimum observations were tuned to attain the optimum models. The performance of the models was tested using classification accuracy, Cohen's kappa coefficient (k), sensitivity and specificity. The best-performing model showed a classification accuracy, k, sensitivity and specificity values of 98%, 93%, 1.00 and 0.957 respectively by optimizing model ROC metrics. The most and least influential input variables were MTS and BC, respectively. The partial dependence plots revealed the relationship between the changes in the input variables and model predictions. The findings reveal that GBM can be used to anticipate rockburst and guide decisions about support requirements before mining development.