• Title/Summary/Keyword: operations efficiency

Search Result 1,327, Processing Time 0.032 seconds

Solution of Fuzzy Relation Equations Using Duality of Operators

  • Lai, Edmund;Park, Chan-Gook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.106.2-106
    • /
    • 2001
  • The two typical composite operations of fuzzy relation are the max-min and the min-max composite operations. It is known that the two operations can be completely dual. This paper pays attention to the nature that these two typical operations are completely dual and investigates the correlation between the max-min composite relation equation and the min-max composite relation equation. An important scheme of correlation is in the characteristic of solution sets derived from these two fuzzy relation equations. The paper explains that one of the composite fuzzy relation equations is solvable using the solution method of the other fuzzy relation equation. The above-mentioned duality plays an important role in this solution procedure. Since it is not necessary to build the solution method separately like before, calculation efficiency can be raised. Moreover, the solution for the relation ...

  • PDF

An Application of a Hybrid Genetic Algorithm on Missile Interceptor Allocation Problem (요격미사일 배치문제에 대한 하이브리드 유전알고리듬 적용방법 연구)

  • Han, Hyun-Jin
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.3
    • /
    • pp.47-59
    • /
    • 2009
  • A hybrid Genetic Algorithm is applied to military resource allocation problem. Since military uses many resources in order to maximize its ability, optimization technique has been widely used for analysing resource allocation problem. However, most of the military resource allocation problems are too complicate to solve through the traditional operations research solution tools. Recent innovation in computer technology from the academy makes it possible to apply heuristic approach such as Genetic Algorithm(GA), Simulated Annealing(SA) and Tabu Search(TS) to combinatorial problems which were not addressed by previous operations research tools. In this study, a hybrid Genetic Algorithm which reinforces GA by applying local search algorithm is introduced in order to address military optimization problem. The computational result of hybrid Genetic Algorithm on Missile Interceptor Allocation problem demonstrates its efficiency by comparing its result with that of a simple Genetic Algorithm.

Cellular manufacturing system design with proper assignment of machines and parts

  • Won Yu Gyeong
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2002.05a
    • /
    • pp.390-396
    • /
    • 2002
  • This study is concerned with the strict machine-cell and part-family grouping (MCPFG) in cellular manufacturing system design. Most of MCPFG methodologies often suffer from improper assignment of machines and parts in which exceptional machine has more common operations with machines in a cell other than its own cell and exceptional part has more operations through machines in a cell other than the cell corresponding to its own family. This results in the loss of similarity in part design or common setup of machines and the benefits from the conversion of job shop manufacturing into cellular manufacturing are lost. In this study, a two-phase methodology is proposed to find the machine-cells and part families under the strict constraints in which all machines and parts are assigned to its most proper cells and families. Test results with moderately medium-sized ill-structured MCPFG problems available from the literature show the substantial efficiency of the proposed approach.

  • PDF

Contrast Enhancement of Blurred Images Using Fuzzy Logic Concepts (퍼지 논리를 이용한 흐린 영상의 콘트라스트 향상)

  • 박중조;김경민;박귀태
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.8
    • /
    • pp.181-191
    • /
    • 1994
  • A new method for enhancing blurred images using fuzzy logic concepts is proposed. Blurred images contain blurred boundaries which make it difficult to detect edges and segment areas in images. In order to sharpen blurred edges local contrast information of an image and erosion/dilation properties of local min/max operations are used in which local min/max operations are fuzzy logic operations. so that given images are transformed to fuzzy images and then these operations are applied on them. In this method the sharpening operation can be iteratively applied to the image to get better deblurring effect and gray-scale "salt-and-pepper" noises are suppressed. the efficiency of our algorithm is demonstrated through experimental results obtained with artificially-made blurred images and real blurred images.

  • PDF

A Study on the Development of the Korean Mobilization Operations Including National Emergency Provision (한국적 비상대비 동원업무 발전방안)

  • Lee Dong-Hun
    • Journal of the military operations research society of Korea
    • /
    • v.18 no.1
    • /
    • pp.15-31
    • /
    • 1992
  • Developments toward a 'the end of the Cold War' are the main factor determining the situation in the Korean Peninsula. While all the combat resources of North Korea are systematically controlled and kept available for instant mobilization even in peacetime. South Korea is inferior to North Korea in terms of mobilization system and efficiency, exercise intensity and equipments. In sum, the South faces far greater restraints in wartime conversion capability than does the North. Mobilization refers to a nation's compulsory control, management and operation of its human and material resources for the purpose of national security. The total capability for safeguarding national security must be pursued by the continuous examination and complementation of our mobilization system and capability. This paper proposes an efficient management of national mobilization system that can be instantly operated on the whole in time of national emergency. Therefore, the actual operation of National Security Council is suggested to prepare operations against the emergencies and establish the foundation for national security.

  • PDF

Extended Light Buffers for Efficient Visibility Operations (효율적인 가시성 연산을 위한 확장된 광 버퍼)

  • Kim, Ja-Hee;Kwon, Bomjun;Kim, Dae Seoung;Shin, Sung Yong
    • Journal of the Korea Computer Graphics Society
    • /
    • v.2 no.2
    • /
    • pp.1-9
    • /
    • 1996
  • It is important issue to increase the efficiency of visibility operations in rendering since the most of rendering time is spent for performing visibility operations. In this paper, we present light buffers of area light sources, which provide efficient visibility operations from the sources. The light buffers are extended to support visibility operations not originated from the sources. We also explore their applications such as shadow generation, ray tracing and radiosity. Our experimental results show that the light buffers support more efficient visibility operations than the previously developed data structures including BSP trees, linear grids, and octrees.

  • PDF

The Novel Efficient Dual-field FIPS Modular Multiplication

  • Zhang, Tingting;Zhu, Junru;Liu, Yang;Chen, Fulong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.738-756
    • /
    • 2020
  • The modular multiplication is the key module of public-key cryptosystems such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). However, the efficiency of the modular multiplication, especially the modular square, is very low. In order to reduce their operation cycles and power consumption, and improve the efficiency of the public-key cryptosystems, a dual-field efficient FIPS (Finely Integrated Product Scanning) modular multiplication algorithm is proposed. The algorithm makes a full use of the correlation of the data in the case of equal operands so as to avoid some redundant operations. The experimental results show that the operation speed of the modular square is increased by 23.8% compared to the traditional algorithm after the multiplication and addition operations are reduced about (s2 - s) / 2, and the read operations are reduced about s2 - s, where s = n / 32 for n-bit operands. In addition, since the algorithm supports the length scalable and dual-field modular multiplication, distinct applications focused on performance or cost could be satisfied by adjusting the relevant parameters.

APPLICATION OF MONITORING, DIAGNOSIS, AND PROGNOSIS IN THERMAL PERFORMANCE ANALYSIS FOR NUCLEAR POWER PLANTS

  • Kim, Hyeonmin;Na, Man Gyun;Heo, Gyunyoung
    • Nuclear Engineering and Technology
    • /
    • v.46 no.6
    • /
    • pp.737-752
    • /
    • 2014
  • As condition-based maintenance (CBM) has risen as a new trend, there has been an active movement to apply information technology for effective implementation of CBM in power plants. This motivation is widespread in operations and maintenance, including monitoring, diagnosis, prognosis, and decision-making on asset management. Thermal efficiency analysis in nuclear power plants (NPPs) is a longstanding concern being updated with new methodologies in an advanced IT environment. It is also a prominent way to differentiate competitiveness in terms of operations and maintenance costs. Although thermal performance tests implemented using industrial codes and standards can provide officially trustworthy results, they are essentially resource-consuming and maybe even a hind-sighted technique rather than a foresighted one, considering their periodicity. Therefore, if more accurate performance monitoring can be achieved using advanced data analysis techniques, we can expect more optimized operations and maintenance. This paper proposes a framework and describes associated methodologies for in-situ thermal performance analysis, which differs from conventional performance monitoring. The methodologies are effective for monitoring, diagnosis, and prognosis in pursuit of CBM. Our enabling techniques cover the intelligent removal of random and systematic errors, deviation detection between a best condition and a currently measured condition, degradation diagnosis using a structured knowledge base, and prognosis for decision-making about maintenance tasks. We also discuss how our new methods can be incorporated with existing performance tests. We provide guidance and directions for developers and end-users interested in in-situ thermal performance management, particularly in NPPs with large steam turbines.

A Weighted based Pre-Perform A* Algorithm for Efficient Heuristics Computation Processing (효율적인 휴리스틱 계산 처리를 위한 가중치 기반의 선수행 A* 알고리즘)

  • Oh, Min-Seok;Park, Sung-Jun
    • Journal of Korea Game Society
    • /
    • v.13 no.6
    • /
    • pp.43-52
    • /
    • 2013
  • Path finder is one of the very important algorithm of artificial intelligence and is a process generally used in many game fields. Path finder requires many calculation, so it exerts enormous influences on performances. To solve this, many researches on the ways to reduce the amount of calculate operations have been made, and the typical example is A* algorithm but it has unnecessary computing process, reducing efficiency. In this paper, to reduce the amount of calculate operations such as node search with costly arithmetic operations, we proposes the weight based pre-processing A* algorithm. The simulation was materialized to measure the efficiency of the weight based pre-process A* algorithm, and the results of the experiments showed that the weight based method was approximately 1~2 times more efficient than the general methods.

Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System (효율성을 고려한 해시 함수 기반의 안전한 RFID 인증 프로토콜)

  • Kim, Ik-Su
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.4B
    • /
    • pp.428-434
    • /
    • 2009
  • Many RFID authentication protocols have been proposed to build a secure ubiquitous environment. However, existing protocols do not respond recent attacks appropriately and they perform many hash operations to authenticate a large number of tags. In this paper, we propose a hash function-based secure authentication protocol for improving efficiency in RFID system. The proposed protocol is safe to passive attacks and active attacks, and requires only 2 hash operations in a tag and 3 hash operations in a database. Accordingly, the proposed protocol is very effective in RFID system environment which is composed to low-cost tags and a database handling many tags.