• 제목/요약/키워드: probabilistic scheme

검색결과 163건 처리시간 0.027초

인플루언스 다이아그램을 기초로 한 이상진단 지식베이스의 개발 (Development of Influence Diagram Based Knowledge Base in Probabilistic Reasoning)

  • 김영진
    • 대한기계학회논문집
    • /
    • 제17권12호
    • /
    • pp.3124-3134
    • /
    • 1993
  • Diagnosis is composed of two different but interrelated steps ; retrieving the sensory responses f the system and reasoning the state of the system through the given sensor data. This paper explains the probabilistic nature of reasoning involved in the diagnosis when the uncertainties are inevitably included in experts' diagnostic decision making. Uncertainties in decision making are experts' personal experiences, preferences, and system's coherent characteristics. In order to ensure a consistent decision based on the same responses from the system, expert system technology is adopted with the Bayesian reasoning scheme.

경계요소법을 이용한 평면변형율요소의 확률해석 (Probability Analysis of Plane Strain Element using Boundary Element Method)

  • 전정배;윤성수;박진선;이형렬
    • 한국농공학회논문집
    • /
    • 제54권4호
    • /
    • pp.39-46
    • /
    • 2012
  • The objectives of this study is intended to analyze stresses using the boundary element method and probability analysis for agricultural structure. Loads and material properties are an important factor when analyzing the structure. Until now, designing structure, loads and material properties are applied deterministic value. However, load and material properties involve uncertainties due to those change probabilistic and deterministic methods could not consider uncertainties. To solve these problems, the reliability analysis based on probability properties scheme was developed. Reliability analysis is easy to approach to analysis frame structure, however it has limitation when solving plane stress strain problems a kind of agricultural structures. The BEM (Boundary Element Method) is able to analysis plane strain problems by boundary conditions. Thus, this study applied boundary element method to analysis plane strain problem, load and material properties as a probabilistic value to calculate the analytical model using Monte Carlo simulations were developed.

Monte-Carlo Simulation을 이용한 연계계통의 최대수송전력 산정 (Maximum Transfer Capability Calculating in Interconnected Power System using Monte-Carlo Sinulation)

  • 남광우;김용하;이범;최상규
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 하계학술대회 논문집 A
    • /
    • pp.360-362
    • /
    • 2000
  • This paper presents a probabilistic method for describing the transfer capability of one area in an interconnected power system. The approach is based on Monte Carlo simulation scheme. The result of this method is the probability distribution of transfer capability. The distribution yield a general framework for probabilistic analysis of STC. IEEE RTS-24 power system is utilized to evaluate the proposed method.

  • PDF

Probabilistic Soft Error Detection Based on Anomaly Speculation

  • Yoo, Joon-Hyuk
    • Journal of Information Processing Systems
    • /
    • 제7권3호
    • /
    • pp.435-446
    • /
    • 2011
  • Microprocessors are becoming increasingly vulnerable to soft errors due to the current trends of semiconductor technology scaling. Traditional redundant multi-threading architectures provide perfect fault tolerance by re-executing all the computations. However, such a full re-execution technique significantly increases the verification workload on the processor resources, resulting in severe performance degradation. This paper presents a pro-active verification management approach to mitigate the verification workload to increase its performance with a minimal effect on overall reliability. An anomaly-speculation-based filter checker is proposed to guide a verification priority before the re-execution process starts. This technique is accomplished by exploiting a value similarity property, which is defined by a frequent occurrence of partially identical values. Based on the biased distribution of similarity distance measure, this paper investigates further application to exploit similar values for soft error tolerance with anomaly speculation. Extensive measurements prove that the majority of instructions produce values, which are different from the previous result value, only in a few bits. Experimental results show that the proposed scheme accelerates the processor to be 180% faster than traditional fully-fault-tolerant processor with a minimal impact on overall soft error rate.

Fuzzy Logic Approach to Zone-Based Stable Cluster Head Election Protocol-Enhanced for Wireless Sensor Networks

  • Mary, S.A. Sahaaya Arul;Gnanadurai, Jasmine Beulah
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권4호
    • /
    • pp.1692-1711
    • /
    • 2016
  • Energy is a scarce resource in wireless sensor networks (WSNs). A variety of clustering protocols for WSNs, such as the zone-based stable election protocol-enhanced (ZSEP-E), have been developed for energy optimization. The ZSEP-E is a heterogeneous zone-based clustering protocol that focuses on unbalanced energy consumption with parallel formation of clusters in zones and election of cluster heads (CHs). Most ZSEP-E research has assumed probabilistic election of CHs in the zones by considering the maximum residual energy of nodes. However, studies of the diverse CH election parameters are lacking. We investigated the performance of the ZSEP-E in such scenarios using a fuzzy logic approach based on three descriptors, i.e., energy, density, and the distance from the node to the base station. We proposed an efficient ZSEP-E scheme to adapt and elect CHs in zones using fuzzy variables and evaluated its performance for different energy levels in the zones.

Two-step approaches for effective bridge health monitoring

  • Lee, Jong Jae;Yun, Chung Bang
    • Structural Engineering and Mechanics
    • /
    • 제23권1호
    • /
    • pp.75-95
    • /
    • 2006
  • Two-step identification approaches for effective bridge health monitoring are proposed to alleviate the issues associated with many unknown parameters faced in real structures and to improve the accuracy in the estimate results. It is suitable for on-line monitoring scheme, since the damage assessment is not always needed to be carried out whereas the alarming for damages is to be continuously monitored. In the first step for screening potentially damaged members, a damage indicator method based on modal strain energy, probabilistic neural networks and the conventional neural networks using grouping technique are utilized and then the conventional neural networks technique is utilized for damage assessment on the screened members in the second step. The effectiveness of the proposed methods is investigated through a field test on the northern-most span of the old Hannam Grand Bridge over the Han River in Seoul, Korea.

Fuzzy Relaxation Based on the Theory of Possibility and FAM

  • Uam, Tae-Uk;Park, Yang-Woo;Ha, Yeong-Ho
    • Journal of Electrical Engineering and information Science
    • /
    • 제2권5호
    • /
    • pp.72-78
    • /
    • 1997
  • This paper presents a fuzzy relaxation algorithm, which is based on the possibility and FAM instead of he probability and compatibility coefficients used in most of existing probabilistic relaxation algorithms, Because of eliminating stages for estimating of compatibility coefficients and normalization of the probability estimates, the proposed fuzzy relaxation algorithms increases the parallelism and has a simple iteration scheme. The construction of fuzzy relaxation scheme consists of the following three tasks: (1) definition of in/output linguistic variables, their term sets, and possibility. (2) Definition of FAM rule bases for relaxation using fuzzy compound relations. (3) Construction of the iteration scheme for calculating the new possibility estimate. Applications to region segmentation an ege detectiojn algorithms show that he proposed method can be used for not only reducing the image ambiguity and segmentation errors, but also enhancing the raw edge iteratively.

  • PDF

초기 태그 수 추정 기법을 이용한 RFID 시스템의 성능 향상 (Improving performance with Initial number of tag estimation scheme for the RFID System)

  • 양성룡
    • 한국정보통신학회논문지
    • /
    • 제16권12호
    • /
    • pp.2643-2648
    • /
    • 2012
  • RFID 시스템에서 리더가 태그를 인식할 때 충돌 방지 기법은 시스템의 성능에 중요한 요인으로 작용한다. 확률론적 기반의 충돌 방지 기법은 슬롯상태를 이용하여 태그 수를 추정하는 기법이다. 태그 수를 더욱 정확하고 빠르게 추정하기 위하여 충돌 방지 기법들이 많이 연구되어 있으나 태그 수를 알 수 없는 환경에서 초기 태그 수에 대한 예측은 고려하지 않고 있다. 본 논문에서는 초기 태그 수를 예측하기 위한 방안을 제안하고 초기 태그 수가 시스템 성능에 미치는 영향과 제안된 기법의 성능을 분석한다.

확률적 LCC분석기법을 활용한 수도시설물의 설계VA모델에 관한 연구 (A Study on the Design Value Analysis Model Using Probabilistic LCC Analysis of Water Supply System Project)

  • 정평기;서종원;임종권
    • 한국건설관리학회논문집
    • /
    • 제5권2호
    • /
    • pp.181-193
    • /
    • 2004
  • 수도건설사업은 공용이후단계에서 소요되는 $운영\cdot유지관리비용$ 중에서 기계설비 및 관로시설이 대부분을 차지하는 대표적인 플랜트시설로 구성되므로 일반적인 토목시설물의 LCC모델과 차별화 되어야 할 것이다. 따라서 본 연구에서는 수도건설사업에 적합하도록 비용분류체계를 제시하고, 이에 따라 수도시설의 확률적 LCC분석 모델을 개발하였다. 또한, 설계VE 활동시 기초가 되는 설계VA의 절차를 실무활용도 측면을 고려하여 개선된 설계VA절차를 제시하였다. 제시된 설계VA절차와 확률적 LCC분석모델을 사용하여 실제 건설사업의 설계VE활동에 있어 송수관로의 적정 선형 선정에 적용하였다. 제안된 수도건설사업의 설계VA 및 확률적 LCC분석모델은 향후 수도건설사업의 $경제적\cdot가치혁신적$ 대안선정과 유지관리비 예산추정 및 적정예산 배정에 매우 유용하게 활용될 수 있을 것이다.

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.