• Title/Summary/Keyword: random sum

Search Result 252, Processing Time 0.033 seconds

Predicting the Performance of Forecasting Strategies for Naval Spare Parts Demand: A Machine Learning Approach

  • Moon, Seongmin
    • Management Science and Financial Engineering
    • /
    • v.19 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • Hierarchical forecasting strategy does not always outperform direct forecasting strategy. The performance generally depends on demand features. This research guides the use of the alternative forecasting strategies according to demand features. This paper developed and evaluated various classification models such as logistic regression (LR), artificial neural networks (ANN), decision trees (DT), boosted trees (BT), and random forests (RF) for predicting the relative performance of the alternative forecasting strategies for the South Korean navy's spare parts demand which has non-normal characteristics. ANN minimized classification errors and inventory costs, whereas LR minimized the Brier scores and the sum of forecasting errors.

Preliminary Research on the Uncertainty Estimation in the Probabilistic Designs

  • Youn Byung D.;Lee Jae-Hwan
    • Journal of Ship and Ocean Technology
    • /
    • v.9 no.1
    • /
    • pp.64-71
    • /
    • 2005
  • In probabilistic design, the challenge is to estimate the uncertainty propagation, since outputs of subsystems at lower levels could constitute inputs of other systems or at higher levels of the multilevel systems. Three uncertainty propagation estimation techniques are compared in this paper in terms of numerical efficiency and accuracy: root sum square (linearization), distribution-based moment approximation, and Taguchi-based integration. When applied to reliability-based design optimization (RBDO) under uncertainty, it is investigated which type of applications each method is best suitable for. Two nonlinear analytical examples and one vehicle crashworthiness for side-impact simulation example are employed to investigate the unique features of the presented techniques for uncertainty propagation. This study aims at helping potential users to identify appropriate techniques for their applications in the multilevel design.

Dynamic Modulation Transfer Function Analysis of Images Blurred by Sinusoidal Vibration

  • Du, Yanlu;Ding, Yalin;Xu, Yongsen;Sun, Chongshang
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.6
    • /
    • pp.762-769
    • /
    • 2016
  • The dynamic modulation transfer function (MTF) for image degradation caused by sinusoidal vibration is formulated based on a Bessel function of the first kind. The presented method makes it possible to obtain an analytical MTF expression derived for arbitrary frequency sinusoidal vibration. The error obtained by the use of finite order sum approximations instead of infinite sums is investigated in detail. Dynamic MTF exhibits a stronger random behavior for low frequency vibration than high frequency vibration. The calculated MTFs agree well with the measured MTFs with the slant edge method in imaging experiments. With the proposed formula, allowable amplitudes of any frequency vibration are easily calculated. This is practical for the analysis and design of the line-of-sight stabilization system in the remote sensing camera.

Heuristic Aspects of the Branch and Bound Procedure for a Job Scheduling Problem (작업 스케쥴링 문제 해결을 위한 Branch & Bound 해법의 비교분석)

  • Koh, Seok-Joo;Lee, Chae-Y.
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.18 no.2
    • /
    • pp.141-147
    • /
    • 1992
  • This article evaluates the efficiency of three branch-and-bound heuristics for a job scheduling problem that minimizes the sum of absolute deviations of completion times from a common due date. To improve the performance of the branch-and-bound procedure, Algorithm SA is presented for the initial feasible schedule and three heuristics : breadth-first, depth-first and best-first search are investigated depending on the candidate selection procedure. For the three heuristics the CPU time, memory space, and the number of nodes generated are computed and tested with nine small examples (6 ${\leq}$ n ${\leq}$ 4). Medium sized random problems (10 ${\leq}$ n ${\leq}$ 30) are also generated and examined. The computational results are compared and discussed for the three heuristics.

  • PDF

Optimal Allocation of Purchase Orders in Dynamic Bidding (동적 전자경매 환경에서의 최적 구매주문 할당)

  • Rim, Suk-Chul;Lee, Sang-Won;Kim, Hyun-Soo
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.33 no.3
    • /
    • pp.322-328
    • /
    • 2007
  • Highly standardized products are suitable for automated purchasing using electronic commerce technology, where the price becomes the most important factor. Suppliers can change the prices dynamically based on the inventory level and market situation in order to maximize the sales and profit. In the virtual marketplace where multiple customers purchase multiple standardized products from multiple suppliers repetitively, customers can purchase the required amount of each item as a dynamic bidding by allocating purchase orders to the suppliers based on the current price. Customers need a method to quickly determine the optimal allocation of orders to the suppliers using the dynamically changing data to minimize the total cost. We present a LP model which minimizes the sum of the total price plus transportation cost for this problem. Simulation results using random data show meaningful reduction of the total cost.

Operating Criteria of Core Exit Temperature in Nuclear Power Plant with using Channel Statistical Allowance (총채널 불확실도를 적용한 원전 노심출구온도의 운전가능 판정기준)

  • Sung, Je Joong;Joo, Yoon Duk;Ha, Sang Jun
    • Journal of the Korean Society of Safety
    • /
    • v.29 no.6
    • /
    • pp.166-171
    • /
    • 2014
  • Nuclear power plants are equipped with the reactor trip system (RTS) and the engineered safety features actuation system (ESFAS) to improve safety on the normal operation. In the event of the design basis accident (DBA), a various of post accident monitor(PAM)systems support to provide important details (e.g. Containment pressure, temperature and pressure of reactor cooling system and core exit temperature) to determine action of main control room (MCR). Operator should be immediately activated for the accident mitigation with the information. Especially, core exit temperature is a critical parameter because the operating mode converts from normal mode to emergency mode when the temperature of core exit reaches $649^{\circ}C$. In this study, uncertainty which was caused by exterior environment, characteristic of thermocouple/connector and accuracy of calibrator/indicator was evaluated in accordance with ANSI-ISA 67.04. The square root of the sum of square (SRSS) methodology for combining uncertainty terms that are random and independent was used in the synthesis. Every uncertainty that may exist in the hardware which is used to measure the core exit temperature was conservatively applied and the associative relation between the elements of uncertainty was considered simultaneously. As a result of uncertainty evaluation, the channel statistical allowance (CSA) of single channel of core exit temperature was +1.042%Span. The range of uncertainty, -0.35%Span ($-4.05^{\circ}C$) ~ +2.08%Span($24.25^{\circ}C$), was obtained as the operating criteria of core exit temperature.

An Authority-Based Efficient Key Management Protocol for Cloud Environment (클라우드 환경을 위한 효율적인 권한 기반 키 설립 프로토콜)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1035-1045
    • /
    • 2018
  • Recently, with the development of IT technology, authentication methods of users using cloud services have been diversified. However, research on providing authentication information of a user using a cloud service securely according to authority has not been make until now. In this paper, we propose a key establishment protocol which can perform split authentication using secret key and access control key according to the role authority of user in Intra cloud environment. The proposed protocol generates the access control key and secret key of the user by using the attributes of the user and the generated random number($t_1$, $t_2$), and classifies the roles according to the user's authority after generating the key. Unnecessary operation processes can be reduced. As a result of the performance evaluation, the proposed protocol guarantees the security against various type of attacks that may occur in the cloud environment because the user is authenticated by dividing the access control key and secret key. The size of the ciphertext used to establish the key could be reduced by ${\sum}+1$ more than the existing protocol.

An Improvement of the Approximation of the Ruin Probability in a Risk Process (보험 상품 파산 확률 근사 방법의 개선 연구)

  • Lee, Hye-Sun;Choi, Seung-Kyoung;Lee, Eui-Yong
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.5
    • /
    • pp.937-942
    • /
    • 2009
  • In this paper, a continuous-time risk process in an insurance business is considered, where the premium rate is constant and the claim process forms a compound Poisson process. We say that a ruin occurs if the surplus of the risk process becomes negative. It is practically impossible to calculate analytically the ruin probability because the theoretical formula of the ruin probability contains the recursive convolutions and infinite sum. Hence, many authors have suggested approximation formulas of the ruin probability. We introduce a new approximation formula of the ruin probability which extends the well-known De Vylder's and exponential approximation formulas. We compare our approximation formula with the existing ones and show numerically that our approximation formula gives closer values to the true ruin probability in most cases.

Vertical Sectorization Techniques in MISO Downlink Active Antenna Systems (MISO 하향 능동 안테나 시스템에서의 수직 섹터분할 기법)

  • Ahn, Minki;Eom, Subin;Lee, Inkyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.6
    • /
    • pp.997-1004
    • /
    • 2015
  • In this paper, we study vertical sectorization techniques in multiple-input single-output (MISO) downlink active antenna systems (AAS). In the AAS, antenna beam patterns can be adjusted in each sector and multiple vertical beams can form the vertical sectorization. Since an exhaustive search based vertical sectorization algorithm requires high computational complexity to find the optimal tilt angles, we propose two vertical sectorization algorithms to reduce the complexity. First, we provide an asymptotic sum rate based algorithm which utilizes a large system approximation of the average sum rate based on the random matrix theory. Next, by using the result in the single sector transmission, the single sector based algorithm is proposed. In the simulation results, we confirm that the proposed algorithms are close to the performance of the exhaustive search algorithm with much reduced complexity.

The NHPP Bayesian Software Reliability Model Using Latent Variables (잠재변수를 이용한 NHPP 베이지안 소프트웨어 신뢰성 모형에 관한 연구)

  • Kim, Hee-Cheul;Shin, Hyun-Cheul
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.117-126
    • /
    • 2006
  • Bayesian inference and model selection method for software reliability growth models are studied. Software reliability growth models are used in testing stages of software development to model the error content and time intervals between software failures. In this paper, could avoid multiple integration using Gibbs sampling, which is a kind of Markov Chain Monte Carlo method to compute the posterior distribution. Bayesian inference for general order statistics models in software reliability with diffuse prior information and model selection method are studied. For model determination and selection, explored goodness of fit (the error sum of squares), trend tests. The methodology developed in this paper is exemplified with a software reliability random data set introduced by of Weibull distribution(shape 2 & scale 5) of Minitab (version 14) statistical package.

  • PDF