• Title/Summary/Keyword: rule application

Search Result 764, Processing Time 0.022 seconds

Motion Identification using Neural Networks and Its Application to Automatic Ship Berthing under Wind

  • Im, Nam-Kyun;Kazuhiko Hasegawa
    • Journal of Ship and Ocean Technology
    • /
    • v.6 no.1
    • /
    • pp.16-26
    • /
    • 2002
  • In this paper, a motion identification method using neural networks is applied to automatic ship berthing to overcome disturbance effects. Motion identification is used to estimate the effect of environmental disturbance. Two rule-based algorithms have been developed to over-come disturbance. The first rule based-algorithm was designed to overcome lateral disturbance when a ship's lateral speed is affected by it. The second rule-based algorithm was also designed to overcome longitudinal disturbance when a ship's angular velocity is changed by it. Finally, numerical simulations for automatic berthing are carried out, and the suggested control system is proved to be more practical under disturbance circumstances.

Fuzzy Identification by means of Fuzzy Inference Method and Its Application to Wate Water Treatment System (퍼지추론 방법에 의한 퍼지동정과 하수처리공정시스템 응용)

  • 오성권;주영훈;남위석;우광방
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.6
    • /
    • pp.43-52
    • /
    • 1994
  • A design method of rule-based fuzzy modeling is presented for the model identification of complex and nonlinear systems. The proposed rule-based fuzzy modeling implements system structure and parameter identification in the efficient form of ``IF....,THEN...', using the theories of optimization theory , linguistic fuzzy implication rules and fuzzy c-means clustering. Three kinds of method for fuzzy modeling presented in this paper include simplified inference (type I), linear inference (type 2), and modified linear inference (type 3). In order to identify premise structure and parameter of fuzzy implication rules, fuzzy c- means clustering and modified complex method are used respectively and the least sequare method is utilized for the identification of optimum consequence parameters. Time series data for gas furance and those for sewage treatment process are used to evaluate the performance of the proposed rule-based fuzzy modeling. Comparison shows that the proposed method can produce the fuzzy model with higher accuracy than previous other studies.

  • PDF

Combining Multiple Neural Networks by Dempster's Rule of Combination for ARMA Model Identification (Dempster's Rule of Combination을 이용한 인공신경망간의 결합에 의한 ARMA 모형화)

  • Oh, Sang-Bong
    • Journal of Information Technology Application
    • /
    • v.1 no.3_4
    • /
    • pp.69-90
    • /
    • 1999
  • 본 논문은 시계열자료의 ARMA 모형화를 위해 계층적(Hierarchical) 문제해결 방식인 인공신경망 기초 의상결정트리분류기상의 인공신경망 구조를 개선하여 지역문제(Local Problem)를 해결하는 복수개의 인공신경망 결과를 Dempster's rule of combination을 이용하여 종합하는 병행적인 (Parallel) ARMA 모형활르 위한 방법론을 제시함으로써 의사결정트리분류기에 근거한 방법론의 단점을 보완하였다. 본 논문에서 제시한 ARMA 모형화를 위한 방법론은 세 단계로 구성되어 있다: 1) ESACF 특성 벡터 추출단계; 2) 개별 인공신경망에 의한 부분적 모델링 단계; 3) Conflict Resolution 단계, 제시한 방법론을 검증하기 위해 모의실험용 자료와 실제 시계열자료를 이용하여 제시된 방법론을 검증하였으며 실험결과 기존 연구에 비해 ARMA 모형화와 정확도가 높은 것으로 나타났다.

  • PDF

A Study on Application for Custody in CIETAC Arbitration Rule (중국 CIETAC 중재규칙상의 보전신청에 관한 연구)

  • 윤진기
    • Journal of Arbitration Studies
    • /
    • v.13 no.2
    • /
    • pp.47-68
    • /
    • 2004
  • The problems on application for custody in CIETAC Arbitration Rule are examined in this paper. First, The issue of jurisdiction for application for custody is arisen from the expansion of material jurisdiction of CIETAC. Until 1998, CIETAC had a jurisdiction only for the cases involving foreigners, but now, it has a jurisdiction not only for the cases involving foreigners but also for domestic cases. In the cases of arbitrating disputes involving foreigners, if the parties concerned apply for the preservation of property, CITEAC shall forward the application to and obtain a ruling from an intermediate people's court in the place where the object of the application resides, or where the property is located. But in the cases of arbitrating domestic disputes, if the parties concerned apply for the preservation of property, CITEAC shall forward the application to and obtain a ruling from an ground-level people's court in the place where the object of the application resides, or where the property is located. Therefore, "People's court" in article 23 of CIETAC Arbitration Rule includes both intermediate people's court and ground-level people's court in its meaning. Second, in the cases that the party concerned submits arbitration to CIETAC, it is not permitted for the party to ask the people's court for custody of property before submitting an arbitration. But there still can be the urgent cases that interests of the party concerned are at stake, and legitimate rights and interests of the party concerned may be damaged beyond remedy, if no application for custody of property is filed immediately. In that cases, even if the party may apply for custody of property with the people's court after submitting an arbitration, it might be too late to preserve property. Therefore, Chinese laws and rules have to be revised so that the party may ask the people's court for custody of property before submitting an arbitration. When revising laws and rules, according to the today's legislation trends, it must be considered that court and arbitration tribunal both have a right to decide the custody of property. When arbitration tribunal decides it, the procedural provisions executing it must be provided. It is also required that China permit to apply preservation of evidence as well as custody of property before submitting an arbitration. It is also strongly recommended that China permit custody of property or preservation of evidence even in the cases that an arbitration is submitted to the arbitration institute which is located in foreign country, not in China.

  • PDF

Code Generation for Integrity Constraint Check in Objectivity/C++ (Objectivity/C++에서 무결성 제약조건 확인을 위한 코드 생성)

  • Kim, In-Tae;Kim, Gi-Chang;Yu, Sang-Bong;Cha, Sang-Gyun
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.416-425
    • /
    • 1999
  • 복잡한 무결성 제약 조건을 효율적으로 확인하기 위해 제약 조건들을 룰 베이스(rule base)에 저장하고 별도의 룰 관리 시스템과 제약 조건 관리 시스템을 통해 제약 조건을 확인하는 기법이 많은 연구자들에 의해 연구되고 발표되었다. 그러나 제약 조건 관리 시스템이 실행시간에 응용 프로그램을 항상 모니터링하고 있다가 데이타의 수정이 요청될 때마다 개입하여 프로세스를 중단시키고 관련 제약 조건을 확인하는 기존의 방법들은 처리 시간의 지연을 피할 수 없다. 본 논문은 컴파일 시간에 제약 조건 확인 코드를 응용 프로그램에 미리 삽입할 것을 제안한다. 응용 프로그램 자체 내에 제약 조건 확인 코드가 삽입되기 때문에 실행 시간에 다른 시스템의 제어를 받지 않고 직접 제약 조건의 확인 및 데이타베이스의 접근이 가능해져서 처리 시간의 지연을 피할 수 있을 것이다. 이를 위해 어떤 구문이 제약 조건의 확인을 유발하는 지를 추적하였고, 컴파일러가 그러한 구문을 어떻게 전처리 과정에서 검색하는지 그리고 그러한 구문마다 어떻게 해당 제약 조건 확인 코드를 삽입할 수 있는 지를 객체지향1) 데이타베이스 언어인 Objectivity/C++에 대해 gcc의 YACC 코드를 변경함으로써 보여 주었다.Abstract To cope with the complexity of handling integrity constraints, numerous researchers have suggested to use a rule-based system, where integrity constraints are expressed as rules and stored in a rule base. A rule manager and an integrity constraint manager cooperate to check the integrity constraints efficiently. In this approach, however, the integrity constraint manager has to monitor the activity of an application program constantly to catch any database operation. For each database operation, it has to check relevant rules with the help of the rule manager, resulting in considerable delays in database access. We propose to insert the constraints checking code in the application program directly at compile time. With constraints checking code inserted, the application program can check integrity constraints by itself without the intervention of the integrity constraint manager. We investigate what kind of statements require the checking of constraints, show how the compiler can detect those statements, and show how constraints checking code can be inserted into the program, by modifying the GCC YACC file for Objectivity/C++, an object-oriented database programming language.

Evaluation for the Usefulness of Copper Filters according to Mode Change in Digital Radiography System (DR 시스템에서 모드 변화에 따른 구리필터의 유용성 평가)

  • Kim, Jae-Kyeom;Kim, Jeong-Koo
    • Journal of radiological science and technology
    • /
    • v.44 no.1
    • /
    • pp.39-46
    • /
    • 2021
  • This study confirmed the usefulness of the copper filter according to the mode change by comparing and analyzing the energy change according to the application of the copper filter and the change in effective dose and image quality according to the distance to the subject in the DR(Digital Radiography) system. The average energy increased when the copper filter was applied and the reduction rate by 50% of mAs was increased as the thickness of the copper filter increased according to the application of the 10 kVp rule in AEC mode. The effective dose decreased as the thickness increased when the copper filter was applied in AEC(Automatic Exposure Control) mode and manual mode according to the application of the 10 kVp rule, and the decrease rate decreased with increasing 10 kVp increments. As a result of analyzing the dicom images for AEC mode and manual mode with Image J. the PSNR(Peak Signal to Noise Ratio) values were approximate values of less than 30 dB for each mode and for each copper filter thickness. When the copper filter was applied, the average energy increased, so when the 10 kVp rule was applied, the mAs for each mode could be reduced, and the effective dose could also be reduced. However, as the distance and tube voltage increased, the reduction rate of mAs decreased, and the quality of the image was found to decrease when the copper filter was applied, but there was no difference in quality of the image when the copper filter thickness increased.

Evaluation Method Using Analytic Hierarchy Process for C4I SW Secure Coding Rule Selection (계층분석기법을 활용한 전장관리정보체계 소프트웨어 시큐어 코딩룰 선정 평가 방안)

  • Choi, June-Sung;Kim, Woo-Je;Park, Won-Hyung;Kook, Kwang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.8
    • /
    • pp.651-662
    • /
    • 2013
  • In this study, we suggest the selecting evaluation method considering 6 major factors like Compliance system application (Development language conformance, Platform Compliance), threat evaluation (criticality of security incident, possibility of security incident), application benefit (Reliability / quality improvement, Modify Cost) for appropriate secure coding rule selecting evaluation. Using this method, we selected and make a set consist of 197 secure coding rules for Battlefield Management System Software. And calculated the application priority for each rules.

Exhibition Monitoring System using USN/RFID based on ECA (USN/RFID를 이용한 ECA기반 전시물 정보 모니터링 시스템)

  • Kim, Gang-Seok;Song, Wang-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.6
    • /
    • pp.95-100
    • /
    • 2009
  • Nowadays there are many studies and there's huge development about USN/RFID which have great developmental potential to many kinds of applications. More and more real time application apply USN/RFID technology to identify data collect and locate objects. Wide deployment of USN/RFID will generate an unprecedented volume of primitive data in a short time. Duplication and redundancy of primitive data will affect real time performance of application. Thus, security applications must filter primitive data and correlate them for complex pattern detection and transform them to events that provide meaningful, actionable information to end application. In this paper, we design a ECA Rule system for security monitoring of exhibition. This system will process USN/RFID primitive data and event and perform data transformation. It's had applied each now in exhibition hall through this study and efficient data transmission and management forecast that is possible.

  • PDF

Honour and Dishonour Relating to the Fraud and Forgery in Letter of Credit Transactions (신용장거래에서 사기 및 서류위조에 따른 지급이행과 지급거절에 관한 고찰)

  • Kang, Won-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.139-164
    • /
    • 2011
  • Traditionally courts have been adopted over the years two standards of dealing with compliance of documents such as strict compliance and substantial compliance and the substantial compliance, which was somewhat less demanding than the strict compliance. However the new guidelines of ICC's international standard banking practice for the examination of documents under documentary credits set up how the UCP is to be applied in practice. The payment obligations of an issuing bank to a beneficiary are independence of the performance or the nonperformance of any contract underlying the letter of credit. However, strictly applying the principle of independence and abstraction could produce unfair results by operating unjustly enrich an unscrupulous beneficiary in case of fraud. Accordingly, when a beneficiary presents complying documents, the issuing bank is bound to honour the presentation unless the fraud rule applies on the facts of the case such as forged or material fraud. If it does, the issuing bank(issuer) needs not pay despite the complying presentation of documents by the beneficiary under the Uniform Commercial Code Article 5-109 and case law in America. However the fraud rule was not addressed in UCP 600. In conclusion, view in terms of legal principle and the court cases is variable and difficult to honour or dishonour the presentation in case of application of the independence principle and fraud rule such as the problems on burden of proof timely, possibility of granting injunction in order to protect against victim for bona fide applicant.

  • PDF

ECA Rule-Based Timely Collaboration of Web-Based Distributed Business Systems (웹기반 분산 기업 시스템을 위한 ECA 규칙 기반 적기 협력방법)

  • Lee, Dong-Woo;Lee, Seong-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.4 s.36
    • /
    • pp.345-354
    • /
    • 2005
  • In this paper collaboration of web-based distributed business systems is analyzed and the need of timely collaboration is derived and described in terms of inter-organizational contracts. A method of event-condition-action (ECA) rule based timely collaboration to meet the need and an active functionality component (AFC) to provide the method are proposed. The proposed method supports high level rule programming and event-based immediate processing so that system administrators and programmers can easily maintain the timely collaboration independently to the application logic. The proposed AFC uses HTTP protocol to be applied through firewalls. It is implemented using basic trigger facilities of a commercial DBMS for practical purpose.

  • PDF