• Title/Summary/Keyword: weak convergence techniques

Search Result 16, Processing Time 0.026 seconds

GLOBAL ATTRACTOR FOR A CLASS OF QUASILINEAR DEGENERATE PARABOLIC EQUATIONS WITH NONLINEARITY OF ARBITRARY ORDER

  • Tran, Thi Quynh Chi;Le, Thi Thuy;Nguyen, Xuan Tu
    • Communications of the Korean Mathematical Society
    • /
    • v.36 no.3
    • /
    • pp.447-463
    • /
    • 2021
  • In this paper we study the existence and long-time behavior of weak solutions to a class of quasilinear degenerate parabolic equations involving weighted p-Laplacian operators with a new class of nonlinearities. First, we prove the existence and uniqueness of weak solutions by combining the compactness and monotone methods and the weak convergence techniques in Orlicz spaces. Then, we prove the existence of global attractors by using the asymptotic a priori estimates method.

A DIRECT SOLVER FOR THE LEGENDRE TAU APPROXIMATION FOR THE TWO-DIMENSIONAL POISSON PROBLEM

  • Jun, Se-Ran;Kang, Sung-Kwon;Kwon, Yong-Hoon
    • Journal of applied mathematics & informatics
    • /
    • v.23 no.1_2
    • /
    • pp.25-42
    • /
    • 2007
  • A direct solver for the Legendre tau approximation for the two-dimensional Poisson problem is proposed. Using the factorization of symmetric eigenvalue problem, the algorithm overcomes the weak points of the Schur decomposition and the conventional diagonalization techniques for the Legendre tau approximation. The convergence of the method is proved and numerical results are presented.

A New Incremental Learning Algorithm with Probabilistic Weights Using Extended Data Expression

  • Yang, Kwangmo;Kolesnikova, Anastasiya;Lee, Won Don
    • Journal of information and communication convergence engineering
    • /
    • v.11 no.4
    • /
    • pp.258-267
    • /
    • 2013
  • New incremental learning algorithm using extended data expression, based on probabilistic compounding, is presented in this paper. Incremental learning algorithm generates an ensemble of weak classifiers and compounds these classifiers to a strong classifier, using a weighted majority voting, to improve classification performance. We introduce new probabilistic weighted majority voting founded on extended data expression. In this case class distribution of the output is used to compound classifiers. UChoo, a decision tree classifier for extended data expression, is used as a base classifier, as it allows obtaining extended output expression that defines class distribution of the output. Extended data expression and UChoo classifier are powerful techniques in classification and rule refinement problem. In this paper extended data expression is applied to obtain probabilistic results with probabilistic majority voting. To show performance advantages, new algorithm is compared with Learn++, an incremental ensemble-based algorithm.

A study on Technology for Performance of Network Configuration Management (네트워크 구성관리 성능 향상을 위한 기법 연구)

  • Kang, Hyun Joong;Han, Jeong-Soo
    • Convergence Security Journal
    • /
    • v.4 no.3
    • /
    • pp.47-55
    • /
    • 2004
  • Currently used to manage a whole bunch of networks is the Client/Server Network Management Technique in which a central manager system supports a number of managed ones. Unfortunately it has a big drawback: wasting network resources, most of all bandwidth, which is mainly caused by too much traffic between the central manager system and the managed ones. In a way to overcome this weak point, we have designed a new type of system, a Configuration Management System (CMS), based on code mobility which has been used in distributed network management systems. In this thesis we have compared the CMS with the currently used network management system, identified class to make Mobile Code, and analyzed the techniques of other network management systems in order to verify the validity of the new system.

  • PDF

Research on Wireless Sensor Networks Security Attack and Countermeasures: Survey (무선 센서 네트워크 보안 위협 및 대응책 연구)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.1-6
    • /
    • 2014
  • A wireless sensor network is being actively researched around the world that are connected to the mesh are a plurality of sensor nodes in a wireless manner that span different regions of the techniques. However, wireless communications use the limitation of resources, so it is very weak due to the properties of the network itself secure in comparison to the normal network. Wireless sensor network is divided into tapped-based attacks, forgery based attacks, denial of service attacks based largely by securities laws must defend against various attacks such as insertion of the wrong information being sent eavesdropping or modification of information, which is usually sensor network applications need to do. The countermeasure of sensor network attack is described in this research, and it will contribute to establish a secure sensor network communication.

  • PDF

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

An overview of several techniques employed to overcome squeezing in mechanized tunnels; A case study

  • Eftekhari, Abbas;Aalianvari, Ali
    • Geomechanics and Engineering
    • /
    • v.18 no.2
    • /
    • pp.215-224
    • /
    • 2019
  • Excavation of long tunnels by shielded TBMs is a safe, fast, and efficient method of tunneling that mitigates many risks related to ground conditions. However, long-distance tunneling in great depth through adverse geological conditions brings about limitations in the application of TBMs. Among various harsh geological conditions, squeezing ground as a consequence of tunnel wall and face convergence could lead to cluttered blocking, shield jamming and in some cases failure in the support system. These issues or a combination of them could seriously hinder the performance of TBMs. The technique of excavation has a strong influence on the tunnel response when it is excavated under squeezing conditions. The Golab water conveyance tunnel was excavated by a double-shield TBM. This tunnel passes mainly through metamorphic weak rocks with up to 650 m overburden. These metamorphic rocks (Shales, Slates, Phyllites and Schists) together with some fault zones are incapable of sustaining high tangential stresses. Prediction of the convergence, estimation of the creeping effects and presenting strategies to overcome the squeezing ground are regarded as challenging tasks for the tunneling engineer. In this paper, the squeezing potential of the rock mass is investigated in specific regions by dint of numerical and analytical methods. Subsequently, several operational solutions which were conducted to counteract the challenges are explained in detail.

Exploration of Ways to Nurture Creative and Convergence-Type Talents: Focusing on the actor-network theory (행위자 관계망 이론을 중심으로 창의ˑ융합형 인재 양성 방안 탐색)

  • Yoon Ok Han
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.1-10
    • /
    • 2023
  • The purpose of this study is to explore ways to nurture creative and fusion-type talents centered on ANT. In order to nurture creative and convergence-type talents centered on ANT, first, it is necessary to utilize Kao's Law in the network formation stage. Second, it is necessary to utilize the strong power of weak ties in the network formation stage. Third, in order to cause a stir in the stage of raising questions among the four stages of translation, the ability to ask questions must be developed. Fourth, education in various creative problem-solving techniques is needed to throw a stir. Fifth, in order to successfully intervene in the second stage of the four stages of translation, the stage of attracting attention, communication and critical thinking skills must be trained. Suggestions for follow-up research are: First, it is necessary to compare and analyze the four stages of translation and the stage of the creative problem-solving model presented by ANT. Second, it is expected that there will be follow-up studies that apply specific cases centering on ANT.

An Improvement of the Decision-Making of Categorical Data in Rough Set Analysis (범주형 데이터의 러프집합 분석을 통한 의사결정 향상기법)

  • Park, In-Kyu
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.157-164
    • /
    • 2015
  • An efficient retrieval of useful information is a prerequisite of an optimal decision making system. Hence, A research of data mining techniques finding useful patterns from the various forms of data has been progressed with the increase of the application of Big Data for convergence and integration with other industries. Each technique is more likely to have its drawback so that the generalization of retrieving useful information is weak. Another integrated technique is essential for retrieving useful information. In this paper, a uncertainty measure of information is calculated such that algebraic probability is measured by Bayesian theory and then information entropy of the probability is measured. The proposed measure generates the effective reduct set (i.e., reduced set of necessary attributes) and formulating the core of the attribute set. Hence, the optimal decision rules are induced. Through simulation deciding contact lenses, the proposed approach is compared with the equivalence and value-reduct theories. As the result, the proposed is more general than the previous theories in useful decision-making.

Analytical behavior of longitudinal face dowels based on an innovative interpretation of the ground response curve method

  • Rahimpour, Nima;Omran, Morteza MohammadAlinejad;Moghaddam, Amir Bazrafshan
    • Geomechanics and Engineering
    • /
    • v.30 no.4
    • /
    • pp.363-372
    • /
    • 2022
  • One of the most frequent issues in tunnel excavation is the collapse of rock blocks and the dropping of rock fragments from the tunnel face. The tunnel face can be reinforced using a number of techniques. One of the most popular and affordable solutions is the use of face longitudinal dowels, which has benefits including high strength, flexibility, and ease of cutting. In order to examine the reinforced face, this work shows the longitudinal deformation profile and ground response curve for a tunnel face. This approach is based on assumptions made during the analysis phase of problem solving. By knowing the tunnel face response and dowel behavior, the interaction of two elements can be solved. The rock element equation derived from the rock bolt method is combined with the dowel differential equation to solve the reinforced ground response curve (GRC). With a straightforward and accurate analytical equation, the new differential equation produces the reinforced displacement of the tunnel face at each stage of excavation. With simple equations and a less involved computational process, this approach offers quick and accurate solutions. The FLAC3D simulation has been compared with the suggested analytical approach. A logical error is apparent from the discrepancies between the two solutions. Each component of the equation's effect has also been described.