• Title/Summary/Keyword: $e^N$-기법

Search Result 230, Processing Time 0.028 seconds

Merging Algorithm for Relaxed Min-Max Heaps Relaxed min-max 힙에 대한 병합 알고리즙

  • Min, Yong-Sik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.1E
    • /
    • pp.73-82
    • /
    • 1995
  • This paper presents a data structure that implements a mergeable double-ended priority queue ; namely, an improved relaxed min-max-pair heap. It suggests a sequential algorithm to merge priority queues organized in two relaxed min-max heaps : kheap and nheap of sizes k and n, respecrively. This new data sturuture eliminates the blossomed tree and the lazying method used to merge the relaxed min-max heaps in [8]. As a result, the suggested method in this paper requires the time complexity of O(log(log(n/k))*log(k)) and the space complexity of O(n+), assuming that $k{\leq}{\lfloor}log(size(nheap)){\rfloor}$ are in two heaps of different sizes.

  • PDF

Modified Multi-bit Shifting Algorithm in Multiplication Inversion Problems (개선된 역수연산에서의 멀티 쉬프팅 알고리즘)

  • Jang, In-Joo;Yoo, Hyeong-Seon
    • The Journal of Society for e-Business Studies
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2006
  • This paper proposes an efficient inversion algorithm for Galois field GF(2n) by using a modified multi-bit shifting method based on the Montgomery algorithm. It is well known that the efficiency of arithmetic algorithms depends on the basis and many foregoing papers use either polynomial or optimal normal basis. An inversion algorithm, which modifies a multi-bit shifting based on the Montgomery algorithm, is studied. Trinomials and AOPs (all-one polynomials) are tested to calculate the inverse. It is shown that the suggested inversion algorithm reduces the computation time up to 26 % of the forgoing multi-bit shifting algorithm. The modified algorithm can be applied in various applications and is easy to implement.

  • PDF

Spammer Detection using Features based on User Relationships in Twitter (관계 기반 특징을 이용한 트위터 스패머 탐지)

  • Lee, Chansik;Kim, Juntae
    • Journal of KIISE
    • /
    • v.41 no.10
    • /
    • pp.785-791
    • /
    • 2014
  • Twitter is one of the most famous SNS(Social Network Service) in the world. Twitter spammer accounts that are created easily by E-mail authentication deliver harmful content to twitter users. This paper presents a spammer detection method that utilizes features based on the relationship between users in twitter. Relationship-based features include friends relationship that represents user preferences and type relationship that represents similarity between users. We compared the performance of the proposed method and conventional spammer detection method on a dataset with 3% to 30% spammer ratio, and the experimental results show that proposed method outperformed conventional method in Naive Bayesian Classification and Decision Tree Learning.

Influence Maximization against Social Adversaries (소셜 네트워크 내 경쟁 집단에의 영향력 최대화 기법)

  • Jeong, Sihyun;Noh, Giseop;Oh, Hayoung;Kim, Chong-Kwon
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.1
    • /
    • pp.40-45
    • /
    • 2015
  • Online social networks(OSN) are very popular nowadays. As OSNs grows, the commercial markets are expanding their social commerce by applying Influence Maximization. However, in reality, there exist more than two players(e.g., commercial companies or service providers) in this same market sector. To address the Influence Maximization problem between adversaries, we first introduced Influence Maximization against the social adversaries' problem. Then, we proposed an algorithm that could efficiently solve the problem efficiently by utilizing social network properties such as Betweenness Centrality, Clustering Coefficient, Local Bridge and Ties and Triadic Closure. Moreover, our algorithm performed orders of magnitudes better than the existing Greedy hill climbing algorithm.

Downscaling Technique of the Monthly Precipitation Data using Support Vector Machine (지지벡터기구를 이용한 월 강우량자료의 Downscaling 기법)

  • Kim, Seong-Won;Kyoung, Min-Soo;Kwon, Hyun-Han;Kim, Hyung-Soo
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2009.05a
    • /
    • pp.112-115
    • /
    • 2009
  • The research of climate change impact in hydrometeorology often relies on climate change information. In this paper, neural networks models such as support vector machine neural networks model (SVM-NNM) and multilayer perceptron neural networks model (MLP-NNM) are proposed statistical downscaling of the monthly precipitation. The input nodes of neural networks models consist of the atmospheric meteorology and the atmospheric pressure data for 2 grid points including $127.5^{\circ}E/35^{\circ}N$ and $125^{\circ}E/35^{\circ}N$, which produced the best results from the previous study. The output node of neural networks models consist of the monthly precipitation data for Seoul station. For the performances of the neural networks models, they are composed of training and test performances, respectively. From this research, we evaluate the impact of SVM-NNM and MLP-NNM performances for the downscaling of the monthly precipitation data. We should, therefore, construct the credible monthly precipitation data for Seoul station using statistical downscaling method. The proposed methods can be applied to future climate prediction/projection using the various climate change scenarios such as GCMs and RCMs.

  • PDF

Water Quality Forecasting of the River Applying Ensemble Streamflow Prediction (앙상블 유출 예측기법을 적용한 하천 수질 예측)

  • Ahn, Jung Min;Ryoo, Kyong Sik;Lyu, Siwan;Lee, Sang Jin
    • Journal of Korean Society on Water Environment
    • /
    • v.28 no.3
    • /
    • pp.359-366
    • /
    • 2012
  • Accurate predictions about the water quality of a river have great importance in identifying in-stream flow and water supply requirements and solving relevant environmental problems. In this study, the effect of water release from upstream dam on the downstream water quality has been investigated by applying a hydological model combined with QUAL2E to Geum River basin. The ESP (Ensemble Stream Prediction) method, which has been validated and verified by lots of researchers, was used to predict reservoir and tributary inflow. The input parameters for a combined model to predict both hydrological characteristics and water quality were identified and optimized. In order to verify the model performance, the simulated result at Gongju station, located at the downstream from Daecheong Dam, has been compared with measured data in 2008. As a result, it was found that the proposed model simulates well the values of BOD, T-N, and T-P with an acceptable reliability.

A Study on The Performance Improvement of HDR-WPAN System Using Turbo Code (Turbo Code를 사용한 HDR-WPAN 시스템의 성능개선 방안 연구)

  • Kang, Chul-Gyu;Kim, Jae-Young;OH, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.774-777
    • /
    • 2005
  • In this paper, we propose performance improvement algorithm for high data rate wireless personal area network (HDR-WPAN) system using turbo code. Turbo code increase detection delay and computation according to iterate counts. However, turbo code has been shown to be very close th the Shanon limit, can be classified as a block-based error correction code. Turbo code has gain about E$_b$/N$_o$=5.8dB at 10$^{-4}$ in the multipath indoor channel. In the result, HDR-WPAN system adopted turbo code has reliable communication by low power.

  • PDF

A Feature Re-weighting Approach for the Non-Metric Feature Space (가변적인 길이의 특성 정보를 지원하는 특성 가중치 조정 기법)

  • Lee Robert-Samuel;Kim Sang-Hee;Park Ho-Hyun;Lee Seok-Lyong;Chung Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.33 no.4
    • /
    • pp.372-383
    • /
    • 2006
  • Among the approaches to image database management, content-based image retrieval (CBIR) is viewed as having the best support for effective searching and browsing of large digital image libraries. Typical CBIR systems allow a user to provide a query image, from which low-level features are extracted and used to find 'similar' images in a database. However, there exists the semantic gap between human visual perception and low-level representations. An effective methodology for overcoming this semantic gap involves relevance feedback to perform feature re-weighting. Current approaches to feature re-weighting require the number of components for a feature representation to be the same for every image in consideration. Following this assumption, they map each component to an axis in the n-dimensional space, which we call the metric space; likewise the feature representation is stored in a fixed-length vector. However, with the emergence of features that do not have a fixed number of components in their representation, existing feature re-weighting approaches are invalidated. In this paper we propose a feature re-weighting technique that supports features regardless of whether or not they can be mapped into a metric space. Our approach analyses the feature distances calculated between the query image and the images in the database. Two-sided confidence intervals are used with the distances to obtain the information for feature re-weighting. There is no restriction on how the distances are calculated for each feature. This provides freedom for how feature representations are structured, i.e. there is no requirement for features to be represented in fixed-length vectors or metric space. Our experimental results show the effectiveness of our approach and in a comparison with other work, we can see how it outperforms previous work.

Modulation Scheme for Network-coded Bi-directional Relaying over an Asymmetric Channel (양방향 비대칭 채널에서 네트워크 부호화를 위한 변조 방식)

  • Ryu, Hyun-Seok;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2B
    • /
    • pp.97-109
    • /
    • 2012
  • In this paper, we propose a modulation scheme for a network-coded bi-directional relaying (NBR) system over an asymmetric channel, which means that the qualities of the relay channel (the link between the BS and RS) and access channel (the link between the RS and MS) are not identical. The proposed scheme employs a dual constellation in such a way that the RS broadcasts the network-coded symbols modulated by two different constellations to the MS and BS over two consecutive transmission intervals. We derive an upper bound on the average bit error rate (BER) of the proposed scheme, and compare it with the hybrid constellation-based modulation scheme proposed for the asymmetric bi-directional link. Furthermore, we investigate the channel utilization of the existing bi-directional relaying schemes as well as the NBR system with the proposed dual constellation diversity-based modulation (DCD). From our simulation results, we show that the DCD gives better average BER performance about 3.5~4dB when $E_b/N_0$ is equal to $10^{-2}$, while maintaining the same spectral efficiency as the existing NBR schemes over the asymmetric bi-directional relaying channel.

Effect of Soft Handoff Technique on CDMA Cell Coverage in a Lognormally Shadowed Channel (전파음영 채널 환경에서 소프트 핸드오프 기법이 CDMA 셀룰러 시스템의 셀 커버리지에 미치는 영향)

  • Oh, Hyon-Kyu;Kim, Hang-Rae;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.6
    • /
    • pp.871-881
    • /
    • 2001
  • In this paper, the effect of soft handoff technique on CDMA cell coverage is analyzed in a lognormally shadowed channel, which uses the Hata propagation model, Also, the rate of increase for the cell coverage is analyzed by calculating the hard and soft handoff margin. When the outage probability is 0.02 and the standard deviation of the received signal is 2.5 dB in a lognormally shadowed channel, the transmit power of the mobile station which is located in the cell boundary is increased by the hard handoff margin of 5.13 dB and by the soft handoff margin of 3.68 dB, respectively. So, the rate of increase for the cell coverage is 1.39 in case of using the soft handoff technique. It is shown that if the (E$\_$b//N$\_$0/)$\_$req/ value is 7 dB, the cell coverage of the CDMA cellular system with soft handoff technique in city area is 3.33 km in case of the 850 MHz frequency and 1.36 km in case of the 1900 MHz frequency. Also, the accurate cell coverage with soft handoff technique is supported that could be serviced by the base-station in CDMA cellular system.

  • PDF