• Title/Summary/Keyword: 집합 통신

Search Result 578, Processing Time 0.021 seconds

Dynamic Slicing Algorithms for Understanding of C Programs (C 프로그램의 이해를 지원하는 동적 조각화 알고리즘)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.1
    • /
    • pp.172-180
    • /
    • 2005
  • Dynamic slicing method decomposes a program into slices and supports to be understood programs easily by software developer or maintainer. In this paper, we propose dynamic slicing algorithm to reduce time to decompose a program. We produce reference-variable set used in right and modify-variable set used in left on the basis of the assignment operator of all sentences and extract Inter-Variable Relationship(VV) for all variables of variable declaration. Proposed algorithm extracts dynamic slices by using them and execution trace of program. In conclusion, proposed algorithm improved the performance by reducing the time to extract dynamic slices by decreasing average comparison count of sentence when the number of criterion variables is three or more.

Uncertainty Measurement of Incomplete Information System based on Conditional Information Entropy (조건부 정보엔트로피에 의한 불완전 정보시스템의 불확실성 측정)

  • Park, Inkyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.107-113
    • /
    • 2014
  • The derivation of optimal information from decision table is based on the concept of indiscernibility relation and approximation space in rough set. Because decision table is more likely to be susceptible to the superposition or inconsistency in decision table, the reduction of attributes is a important concept in knowledge representation. While complete subsets of the attribute's domain is considered in algebraic definition, incomplete subsets of the attribute's domain is considered in information-theoretic definition. Therefore there is a marked difference between algebraic and information-theoretic definition. This paper proposes a conditional entropy using rough set as information theoretical measures in order to deduct the optimal information which may contain condition attributes and decision attribute of information system and shows its effectiveness.

3D Mesh Model Watermarking Based on POCS (POCS에 기반한 3D 메쉬 모델 워터마킹)

  • Lee Suk-Hwan;Kwon Ki-Ryong;Lee Kuhn-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.11C
    • /
    • pp.1592-1599
    • /
    • 2004
  • In this paper, we proposed the 3D mesh watermarking using projection onto convex sets (POCS). 3D mesh is projected iteratively onto two constraint convex sets until it satisfy the convergence condition. These sets consist of the robustness set and the invisibility set that designed to embed watermark Watermark is extracted without original mesh by using the decision values and the index that watermark is embedded. Experimental results verified that the watermarked mesh have the robustness against mesh simplification, cropping, affine transformation, and vertex randomization as well as the invisibility.

Prediction of Protein Subcellular Localization using Label Power-set Classification and Multi-class Probability Estimates (레이블 멱집합 분류와 다중클래스 확률추정을 사용한 단백질 세포내 위치 예측)

  • Chi, Sang-Mun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2562-2570
    • /
    • 2014
  • One of the important hints for inferring the function of unknown proteins is the knowledge about protein subcellular localization. Recently, there are considerable researches on the prediction of subcellular localization of proteins which simultaneously exist at multiple subcellular localization. In this paper, label power-set classification is improved for the accurate prediction of multiple subcellular localization. The predicted multi-labels from the label power-set classifier are combined with their prediction probability to give the final result. To find the accurate probability estimates of multi-classes, this paper employs pair-wise comparison and error-correcting output codes frameworks. Prediction experiments on protein subcellular localization show significant performance improvement.

Sampling Set Selection Algorithm for Weighted Graph Signals (가중치를 갖는 그래프신호를 위한 샘플링 집합 선택 알고리즘)

  • Kim, Yoon Hak
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.1
    • /
    • pp.153-160
    • /
    • 2022
  • A greedy algorithm is proposed to select a subset of nodes of a graph for bandlimited graph signals in which each signal value is generated with its weight. Since graph signals are weighted, we seek to minimize the weighted reconstruction error which is formulated by using the QR factorization and derive an analytic result to find iteratively the node minimizing the weighted reconstruction error, leading to a simplified iterative selection process. Experiments show that the proposed method achieves a significant performance gain for graph signals with weights on various graphs as compared with the previous novel selection techniques.

A Method of BDD Restructuring for Efficient MCS Extraction in BDD Converted from Fault Tree and A New Approximate Probability Formula (고장수목으로부터 변환된 BDD에서 효율적인 MCS 추출을 위한 BDD 재구성 방법과 새로운 근사확률 공식)

  • Cho, Byeong Ho;Hyun, Wonki;Yi, Woojune;Kim, Sang Ahm
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.6
    • /
    • pp.711-718
    • /
    • 2019
  • BDD is a well-known alternative to the conventional Boolean logic method in fault tree analysis. As the size of fault tree increases, the calculation time and computer resources for BDD dramatically increase. A new failure path search and path restructure method is proposed for efficient calculation of CS and MCS from BDD. Failure path grouping and bottom-up path search is proved to be efficient in failure path search in BDD and path restructure is also proved to be used in order to reduce the number of CS comparisons for MCS extraction. With these newly proposed methods, the top event probability can be calculated using the probability by ASDMP(Approximate Sum of Disjoint MCS Products), which is shown to be equivalent to the result by the conventional MCUB(Minimal Cut Upper Bound) probability.

Tabu Search Algorithm for Constructing Load-balanced Connected Dominating Sets in Wireless Sensor Networks (무선 센서 네트워크에서 부하 균형 연결 지배 집합을 구성하기 위한 타부서치 알고리즘)

  • Jang, Kil-Woong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.4
    • /
    • pp.571-581
    • /
    • 2022
  • Wireless sensor networks use the concept of connected dominating sets that can form virtual backbones for effective routing and broadcasting. In this paper, we propose an optimization algorithm that configures a connected dominating sets in order to balance the load of nodes to increase network lifetime and to perform effective routing. The proposed optimization algorithm in this paper uses the metaheuristic method of tabu search algorithm, and is designed to balance the number of dominatees in each dominator in the constituted linked dominance set. By constructing load-balanced connected dominating sets with the proposed algorithm, it is possible to extend the network lifetime by balancing the load of the dominators. The performance of the proposed tabu search algorithm was evaluated the items related to load balancing on the wireless sensor network, and it was confirmed in the performance evaluation result that the performance was superior to the previously proposed method.

Analysis on the characteristics for upper bound of [1,2]-domination in trees (트리의 [1,2]-지배 수 상계에 대한 특성 분석)

  • Lee, Hoon;Sohn, Moo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2243-2251
    • /
    • 2016
  • In this paper, we propose a theoretical model for characterization and upper bounds of [1,2]-domination set of network which has tree structure. In detail, we propose a theoretic model for upper bounds on [1,2]-domination set of a tree network which has some typical constrains. To that purpose, we introduce a graph theory to model and analyze the characteristics of tree structure networks. We assume a node subset D of a graph G=(V,E). We define that D is a [1,2]-dominant set if for any node v in set V which is not an element of a set D is adjacent to a node or two nodes of an element in a set D (that is, $1{\leq}{\mid}N({\upsilon}){\bigcap}D{\mid}{\leq}2$ for every node $v{\in}V-D$). The minimum cardinality of a [1,2]-dominating set of G, which is denoted by ${\gamma}_{[1,2]}(G)$, is called the [1,2]-domination number of G. In this paper, we show new upper bounds and characteristics about the [1,2]-domination number of tree.

An Efficient Location Management Scheme for High-speed Mobile Nodes (고속으로 이동하는 노드들을 위한 효율적인 위치 갱신 기법)

  • 송의성;길준민;황종선
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.5
    • /
    • pp.581-594
    • /
    • 2003
  • Recently, a location management is being more important in mobile communication systems due to an explosive increase of mobile users. Current systems have used a concept of location area. Based on this concept, a mobile user performs a location update whenever it moves into a new location area. However, this scheme can not avoid unnecessary location updates when a mobile user moves around with high movement rate as compared to call arrival rate. That results in tremendous location management cost. To overcome this drawback, our proposal divides service areas into two sets: One is a set of areas that mobile users move with high speed and another is a set of areas that they move with low speed. After establishing these two sets, this paper employs different location tracking schemes for each sets. Generally, most mobile users with high speed have a low CMR and a regular direction until they arrive at their destination. Using such the moving behavior, systems can predict a mobile user's next location area in advance. When the mobile user moves into the predicted location, our proposal does not perform a location update. Thus, it can reduce overall location management cost. The Markov model is used to analyze the performance of our proposal. Using the model, this paper compares our proposal with IS-41 and TLA. The analytic results show that as CMR grows lower, an overall cost of our proposal becomes less, particularly if a mobile user frequently moves into the specific location are predicted by mobile systems. Also, our proposal has a better performance than other two schemes when the communication cost between HLR and VLR is high.

Secure Group Communications Using Subset Difference (부분 집합 차를 이용한 안전한 그룹 통신)

  • 김희열;이윤호;정병천;이재원;윤현수;조정완
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.254-256
    • /
    • 2003
  • 그룹 통신을 이용한 어플리케이션이 증가함에 따라 안전하면서도 효율적인 그룹 통신에 관한 요구가 높아지고 있다. 이를 위해서는 안전한 데이터 통신, 그룹 멤버 관리, 그리고 확장성이 요구되며. 특히 빈번한 멤버의 가입/탈퇴시에 효율적으로 키를 갱신하는 수단이 필요하다. 제안된 시스템에서는 대칭키 암호화 알고리즘을 통해 안전성을 획득하며, 부분집합 차를 이용해서 키갱신을 수행하기 때문에 요구되는 메시지의 횟수를 감소시켰다. 기존 방법에서는 키 갱신을 위해 O(log n)번의 멀티캐스트가 요구되었지만, 제안된 시스템에서는 오직 한 번의 멀티캐스트만이 요구된다. 또한 제안된 시스템은 큰 정수의 인수분해 문제의 어려움에 기반하기 때문에, 안전성을 보장받을 수 있다.

  • PDF