• Title/Summary/Keyword: 최악 수행시간

Search Result 50, Processing Time 0.038 seconds

An Approximate Approach for Density-Based Clustering Using Multidimensional Indexes (다차원 색인을 이용한 밀도 기반 클러스터링의 근사적 접근 방법)

  • Hwang Jae-Joon;Moon Yang-Sae;Whang Kyu-Young;Jang Joo-Hyun;Kim Jin-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.37-39
    • /
    • 2005
  • 본 논문에서는 기존의 밀도 기반 전지 클러스터링 알고리즘의 성능을 개선한 밀도 기반 클러스터링의 근사적 접근법을 제안한다. 기존의 밀도 기반 전지 알고리즘은 다차원 색인의 많은 검색 공간을 빠르게 전지하면서도 원하는 클러스터를 정확히 찾아내는 특징을 가지고 있다. 그러나 기존 알고리즘은 전지를 위한 한계 값 설정을 위하여 단말 영역들의 밀도 값을 사용함으로써, 내부 영역에 속한 단말 영역들 간의 밀도 편차가 큰 경우 전지 여부에 대한 판별이 빨리 이루어지지 않는다. 또한, 최악의 경우에는 모든 단말 페이지를 검색하여야 하고, 이에 따라 성능이 저하될 수 있다. 반면에 제안하는 근사적 접근법에서는 한계 값 설정을 위해 단말 영역이 아닌 내부 영역의 밀도 값을 사용한다. 일반적으로, 내부 영역들 간의 밀도 편차는 단말 영역들 간의 밀도 편차보다 크지 않으므로, 근사 밀도 기반 전지 알고리즘에서는 더욱 많은 검색 공간의 전지 여부의 빨리 판별할 수 있게 된다. 성능 평가 실험을 수행한 결과, 제안한 알고리즘은 기존의 알고리즘과 비교하여 정확성 측면에서는 큰 차이가 없는 반면 수행 시간 측면에서는 최대 $17\%$의 성능 향상 효과가 있는 것으로 나타났다.

  • PDF

Symbol Time Tracking Algorithm for WAVE Systems (WAVE 시스템에서 심볼 시간추적 알고리듬)

  • Hong, Dae-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.397-406
    • /
    • 2009
  • A Wireless Access for Vehicular Environment (WAVE) system based on Orthogonal frequency Division Multiplexing (OFDM) is made for vehicle to vehicle wireless communications. The physical layer standard of the WAVE system is very similar to that of the IEEE802.1la wireless local area network (WLAN). Therefore, the performance of the WAVE system is degraded by continual timing delay in the WAVE multipath fading channels after starting initial timing synchronization. In this paper, the tracking algorithm that synchronizes symbol timing is proposed to continually compensate additional timing delay. Computer simulation of the proposed algorithm is performed in the worst communication environments that apply to maximum timing delay. Computer simulation shows that the proposed algorithm can improve the system performance in various channel conditions.

Detecting the First Race in OpenMP Program with Nested Parallelism (내포 병렬성을 가지는 OpenMP 프로그램의 최초 경합 탐지)

  • Chon, Byoung-Gyu;Woo, Jong-Jung;Jun, Yong-Kee
    • The KIPS Transactions:PartA
    • /
    • v.8A no.3
    • /
    • pp.253-260
    • /
    • 2001
  • It is important to detect races for debugging shared-memoy parallel programs, because the races cause unintended nondeterministic program execution. Previous on-the-fly techniques to detect races can not guarantee the first race detection in nested parallel programs. Detecting the first race is important for debugging parallel programs, since the removal of the first race may make the next occurred races disappear. In this paper, we presents an on-the-fly detection technique to detect all of the first races through the reexecution of the debugged programs. We assume that the debugged parallel program may have one-way nested parallel programs. The number of reexecution is at the least the nesting depth of the program in the worst case. The space complexity is O(VT) and the time complexity to detect race in each access of access history is O(T), where V is number of shared variables and T is the maximum parallelism of the program. This efficiency of our technique in each execution is the same with the previous on-the-fly detection techniques. Therefore, this technique makes debugging parallel programs more effective and practical.

  • PDF

The Case Analysis through Fire Simulation FDS and Evacuation Simulation Pathfinder (화재 시뮬레이션 FDS와 피난시뮬레이션 Pathfinder 사례분석)

  • Kim, Jong Yoon;Jeon, Yong Han
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.6
    • /
    • pp.253-260
    • /
    • 2015
  • In this study, using the FDS as the fire simulation and evacuation simulations of the Pathfinder, set the main control room of the building to the fire point fire safety assessment studies were carried out. At first the quantitative result such as distribution of visibility as time passing, distribution of temperature, distribution of CO density produced results using fire-simulation and evacuation-simulation was carried out based on the result that produced the final safety evaluation result as being calculated of evacuation time. As the risk increased with the distribution of visibility at the result of fire-simulation, evacuation-simulation was carried out using the result. Finally the result was made 127.9 sec that everyone could evacuate. The numerical results are analyzed in case of the places in the building required safe egress time for safety a as the analysis to be no more than available safe egress time was analyzed to be secured. The results of this safety evaluation represent that more smooth evacuation safety performance can be secured by linking the event of fire firefighting equipment as a result of simulating the worst conditions.

  • PDF

Constant Time RMESH Algorithms for Polygon Intersection Problems (다각형 교차 문제를 위한 상수 시간 재구성메쉬 알고리즘)

  • Kim, Su-Hwan
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.11
    • /
    • pp.1344-1352
    • /
    • 1999
  • 본 논문에서는 두 단순 다각형의 교차 영역을 구하는 문제를 재구성메쉬(RMESH) 상에서 상수 시간에 해결하는 두 개의 알고리즘을 제시한다. 먼저, 두 다각형이 모두 볼록 다각형일 때, N$\times$N RMESH에서 상수 시간에 교차 영역을 구하는 알고리즘을 제시한다, 여기서 N은 두 다각형의 정점의 개수의 합이다. 그리고, 두 일반적인 단순 다각형의 교차 영역을 구하는 문제에 대해서 (N+T)$\times$(N+T)2 RMESH에서 수행되는 상수 시간 알고리즘을 제시한다, 여기서 T는 최악의 경우 두 다각형의 경계선 상의 교차점의 개수로서 두 다각형의 정점의 개수가 각각 n과 m일 때 n.m에 해당한다. 두 다각형 중 하나가 볼록 다각형인 경우는 T = 2.max{n, m}이다. 이 알고리즘은 두 다각형의 모든 교차 영역 조각들을 구한 후 RMESH의 0번째 열에 차례로 배치해 준다. Abstract In this paper, we consider two constant time algorithms for polygon intersection problems on a reconfigurable mesh(in short, RMESH). First, we present a constant time algorithm for computing the intersection of two convex polygons on an N$\times$N RMESH, where N is the total number of vertices in both polygons. Second, we present a constant time algorithm for computing the intersection of two simple polygons on an (N+T)$\times$(N+T)2 RMESH, where T is the worstcase number of intersection points between the boundaries of them. T = n m, where n and m are the numbers of vertices of two polygons respectively. If either of them is convex, then T = 2 max{n,m}. The algorithm computes the intersection of them, and then arranges each intersection component onto the 0-th column of the mesh.

A Dynamic Scheduling Algorithm to Maximize the Total Value of Real-time Tasks running on a Single Processor (단일 프로세서상에서 수행되는 실시간 타스크의 실행 가치 최대화를 위한 동적 스케쥴링)

  • Kim, In-Su;Lee, Yun-Yeol;Lee, Chun-Hui;Jeong, Gi-Hyeon;Choe, Gyeong-Hui
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1678-1685
    • /
    • 1999
  • In most of the existing real-time schedulers producing the total value as large as possible, the service times for all schedulable tasks are computed at each time a new task arrives. If all scheduled tasks would be executed completely before a new task arrives, the schedule may produce the greatest total value. But this is not always true in real situations. In many cases, (a) new tasks arrive(s) before all the scheduled tasks are executed completely. In this paper, we propose a unique scheduling algorithm for real-time tasks. The proposed algorithm determines the service times only for some tasks with earlier deadlines while the existing algorithms determine the service times for all tasks. This partial computation decreases the average scheduling complexity ramatically, even though, in the worst case, the complexity of the proposed algorithm becomes O(N2), which is equal to that of a previous algorithm that has been known as a less complicated one.

  • PDF

Design of a Binary Adder Structure Suitable for Public Key Cryptography Processor (공개키 암호화 프로세서에 적합한 이진 덧셈기의 구조 연구)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.724-727
    • /
    • 2008
  • Studies on binary adder have been variously developed. According to those studies of critical worst delay and mean delay time of asynchronous binary adders, carry select adders (CSA) based on hybrid structure showed 17% better performance than ripple carry adders (RCA) in 32 bit asynchronous processors, and 23% better than in 64 bit microprocessor implemented. In the complicated signal processing systems such as RSA, it is essential to optimize the performance of binary adders which play fundamental roles. The researches which have been studied so far were subject mostly to addition algorithms or adder structures. In this study, we analyzed and designed adders in an asp;ect of synthesis method. We divided the ways of implementing adders into groups, each of which was synthesized with different synthesis options. Also, we analyzed the variously implemented adders to evaluate the performance and area so that we can propose a different approach of designing optimal binary adders.

  • PDF

Efficient Scheduling of Sensor-based Elevator Systems in Smart Buildings (스마트 빌딩을 위한 센서 기반의 효율적인 엘리베이터 스케줄링)

  • Bahn, Hyokyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.367-372
    • /
    • 2016
  • In a modern smart building, sensors can detect various physical conditions, such as temperature, humidity, sound, motion, and light, which can be used in medical services and security, and for energy savings. This paper presents an efficient elevator scheduling system that utilizes smart sensor technologies with radio-frequency identification, video, and floor sensors to detect the arrival of elevator users in advance. The detected information is then delivered to the elevator scheduling system via building networks. By using this information, the proposed system makes a reservation call for efficient control of the elevator's direction and time. Experiments under a spectrum of traffic conditions show that the proposed system performs better than a legacy system with respect to average wait time, maximum wait time, and energy consumption.

Design of a Binary Adder Structure Suitable for High-Security Public Key Cryptography Processor (고비도 공개키 암호화 프로세서에 적합한 이진 덧셈기의 구조 연구)

  • Moon, Sang-Gook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.1976-1979
    • /
    • 2008
  • Studies on binary adder have been variously developed. According to those studies of critical worst delay and mean delay time of asynchronous binary adders, carry select adders (CSA) based on hybrid structure showed 17% better performance than ripple carry adders (RCA) in 32 bit asynchronous processors, and 23% better than in 64 bit microprocessor implemented. In the complicated signal processing systems such as RSA, it is essential to optimize the performance of binary adders which play fundamental roles. The researches which have been studied so far were subject mostly to addition algorithms or adder structures. In this study, we analyzed and designed adders in an asp;ect of synthesis method. We divided the ways of implementing adders into groups, each of which was synthesized with different synthesis options. Also, we analyzed the variously implemented adders to evaluate the performance and area so that we can propose a different approach of designing optimal binary adders.

Study on the Fire Safety Estimation for a Pilot LNG Storage Tank (PILOT LNG저장탱크의 화재안전성 평가에 관한 연구)

  • 고재선;김효
    • Fire Science and Engineering
    • /
    • v.18 no.3
    • /
    • pp.57-73
    • /
    • 2004
  • Quantitative safety analysis through a fault tree method has been conducted for a fire broken out over the spilling LNG from a pilot LNG tank, which may have 4 types of scenarios causing potentially risky results. When we consider LNG release from venting pipelines as a first event, any specific radius of Low Flammable Limit(LFL) has not been built up. The second case of LNG outflow from the rupture of storage tank which will be the severest has been analyzed and the results revealed various diffusion areas to the leaking times even with the same amount of LNG release. As a third case LNG leakage from the inlet/outlet pipelines was taken into consider. The results showed no significant differences of LFL radii between the two spilling times of 10 and 60 minutes. Hence, we have known the most affecting factor on the third scenario is an initial amount of LNG release. Finally, the extent of LFL was calculated when LNG pipelines around the dike area were damaged. In addition, consequence analysis has been also performed to acquire the heat radiation and flame magnitude for each case.