• Title/Summary/Keyword: Delete

Search Result 365, Processing Time 0.025 seconds

Bootstrap and Delete-d Jackknife Confidence Intervals for Parameters of an Exponential Distribution

  • Kang, Suk-Bok;Cho, Young-Suk
    • Journal of the Korean Data and Information Science Society
    • /
    • v.8 no.1
    • /
    • pp.59-70
    • /
    • 1997
  • We introduce several estimators of the location and the scale parameters of the two-parameter exponential distribution, and then compare these estimators by the mean square error (MSE). Using the parametric bootstrap estimators and the delete-d jackknife, we obtain the bootstrap and the delete-d jackknife confidence intervals for the location and the scale parameters and compare the bootstrap confidence intervals with the delete-d jackknife confidence intervals by length and coverage probability through Monte Carlo method.

  • PDF

Study on Improved Interactive Mode of Delete in Mobile Phone's Full Keyboard and Its Usability (휴대폰의 풀 키보드에서 향상된 대화식 삭제 모드 및 사용성에 관한 연구)

  • Guo, Haoyue;Pan, Younghwan;Luo, Tao
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.41-48
    • /
    • 2020
  • The text has always been an important recording channel for the development of human civilization. The delete text function is essential. The current method of deleting text is to "press" the delete button to complete the operation. It does not meet the user's need to delete large amounts of text. This article focuses on a new interactive approach to this problem. We consider problems and find solutions from the perspective of zero-order position control and first-order rate control. Through experimental design analysis and comparison, the new keyboard interaction method greatly improves efficiency and user experience. This article hopes to evaluate the usability of the new keyboard through usability studies.

Comparison of Remaining Data According to Deletion Events on Microsoft SQL Server (Microsoft SQL Server 삭제 이벤트의 데이터 잔존 비교)

  • Shin, Jiho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.223-232
    • /
    • 2017
  • Previous research on data recovery in Microsoft SQL Server has focused on restoring data based on in the transaction log that might have deleted records exist. However, there was a limit that was not applicable if the related transaction log did not exist or the physical database file was not connected to Server. Since the suspect in the crime scene may delete the data records using a different deletion statements besides "delete", we need to check the remaining data and a recovery possibility of the deleted record. In this paper, we examined the changes "Page Allocation information" of the table, "Unallocation deleted data", "Row Offset Array" in the page according to "delete", "truncate" and "drop" events. Finally it confirmed the possibility of data recovery and availability of management tools in Microsoft SQL Server digital forensic investigation.

Minimum Spanning Tree with Select-and-Delete Algorithm (선택-삭제 최소신장트리 알고리즘)

  • Choi, Myeong-Bok;Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.107-116
    • /
    • 2013
  • This algorithm suggests a method in which a minimum spanning tree can be obtained fast by reducing the number of an algorithm execution. The suggested algorithm performs a select-and-delete process. In the select process, firstly, it performs Borůvka's first stage for all the vertices of a graph. Then it re-performs Borůvka's first stage for specific vertices and reduces the population of the edges. In the delete process, it deletes the maximum weight edge if any cycle occurs between the 3 edges of the edges with the reduced population. After, among the remaining edges, applying the valency concept, it gets rid of maximum weight edges. Finally, it eliminates the maximum weight edges if a cycle happens among the vertices with a big valency. The select-and-delete algorithm was applied to 9 various graphs and was evaluated its applicability. The suggested select process is believed to be the vest way to choose the edges, since it showed that it chose less number of big edges from 6 graphs, and only from 3 graphs, comparing to the number of edges that is to be performed when using MST algorithm. When applied the delete process to Kruskal algorithm, the number of performances by Kruskal was less in 6 graphs, but 1 more in each 3 graph. Also, when using the suggested delete process, 1 graph performed only the 1st stage, 5 graphs till 2nd stage, and the remaining till 3rd stage. Finally, the select-and-delete algorithm showed its least number of performances among the MST algorithms.

An Efficient Implementation of Kruskal's and Reverse-Delete Minimum Spanning Tree Algorithm (Kruskal과 역-삭제 최소신장트리 알고리즘의 효율적 구현 방법)

  • Choi, Myeong-Bok;Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.103-114
    • /
    • 2013
  • This paper suggests a method to reduce the number of performances of Kruskal and Reverse-delete algorithms. Present Kruskal and Reverse-delete algorithms verify whether the cycle occurs within the edges of the graph. For this reason, they have problems of unnecessarily performing extra algorithms from the edges, even though they've already obtained the minimum spanning tree. This paper, first of all, suggests the 1st method which reduces the no. of performances by introducing stop point criteria of algorithm, but at the same time, performs algorithms from all the edges, just like how Kruskal and Reverse-delete algorithms. Next, it suggests the 2nd method which finds the minimum spanning tree from the remaining edges after getting rid of all the unnecessary edges which are considered not to affect the minimum spanning tree. These suggested methods have an effect of terminating algorithm at least 1.4 times and at most 3.86times than Kruskal and Reverse-delete algorithms, when applied to the real graphs. We have found that the 2nd method of the Reverse-delete algorithm has the fastest speed in terminating an algorithm, among 4 algorithms which are results of the 2 suggested methods being applied to 2 algorithms.

Right to delete and Right to be forgotten -Discuss on the condition of the right to delete (기사삭제 요구권과 잊혀질 권리 - 기사삭제의 인정기준에 관한 논의)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.13-22
    • /
    • 2014
  • The right to be forgotten is a world-wide issue after the decision of the European Court of Justice which accepted that right. This essay discusses about the guide lines for protecting the right to delete, a category of the right to be forgotten. I classified those guide lines as follows : (1) sensitiveness of the personal information, (2) offensiveness to reasonable and ordinary people, (3) intention of writing the article, (4) value of historical record, (5) importance of privacy comparing with right to know with time flow, (6) public figure, (7) article based on fact or opinion. To effectively protect right to be forgotten and delete, we have to consider Privacy Impact Assessment, using blind system, unification of multiple institutions, and reforming press arbitration system.

An Optimal Denormalization Method in Relational Database with Response Time Constraint (관계형 데이터베이스에서 응답시간에 제약이 있는 경우 최적 역정규화 방법)

  • 장영관
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.3
    • /
    • pp.1-9
    • /
    • 2003
  • Databases are central to business information systems and RDBMS is most widely used for the database system. Normalization was designed to control various anomalies (insert, update, delete anomalies). However, normalized database design does not account for the tradeoffs necessary for performance. In this research, I model a database design method considering denormalization of duplicating attributes in order to reduce frequent join processes. This model considers response time for processing each select, insert, update, delete transaction, and for treating anomalies. A branch and bound method is proposed for this model.

Delete and Generate: Korean style transfer based on deleting and generating word n-grams (Delete-Generate: 단어 n-gram의 삭제 및 생성에 기반한 한국어 스타일 변환)

  • Choi, Heyon-Jun;Na, Seung-Hoon
    • Annual Conference on Human and Language Technology
    • /
    • 2019.10a
    • /
    • pp.400-403
    • /
    • 2019
  • 스타일 변환(Style Transfer)은 주어진 문장의 긍정이나 부정 같은 속성을 변경하여 다른 속성을 갖는 문장으로 변환하는 과정을 의미한다. 본 연구에서는 스타일 변환을 위한 단어 n-그램 삭제의 기준을 확장하였고, 네이버 영화리뷰 데이터셋을 통해 이를 스타일 변환 이후 원래 문장의 스타일로부터 얼마나 차이가 나게 되었는지를 측정하였다. 측정은 감성분석기를 통해 이루어졌고, 기존 방법에 비해 6.28%p정도 높은 75.13%의 정확도를 보였다.

  • PDF

Developed Optimizing File Delete Detection Model (최적화된 디지털 증거 파일삭제 탐지 모델)

  • Kim, Yong-Ho;Yoo, Jae-Hyung;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.2
    • /
    • pp.111-118
    • /
    • 2008
  • Computer forensics have been used for verify a crime when industry secret information or cyber crime occurred. However, these methods are simple analysis which cannot find the problem of deleted files. Therefore these cannot be a trusty evidence in a law court. We studied with focus on connectivity principle because it has never tried yet. In this paper, we developed optimizing detection model through systemized analysis between user-delete method and operating system-delete method. Detection model has 3 cases; Firstly, case of deleted by a user, secondly, case of deleted by application. Thirdly case of deleted by operating system. Detection model guarantees optimized performance because it is used in actual field.

  • PDF

Polynomial Time Algorithm for Worker Assignment Problem (작업자 배정 문제의 다항시간 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.159-164
    • /
    • 2022
  • The linear assignment problem (LAP) and linear bottleneck assignment problem (LBAP) has been unknown the algorithm to solve the optimal solution within polynomial-time. These problems are classified by NP-hard. Therefore, we can be apply metaheuristic methods or linear programming (LP) software package or Hungarian algorithm (HA) with O(m4) computational complexity. This paper suggests polynomial time algorithm with O(mn)=O(m2),m=n time complexity to LAP and LBAP. The select-delete method is simply applied to LAP, and the delete-select method is used to LBAP. For the experimental data without the unique algorithm can be apply to whole data, the proposed algorithm can be obtain the optimal solutions for whole data.