• Title/Summary/Keyword: E-M algorithm

Search Result 296, Processing Time 0.029 seconds

Cyber Natural History Museum Contents for Mobile Phones (모바일 폰 기반의 사이버 자연사 박물관)

  • Hong, Sung-Soo;Khan, Irfan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1422-1425
    • /
    • 2011
  • These days' mobile phones and their improved multimedia limits making it powerful enough to handle complicated tasks. Image processing related support for mobile devices is extremely comprehensive in mobile cyber museum. A key technical challenge is how to achieve the best-perceived image quality and transmitting data between client and server with given the limited screen size and display bit-depth of the mobile devices. This paper targets image processing features such as capturing rendering zooming, panning and image rotation for 360o view and customized algorithm related image processing with variety of search method i.e. alphabetical, visual search.

A Congestion Control Algorithm through RTS/CTS with Priority in Wireless Ad-Hoc Network (Wireless Ad-Hoc Network에서 RTS/CTS 내의 우선순위 부여를 통한 충돌 회피 알고리즘)

  • Lee, Ji Hye;Bae, Kyoung Han;Rhee, Byung Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.507-510
    • /
    • 2011
  • 데이터에 차별화된 우선순위를 부여하는 IEEE 802.11e EDCA는 데이터 프레임 전송 이전 스테이션 간에 발생할 수 있는 충돌을 방지할 수 없고 네트워크 환경이 혼잡할 경우에는 오히려 충돌 발생 확률을 높이는 한계가 있었다. 이 문제를 해결하기 위하여 본 논문에서는 무선 다중 애드 혹 네트워크 환경에서 채널 확보를 위한 RTS/CTS 프레임 전송 시 우선순위를 부여하여 채널을 점유할 단말을 결정하고, 또한 채널형성 후 한 노드 내에서 여러 데이터 전송 시 충돌확률을 줄이는 방법을 제안하였다.

Blockchain-Enabled Decentralized Clustering for Enhanced Decision Support in the Coffee Supply Chain

  • Keo Ratanak;Muhammad Firdaus;Kyung-Hyune Rhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.260-263
    • /
    • 2023
  • Considering the growth of blockchain technology, the research aims to transform the efficiency of recommending optimal coffee suppliers within the complex supply chain network. This transformation relies on the extraction of vital transactional data and insights from stakeholders, facilitated by the dynamic interaction between the application interface (e.g., Rest API) and the blockchain network. These extracted data are then subjected to advanced data processing techniques and harnessed through machine learning methodologies to establish a robust recommendation system. This innovative approach seeks to empower users with informed decision-making abilities, thereby enhancing operational efficiency in identifying the most suitable coffee supplier for each customer. Furthermore, the research employs data visualization techniques to illustrate intricate clustering patterns generated by the K-Means algorithm, providing a visual dimension to the study's evaluation.

An Addition-Chain Heuristics and Two Modular Multiplication Algorithms for Fast Modular Exponentiation (모듈라 멱승 연산의 빠른 수행을 위한 덧셈사슬 휴리스틱과 모듈라 곱셈 알고리즘들)

  • 홍성민;오상엽;윤현수
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.73-92
    • /
    • 1997
  • A modular exponentiation( E$M^{$=varepsilon$}$mod N) is one of the most important operations in Public-key cryptography. However, it takes much time because the modular exponentiation deals with very large operands as 512-bit integers. Modular exponentiation is composed of repetition of modular multiplications, and the number of repetition is the same as the length of the addition-chain of the exponent(E). Therefore, we can reduce the execution time of modular exponentiation by finding shorter addition-chain(i.e. reducing the number of repetitions) or by reducing the execution time of each modular multiplication. In this paper, we propose an addition-chain heuristics and two fast modular multiplication algorithms. Of two modular multiplication algorithms, one is for modular multiplication between different integers, and the other is for modular squaring. The proposed addition-chain heuristics finds the shortest addition-chain among exisiting algorithms. Two proposed modular multiplication algorithms require single-precision multiplications fewer than 1/2 times of those required for previous algorithms. Implementing on PC, proposed algorithms reduce execution times by 30-50% compared with the Montgomery algorithm, which is the best among previous algorithms.

A Self-Calibrated Localization System using Chirp Spread Spectrum in a Wireless Sensor Network

  • Kim, Seong-Joong;Park, Dong-Joo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.253-270
    • /
    • 2013
  • To achieve accurate localization information, complex algorithms that have high computational complexity are usually implemented. In addition, many of these algorithms have been developed to overcome several limitations, e.g., obstruction interference in multi-path and non-line-of-sight (NLOS) environments. However, localization systems those have complex design experience latency when operating multiple mobile nodes occupying various channels and try to compensate for inaccurate distance values. To operate multiple mobile nodes concurrently, we propose a localization system with both low complexity and high accuracy and that is based on a chirp spread spectrum (CSS) radio. The proposed localization system is composed of accurate ranging values that are analyzed by simple linear regression that utilizes a Big-$O(n^2)$ of only a few data points and an algorithm with a self-calibration feature. The performance of the proposed localization system is verified by means of actual experiments. The results show a mean error of about 1 m and multiple mobile node operation in a $100{\times}35m^2$ environment under NLOS condition.

Damage state evaluation of experimental and simulated bolted joints using chaotic ultrasonic waves

  • Fasel, T.R.;Kennel, M.B.;Todd, M.D.;Clayton, E.H.;Park, G.
    • Smart Structures and Systems
    • /
    • v.5 no.4
    • /
    • pp.329-344
    • /
    • 2009
  • Ultrasonic chaotic excitations combined with sensor prediction algorithms have shown the ability to identify incipient damage (loss of preload) in a bolted joint. In this study we examine a physical experiment on a single-bolt aluminum lap joint as well as a three-dimensional physics-based simulation designed to model the behavior of guided ultrasonic waves through a similarly configured joint. A multiple bolt frame structure is also experimentally examined. In the physical experiment each signal is imparted to the structure through a macro-fiber composite (MFC) patch on one side of the lap joint and sensed using an equivalent MFC patch on the opposite side of the joint. The model applies the waveform via direct nodal displacement and 'senses' the resulting displacement using an average of the nodal strain over an area equivalent to the MFC patch. A novel statistical classification feature is developed from information theory concepts of cross-prediction and interdependence. This damage detection algorithm is used to evaluate multiple damage levels and locations.

Developing an integrated software solution for active-sensing SHM

  • Overly, T.G.;Jacobs, L.D.;Farinholt, K.M.;Park, G.;Farrar, C.R.;Flynn, E.B.;Todd, M.D.
    • Smart Structures and Systems
    • /
    • v.5 no.4
    • /
    • pp.457-468
    • /
    • 2009
  • A novel approach for integrating active sensing data interrogation algorithms for structural health monitoring (SHM) applications is presented. These algorithms cover Lamb wave propagation, impedance methods, and sensor diagnostics. Contrary to most active-sensing SHM techniques, which utilize only a single signal processing method for damage identification, a suite of signal processing algorithms are employed and grouped into one package to improve the damage detection capability. A MATLAB-based user interface, referred to as HOPS, was created, which allows the analyst to configure the data acquisition system and display the results from each damage identification algorithm for side-by-side comparison. By grouping a suite of algorithms into one package, this study contributes to and enhances the visibility and interpretation of the active-sensing methods related to damage identification. This paper will discuss the detailed descriptions of the damage identification techniques employed in this software and outline future issues to realize the full potential of this software.

A high-speed complex multiplier based on redundant binary arithmetic (Redundant binary 연산을 이용한 고속 복소수 승산기)

  • 신경욱
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.2
    • /
    • pp.29-37
    • /
    • 1997
  • A new algorithm and parallel architecture for high-speed complex number multiplication is presented, and a prototype chip based on the proposed approach is designed. By employing redundant binary (RB) arithmetic, an N-bit complex number multiplication is simplified to two RB multiplications (i.e., an addition of N RB partial products), which are responsible for real and imaginary parts, respectively. Also, and efficient RB encoding scheme proposed in this paper enables to generate RB partial products without additional hardware and delay overheads compared with binary partial product generation. The proposed approach leads to a highly parallel architecture with regularity and modularity. As a results, it results in much simpler realization and higher performance than the classical method based on real multipliers and adders. As a test vehicle, a prototype 8-b complex number multiplier core has been fabricated using $0.8\mu\textrm{m}$ CMOS technology. It contains 11,500 transistors on the area of about $1.05 \times 1.34 textrm{mm}^2$. The functional and speed test results show that it can safely operate with 200 MHz clock at $V_{DD}=2.5 V$, and consumes about 90mW.

  • PDF

Colourings and the Alexander Polynomial

  • Camacho, Luis;Dionisio, Francisco Miguel;Picken, Roger
    • Kyungpook Mathematical Journal
    • /
    • v.56 no.3
    • /
    • pp.1017-1045
    • /
    • 2016
  • Using a combination of calculational and theoretical approaches, we establish results that relate two knot invariants, the Alexander polynomial, and the number of quandle colourings using any finite linear Alexander quandle. Given such a quandle, specified by two coprime integers n and m, the number of colourings of a knot diagram is given by counting the solutions of a matrix equation of the form AX = 0 mod n, where A is the m-dependent colouring matrix. We devised an algorithm to reduce A to echelon form, and applied this to the colouring matrices for all prime knots with up to 10 crossings, finding just three distinct reduced types. For two of these types, both upper triangular, we found general formulae for the number of colourings. This enables us to prove that in some cases the number of such quandle colourings cannot distinguish knots with the same Alexander polynomial, whilst in other cases knots with the same Alexander polynomial can be distinguished by colourings with a specific quandle. When two knots have different Alexander polynomials, and their reduced colouring matrices are upper triangular, we find a specific quandle for which we prove that it distinguishes them by colourings.

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.