• Title/Summary/Keyword: O-Algorithm

Search Result 1,529, Processing Time 0.031 seconds

A Time and Space Efficient Algorithm for VLSI Geometrical Rule Checking (시간 및 공간복잡도가 개선된 VLSI 설계규칙 검증 알고리듬)

  • Jeong, Ja-Choon;Shin, Sung-Yong;Lee, Hyun-Chan;Lee, Chul-Dong;Yu, Young-Uk
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.5
    • /
    • pp.137-144
    • /
    • 1989
  • A new algorithm is presented which efficiently reports minimum width/space violation in a geometric mask pattern. The proposed algorithm solves a sequence of range search problems by employing a plane sweep method. The algorithm runs in O(n log n) time, where n is the number of edges in a mask pattern. Since a lower bound in time conplexity for reporting all minimum width/space violations is ${\Omega}$ (n log n), this algorithm is theoretically optimal within a constant multiplicaive factor. It requires O($n^{0.5}$) space which is very efficient in practice. Moreover, this algorithm, we believe, is easy to implement and practically fast (116.7 seconds for a rectilinear region with 250000 vertices ar VAX 8650.)

  • PDF

A Hierarchical Round-Robin Algorithm for Rate-Dependent Low Latency Bounds in Fixed-Sized Packet Networks (고정크기 패킷 네트워크 환경에서 할당율에 비례한 저지연 한계를 제공하는 계층적 라운드-로빈 알고리즘)

  • Pyun Kihyun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.254-260
    • /
    • 2005
  • In the guaranteed service, a real-time scheduling algorithm must achieve both high level of network utilization and scalable implementation. Here, network utilization indicates the number of admitted real-time sessions. Unfortunately, existing scheduling algorithms either are lack of scalable implementation or can achieve low network utilization. For example, scheduling algorithms based on time-stamps have the problem of O(log N) scheduling complexity where N is the number of sessions. On the contrary, round-robin algorithms require O(1) complexity. but can achieve just a low level of network utilization. In this paper, we propose a scheduling algorithm that can achieve high network utilization without losing scalability. The proposed algorithm is a Hierarchical Round-Robin (H-RR) algorithm that utilizes multiple rounds with different interval sizes. It provides latency bounds similar to those by Packet-by-Packet Generalized Processor Sharing (PGPS) algorithm using a sorted-Priority queue. However, H-RR requires a constant time for implementation.

Approximation Algorithms for a Minimum-Diameter Spanning Tree (최소 지름 신장 트리를 구하는 근사 알고리즘)

  • 신찬수;박상민
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.319-323
    • /
    • 2003
  • Let P be a set of n points in the plane. A minimum spanning tree(MST) is a spanning tree connecting n points of P such that the sum of lengths of edges of the tree is minimized. A diameter of a tree is the maximum length of paths connecting two points of a spanning tree of P. The problem considered in this paper is to compute the spanning tree whose diameter is minimized over all spanning trees of P. We call such tree a minimum-diameter spanning tree(MDST). The best known previous algorithm[3] finds MDST in $O(n^2)$ time. In this paper, we suggest an approximation algorithm to compute a spanning tree whose diameter is no more than 5/4 times that of MDST, running in O(n$^2$log$^2$n) time. This is the first approximation algorithm on the MDST problem.

DNA Sequences Compression using Repeat technique and Selective Encryption using modified Huffman's Technique

  • Syed Mahamud Hossein; Debashis De; Pradeep Kumar Das Mohapatra
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.8
    • /
    • pp.85-104
    • /
    • 2024
  • The DNA (Deoxyribonucleic Acid) database size increases tremendously transmuting from millions to billions in a year. Ergo for storing, probing the DNA database requires efficient lossless compression and encryption algorithm for secure communication. The DNA short pattern repetitions are of paramount characteristics in biological sequences. This algorithm is predicated on probing exact reiterate, substring substitute by corresponding ASCII code and engender a Library file, as a result get cumulating of the data stream. In this technique the data is secured utilizing ASCII value and engendering Library file which acts as a signature. The security of information is the most challenging question with veneration to the communication perspective. The selective encryption method is used for security purpose, this technique is applied on compressed data or in the library file or in both files. The fractional part of a message is encrypted in the selective encryption method keeping the remaining part unchanged, this is very paramount with reference to selective encryption system. The Huffman's algorithm is applied in the output of the first phase reiterate technique, including transmuting the Huffman's tree level position and node position for encryption. The mass demand is the minimum storage requirement and computation cost. Time and space complexity of Repeat algorithm are O(N2) and O(N). Time and space complexity of Huffman algorithm are O(n log n) and O(n log n). The artificial data of equipollent length is additionally tested by this algorithm. This modified Huffman technique reduces the compression rate & ratio. The experimental result shows that only 58% to 100% encryption on actual file is done when above 99% modification is in actual file can be observed and compression rate is 1.97bits/base.

An Algorithm for Self-determing Degrees-of-freedom of Shifting Systems (변속 시스템의 자유도 자율 판단 알고리즘)

  • 임원식;박영일;이장무
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.5 no.6
    • /
    • pp.202-214
    • /
    • 1997
  • In automotive industries, one of major issues is the shifting shock, which is brought out when two clutches are engaged in an automatic transmission. The engagement and disengagement if two clutches means the variation of the D.O.F(degree of freedom) of system. Therefore to analyze the shifting performance, the variation of D.O.F should be considered in detail. Generally, the programs for analyzing the shifting transients have been developed as the problem-dependent codes because the artificial maris were usually used to indicate the change of shifting phase. To develop a software applicable to a general mechanism of transmissions, a self-determining algorithm of D.O.F must be applied. Through the experiences for the last several years, a generalized analysis software of shifting mechanism(so called by POTAS-MSM Version 2.0) has been developed. In this study, some major ideas of the software and the concept for the analysis of shifting characteristics are presented. In addition to that, this paper shows how to self -determine D.O.F of he multi-slipping systems using the stick-slip criterion on a single slipping mechanism. By using this software, the shifting characteristics of a vehicle are analyzed and compared with the experimental results.

  • PDF

3-Dimensional Contour Line Algorithm (3차원 등가속도 처리에 관한 연구)

  • Choe, Heon-O;Lee, Seok-Sun
    • 한국기계연구소 소보
    • /
    • s.20
    • /
    • pp.13-20
    • /
    • 1990
  • An algorithm is presented for 3-dimensional contour lines with a hidden line removal ~technique developed by T.L. Janssen(l). Contour line algorithm on any 3-dimensional plane cutting solid body is also shown. NUFIG(2) algorithm is adopted for searching contour lines. Test problems show well-established contour lines on the surface and also on the cutting plane of the structure.

  • PDF

Time-Efficient Voltage Scheduling Algorithms for Embedded Real-Time Systems with Task Synchronization (태스크 동기화가 필요한 임베디드 실기간 시스템에서 시간-효율적인 전압 스케쥴링 알고리즘)

  • Lee, Jae-Dong;Kim, Jung-Jong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.30-37
    • /
    • 2010
  • Many embedded real - lime systems have adopted processors supported with dynamic voltage scal-ing(DVS) recently. Power is one of the important metrics for Optimization in the design and operation of embedded real-time systems. We can save considerable energy by using slowdown of processor sup-ported with DVS. In this paper, we improved the previous algorithm at a point of view of time complexity to calculate task slowdown factors for an efficient energy consumption in embedded real-time systems with task synchronization. We grasped the properties of the previous algorithm having $O(n^{2})$ time complexity through mathematical analysis and s simulation. Using its properties we proposed the improved algorithms with O(nlogn) and O(n) time complexity which have the same performance as the previous algorithm has.

Minimizing the Diameter by Augmenting an Edge to a Path in a Metric Space (거리공간속 경로 그래프에 간선추가를 통한 지름의 최소화)

  • Kim, Jae-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.1
    • /
    • pp.128-133
    • /
    • 2022
  • This paper deals with the graph in which the weights of edges are given the distances between two end vertices on a metric space. In particular, we will study about a path P with n vertices for these graphs. We obtain a new graph $\bar{P}$ by augmenting an edge to P. Then the length of the shortest path between two vertices on $\bar{P}$ is considered and we focus on the maximum of these lengths. This maximum is called the diameter of the graph $\bar{P}$. We wish to find the augmented edge to minimize the diameter of $\bar{P}$. Especially, for an arbitrary real number λ > 0, we should determine whether the diameter of $\bar{P}$ is less than or equal to λ and we propose an O(n)-time algorithm for this problem, which improves on the time complexity O(nlogn) previously known. Using this decision algorithm, for the length D of P, we provide an O(nlogD)-time algorithm to find the minimum of the diameter of $\bar{P}$.

Sub-Exponential Algorithm for 0/1 Knapsack (0/1 Knapsack에 대한 서브-지수 함수 알고리즘)

  • Rhee, Chung Sei
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.59-64
    • /
    • 2014
  • We investigate $p(n){\cdot}2^{O(\sqrt{n})}$ algorithm for 0/1 knapsack problem where x is the total bit length of a list of sizes of n objects. The algorithm is adaptable of method that achieves a similar complexity for the partition and Subset Sum problem. The method can be applied to other optimization or decision problem based on a list of numerics sizes or weights. 0/1 knapsack problem can be used to solve NP-Complete Problems with pseudo-polynomial time algorithm. We try to apply this technique to bio-informatics problem which has pseudo-polynomial time complexity.

An Eulerian Cycle Algorithm for Chinese Postman Problem

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.7
    • /
    • pp.47-52
    • /
    • 2016
  • This paper introduces an algorithm to construct an Eulerian cycle for Chinese postman problem. The Eulerian cycle is formed only when all vertices in the graph have an even degree. Among available algorithms to the Eulerian cycle problem, Edmonds-Johnson's stands out as the most efficient of its kind. This algorithm constructs a complete graph composed of shortest path between odd-degree vertices and derives the Eulerian cycle through minimum-weight complete matching method, thus running in $O({\mid}V{\mid}^3)$. On the contrary, the algorithm proposed in this paper selects minimum weight edge from edges incidental to each vertex and derives the minimum spanning tree (MST) so as to finally obtain the shortest-path edge of odd-degree vertices. The algorithm not only runs in simple linear time complexity $O({\mid}V{\mid}log{\mid}V{\mid})$ but also obtains the optimal Eulerian cycle, as the implementation results on 4 different graphs concur.