• Title/Summary/Keyword: Polynomial Time Algorithm

Search Result 331, Processing Time 0.023 seconds

IMPLEMENTATION OF ADAPTIVE WAVELET METHOD FOR ENHANCEMENT OF COMPUTATIONAL EFFICIENCY FOR THREE DIMENSIONAL EULER EQUATION (3차원 오일러 방정식의 계산 효율성 증대를 위한 Adaptive Wavelet 기법의 적용)

  • Jo, D.U.;Park, K.H.;Kang, H.M.;Lee, D.H.
    • Journal of computational fluids engineering
    • /
    • v.19 no.2
    • /
    • pp.58-65
    • /
    • 2014
  • The adaptive wavelet method is studied for the enhancement of computational efficiency of three-dimensional flows. For implementation of the method for three-dimensional Euler equation, wavelet decomposition process is introduced based on the previous two-dimensional adaptive wavelet method. The order of numerical accuracy of an original solver is preserved by applying modified thresholding value. In order to assess the efficiency of the proposed algorithm, the method is applied to the computation of flow field around ONERA-M6 wing in transonic regime with 4th and 6th order interpolating polynomial respectively. Through the application, it is confirmed that the three-dimensional adaptive wavelet method can reduce the computational time while conserving the numerical accuracy of an original solver.

Improvement of ISAR Autofocusing Performance Based on PGA (PGA(Phase Gradient Autofocus)기반 ISAR영상 자동초점기법 성능개선)

  • Kim, Kwan Sung;Yang, Eun Jung;Kim, Chan Hong;Park, Sung Chul
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.5
    • /
    • pp.680-687
    • /
    • 2014
  • PGA(phase gradient autofocus) has been widely used to remove motion induced phase errors in the ISAR(inverse synthetic aperture radar) imaging. The critical process for the processing time and image quality is windowing stage in PGA. In this paper, the new method to determine window size based on polynomial least square approximation is proposed. Moreover, dominant range bins are selected for efficient phase error estimation, which improve image quality and speed up convergence. The simulation results show that the proposed algorithm provides high quality ISAR images while computational efficiency of inherent PGA is retained.

IKPCA-ELM-based Intrusion Detection Method

  • Wang, Hui;Wang, Chengjie;Shen, Zihao;Lin, Dengwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.3076-3092
    • /
    • 2020
  • An IKPCA-ELM-based intrusion detection method is developed to address the problem of the low accuracy and slow speed of intrusion detection caused by redundancies and high dimensions of data in the network. First, in order to reduce the effects of uneven sample distribution and sample attribute differences on the extraction of KPCA features, the sample attribute mean and mean square error are introduced into the Gaussian radial basis function and polynomial kernel function respectively, and the two improved kernel functions are combined to construct a hybrid kernel function. Second, an improved particle swarm optimization (IPSO) algorithm is proposed to determine the optimal hybrid kernel function for improved kernel principal component analysis (IKPCA). Finally, IKPCA is conducted to complete feature extraction, and an extreme learning machine (ELM) is applied to classify common attack type detection. The experimental results demonstrate the effectiveness of the constructed hybrid kernel function. Compared with other intrusion detection methods, IKPCA-ELM not only ensures high accuracy rates, but also reduces the detection time and false alarm rate, especially reducing the false alarm rate of small sample attacks.

Small Base Station Association and Cooperative Receiver Design for HetNets via Distributed SOCP

  • Lu, Li;Wang, Desheng;Zhao, Hongyi;Liu, Yingzhuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5212-5230
    • /
    • 2016
  • How to determine the right number of small base stations to activate in multi-cell uplinks to match traffic from a fixed quantity of K users is an open question. This paper analyses the uplink cooperative that jointly receives base stations activation to explore this question. This paper is different from existing works only consider transmitting power as optimization objective function. The global objective function is formulated as a summation of two terms: transmitting power for data and coordinated overhead for control. Then, the joint base stations activation and beamforming problem is formulated as a mixed integer second order cone optimization. To solve this problem, we develop two polynomial-time distributed methods. Method one is a two-stage solution which activates no more than K small base stations (SBSs). Method two is a heuristic algorithm by dual decomposition to MI-SOCP that activates more SBSs to obtain multiple-antennae diversity gains. Thanks to the parallel computation for each node, our methods are more computationally efficient. The strengths and weaknesses of these two proposed two algorithms are also compared using numerical results.

An Efficient Bit-serial Systolic Multiplier over GF($2^m$) (GF($2^m$)상의 효율적인 비트-시리얼 시스톨릭 곱셈기)

  • Lee Won-Ho;Yoo Kee-Young
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.62-68
    • /
    • 2006
  • The important arithmetic operations over finite fields include multiplication and exponentiation. An exponentiation operation can be implemented using a series of squaring and multiplication operations over GF($2^m$) using the binary method. Hence, it is important to develop a fast algorithm and efficient hardware for multiplication. This paper presents an efficient bit-serial systolic array for MSB-first multiplication in GF($2^m$) based on the polynomial representation. As compared to the related multipliers, the proposed systolic multiplier gains advantages in terms of input-pin and area-time complexity. Furthermore, it has regularity, modularity, and unidirectional data flow, and thus is well suited to VLSI implementation.

On Recovering Erased RSA Private Key Bits

  • Baek, Yoo-Jin
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.3
    • /
    • pp.11-25
    • /
    • 2018
  • While being believed that decrypting any RSA ciphertext is as hard as factorizing the RSA modulus, it was also shown that, if additional information is available, breaking the RSA cryptosystem may be much easier than factoring. For example, Coppersmith showed that, given the 1/2 fraction of the least or the most significant bits of one of two RSA primes, one can factorize the RSA modulus very efficiently, using the lattice-based technique. More recently, introducing the so called cold boot attack, Halderman et al. showed that one can recover cryptographic keys from a decayed DRAM image. And, following up this result, Heninger and Shacham presented a polynomial-time attack which, given 0.27-fraction of the RSA private key of the form (p, q, d, $d_p$, $d_q$), can recover the whole key, provided that the given bits are uniformly distributed. And, based on the work of Heninger and Shacham, this paper presents a different approach for recovering RSA private key bits from decayed key information, under the assumption that some random portion of the private key bits is known. More precisely, we present the algorithm of recovering RSA private key bits from erased key material and elaborate the formula of describing the number of partially-recovered RSA private key candidates in terms of the given erasure rate. Then, the result is justified by some extensive experiments.

The numerical solution of dynamic response of SDOF systems using cubic B-spline polynomial functions

  • Shojaee, S.;Rostami, S.;Moeinadini, A.
    • Structural Engineering and Mechanics
    • /
    • v.38 no.2
    • /
    • pp.211-229
    • /
    • 2011
  • In this paper, we present a new explicit procedure using periodic cubic B-spline interpolation polynomials to solve linear and nonlinear dynamic equation of motion governing single degree of freedom (SDOF) systems. In the proposed approach, a straightforward formulation was derived from the approximation of displacement with B-spline basis in a fluent manner. In this way, there is no need to use a special pre-starting procedure to commence solving the problem. Actually, this method lies in the case of conditionally stable methods. A simple step-by-step algorithm is implemented and presented to calculate dynamic response of SDOF systems. The validity and effectiveness of the proposed method is demonstrated with four examples. The results were compared with those from the numerical methods such as Duhamel integration, Linear Acceleration and also Exact method. The comparison shows that the proposed method is a fast and simple procedure with trivial computational effort and acceptable accuracy exactly like the Linear Acceleration method. But its power point is that its time consumption is notably less than the Linear Acceleration method especially in the nonlinear analysis.

A Pollutant Transport Model by the Forward-Tracking Method (전방추적법에 의한 오염물질의 전송 모델)

    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.10 no.1
    • /
    • pp.37-44
    • /
    • 1998
  • In this study a new hybrid method is developed for solving flow-dominated transport problems accurately and effectively. The method takes the forward-tracking particle method for advection. However, differently from the random-walk Lagrangian approach it solves the diffusion process on the fixed Eulerian grids. Therefore, neither any interpolating algorithm nor a large enough number of particles is required. The method was successfully examined for both cases of instantaneous and continuous sources released at a point. Comparison with a surrounding 5-point Hermite polynomial method (Eulerian-Lagrangian method) and the random-walk pure Lagrangian method shows that the present method is superior in result accuracy and time-saving ability.

  • PDF

SynRM Driving CVT System Using an ARGOPNN with MPSO Control System

  • Lin, Chih-Hong;Chang, Kuo-Tsai
    • Journal of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.771-783
    • /
    • 2019
  • Due to nonlinear-synthetic uncertainty including the total unknown nonlinear load torque, the total parameter variation and the fixed load torque, a synchronous reluctance motor (SynRM) driving a continuously variable transmission (CVT) system causes a lot of nonlinear effects. Linear control methods make it hard to achieve good control performance. To increase the control performance and reduce the influence of nonlinear time-synthetic uncertainty, an admixed recurrent Gegenbauer orthogonal polynomials neural network (ARGOPNN) with a modified particle swarm optimization (MPSO) control system is proposed to achieve better control performance. The ARGOPNN with a MPSO control system is composed of an observer controller, a recurrent Gegenbauer orthogonal polynomial neural network (RGOPNN) controller and a remunerated controller. To insure the stability of the control system, the RGOPNN controller with an adaptive law and the remunerated controller with a reckoned law are derived according to the Lyapunov stability theorem. In addition, the two learning rates of the weights in the RGOPNN are regulating by using the MPSO algorithm to enhance convergence. Finally, three types of experimental results with comparative studies are presented to confirm the usefulness of the proposed ARGOPNN with a MPSO control system.

MORE RELATIONS BETWEEN λ-LABELING AND HAMILTONIAN PATHS WITH EMPHASIS ON LINE GRAPH OF BIPARTITE MULTIGRAPHS

  • Zaker, Manouchehr
    • Bulletin of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.119-139
    • /
    • 2022
  • This paper deals with the λ-labeling and L(2, 1)-coloring of simple graphs. A λ-labeling of a graph G is any labeling of the vertices of G with different labels such that any two adjacent vertices receive labels which differ at least two. Also an L(2, 1)-coloring of G is any labeling of the vertices of G such that any two adjacent vertices receive labels which differ at least two and any two vertices with distance two receive distinct labels. Assume that a partial λ-labeling f is given in a graph G. A general question is whether f can be extended to a λ-labeling of G. We show that the extension is feasible if and only if a Hamiltonian path consistent with some distance constraints exists in the complement of G. Then we consider line graph of bipartite multigraphs and determine the minimum number of labels in L(2, 1)-coloring and λ-labeling of these graphs. In fact we obtain easily computable formulas for the path covering number and the maximum path of the complement of these graphs. We obtain a polynomial time algorithm which generates all Hamiltonian paths in the related graphs. A special case is the Cartesian product graph Kn☐Kn and the generation of λ-squares.