• Title/Summary/Keyword: Select and Delete

Search Result 19, Processing Time 0.024 seconds

Minimum Spanning Tree with Select-and-Delete Algorithm (선택-삭제 최소신장트리 알고리즘)

  • Choi, Myeong-Bok;Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.4
    • /
    • pp.107-116
    • /
    • 2013
  • This algorithm suggests a method in which a minimum spanning tree can be obtained fast by reducing the number of an algorithm execution. The suggested algorithm performs a select-and-delete process. In the select process, firstly, it performs Borůvka's first stage for all the vertices of a graph. Then it re-performs Borůvka's first stage for specific vertices and reduces the population of the edges. In the delete process, it deletes the maximum weight edge if any cycle occurs between the 3 edges of the edges with the reduced population. After, among the remaining edges, applying the valency concept, it gets rid of maximum weight edges. Finally, it eliminates the maximum weight edges if a cycle happens among the vertices with a big valency. The select-and-delete algorithm was applied to 9 various graphs and was evaluated its applicability. The suggested select process is believed to be the vest way to choose the edges, since it showed that it chose less number of big edges from 6 graphs, and only from 3 graphs, comparing to the number of edges that is to be performed when using MST algorithm. When applied the delete process to Kruskal algorithm, the number of performances by Kruskal was less in 6 graphs, but 1 more in each 3 graph. Also, when using the suggested delete process, 1 graph performed only the 1st stage, 5 graphs till 2nd stage, and the remaining till 3rd stage. Finally, the select-and-delete algorithm showed its least number of performances among the MST algorithms.

Polynomial Time Algorithm for Worker Assignment Problem (작업자 배정 문제의 다항시간 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.159-164
    • /
    • 2022
  • The linear assignment problem (LAP) and linear bottleneck assignment problem (LBAP) has been unknown the algorithm to solve the optimal solution within polynomial-time. These problems are classified by NP-hard. Therefore, we can be apply metaheuristic methods or linear programming (LP) software package or Hungarian algorithm (HA) with O(m4) computational complexity. This paper suggests polynomial time algorithm with O(mn)=O(m2),m=n time complexity to LAP and LBAP. The select-delete method is simply applied to LAP, and the delete-select method is used to LBAP. For the experimental data without the unique algorithm can be apply to whole data, the proposed algorithm can be obtain the optimal solutions for whole data.

An Optimal Denormalization Method in Relational Database with Response Time Constraint (관계형 데이터베이스에서 응답시간에 제약이 있는 경우 최적 역정규화 방법)

  • 장영관
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.3
    • /
    • pp.1-9
    • /
    • 2003
  • Databases are central to business information systems and RDBMS is most widely used for the database system. Normalization was designed to control various anomalies (insert, update, delete anomalies). However, normalized database design does not account for the tradeoffs necessary for performance. In this research, I model a database design method considering denormalization of duplicating attributes in order to reduce frequent join processes. This model considers response time for processing each select, insert, update, delete transaction, and for treating anomalies. A branch and bound method is proposed for this model.

Dynamic Compressed Representation of Texts with Rank/Select

  • Lee, Sun-Ho;Park, Kun-Soo
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.1
    • /
    • pp.15-26
    • /
    • 2009
  • Given an n-length text T over a $\sigma$-size alphabet, we present a compressed representation of T which supports retrieving queries of rank/select/access and updating queries of insert/delete. For a measure of compression, we use the empirical entropy H(T), which defines a lower bound nH(T) bits for any algorithm to compress T of n log $\sigma$ bits. Our representation takes this entropy bound of T, i.e., nH(T) $\leq$ n log $\sigma$ bits, and an additional bits less than the text size, i.e., o(n log $\sigma$) + O(n) bits. In compressed space of nH(T) + o(n log $\sigma$) + O(n) bits, our representation supports O(log n) time queries for a log n-size alphabet and its extension provides O(($1+\frac{{\log}\;{\sigma}}{{\log}\;{\log}\;n}$) log n) time queries for a $\sigma$-size alphabet.

Pruning Algorithm for Spokes Puzzle (수레바퀴 살 퍼즐에 관한 전정 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.89-97
    • /
    • 2024
  • The problem of the spokes puzzle(SP), which connects the spokes(edges) required by the wheel axis (hub, vertex) without intersection to form a network in which all the hubs are connected, can be said to be a wasteland of research. For this problem, there is no algorithm that presents a brute-force search or branch-and-bound method that takes exponential time. This paper proposes an algorithm to plot a lattice graph with cross-diagonal lines of m×n for a given SP and to pruning(delete) the surplus edges(spokes). The proposed algorithm is a simple way to select an edge of a hub whose number of edges matches the hub requirement and delete the edge crossing it. If there is no hub with an edge that meets the hub requirement, a strategy was adopted to preferentially delete(pruning) the edge of the hub with the maximum amount of spare. As a result of applying the proposed algorithm to 20 benchmarking experimental data, it was shown that a solution that minimizes the number of trials and errors can be obtained for all problems.

A Performance Analysis on the Scope/Filter of OSI Network Management Protocol (표준망관리 프로토콜의 Scope/Filter에 대한 성능분석)

  • 변옥환;진용옥
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.29A no.7
    • /
    • pp.10-18
    • /
    • 1992
  • In this paper, a simulation model for scope and filter parameters in CMIS/CMIP, OSI management protocol, has been discussed and the suitable scope type was represented by analyzing optimal polling time in network management system, queue size and response time. Scope and filter parameters in MGet, M-Set, M-Action, and =M-Delete services provide a scheme to select some managed objects, and the results are largely varied according to a scope type requested and the outcome of filtering. It has been simulated each scope type and all scope type mixed in a network by varying the offered load and a polling time. On the same time, the response time, queue size of the managing system and a delay time have been measured. As a results, the suitable scope type and polling time enhancing the network performance on the OSI network management is proposed.

  • PDF

Selection of Canonical Factors in Second Order Response Surface Models

  • Park, Sung H.;Seong K. Han
    • Journal of the Korean Statistical Society
    • /
    • v.30 no.4
    • /
    • pp.585-595
    • /
    • 2001
  • A second-order response surface model is often used to approximate the relationship between a response factor and a set of explanatory factors. In this article, we deal with canonical analysis in response surface models. For the interpretation of the geometry of second-order response surface model, standard errors and confidence intervals for the eigenvalues of the second-order coefficient matrix play an important role. If the confidence interval for some eigenvalue includes 0 or the estimate of some eigenvalue is very small (near to 0) with respect to other eigenvalues, then we are able to delete the corresponding canonical factor. We propose a formulation of criterion which can be used to select canonical factors. This criterion is based on the IMSE(=Integrated Mean Squared Error). As a result of this method, we may approximately write the canonical factors as a set of some important explanatory factors.

  • PDF

The Minimum number of Mobile Guards Algorithm for Art Gallery Problem (화랑 문제의 최소 이동 경비원 수 알고리즘)

  • Lee, Sang-Un;Choi, Myeong-Bok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.63-69
    • /
    • 2012
  • Given art gallery P with n vertices, the maximum (sufficient) number of mobile guards is${\lfloor}n/4{\rfloor}$ for simple polygon and${\lfloor}(3n+4)/16{\rfloor}$ for simple orthogonal polygon. However, there is no polynomial time algorithm for minimum number of mobile guards. This paper suggests polynomial time algorithm for the minimum number of mobile guards. Firstly, we obtain the visibility graph which is connected all edges if two vertices can be visible each other. Secondly, we select vertex u with ${\Delta}(G)$ and v with ${\Delta}(G)$ in $N_G(u)$ and delete visible edges from u,v and incident edges. Thirdly, we select $w_i$ in partial graphs and select edges that is the position of mobile guards. This algorithm applies various art galley problems with simple polygons and orthogonal polygons art gallery. As a results, the running time of proposed algorithm is linear time complexity and can be obtain the minimum number of mobile guards.

A Study on Flash Memory Management Techniques (플래시메모리의 관리 기법 연구)

  • Kim, Jeong-Joon;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.143-148
    • /
    • 2017
  • Flash Memory which is light and strong external shock as storage of small electronics like smartphone, digital camera, car black box has been widely used. Since the operation speed of the read operation and the write operation are different from each other, and the flash memory has the feature that it is not possible to overwrite, the delete operation is added to solve these problems. Wear-leveling must also be considered, since the number of erase times of the flash memory is limited. Many studies have been conducted on the substitutional algorithms of flash memory based on these characteristics of recent flash memories. So, to solve the problem that has existing buffer replacement algorithm this thesis divide page into 6 groups and when proposed algorithm select victim page, it consider reference page frequency and page recency.

MenuGen: Menu Planning and Recommended Menu Search System for Promotion of Self Sufficiency of Korean Food (MenuGen: 한국 식량자급률 향상을 위한 인터넷 기반의 권장식단검색 및 식단작성 프로그램)

  • Hong, Sun-Myeong;Bae, Jae-Hak;Kim, Gon;Choe, Jeong-Suk;Kim, Yeong-Ok
    • Journal of the Korean Dietetic Association
    • /
    • v.10 no.3
    • /
    • pp.272-283
    • /
    • 2004
  • This study was conducted to develop menugen program: Korean recommended menu planning and search based on internet to promote self sufficiency of food in Korea. This program manipulate menu and search 432 Korean recommended menus which have been developed in combination of population characteristics of 9 age level, 3 residential areas, 3 income groups, four seasons and male or female. Clients can select the high self sufficiency recommended menu by inputting their age, residental area, income, season and sex in using Menugen program. MenuGen can analyze nutrients and compare with Korean Recommended Allowance about clients' menu based on their age and sex. It can access the food, dish and menu databases. And also client can use MenuGen program for menu planning and analysis nutrients. Client's menu data can be store, delete, modify and print through MenuGen too. It will be able to read the nutrition analysis data of the foods, the dishes and the menu. Therefore it provides convenient user interface to not only users but also dietitians and nutritionists, who take charge of making a menu, and experts in the field of food and nutrition. MenuGen will help the nutrition policy accomplishment and the food self-supply rate improvement of the nation with use of menu drawing up program of internet base.

  • PDF