• Title/Summary/Keyword: analysis and computation

Search Result 2,240, Processing Time 0.032 seconds

Efficient and Privacy-Preserving Near-Duplicate Detection in Cloud Computing (클라우드 환경에서 검색 효율성 개선과 프라이버시를 보장하는 유사 중복 검출 기법)

  • Hahn, Changhee;Shin, Hyung June;Hur, Junbeom
    • Journal of KIISE
    • /
    • v.44 no.10
    • /
    • pp.1112-1123
    • /
    • 2017
  • As content providers further offload content-centric services to the cloud, data retrieval over the cloud typically results in many redundant items because there is a prevalent near-duplication of content on the Internet. Simply fetching all data from the cloud severely degrades efficiency in terms of resource utilization and bandwidth, and data can be encrypted by multiple content providers under different keys to preserve privacy. Thus, locating near-duplicate data in a privacy-preserving way is highly dependent on the ability to deduplicate redundant search results and returns best matches without decrypting data. To this end, we propose an efficient near-duplicate detection scheme for encrypted data in the cloud. Our scheme has the following benefits. First, a single query is enough to locate near-duplicate data even if they are encrypted under different keys of multiple content providers. Second, storage, computation and communication costs are alleviated compared to existing schemes, while achieving the same level of search accuracy. Third, scalability is significantly improved as a result of a novel and efficient two-round detection to locate near-duplicate candidates over large quantities of data in the cloud. An experimental analysis with real-world data demonstrates the applicability of the proposed scheme to a practical cloud system. Last, the proposed scheme is an average of 70.6% faster than an existing scheme.

A Study on the application of Critical Rainfall Duration for the Estimation of Design Flood (설계홍수량 산정에 따른 임계지속시간의 적용성에 관한 연구)

  • Chang, Seong Mo;Kang, In Joo;Lee, Eun Tae
    • Journal of Wetlands Research
    • /
    • v.6 no.3
    • /
    • pp.119-126
    • /
    • 2004
  • In recent, the critical rainfall duration concept is widely used but we do not have understandable criteria yet. However, the critical rainfall duration is usually calculated considering concentration time, runoff model using effective rainfall, and unit hydrograph for the estimation of design flood. This study is to derive the regression equations between the critical rainfall duration and hydrologic components such as the basin area, slope, length, CN, and so on. We use a GIS tool which is called the ArcView for the estimation of hydrologic components and the HEC-1 module which is provided in WMS model is used for the runoff computation. As the results, the basin area, basin slope, and basin length had a great influence on the estimations of peak runoff and critical rainfall duration. We also investigated the sensitivities for the peak runoff and critical duration of rainfall from the correlation analysis for the involved components in the runoff estimation.

  • PDF

Analysis and solution to the phase concentration and DC-like component of correlation result in Daejeon correlator (대전 상관기의 상관 결과에 나타난 유사 DC 성분과 위상 집중 현상에 대한 원인 분석과 해결 방법)

  • Roh, Duk-Gyoo;Oh, Se-Jin;Yeom, Jae-Hwan;Oh, Chung-Sik;Jung, Jin-Seung;Chung, Dong-Kyu;Yun, Young-Joo;Oyama, Tomoaki;Ozeki, Kensuke;Onuki, Hirofumi
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.3
    • /
    • pp.191-204
    • /
    • 2013
  • In this paper, we investigated the correlation outputs of Daejeon correlator at the viewpoints of the buffer memory setting related to the fine delay tracking and the under/overflow issue in FFT modules, in order to eliminate DC-like component and phase concentration to 0 degree. As the ring buffer memory is being used for the fine delay tracking, the DC-like component in correlation outputs is generated by improper setting of data read/write address, and then that address setting method is modified to exclude a polluted FFT segment in correlation processing when crossing the port/stream boundary. The phase concentration to 0 degree at beginning of bandpass is caused by inadequate scaling factors, which may be the origins of under/overflow occurred at internal computation of FFT stage. With the revised method of the ring buffer memory setting and the scaling factors in FFT, we could obtain higher signal-to-noise ratio and flux density, compared to the previous method, through the correlation processing of true observational data.

Effect of Ground Boundary Condition on Evaluation of Blast Resistance Performance of Precast Arch Structures (지반경계조건이 프리캐스트 아치구조물의 폭발저항성능 평가에 미치는 영향)

  • Lee, Jungwhee;Choi, Keunki;Kim, Dongseok
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.32 no.5
    • /
    • pp.287-296
    • /
    • 2019
  • In this study, the effect of ground boundary conditions on the evaluation of blast resistance performance of precast arch structures was evaluated by a numerical analysis method. Two types of boundary conditions, namely, fixed boundary conditions and a perfectly matched layer (PML) were applied to numerical models. Blast loads that were much higher than the design load of the target structure were applied to compare the effects of the boundary conditions. The distribution and path of the ground explosion pressure, structural displacement, fracture of concrete, stress of concrete, and reinforcing bars were compared according to the ground boundary condition settings. As a result, the reflecting pressure shock wave at the ground boundaries could be effectively eliminated using PML elements; furthermore, the displacement of the foundation was reduced. However, no distinct difference could be observed in the overall structural behavior including the fracture and stress of the concrete and rebar. Therefore, when blast simulations are performed in the design of protective structures, it is rational to apply the fixed boundary condition on the ground boundaries as conservative design results can be achieved with relatively short computation times.

Estimation of Harbor Operating Ratio Based on Moored Ship Motion (계류선박의 동요에 기초한 항만가동률 산정)

  • Kwak, Moonsu;Chung, Jaewan;Ahn, Sungphil;Pyun, Chongkun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.6B
    • /
    • pp.651-660
    • /
    • 2006
  • Although a harbor may be constructed with calmness in harbor in mind, which satisfies the design standard, it is frequently reported that the motion of moored ships disrupt the cargo handling. This is because of current design standard, which only deals with the wave height in the decision making process of cargo handling, and, now, a new kind of estimation method of operating ratio for calmness based on the motion of moored ship is in need. In this research, a computational method that analyses the harbor operation rate in harbor was put forward by considering the relation of allowable quantity of motion for cargo handling and the computation of the motion of moored ship at wharf by using moored ship motion analysis model. Here, a new estimetion method was applied at Onsan harbor, and it was compared with the current estimation method, and, then, the difference between the two methods was showed. The harbor operating ratio gained by a new method was dropped by 2~11% at ENE and NE directions when it was compared with the operating ratio based on the current design standard. However, when a harbor structure layout is to be designed, a harbor operating ratio test according to the wave height and a harbor operation rate test, which considers the motion of moored ship, are to be run side by side at a harbor designing process.

kNN Query Processing Algorithm based on the Encrypted Index for Hiding Data Access Patterns (데이터 접근 패턴 은닉을 지원하는 암호화 인덱스 기반 kNN 질의처리 알고리즘)

  • Kim, Hyeong-Il;Kim, Hyeong-Jin;Shin, Youngsung;Chang, Jae-woo
    • Journal of KIISE
    • /
    • v.43 no.12
    • /
    • pp.1437-1457
    • /
    • 2016
  • In outsourced databases, the cloud provides an authorized user with querying services on the outsourced database. However, sensitive data, such as financial or medical records, should be encrypted before being outsourced to the cloud. Meanwhile, k-Nearest Neighbor (kNN) query is the typical query type which is widely used in many fields and the result of the kNN query is closely related to the interest and preference of the user. Therefore, studies on secure kNN query processing algorithms that preserve both the data privacy and the query privacy have been proposed. However, existing algorithms either suffer from high computation cost or leak data access patterns because retrieved index nodes and query results are disclosed. To solve these problems, in this paper we propose a new kNN query processing algorithm on the encrypted database. Our algorithm preserves both data privacy and query privacy. It also hides data access patterns while supporting efficient query processing. To achieve this, we devise an encrypted index search scheme which can perform data filtering without revealing data access patterns. Through the performance analysis, we verify that our proposed algorithm shows better performance than the existing algorithms in terms of query processing times.

Analysis of Non-Point Source Pollution Discharge Characteristics in Leisure Facilities Areas for Pattern Classification (패턴분류를 위한 위락시설지역의 비점오염원 유출특성분석)

  • Kim, Yong-Gu;Jin, Young-Hoon;Park, Sung-Chun;Kim, Jung-Min
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.12
    • /
    • pp.1029-1038
    • /
    • 2010
  • In meteorology Korea has 2/3 of rain of annual total rainfall at the month of Jun through Sept and it has possibility to have serious flood damage because geographically it is composed of mountainous area with steep slope which account for 70% of its country. Also, the increase of impervious layer due to industrialization and urbanization causes direct runoff, which deteriorates contamination of rivers by moving the contaminated material on the surface at the beginning of rain. In particular, the area of leisure facilities needs the management of water quality absolutely because dense population requires space of park function and place to relax and increases moving capability of non-point pollution source. For disposition of rainfall & runoff, the standard of initial rainfall, which is to be used for the computation of disposition volume, is significant factors for the runoff study of non-point pollution source, Until now, a great deal of study has been done by many researchers. However, it is the current reality that the characteristics of runoff varies according to land protection comprising river basin and the standard of initial rainfall by each researcher is not clearly defined yet. Therefore, in this research, it is suggested that, with the introduction of SOM (Self-Organizing Map), the standard of initial rainfall be determined after analyzing each sectional data by executing pattern classification about runoff and water quality data measured at the test river basin for this research.

Characterization of Domestic Well Intrusion Events for the Safety Assessment of the Geological Disposal System (심지층 처분시스템의 안전성평가를 위한 국내 우물침입 발생 특성 평가)

  • Kim, Jung-Woo;Cho, Dong-Keun;Ko, Nak-Youl;Jeong, Jongtae
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2015
  • In the safety assessment of the geological disposal system of the radioactive wastes, the abnormal scenarios, in which the system is impacted by the abnormal events, need to be considered in addition to the reference scenario. In this study, characterization and prediction of well intrusion as one of the abnormal events which will impact the disposal system were conducted probabilistically and statistically for the safety assessment. The domestic well development data were analyzed, and the prediction methodologies of the well intrusion were suggested with a computation example. From the results, the annual well development rate per unit area in Korea was about 0.8 well/yr/km2 in the conservative point of view. Considering the area of the overall disposal system which is about 1.5 km2, the annual well development rate within the disposal system could be 1.2 well/yr. That is, it could be expected that more than one well would be installed within the disposal system every year after the institutional management period. From the statistical analysis, the probabilistic distribution of the well depth followed the log-normal distribution with 3.0363 m of mean value and 1.1467 m of standard deviation. This study will be followed by the study about the impacts of the well intrusion on the geological disposal system, and the both studies will contribute to the increased reliability of safety assessment.

Performance Analysis of STBC System Combined with Convolution Code fot Improvement of Transmission Reliability (전송신뢰성의 향상을 위해 STBC에 컨볼루션 코드를 연계한 시스템의 성능분석)

  • Shin, Hyun-Jun;Kang, Chul-Gyu;Oh, Chang-Heon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1068-1074
    • /
    • 2011
  • In this paper, the proposed scheme is STBC(space-time block codes) system combined with convolution code which is the most popular channel coding to ensure the reliability of data transmission for a high data rate wireless communication. The STBC is one of MIMO(multi-input multi-output) techniques. In addition, this scheme uses a modified viterbi algorithm in order to get a high system gain when data is transmitted. Because we combine STBC and convolution code, the proposed scheme has a little high quantity of computation but it can get a maximal diversity gain of STBC and a high coding gain of convolution code at the same time. Unlike existing viterbi docoding algorithm using Hamming distance in order to calculate branch matrix, the modified viterbi algorithm uses Euclidean distance value between received symbol and reference symbol. Simulation results show that the modified viterbi algorithm improved gain 7.5 dB on STBC 2Tx-2Rx at $BER=10^{-2}$. Therefore the proposed scheme using STBC combined with convolution code can improve the transmission reliability and transmission efficiency.

The Comparison of Various Turbulence Models of the Flow around a Wall Mounted Square Cylinder (벽면에 부착된 사각 실린더 주변 유동에 대한 난류모델 비교연구)

  • Bae, Jun-Young;Song, Gi-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.4
    • /
    • pp.419-428
    • /
    • 2020
  • The flow past a wall mounted square cylinder, a typical and basic shape of building, bridge or offshore structure, was simulated using URANS computation through adoption of three turbulence models, namely, the k-ε model, k-ω model, and the v2-f model. It is well known that this flow is naturally unstable due to the Karman vortex shedding and exhibits a complex flow structure in the wake region. The mean flow field including velocity profiles and the dominant frequency of flow oscillation that was from the simulations discussed earlier were compared with the experimental data observed by Wang et al. (2004; 2006). Based on these comparisons it was found that the v2-f model is most accurate for the URANS simulation; moreover, the k-ω model is also acceptable. However, the k-ε model was found to be unsuitable in this case. Therefore, v2-f model is proved to be an excellent choice for the analysis of flow with massive separation. Therefore, it is expected to be used in future by studies aiming to control the flow separation.