• Title/Summary/Keyword: bipartite graph

Search Result 87, Processing Time 0.025 seconds

Design of an Automatic Synthesis System for Datapaths Based on Multiport Memories (다중포트 메모리를 지원하는 데이터패스 자동 합성 시스템의 설계)

  • 이해동;김용노;황선영
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.7
    • /
    • pp.117-124
    • /
    • 1994
  • In this pape, we propose a graph-theoretic approach for solving the allocation problem for the synthesis of datapaths based on multiport memories. An efficient algorithm is devised by using the weighted bipartite matching algorithm to assign variables to each port of memory modules. The proposed algorithm assigns program variables into a minimum number of multiport memory modules such that usage of memory elements and interconnection cost can be kept minimal. Experimental results show that the proposed algorithm generates the datapaths with fewer registers in memory modules and less interconnection cost for several benchmarks available from the literatures.

  • PDF

A Visualization Tool for Similarity Estimation of Sequence Data (서열 정보의 유사성 검사를 위한 가시화 도구)

  • 황미녕;강영민;조환규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10b
    • /
    • pp.559-561
    • /
    • 2000
  • 현재 활발한 연구가 진행중인 유전자 분석과 같은 분야에서는 유전자 염기 서열과 같은 대규모 서열 정보들에 대한 효과적인 분석기술을 요구하고 있다. 본 논문은 이러한 서열 정보들 사이의 유사도를 측정하고 분석하는 작업을 효과적으로 지원하기 위한 가시화 도구의 개발을 다룬다. 본 논문에서 사용하는 유사도 가시화 기법은 유전자 정보의 유사도 가시화를 위해 제안되었던 시각적 점-행렬 도면(Graphical Dot-Matrix Plots) 기법을 이용하는데, 이 시각적 점-행렬 도면 기법은 비교 대상이 되는 서열 정보의 크기가 커지면 효율적으로 가시화하기가 힘들다는 단점을 가진다. 본 논문은 시각적 점-행렬 도면 기법의 이러한 문제를 해결하기 위해 서열 정보 유사도 비교 결과를 화면의 해상도 내에서 표현할 수 있도록 데이터를 영역별로 분할하고 각 영역별 일치도를 이분 그래프(bipartite graph)의 최대 평면 일치(maximal planar matching)를 이용하여 결정하고 이를 하나의 화소(pixel)로 출력하는 기법을 제안한다.

  • PDF

Expander graphs based on 60/102 NBCA and its application (60/102 NBCA에 기반을 둔 확장그래프들과 그 응용)

  • Kim, Han-Doo;Cho, Sung-Jin;Choi, Un-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.9
    • /
    • pp.1939-1946
    • /
    • 2011
  • Expander graphs are useful in the design and analysis of communication networks. Mukhopadhyay et. al introduced a method to generate a family of expander graphs based on nongroup two predecessor single attractor CA(Cellular Automata). In this paper we propose a method to generate a family of expander graphs based on 60/102 Null boundary CA(NBCA) which is a group CA. The spectral gap generated by our method is larger than that of Mukhopadhyay et. al [12]. As an application we give an algorithm which generate one-way functions whose security lies on the combinatorial properties of our expander graphs. the one-way function using d-regular graph generated by the 60/102 NBCA is based on the Goldreich's construction [5].

A Method for Detecting Program Plagiarism Comparing Class Structure Graphs (클래스 구조 그래프 비교를 통한 프로그램 표절 검사 방법)

  • Kim, Yeoneo;Lee, Yun-Jung;Woo, Gyun
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.37-47
    • /
    • 2013
  • Recently, lots of research results on program comparison have been reported since the code theft become frequent as the increase of code mobility. This paper proposes a plagiarism detection method using class structures. The proposed method constructs a graph representing the referential relationship between the member variables and the methods. This relationship is shown as a bipartite graph and the test for graph isomorphism is applied on the set of graphs to measure the similarity of the programs. In order to measure the effectiveness of this method, an experiment was conducted on the test set, the set of Java source codes submitted as solutions for the programming assignments in Object-Oriented Programming course of Pusan National University in 2012. In order to evaluate the accuracy of the proposed method, the F-measure is compared to those of JPlag and Stigmata. According to the experimental result, the F-measure of the proposed method is higher than those of JPlag and Stigmata by 0.17 and 0.34, respectively.

Automatic Change Detection Based on Areal Feature Matching in Different Network Data-sets (이종의 도로망 데이터 셋에서 면 객체 매칭 기반 변화탐지)

  • Kim, Jiyoung;Huh, Yong;Yu, Kiyun;Kim, Jung Ok
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.31 no.6_1
    • /
    • pp.483-491
    • /
    • 2013
  • By a development of car navigation systems and mobile or positioning technology, it increases interest in location based services, especially pedestrian navigation systems. Updating of digital maps is important because digital maps are mass data and required to short updating cycle. In this paper, we proposed change detection for different network data-sets based on areal feature matching. Prior to change detection, we defined type of updating between different network data-sets. Next, we transformed road lines into areal features(block) that are surrounded by them and calculated a shape similarity between blocks in different data-sets. Blocks that a shape similarity is more than 0.6 are selected candidate block pairs. Secondly, we detected changed-block pairs by bipartite graph clustering or properties of a concave polygon according to types of updating, and calculated Fr$\acute{e}$chet distance between segments within the block or forming it. At this time, road segments of KAIS map that Fr$\acute{e}$chet distance is more than 50 are extracted as updating road features. As a result of accuracy evaluation, a value of detection rate appears high at 0.965. We could thus identify that a proposed method is able to apply to change detection between different network data-sets.

Performance Analysis of Automatic Target Recognition Using Simulated SAR Image (표적 SAR 시뮬레이션 영상을 이용한 식별 성능 분석)

  • Lee, Sumi;Lee, Yun-Kyung;Kim, Sang-Wan
    • Korean Journal of Remote Sensing
    • /
    • v.38 no.3
    • /
    • pp.283-298
    • /
    • 2022
  • As Synthetic Aperture Radar (SAR) image can be acquired regardless of the weather and day or night, it is highly recommended to be used for Automatic Target Recognition (ATR) in the fields of surveillance, reconnaissance, and national security. However, there are some limitations in terms of cost and operation to build various and vast amounts of target images for the SAR-ATR system. Recently, interest in the development of an ATR system based on simulated SAR images using a target model is increasing. Attributed Scattering Center (ASC) matching and template matching mainly used in SAR-ATR are applied to target classification. The method based on ASC matching was developed by World View Vector (WVV) feature reconstruction and Weighted Bipartite Graph Matching (WBGM). The template matching was carried out by calculating the correlation coefficient between two simulated images reconstructed with adjacent points to each other. For the performance analysis of the two proposed methods, the Synthetic and Measured Paired Labeled Experiment (SAMPLE) dataset was used, which has been recently published by the U.S. Defense Advanced Research Projects Agency (DARPA). We conducted experiments under standard operating conditions, partial target occlusion, and random occlusion. The performance of the ASC matching is generally superior to that of the template matching. Under the standard operating condition, the average recognition rate of the ASC matching is 85.1%, and the rate of the template matching is 74.4%. Also, the ASC matching has less performance variation across 10 targets. The ASC matching performed about 10% higher than the template matching according to the amount of target partial occlusion, and even with 60% random occlusion, the recognition rate was 73.4%.

Resource Allocation and EE-SE Tradeoff for H-CRAN with NOMA-Based D2D Communications

  • Wang, Jingpu;Song, Xin;Dong, Li
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1837-1860
    • /
    • 2020
  • We propose a general framework for studying resource allocation problem and the tradeoff between spectral efficiency (SE) and energy efficiency (EE) for downlink traffic in power domain-non-orthogonal multiple access (PD-NOMA) and device to device (D2D) based heterogeneous cloud radio access networks (H-CRANs) under imperfect channel state information (CSI). The aim is jointly optimize radio remote head (RRH) selection, spectrum allocation and power control, which is formulated as a multi-objective optimization (MOO) problem that can be solved with weighted Tchebycheff method. We propose a low-complexity algorithm to solve user association, spectrum allocation and power coordination separately. We first compute the CSI for RRHs. Then we study allocating the cell users (CUs) and D2D groups to different subchannels by constructing a bipartite graph and Hungrarian algorithm. To solve the power control and EE-SE tradeoff problems, we decompose the target function into two subproblems. Then, we utilize successive convex program approach to lower the computational complexity. Moreover, we use Lagrangian method and KKT conditions to find the global optimum with low complexity, and get a fast convergence by subgradient method. Numerical simulation results demonstrate that by using PD-NOMA technique and H-CRAN with D2D communications, the system gets good EE-SE tradeoff performance.

SIGNED TOTAL κ-DOMATIC NUMBERS OF GRAPHS

  • Khodkar, Abdollah;Sheikholeslami, S.M.
    • Journal of the Korean Mathematical Society
    • /
    • v.48 no.3
    • /
    • pp.551-563
    • /
    • 2011
  • Let ${\kappa}$ be a positive integer and let G be a simple graph with vertex set V(G). A function f : V (G) ${\rightarrow}$ {-1, 1} is called a signed total ${\kappa}$-dominating function if ${\sum}_{u{\in}N({\upsilon})}f(u){\geq}{\kappa}$ for each vertex ${\upsilon}{\in}V(G)$. A set ${f_1,f_2,{\ldots},f_d}$ of signed total ${\kappa}$-dominating functions of G with the property that ${\sum}^d_{i=1}f_i({\upsilon}){\leq}1$ for each ${\upsilon}{\in}V(G)$, is called a signed total ${\kappa}$-dominating family (of functions) of G. The maximum number of functions in a signed total ${\kappa}$-dominating family of G is the signed total k-domatic number of G, denoted by $d^t_{kS}$(G). In this note we initiate the study of the signed total k-domatic numbers of graphs and present some sharp upper bounds for this parameter. We also determine the signed total signed total ${\kappa}$-domatic numbers of complete graphs and complete bipartite graphs.

LOCAL AND MEAN k-RAMSEY NUMBERS FOR THE FAMILY OF GRAPHS

  • Su, Zhanjun;Chen, Hongjing;Ding, Ren
    • Journal of applied mathematics & informatics
    • /
    • v.27 no.3_4
    • /
    • pp.909-913
    • /
    • 2009
  • For a family of graphs $\mathcal{H}$ and an integer k, we denote by $R^k(\mathcal{H})$ the corresponding k-Ramsey number, which is defined to be the smallest integer n such that every k-coloring of the edges of $K_n$ contains a monochromatic copy of a graph in $\mathcal{H}$. The local k-Ramsey number $R^k_{loc}(\mathcal{H})$ and the mean k-Ramsey number $R^k_{mean}(\mathcal{H})$ are defined analogously. Let $\mathcal{G}$ be the family of non-bipartite graphs and $T_n$ be the family of all trees on n vertices. In this paper we prove that $R^k_{loc}(\mathcal{G})=R^k_{mean}(\mathcal{G})$, and $R^2(T_n)$ < $R^2_{loc}(T_n)4 = $R^2_{mean}(T_n)$ for all $n\;{\ge}\;3$.

  • PDF

Generalization of Tanner′s Minimum Distance Bounds for LDPC Codes (LDPC 부호 적용을 위한 Tanner의 최소 거리 바운드의 일반화)

  • Shin Min Ho;Kim Joon Sung;Song Hong Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1363-1369
    • /
    • 2004
  • LDPC(Low Density Parity Check) codes are described by bipartite graphs with bit nodes and parity-check nodes. Tanner derived minimum distance bounds of the regular LDPC code in terms of the eigenvalues of the associated adjacency matrix. In this paper we generalize the Tanner's results. We derive minimum distance bounds applicable to both regular and blockwise-irregular LDPC codes. The first bound considers the relation between bit nodes in a minimum-weight codeword, and the second one considers the connectivity between parity nodes adjacent to a minimum-weight codeword. The derived bounds make it possible to describe the distance property of the code in terms of the eigenvalues of the associated matrix.