• Title/Summary/Keyword: computer algorithms

Search Result 3,790, Processing Time 0.037 seconds

ON AN EXPANSION OF NONDETERMINISTIC FINITE AUTOMATA

  • Melnikov, Boris
    • Journal of applied mathematics & informatics
    • /
    • v.24 no.1_2
    • /
    • pp.155-165
    • /
    • 2007
  • We consider a possible generalization of nondeterministic finite automata. The goals of this consideration are: to apply some obtained algorithms for various problems of minimization of classical nondeterministic automata; to use such automata for describing practical anytime algorithms for the same problems of minimization; to simplify some proofs for algorithms of simplification for usual nondeterministic automata.

Adaptive Spatio-temporal Decorrelation : Application to Multichannel Blind Deconvolution

  • Hong, Heon-Seok;Choi, Seung-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.753-756
    • /
    • 2000
  • In this paper we present and compare two different spatio-temporal decorrelation learning algorithms for updating the weights of a linear feedforward network with FIR synapses (MIMO FIR filter). Both standard gradient and the natural gradient are employed to derive the spatio-temporal decorrelation algorithms. These two algorithms are applied to multichannel blind deconvolution task and their performance is compared. The rigorous derivation of algorithms and computer simulation results are presented.

  • PDF

Popular Object detection algorithms in deep learning (딥러닝을 이용한 객체 검출 알고리즘)

  • Kang, Dongyeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.427-430
    • /
    • 2019
  • Object detection is applied in various field. Autonomous driving, surveillance, OCR(optical character recognition) and aerial image etc. We will look at the algorithms that are using to object detect. These algorithms are divided into two methods. The one is R-CNN algorithms [2], [5], [6] which based on region proposal. The other is YOLO [7] and SSD [8] which are one stage object detector based on regression/classification.

Cell to Cell Interference Cancellation Algorithms in Multi level cell Flash memeory (MLC 플래시 메모리에서의 셀간 간섭 제거 알고리즘)

  • Jeon, Myeong-Woon;Kim, Kyung-Chul;Shin, Beom-Ju;Lee, Jung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.12
    • /
    • pp.8-16
    • /
    • 2010
  • NAND multilevel cell (MLC) flash memory is widely issued because it can increase the capability of storage by storing two or more bits to a single cell. However if a number of levels in a cell increases, some physical features like cell to cell interference result cell voltage shift and it is known that a VT shift is unidirectional. To reduce errors by the effects, we can consider error correcting codes(ECC) or signal processing methods. We focus signal processing methods for the cell to cell interference voltage shift effects and propose the algorithms which reduce the effects of the voltage shift by estimating it and making level read voltages be adaptive. These new algorithms can be applied with ECC at the same time, therefore these algorithms are efficient for MLC error correcting ability. We show the bit error rate simulation results of the algorithms and compare the performance of the algorithms.

Selection of Optimal Face Detection Algorithms by Fuzzy Inference (퍼지추론을 이용한 최적의 얼굴검출 알고리즘 선택기법)

  • Jang, Dae-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.1
    • /
    • pp.71-80
    • /
    • 2011
  • This paper provides a novel approach for developers to use face detection techniques for their applications easily without special knowledge by selecting optimal face detection algorithms based on fuzzy inference. The purpose of this paper is to come up with a high-level system for face detection based on fuzzy inference with which users can develop systems easily and even without specific knowledge on face detection theories and algorithms. Important conditions are firstly considered to categorize the large problem space of face detection. The conditions identified here are then represented as expressions so that developers can use them to express various problems. The expressed conditions and available face detection algorithms constitute the fuzzy inference rules and the Fuzzy Interpreter is constructed based on the rules. Once the conditions are expressed by developers, the Fuzzy Interpreter proposed take the role to inference the conditions and find and organize the optimal algorithms to solve the represented problem with corresponding conditions. A proof-of-concept is implemented and tested compared to conventional algorithms to show the performance of the proposed approach.

A Systematic Literature Review on Security Challenges In Image Encryption Algorithms for Medical Images

  • Almalki, Nora;Alsuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.75-82
    • /
    • 2022
  • Medical data is one of the data that must be kept in safe containers, far from intrusion, viewing and modification. With the technological developments in hospital systems and the use of cloud computing, it has become necessary to save, encrypt and even hide data from the eyes of attackers. Medical data includes medical images, whether they are x-ray images of patients or others, or even documents that have been saved in the image format. In this review, we review the latest research and the latest tools and algorithms that are used to protect, encrypt and hide these images, and discuss the most important challenges facing these areas.

Computer Architecture Execution Time Optimization Using Swarm in Machine Learning

  • Sarah AlBarakati;Sally AlQarni;Rehab K. Qarout;Kaouther Laabidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.49-56
    • /
    • 2023
  • Computer architecture serves as a link between application requirements and underlying technology capabilities such as technical, mathematical, medical, and business applications' computational and storage demands are constantly increasing. Machine learning these days grown and used in many fields and it performed better than traditional computing in applications that need to be implemented by using mathematical algorithms. A mathematical algorithm requires more extensive and quicker calculations, higher computer architecture specification, and takes longer execution time. Therefore, there is a need to improve the use of computer hardware such as CPU, memory, etc. optimization has a main role to reduce the execution time and improve the utilization of computer recourses. And for the importance of execution time in implementing machine learning supervised module linear regression, in this paper we focus on optimizing machine learning algorithms, for this purpose we write a (Diabetes prediction program) and applying on it a Practical Swarm Optimization (PSO) to reduce the execution time and improve the utilization of computer resources. Finally, a massive improvement in execution time were observed.

User Bias Drift Social Recommendation Algorithm based on Metric Learning

  • Zhao, Jianli;Li, Tingting;Yang, Shangcheng;Li, Hao;Chai, Baobao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.3798-3814
    • /
    • 2022
  • Social recommendation algorithm can alleviate data sparsity and cold start problems in recommendation system by integrated social information. Among them, matrix-based decomposition algorithms are the most widely used and studied. Such algorithms use dot product operations to calculate the similarity between users and items, which ignores user's potential preferences, reduces algorithms' recommendation accuracy. This deficiency can be avoided by a metric learning-based social recommendation algorithm, which learns the distance between user embedding vectors and item embedding vectors instead of vector dot-product operations. However, previous works provide no theoretical explanation for its plausibility. Moreover, most works focus on the indirect impact of social friends on user's preferences, ignoring the direct impact on user's rating preferences, which is the influence of user rating preferences. To solve these problems, this study proposes a user bias drift social recommendation algorithm based on metric learning (BDML). The main work of this paper is as follows: (1) the process of introducing metric learning in the social recommendation scenario is introduced in the form of equations, and explained the reason why metric learning can replace the click operation; (2) a new user bias is constructed to simultaneously model the impact of social relationships on user's ratings preferences and user's preferences; Experimental results on two datasets show that the BDML algorithm proposed in this study has better recommendation accuracy compared with other comparison algorithms, and will be able to guarantee the recommendation effect in a more sparse dataset.

Personalized Mentor/Mentee Recommendation Algorithms for Matching in e-Mentoring Systems (e-멘토링 시스템에서 매칭을 위한 개인선호도기반 멘토/멘티 추천 알고리즘)

  • Jin, Heui-Lan;Park, Chan-Jung
    • The Journal of Korean Association of Computer Education
    • /
    • v.11 no.1
    • /
    • pp.11-21
    • /
    • 2008
  • In advance of Knowledge Information Society, mentoring is becoming an efficient method for developing and managing human resources. There are several factors to improve the effect of mentoring. Among them, a matching mechanism that connects a mentee and a mentor is the most important in mentoring. In the existing e-mentoring systems, administrators rarely consider personal data. They match suitable mentors for mentees in a mandatory way, which reflects bad effects in the e-mentoring. In this paper, we propose new recommendation algorithms for matching by analyzing personal preferences for secondary school students to improve the effects of the mentoring. In addition, we compare our algorithms with the existing algorithms in terms of elaborateness, accordance, and diversity in order to prove the effectiveness of the proposed algorithms.

  • PDF

Design and Implementation of Multi-Gigabit Packet Receiver Algorithms based on ECMA Standard (ECMA 표준에 기반한 Multi-Gigabit Packet 수신기 알고리듬 설계 및 구현)

  • Lee, Yong-Wook;Oh, Wang-Rok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.3
    • /
    • pp.26-31
    • /
    • 2009
  • In this paper, we propose the receiver algorithms suitable for the ECMA standard proposed for multi-gigabit packet transmission in 60 GHz band. In the ECMA standard, various modulation schemes are used for system flexibility. Hence, it is crucial to develop receiver algorithms supporting various modulation schemes with an uniform hardware structure. In this paper, we propose the receiver algorithms supporting DBPSK, DQPSK and OOK modulation schemes simultaneously. The proposed algorithms are not only hardware efficient but also support various modulation schemes with an uniform hardware structure.