• Title/Summary/Keyword: computer terms

Search Result 3,418, Processing Time 0.026 seconds

English Syntactic Disambiguation Using Parser's Ambiguity Type Information

  • Lee, Jae-Won;Kim, Sung-Dong;Chae, Jin-Seok;Lee, Jong-Woo;Kim, Do-Hyung
    • ETRI Journal
    • /
    • v.25 no.4
    • /
    • pp.219-230
    • /
    • 2003
  • This paper describes a rule-based approach for syntactic disambiguation used by the English sentence parser in E-TRAN 2001, an English-Korean machine translation system. We propose Parser's Ambiguity Type Information (PATI) to automatically identify the types of ambiguities observed in competing candidate trees produced by the parser and synthesize the types into a formal representation. PATI provides an efficient way of encoding knowledge into grammar rules and calculating rule preference scores from a relatively small training corpus. In the overall scoring scheme for sorting the candidate trees, the rule preference scores are combined with other preference functions that are based on statistical information. We compare the enhanced grammar with the initial one in terms of the amount of ambiguity. The experimental results show that the rule preference scores could significantly increase the accuracy of ambiguity resolution.

  • PDF

Non-square colour image scrambling based on two-dimensional Sine-Logistic and Hénon map

  • Zhou, Siqi;Xu, Feng;Ping, Ping;Xie, Zaipeng;Lyu, Xin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.5963-5980
    • /
    • 2017
  • Image scrambling is an important technology in information hiding, where the Arnold transformation is widely used. Several researchers have proposed the application of $H{\acute{e}}non$ map in square image scrambling, and certain improved technologies require scrambling many times to achieve a good effect without resisting chosen-plaintext attack although it can be directly applied to non-square images. This paper presents a non-square image scrambling algorithm, which can resist chosen-plaintext attack based on a chaotic two-dimensional Sine Logistic modulation map and $H{\acute{e}}non$ map (2D-SLHM). Theoretical analysis and experimental results show that the proposed algorithm has advantages in terms of key space, efficiency, scrambling degree, ability of anti-attack and robustness to noise interference.

Group Idea Generation and Simulation (그룹 아이디어 제너레이션을 위한 시뮬레이션 알고리즘의 개발)

  • Jung, J.H.
    • Korean Management Science Review
    • /
    • v.26 no.2
    • /
    • pp.37-59
    • /
    • 2009
  • Electronic brainstorming (EBS) to improve the process and outcomes of group decision making is an artifact of Information Systems legacy. Despite three decades of research with EBS in an effort to become a key resource of organizational performance, its performance when compared to that of nominal is inconclusive because of the recent debate over its usefulness in terms of productivity. Subsequent researchers have directed our attention to the re-examination of cognitive stimulation, which is considered the major benefit in computer-based idea generation, to explain the performance singularity in computer-based groups. While both cognitive and motivational factors that moderate and mediate the group-interaction process remain unexplored, individual differences that are tightly linked to creative behavior have been largely ignored to account for the discrepancy in performance. Since simulations have been widely used in situations where an outcome does not meet the assumptions, the notion of a group simulator and detailed simulation mechanisms are introduced to examine the potential effects of individual differences on the performance of computer-based idea generation groups. In addition, two prior studies that empirically explored cognitive mechanisms with the group simulator are showcased along with six propositions to initiate future research.

On Routing Protocol and Metric for Multiradio Multichannel WMNs: Survey and Design Considerations (Multiradio Multichannel WMNs의 라우팅 프로토콜 및 메트릭: 연구 및 설계 고려 사항)

  • Gao, Hui;Lee, Hyung-Ok;Nam, Ji-Seung
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.01a
    • /
    • pp.105-108
    • /
    • 2012
  • Wireless mesh networks are considered a promising solution to last mile broadband. The unique characteristics of WMN impose unique requirements on designing routing protocols and metrics for WMN. However, existing routing schemes that are designed for single-channel multi-hop wireless networks may lead to inefficient routing paths in multichannel. This paper focuses on the routing problem for multi-radio multichannel WMNs. We list the challenges in designing routing algorithms for multi-radio multichannel WMNs. Then we examine the requirements and considerations for designing routing metrics according to the characteristics of multi-radio multichannel WMNs. Finally we survey and investigate the existing routing metrics in terms of their ability to satisfy these requirements.

  • PDF

Performance Tradeoff Between Control Period and Delay: Lane Keeping Assist System Case Study

  • Cha, Hyun-Jun;Park, Seong-Woo;Jeong, Woo-Hyuk;Kim, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.11
    • /
    • pp.39-46
    • /
    • 2015
  • In this paper, we propose a performance-aware workload model for efficient implementation of control systems. When implementing a control algorithm as an embedded computer system, the control code executes periodically. For such systems, its control performance depends on not only the accuracy of the control algorithm itself but also temporal parameters such as control period and sensing to actuation delay. In this regard, this paper studies the relation between control period and delay by measuring and analyzing the control performance of LKAS (Lane Keeping Assist System) with varying period and delay combinations. Through this experimental study, this paper shows that the two timing parameters, i.e.,control period and delay, has a tradeoff relation in terms of control performance.

Intelligent Pattern Recognition Algorithms based on Dust, Vision and Activity Sensors for User Unusual Event Detection

  • Song, Jung-Eun;Jung, Ju-Ho;Ahn, Jun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.95-103
    • /
    • 2019
  • According to the Statistics Korea in 2017, the 10 leading causes of death contain a cardiac disorder disease, self-injury. In terms of these diseases, urgent assistance is highly required when people do not move for certain period of time. We propose an unusual event detection algorithm to identify abnormal user behaviors using dust, vision and activity sensors in their houses. Vision sensors can detect personalized activity behaviors within the CCTV range in the house in their lives. The pattern algorithm using the dust sensors classifies user movements or dust-generated daily behaviors in indoor areas. The accelerometer sensor in the smartphone is suitable to identify activity behaviors of the mobile users. We evaluated the proposed pattern algorithms and the fusion method in the scenarios.

Identity-based Deniable Authenticated Encryption for E-voting Systems

  • Jin, Chunhua;Chen, Guanhua;Zhao, Jianyang;Gao, Shangbing;Yu, Changhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3299-3315
    • /
    • 2019
  • Deniable authentication (DA) is a protocol in which a receiver can generate an authenticator that is probabilistically indistinguishable from a sender. DA can be applied in many scenarios that require user privacy protection. To enhance the security of DA, in this paper, we construct a new deniable authenticated encryption (DAE) scheme that realizes deniable authentication and confidentiality in a logical single step. Compared with existing approaches, our approach provides proof of security and is efficient in terms of performance analysis. Our scheme is in an identity-based environment; thus, it avoids the public key certificate-based public key infrastructure (PKI). Moreover, we provide an example that shows that our protocol is applicable for e-voting systems.

Performance Analysis of Blockchain Consensus Protocols-A Review

  • Amina Yaqoob;Alma Shamas;Jawad Ibrahim
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.181-192
    • /
    • 2023
  • Blockchain system brought innovation in the area of accounting, credit monitoring and trade secrets. Consensus algorithm that considered the central component of blockchain, significantly influences performance and security of blockchain system. In this paper we presented four consensus protocols specifically as Proof of Work (PoW), Proof of Stake (PoS), Delegated Proof of Stake (DPoS) and Practical Byzantine Fault-Tolerance (PBFT), we also reviewed different security threats that affect the performance of Consensus Protocols and precisely enlist their counter measures. Further we evaluated the performance of these Consensus Protocols in tabular form based on different parameters. At the end we discussed a comprehensive comparison of Consensus protocols in terms of Throughput, Latency and Scalability. We presume that our results can be beneficial to blockchain system and token economists, practitioners and researchers.

SCA Advice System: Ontology Framework for a Computer Curricula Advice System Based on Student Behavior

  • Phrimphrai Wongchomphu;Chutima Beokhaimook
    • Journal of information and communication convergence engineering
    • /
    • v.21 no.4
    • /
    • pp.306-315
    • /
    • 2023
  • This study proposed an SCA advice system. It is an ontology-based recommender that provides advice on appropriate computer curricula based on the behavior of high school students. The three computer curricula at Chiang Mai Rajabhat University include computer science (CS), information technology (IT), and web programming and security (WEB). This study aims to design the ontology framework for an SCA advice system. The system considers three core ontologies: student, computer-curriculum, and advice. After analyzing student behaviors, the behavior types of CS, IT, and WEB were determined to be SB-2, SB-1, and SB-5, respectively. All subjects in these three curricula were analyzed and grouped into seven groups. Their curricula were synthesized in terms of basic skills, basic knowledge, and characteristics. Finally, advice results can be obtained by consolidating the curriculum nature of the CS, IT, and WEB curricula.

Long-Tail Watchdog Timer for High Availability on STM32F4-Based Real-Time Embedded Systems (STM32F4 기반의 실시간 임베디드 시스템의 가동시간 향상을 위한 긴 꼬리 와치독 타이머 기법)

  • Choi, Hayeon;Yun, Jiwan;Park, Seoyeon;Kim, Yesol;Park, Sangsoo
    • Journal of Korea Multimedia Society
    • /
    • v.18 no.6
    • /
    • pp.723-733
    • /
    • 2015
  • High availability is of utmost importance in real-time embedded systems. Temporary failures due to software or hardware faults should not result in a system crash. To achieve high availability, embedded systems typically use a combination of hardware and software techniques. A watchdog timer is a hardware component in embedded microprocessors that can be used to automatically reset the processor if software anomalies are detected. The embedded system relies on a single watchdog timer, however, can be permanently disabled if the timer is not properly configured, e.g. falling into an indefinite loop. STM32F4 provides two different types of watchdog timer in terms of timing accuracy and robustness. In this paper, we propose a hybrid approach, called long-tail watchdog timer, to utilize both timers to achieve self-reliance in embedded systems even though one of timers fails. Experimental results confirm that the proposed approach successfully handles various failure scenarios and present performance comparisons between single watchdog timer and hybrid approach in terms of configuration parameters of watchdog timers in STM32F4, counter value and window size.