• 제목/요약/키워드: divide and conquer

검색결과 88건 처리시간 0.022초

이항트리의 완전이진트리에 대한 임베딩 (Embedding Binomial Trees in Complete Binary Trees)

  • 윤수만;최정임형석
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 추계종합학술대회 논문집
    • /
    • pp.479-482
    • /
    • 1998
  • Whether a given tree is a subgraph of the interconnection network topology is one of the important problem in parallel computing. Trees are used as the underlying structure for divide and conquer algorithms and provide the solution spaces for NP-complete problems. Complete binary trees are the basic structure among those trees. Binomial trees play an important role in broadcasting messages in parallel networks. If binomial trees can be efficiently embedded in complex binary trees, broadcasting algorithms can be effeciently performed on the interconnection networks. In this paper, we present average dilation 2 embedding of binomial trees in complete binary trees.

  • PDF

완전이진트리의 이항트리에 대한 임베딩 (Embedding Complete binary trees in Binomial trees)

  • 윤수민;최정임형석
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 1998년도 하계종합학술대회논문집
    • /
    • pp.289-292
    • /
    • 1998
  • Trees are the underlying structure for divide-and-conquer algorithms and the graphs that provide the solution spaces for NP-complete problems. Complete binary trees are the basic structure among trees. Therefore, if complete binary trees can be embedded in binomial trees, the algorithms which are provided by complete binary trees can be performed efficiently on the interconnection networks which have binomial trees as their subgraphs or in which binomial trees can be embedded easily. In this paper, we present dilation 2 embedding of complete binary trees in binomial trees.

  • PDF

추이적 행렬을 이용한 패트리 넷 모델의 분석방법에 대한 연구 (A study on the analysis method of Petri Net Models Using the Transitive Matrix)

  • 송유진;이종근
    • 한국시뮬레이션학회논문지
    • /
    • 제10권1호
    • /
    • pp.13-24
    • /
    • 2001
  • We propose a divide-conquer method of Petri nets under the condition of one-boundedness for all the Petri nets. We introduce the P-invariant transitive matrix of Petri nets and relationship between them. The feature of the P-invariant transitive matrix is that each element stands for the transitive relationship between input place and output place through the firing of the enable transition.

  • PDF

Analysis of Petri net models using Transitive Matrix

  • Song, Yu-Jin;Lee, Jong-kun
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2000년도 ITC-CSCC -2
    • /
    • pp.665-668
    • /
    • 2000
  • In this paper, we are focused on the analysis of Petri nets model using the subnet. Specially, we are proposes a divide-conquer method of Petri nets under the condition of one-boundedness for all the Petri nets. The usefulness of the approach is shown by applying the proposed techniques to a illustration model.

  • PDF

Local Similarity based Discriminant Analysis for Face Recognition

  • Xiang, Xinguang;Liu, Fan;Bi, Ye;Wang, Yanfang;Tang, Jinhui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권11호
    • /
    • pp.4502-4518
    • /
    • 2015
  • Fisher linear discriminant analysis (LDA) is one of the most popular projection techniques for feature extraction and has been widely applied in face recognition. However, it cannot be used when encountering the single sample per person problem (SSPP) because the intra-class variations cannot be evaluated. In this paper, we propose a novel method called local similarity based linear discriminant analysis (LS_LDA) to solve this problem. Motivated by the "divide-conquer" strategy, we first divide the face into local blocks, and classify each local block, and then integrate all the classification results to make final decision. To make LDA feasible for SSPP problem, we further divide each block into overlapped patches and assume that these patches are from the same class. To improve the robustness of LS_LDA to outliers, we further propose local similarity based median discriminant analysis (LS_MDA), which uses class median vector to estimate the class population mean in LDA modeling. Experimental results on three popular databases show that our methods not only generalize well SSPP problem but also have strong robustness to expression, illumination, occlusion and time variation.

유한체 $GF(2^n)$에서 낮은 공간복잡도를 가지는 새로운 다중 분할 카라슈바 방법의 병렬 처리 곱셈기 (A New Low Complexity Multi-Segment Karatsuba Parallel Multiplier over $GF(2^n)$)

  • 장남수;한동국;정석원;김창한
    • 전자공학회논문지SC
    • /
    • 제41권1호
    • /
    • pp.33-40
    • /
    • 2004
  • 유한체 $GF(2^n)$에서 두 원소의 곱셈을 수행하는 공간 복잡도가 낮은 병렬 처리 곱셈기의 구현에 있어서 divide-and-conquer 방법은 유용하게 사용된다. 이를 이용한 가장 널리 알려진 알고리듬으로는 카라슈바 (Karatsuba-Ofman) 알고리듬과 다중 분할 카라슈바(Multi-Segment Karatsuba) 알고리듬이 있다. Leo ne은 카라슈바 알고리듬의 최적화된 반복 횟수를 제안하였고, Ernst는 다중 분할 카라슈바 방법을 이용한 일반적이고 확장 가능한 유한체 곱셈기를 제안하였다. 본 논문에서는 Ernst가 제시한 다중 분할 카라슈바 병렬 처리 곱셈기의 복잡도를 제시한다. 또한 기존 방법의 병렬 처리 곱셈기와 시간 복잡도는 같지만 공간 복잡도는 낮은 새로운 다중 분할 카라슈바 방법의 병렬 처리 곱셈기를 제안하며 그에 따른 최적화된 반복 횟수를 제안한다. 나아가서 제안하는 곱셈기가 몇몇 유한체에서 카라슈바 방법의 병렬 처리 곱셈기 보다 공간 복잡도에서 효과적임을 제시한다.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권2호
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

ASRI-FMS/CIM 을 위한 운용 소프트웨어의 구축 (Development of an Operation Software for the ASRI-FMS/CIM)

  • 박찬권;박진우;강석호
    • 산업공학
    • /
    • 제6권2호
    • /
    • pp.53-65
    • /
    • 1993
  • This paper deals with the development of a software module for production planning and scheduling activities of an existing Flexible Machining and Assembly System (FMAS). The Production Planning Module uses the hierarchical and sequential scheme based on "divide and conquer" philosophy. In this module, routes are determined based on the production order, orders are screened, tools are allocated, and order adjustments are executed according to the allocated tools. The Scheduling Module allocates the resources, determines the task priority and the start and completion times of tasks. Re-scheduling can be done to handle unforeseen situations such as lumpy demands and machine breakdowns. Since all modules are integrated with a central database and they interface independently, it is easy to append new modules or update the existing modules. The result of this study is used for operating the real FMAS consisting of a machining cell with 2 domestic NC machines and a part feeding robot, an assembly cell with a conveyor and 3 robots, an inspection cell, an AGV, an AS/RS, and a central control computer.

  • PDF

분산 감독제어기와 부분관측 감독제어기의 비교: CIM Testbed 응용 (A Comparison of Decentralized and Partially Observed Supervisors: Application to a CIM Testbed)

  • 손형일;이석
    • 제어로봇시스템학회논문지
    • /
    • 제14권11호
    • /
    • pp.1155-1164
    • /
    • 2008
  • Supervisory control theory, which was first proposed by Ramadge and Wonahm, is a well-suited control theory for the control of complex systems such as semiconductor manufacturing systems, automobile manufacturing systems, and chemical processes because these are better modeled by discrete event models than by differential or difference equation models at higher levels of abstraction. Moreover, decentralized supervisory control is an efficient method for large complex systems according to the divide-and-conquer principle. Decentralized supervisors cannot observe the events those of which occur only within the other supervisors. Therefore decentralized supervisors can be designed according to supervisory control theory under partial observation. This paper presents a solution and a design procedure of supervisory control problem (SCP) for the case of decentralized control and SCP under partial observation (SCPPO). We apply the proposed design procedure to an experimental CIM Testbed. And we compare and analyze the designed decentralized supervisors and partially observed supervisors.

Proteolytic cleavages of MET: the divide-and-conquer strategy of a receptor tyrosine kinase

  • Fernandes, Marie;Duplaquet, Leslie;Tulasne, David
    • BMB Reports
    • /
    • 제52권4호
    • /
    • pp.239-249
    • /
    • 2019
  • Membrane-anchored full-length MET stimulated by its ligand HGF/SF induces various biological responses, including survival, growth, and invasion. This panel of responses, referred to invasive growth, is required for embryogenesis and tissue regeneration in adults. On the contrary, MET deregulation is associated with tumorigenesis in many kinds of cancer. In addition to its well-documented ligand-stimulated downstream signaling, the receptor can be cleaved by proteases such as secretases, caspases, and calpains. These cleavages are involved either in MET receptor inactivation or, more interestingly, in generating active fragments that can modify cell fate. For instance, MET fragments can promote cell death or invasion. Given a large number of proteases capable of cleaving MET, this receptor appears as a prototype of proteolytic-cleavage-regulated receptor tyrosine kinase. In this review, we describe and discuss the mechanisms and consequences, both physiological and pathological, of MET proteolytic cleavages.