• Title/Summary/Keyword: explicit bound

Search Result 41, Processing Time 0.03 seconds

STALE REDUCTIONS OF SINGULAR PLANE QUARTICS

  • Kang, Pyung-Lyun
    • Communications of the Korean Mathematical Society
    • /
    • v.9 no.4
    • /
    • pp.905-915
    • /
    • 1994
  • Let $M_g$ be the moduli space of isomorphism classes of genus g smooth curves. It is a quasi-projective variety of dimension 3g - 3, when $g > 2$. It is known that a complete subvariety of $M_g$ has dimension $< g-1 [D]$. In general it is not known whether this bound is rigid. For example, it is not known whether $M_4$ has a complete surface in it. But one knows that there is a complete curve through any given finite points [H]. Recently, an explicit example of a complete curve in moduli space is given in [G-H]. In [G-H] they constructed a complete curve of $M_3$ as an intersection of five hypersurfaces of the Satake compactification of $M_3$. One way to get a complete curve of $M_3$ is to find a complete one dimensional family $p : X \to B$ of plane quartics which gives a nontrivial morphism from the base space B to the moduli space $M_3$. This is because every non-hyperelliptic smooth curve of genus three can be realized as a nonsingular plane quartic and vice versa. This paper has come out from the effort to find such a complete family of plane quartics. Since nonsingular quartics form an affine space some fibers of p must be singular ones. In this paper, due to the semistable reduction theorem [M], we search singular plane quartics which can occur as singular fibers of the family above. We first list all distinct plane quartics in terms of singularities.

  • PDF

Bounded Model Checking BIR Model (BIR 모델의 바운디드 모델 검증)

  • Cho, Min-Taek;Lee, Tae-Hoon;Kwon, Gi-Hwon
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.8
    • /
    • pp.743-751
    • /
    • 2007
  • Model checking has been successfully applied to hardware verification. Software is more subtle than hardware with respect to formal verification due to its infinite state space. Although there are many research activities in this area, bounded model checking is regarded as a promising technique. Bounded model checking uses an upper bound to unroll its model, which is the main advantage of bounded model checking compared to other model checking techniques. In this paper, we applied bounded model checking to verify BIR which is the input model for the model checking tool BOGOR. Some BIR examples are verified with our technique. Experimental results show that bounded model checking is better than explicit model checking provided by BOGOR. This paper presents the formalization of BIR and the encoding algorithm of BIR into CNF.

A Study on the Police Knowledge Management System based on the IntraNet (인트라넷기반의 경찰지식관리시스템에 관한 연구)

  • Choi, Eung-Ryul;Lim, Jae-Kang
    • Korean Security Journal
    • /
    • no.3
    • /
    • pp.273-305
    • /
    • 2000
  • The knowledge substitutes the traditional factors of production - land, labor, and capital - and has become one of the most important new resources. The Internet Knowledge Society is where the knowledge is the major source of development and competition. Now more than 350mi11ion computers are connected to internet servers and the internet users are more than 250mi11ion. The purpose of this paper is to propose some key factors for implementing the Police Knowledge Management System(PKMS) based on Intranet. With Information Technology(IT), the police administrative system will be much more efficient. Introducing the If into the system is critical for restructuring the police administrative system. This paper concludes as follows : ■ Knowledge is divided into tacit and explicit one. Knowledge process is divided into acquisition, accumulation, distribution and creation of knowledge. ■ The IntraNet is composed of Web server, FTP server, electric-mail server, and is constructed security system to safety. ■ All policemen are bound to serve as a new knowledge worker. ■ Police organization needs to operate data management system. The organization also needs to the Police Knowledge Management Center(PKMC). And the Police Chief Knowledge Officers(PCKO) needs to be appointed to manage the PKMC. ■ An information and knowledge infrastructure(various databases are the most important factor) should be established within the organization to promote the self-directed management, the interactive communication, and the learning ability of the members.

  • PDF

Network Coding for Energy-Efficient Distributed Storage System in Wireless Sensor Networks

  • Wang, Lei;Yang, Yuwang;Zhao, Wei;Lu, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.9
    • /
    • pp.2134-2153
    • /
    • 2013
  • A network-coding-based scheme is proposed to improve the energy efficiency of distributed storage systems in WSNs (Wireless Sensor Networks). We mainly focus on two problems: firstly, consideration is given to effective distributed storage technology; secondly, we address how to effectively repair the data in failed storage nodes. For the first problem, we propose a method to obtain a sparse generator matrix to construct network codes, and this sparse generator matrix is proven to be the sparsest. Benefiting from this matrix, the energy consumption required to implement distributed storage is reduced. For the second problem, we designed a network-coding-based iterative repair method, which adequately utilizes the idea of re-encoding at intermediate nodes from network coding theory. Benefiting from the re-encoding, the energy consumption required by data repair is significantly reduced. Moreover, we provide an explicit lower bound of field size required by this scheme, which implies that it can work over a small field and the required computation overhead is very low. The simulation result verifies that the proposed scheme not only reduces the total energy consumption required to implement distributed storage system in WSNs, but also balances energy consumption of the networks.

Flow Labeling Method for Realtime Detection of Heavy Traffic Sources (대량 트래픽 전송자의 실시간 탐지를 위한 플로우 라벨링 방법)

  • Lee, KyungHee;Nyang, DaeHun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.10
    • /
    • pp.421-426
    • /
    • 2013
  • As a greater amount of traffic have been generated on the Internet, it becomes more important to know the size of each flow. Many research studies have been conducted on the traffic measurement, and mostly they have focused on how to increase the measurement accuracy with a limited amount of memory. In this paper, we propose an explicit flow labeling technique that can be used to find out the names of the top flows and to increase the counting upper bound of the existing scheme. The labeling technique is applied to CSM (Counter Sharing Method), the most recent traffic measurement algorithm, and the performance is evaluated using the CAIDA dataset.

3D stability of pile stabilized stepped slopes considering seismic and surcharge loads

  • Long Wang;Meijuan Xu;Wei Hu;Zehang Qian;Qiujing Pan
    • Geomechanics and Engineering
    • /
    • v.32 no.6
    • /
    • pp.639-652
    • /
    • 2023
  • Stepped earth slopes incorporated with anti-slide piles are widely utilized in landslide disaster preventions. Explicit consideration of the three-dimensional (3D) effect in the slope design warrants producing more realistic solutions. A 3D limit analysis of the stability of pile stabilized stepped slopes is performed in light of the kinematic limit analysis theorem. The influences of seismic excitation and surcharge load are both considered from a kinematic perspective. The upper bound solution to the factor of safety is optimized and compared with published solutions, demonstrating the capability and applicability of the proposed method. Comparative studies are performed with respect to the roles of 3D effect, pile location, pile spacing, seismic and surcharge loads in the safety assessments of stepped slopes. The results demonstrate that the stability of pile reinforced stepped slopes differ with that of single stage slopes dramatically. The optimum pile location lies in the upper portion of the slope around Lx/L = 0.9, but may also lies in the shoulder of the bench. The pile reinforcement reaches 10% universally for a looser pile spacing Dc/dp = 5.0, and approaches 70% when the pile spacing reaches Dc/dp = 2.0.

Literature-Based Instruction for Fashion Design Class: Using Alice's Adventures in Wonderland by Lewis Carroll (영문학을 활용한 의상디자인 전공을 위한 영어교육: Alice's Adventures in Wonderland by Lewis Carroll 을 활용한 학습 모형)

  • Kim, Minjung
    • Fashion & Textile Research Journal
    • /
    • v.20 no.3
    • /
    • pp.287-292
    • /
    • 2018
  • The present study proposes a model for literature-based instruction within the context of a fashion design curriculum at a Korean university. The fashion design market continues to grow. The fashion design market now requires more cultural-bound strategies and efficient communication skills. The literature provides authentic resources and is highly relevant to the development of students' culture awareness as well as language awareness. Alice's Adventures in Wonderland written by Lewis Carroll contains various cultural contexts of the Victorian Era. The text provides explicit knowledge of the era depicted in both illustrations and satire languages. This study instructs students to analyze and interpret texts and illustrations so that they can engage critically and analytically in reading text to increase culture awareness and language awareness. The integration of literature and fashion design can provide students an opportunity to explore language choice and acquire refined knowledge of the target culture. Along with the text, illustrations in the literature provoke student's imaginative and creative thinking skills. Students can think and discuss many issues that deal with Victorian values and reinforce creative thinking skills. In the final stage, students can design fashion inspired by Victorian values and present their own designs using the acquired languages. This eventually leads students to adapt to a new notion for the fashion market and become competent communicators in the fashion world.

An Extensible Transaction Model for Real-Time Data Processing (실시간 데이타 처리를 위한 확장 가능한 트랜잭션 모델에 관한 연구)

  • 문승진
    • Journal of Internet Computing and Services
    • /
    • v.1 no.2
    • /
    • pp.11-18
    • /
    • 2000
  • In this paper we present a new extensible model based upon the concept of subtransactions in real-time transaction systems. The nested transaction model originally proposed by J. Moss is extended for real-time uniprocessor transaction systems by adding explicit timing constraints. Based upon the model, an integrated concurrency control and scheduling algorithm is developed, that not only guarantees timing constraints of a set of real-time transactions but also maintains consistency of the database. The algorithm is based on the priority ceiling protocol of Sha et al. We prove that the Real-Time Nested Priority Ceiling Protocol prevents unbounded blocking and deadlock, and maintains the serializability of a set of real-time transactions. We use the upper bound on the duration that a transaction can be blocked to show that it is possible to analyze the schedulability of a transaction set using rate-monotonic priority assignment. This work is viewed as a step toward multiprocessor and distributed real-time nested transaction systems. Also, it is possible to be extended to include the real-time multimedia transactions in the emerging web-based database application areas.

  • PDF

ON THE SUFFICIENT CONDITION FOR THE LINEARIZED APPROXIMATION OF THE B$\"{E}$NARD CONVECTION PROBLEM

  • Song, Jong-Chul;Jeon, Chang-Ho
    • Bulletin of the Korean Mathematical Society
    • /
    • v.29 no.1
    • /
    • pp.125-135
    • /
    • 1992
  • In various viscus flow problems it has been the custom to replace the convective derivative by the ordinary partial derivative in problems for which the data are small. In this paper we consider the Benard Convection problem with small data and compare the solution of this problem (assumed to exist) with that of the linearized system resulting from dropping the nonlinear terms in the expression for the convective derivative. The objective of the present work is to derive an estimate for the error introduced in neglecting the convective inertia terms. In fact, we derive an explicit bound for the L$_{2}$ error. Indeed, if the initial data are O(.epsilon.) where .epsilon. << 1, and the Rayleigh number is sufficiently small, we show that this error is bounded by the product of a term of O(.epsilon.$^{2}$) times a decaying exponential in time. The results of the present paper then give a justification for linearizing the Benard Convection problem. We remark that although our results are derived for classical solutions, extensions to appropriately defined weak solutions are obvious. Throughout this paper we will make use of a comma to denote partial differentiation and adopt the summation convention of summing over repeated indices (in a term of an expression) from one to three. As reference to work of continuous dependence on modelling and initial data, we mention the papers of Payne and Sather [8], Ames [2] Adelson [1], Bennett [3], Payne et al. [9], and Song [11,12,13,14]. Also, a similar analysis of a micropolar fluid problem backward in time (an ill-posed problem) was given by Payne and Straughan [10] and Payne [7].

  • PDF

Study on Peridynamic Interlayer Modeling for Multilayered Structures (가상 절점을 이용한 적층 구조물의 페리다이나믹 층간 결합 모델링 검토)

  • Ahn, Tae Sik;Ha, Youn Doh
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.30 no.5
    • /
    • pp.389-396
    • /
    • 2017
  • Peridynamics has been widely used in the dynamic fracture analysis of brittle materials. Recently, various crack patterns(compact region, floret, Hertz-type crack, etc.) of multilayered glass structures in experiments(Bless et al. 2010) were implemented with a bond-based peridynamic simulation(Bobaru et al.. 2012). The actual glass layers are bound with thin elastic interlayer material while the interlayer is missing from the peridynamic model used in the previous numerical study. In this study, the peridynamic interlayer modeling for the multilayered structures is proposed. It requires enormous computational time and memory to explicitly model very thin interlayer materials. Instead of explicit modeling, fictitious peridynamic particles are introduced for modeling interlayer materials. The computational efficiency and accuracy of the proposed peridynamic interlayer model are verified through numerical tests. Furthermore, preventing penetration scheme based on short-range interaction force is employed for the multilayered structure under compression and verified through parametric tests.