• Title/Summary/Keyword: information routine

Search Result 388, Processing Time 0.023 seconds

GPGPU Acceleration of SAT Algorithm with Propagation Routine Parallelization (전달 루틴의 병렬화를 통한 SAT 알고리즘의 GPGPU 가속화)

  • Kang, Hyeong-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1919-1926
    • /
    • 2016
  • Because of the enormous processing ability, General-Purpose Graphics Processing Unit(GPGPU) has been applied to many fields including electronics design automation. The SAT algorithm is one of the core algorithm in many electronics design automation tools. There has been some efforts to apply GPGPU to the SAT algorithm, but it is difficult to parallelize the SAT algorithm because of its characteristics. In this paper, I applied GPGPU to the SAT algorithm by parallelizing the propagation routine that is relatively suitable to parallel processing. On the basis of the similarity of the propagation routine to the sparse matrix multiplication, the data structure for the SAT problem is constituted, and the parallel propagation routine is described. To prevent data loss between paralllel threads, atomic operations are exploited. The experimental results for some benchmark SAT problems show that the proposed algorithm is superior to the previous GPGPU-based SAT solver.

Robust Scheduling based on Daily Activity Learning by using Markov Decision Process and Inverse Reinforcement Learning (강건한 스케줄링을 위한 마코프 의사결정 프로세스 추론 및 역강화 학습 기반 일상 행동 학습)

  • Lee, Sang-Woo;Kwak, Dong-Hyun;On, Kyoung-Woon;Heo, Yujung;Kang, Wooyoung;Cinarel, Ceyda;Zhang, Byoung-Tak
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.10
    • /
    • pp.599-604
    • /
    • 2017
  • A useful application of smart assistants is to predict and suggest users' daily behaviors the way real assistants do. Conventional methods to predict behavior have mainly used explicit schedule information logged by a user or extracted from e-mail or SNS data. However, gathering explicit information for smart assistants has limitations, and much of a user's routine behavior is not logged in the first place. In this paper, we suggest a novel approach that combines explicit schedule information with patterns of routine behavior. We propose using inference based on a Markov decision process and learning with a reward function based on inverse reinforcement learning. The results of our experiment shows that the proposed method outperforms comparable models on a life-log dataset collected over six weeks.

Miracle Morning routine management application using hybrid app (하이브리드앱을 활용한 미라클모닝 루틴 관리 어플리케이션)

  • Hur, Tai-sung;Bang, Su-Young
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.417-418
    • /
    • 2022
  • 본 논문에서는 하이브리드 앱을 기반으로 요즘 사람들의 많은 이목을 끌고 꾸준히 성장하고 있는 루틴 관리 트렌드에 맞춰 미라클모닝 루틴 관리 방식을 제안한다. 본인이 지킬 루틴을 설정하고 매일 성공 유무를 확인할 수 있으며, 혼자 루틴을 지키는 것이 어려운 사람들을 위한 그룹 기능을 통해 타인들의 성공 인증을 보며 동기부여를 받고 습관 형성을 성공으로 이끈다. 이를 통해 매일 공책을 펼쳐 손으로 하나하나 기록하지 않아도 어플 하나로 간단하게 미라클 모닝의 수행을 관리할 수 있을 뿐 아니라 나만의 통계, 사용자 비교 통계를 도표로 보여줌으로써 편리함을 제공하고 사용자의 만족도를 높인다.

  • PDF

An Analysis of Online Black Market: Using Data Mining and Social Network Analysis (온라인 해킹 불법 시장 분석: 데이터 마이닝과 소셜 네트워크 분석 활용)

  • Kim, Minsu;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.221-242
    • /
    • 2020
  • Purpose This study collects data of the recently activated online black market and analyzes it to present a specific method for preparing for a hacking attack. This study aims to make safe from the cyber attacks, including hacking, from the perspective of individuals and businesses by closely analyzing hacking methods and tools in a situation where they are easily shared. Design/methodology/approach To prepare for the hacking attack through the online black market, this study uses the routine activity theory to identify the opportunity factors of the hacking attack. Based on this, text mining and social network techniques are applied to reveal the most dangerous areas of security. It finds out suitable targets in routine activity theory through text mining techniques and motivated offenders through social network analysis. Lastly, the absence of guardians and the parts required by guardians are extracted using both analysis techniques simultaneously. Findings As a result of text mining, there was a large supply of hacking gift cards, and the demand to attack sites such as Amazon and Netflix was very high. In addition, interest in accounts and combos was in high demand and supply. As a result of social network analysis, users who actively share hacking information and tools can be identified. When these two analyzes were synthesized, it was found that specialized managers are required in the areas of proxy, maker and many managers are required for the buyer network, and skilled managers are required for the seller network.

Detection of Human Papillomavirus DNA in Routine Cervical Scraping Samples: Use for a National Cervical Cancer Screening Program in a Developing Nation

  • Othman, Norodiyah;Othman, Nor Hayati
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.5
    • /
    • pp.2245-2249
    • /
    • 2014
  • Background: Human papillomavirus is a well-established cause of the development of a variety of epithelial lesions in the cervix. However, as yet, incorporation of HPV testing into cervical cancer screening either as an adjunct or stand alone test is limited due to its cost. We therefore here ascertained the presence and type specificity of human papilloma virus (HPV) DNA in routine cervical scrapings. Materials and Methods: Cervical scrapings were collected from women attending clinics for routine Pap smear screening. HPV-DNA was detected by PCR using MY09/11 and GP5+/GP6+ primer sets and genotyping was accomplished by cycle-sequencing. Results: A total of 635 women were recruited into the study with $mean{\pm}SD$ age of $43{\pm}10.5$ years. Of these 92.6% (588/635) were reported as within normal limits (WNL) on cytology. The presence of HPV infection detected by nested MY/GP+-PCR was 4.4% (28/635). The overall prevalence of high-risk HPV (HR-HPV) in abnormal Pap smears was 53.8% (7/13). HPVs were also seen in 3.1% (18/588) of smears reported as WNL by cytology and 5.9% (2/34) in smears unsatisfactory for evaluation. Conclusions: The overall percentage of HPV positivity in routine cervical screening samples is comparable with abnormal findings in cytology. Conventional Pap smear 'missed' a few samples. Since HPV testing is expensive, our results may provide valuable information for strategising implementation of effective cervical cancer screening in a country with limited resources like Malaysia. If Pap smear coverage could be improved, HPV testing could be used as an adjunct method on cases with ambiguous diagnoses.

Analysis of Measured Azimuth Error on Sensitivity Calibration Routine (Sensitivity Calibration 루틴 수행시 Tilt에 의한 방위각 측정 오차의 분석)

  • Woo, Kwang-Joon;Kang, Su-Min
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.1
    • /
    • pp.1-8
    • /
    • 2011
  • The accuracy of MR sensor-based electronic compass is influenced by the temperature drift and DC offset of the MR sensor and the OP-amp, the magnetic distortion of nearby magnetic materials, and the compass tilt We design the 3-axis MR sensor and accelerometers-based electronic compass which is compensated by the set/reset pulse switching method on the temperature drift and DC offset, by the execution of hard-iron calibration routine on the magnetic distortion, and by the execution of the Euler rotational equation on the compass tilt. We qualitatively analyze the measured azimuth error on the execution of sensitivity calibration routine which is the normalization process on the different sensitivity of each MR sensor and the different gain of each op-amps. This compensation and analytic result make us design the one degree accuracy electronic compass.

Usefulness of Three-Dimensional Maximal Intensity Projection (MIP) Reconstruction Image in Breast MRI (유방자기공명영상에서 3 차원 최대 강도 투사 재건 영상의 유용성)

  • Kim, Hyun-Sung;Kang, Bong-Joo;Kim, Sung-Hun;Choi, Jae-Jeong;Lee, Ji-Hye
    • Investigative Magnetic Resonance Imaging
    • /
    • v.13 no.2
    • /
    • pp.183-189
    • /
    • 2009
  • Purpose : To evaluate the usefulness of three-dimensional (3D) maximal intensity projection (MIP) reconstruction method in breast MRI. Materials and Methods : Total 54 breasts of consecutive 27 patients were examined by breast MRI. Breast MRI was performed using GE Signa Excite Twin speed (GE medical system, Wisconsin, USA) 1.5T. We obtained routine breast MR images including axial T2WI, T1WI, sagittal T1FS, dynamic contrast-enhanced T1FS, and subtraction images. 3D MIP reconstruction images were obtained as follows; subtraction images were obtained using TIPS and early stage of contrast-enhanced TIPS images. And then 3D MIP images were obtained using the subtraction images through advantage workstation (GE Medical system). We detected and analyzed the lesions in the 3D MIP and routine MRI images according to ACR $BIRADS^{(R)}$ MRI lexicon. And then we compared the findings of 3D MIP and those of routine breast MR images and evaluated whether 3D MIP had additional information comparing to routine MR images. Results : 3D MIP images detect the 43 of 56 masses found on routine MR images (76.8%). In non-mass like enhancement, 3D MIP detected 17 of 20 lesions (85 %). And there were one hundred sixty nine foci at 3D MIP images and one hundred nine foci at routine MR images. 3D MIP images detected 14 of 23 category 3 lesions (60.9%), 11 of 16 category 4 lesions (68.87%), 28 of 28 Category 5 lesions (100%). In analyzing the enhancing lesions at 3D MIP images, assessment categories of the lesions were correlated as the results at routine MR images (p-value < 0.0001). 3D MIP detected additional two daughter nodules that were descriped foci at routine MR images and additional one nodule that was not detected at routine MR images. Conclusion : 3D MIP image has some limitations but is useful as additional image of routine breast MR Images.

  • PDF

Diagnostics for Regression with Finite-Order Autoregressive Disturbances

  • Lee, Young-Hoon;Jeong, Dong-Bin;Kim, Soon-Kwi
    • Journal of the Korean Statistical Society
    • /
    • v.31 no.2
    • /
    • pp.237-250
    • /
    • 2002
  • Motivated by Cook's (1986) assessment of local influence by investigating the curvature of a surface associated with the overall discrepancy measure, this paper extends this idea to the linear regression model with AR(p) disturbances. Diagnostic for the linear regression models with AR(p) disturbances are discussed when simultaneous perturbations of the response vector are allowed. For the derived criterion, numerical studies demonstrate routine application of this work.

A New Analysis Method for Packed Malicious Codes (코드은닉을 이용한 역공학 방지 악성코드 분석방법 연구)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.3
    • /
    • pp.488-494
    • /
    • 2012
  • This paper classifies the self-defense techniques used by the malicious software based on their approaches, introduces the packing technique as one of the code protection methods and proposes a way to quickly analyze the packed malicious codes. Packing technique hides a malicious code and restore it at runtime. To analyze a packed code, it is initially required to find the entry point after restoration. To find the entry point, it has been used reversing the packing routine in which a jump instruction branches to the entry point. However, the reversing takes too much time because the packing routine is usually obfuscated. Instead of reversing the routine, this paper proposes an idea to search some features of the startup code in the standard library used to generate the malicious code. Through an implementation and a consequent empirical study, it is proved that the proposed approach is able to analyze malicious codes faster.

Implementation of a Software Streaming System Using Pagefault Interrupt Routine Hooking (페이지폴트 인터럽트 루틴 후킹을 이용한 소프트웨어 스트리밍 시스템 구현)

  • Kim, Han-Gook;Lee, Chang-Jo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.14 no.2
    • /
    • pp.8-15
    • /
    • 2009
  • The need for ASP(Application Service Provider) has evolved from the increasing costs of specialized software that have far exceeded the price rage of small to medium sized businesses. There are a lot of technologies that make ASP possible, and software streaming service is one of them Software streaming is a method for overlapping transmission and execution of stream-enabled software. The stream-enabled software is able to run on a device even while the transmission/streaming of the software may still be in progress. Thus, a user does not have to wait for the completion of the software's download prior to starting to execute the software. In this paper, we suggest the new concept of software streaming system implement using the PageFault Interrupt Routine Hooking. As it is able to efficiently manage application, we do not have to install the entire software. In addition, we can save hardware resources by using it because we load basic binaries without occupying the storage space of the hardware.