• Title/Summary/Keyword: multi-log

Search Result 190, Processing Time 0.024 seconds

A Nonblocking $Multi-Log_2N$ Multiconnection Network : Theoretical Characterization and Design Example for a Photonic Switching System (넌블럭킹 $Multi-Log_2N$다중 접속망 : 이론적 특성 및 광 교환시스템을 위한 설계예)

  • Yeong Hwan TSCHA;Kyoon Ha LEE
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.7
    • /
    • pp.680-695
    • /
    • 1991
  • In this paper, the conditions on the number of required copies of a self-routing network with and without extra stages in back-to-back manner are presented respectively for a nonblocking $Multi-Log_2N$ multiconnection network. Actually the obained results hold regardless of connection patterns, i.e., whether a network deploys on-to-one connections or multiconnections. Thus open problems on the nonblocking condition for a multi $Multi-Log_2N$ multiconnection network are solved. Interestingly some of the given formulas comprise the Benes network and the Canto network as a special case repectively. A novel switching system architecture deploying a distributed calls-distribution algorithm is provided to design a nonblocking $Multi-Log_2N$ photonic switching network using a directional coupler. And a directional couplex based call holding demultiplexer is introduced to hold a call until blocking disappears in a switching network and let it enter to a network, provided that the number of switching networks is less than that of required switching networks for a nonblocking $Multi-Log_2N$ network.

  • PDF

Multiple Signature Comparison of LogTM-SE for Fast Conflict Detection (다중 시그니처 비교를 통한 트랜잭셔널 메모리의 충돌해소 정책의 성능향상)

  • Kim, Deok-Ho;Oh, Doo-Hwan;Ro, Won-W.
    • The KIPS Transactions:PartA
    • /
    • v.18A no.1
    • /
    • pp.19-24
    • /
    • 2011
  • As era of multi-core processors has arrived, transactional memory has been considered as an effective method to achieve easy and fast multi-threaded programming. Various hardware transactional memory systems such as UTM, VTM, FastTM, LogTM, and LogTM-SE, have been introduced in order to implement high-performance multi-core processors. Especially, LogTM-SE has provided study performance with an efficient memory management policy and a practical thread scheduling method through conflict detection based on signatures. However, increasing number of cores on a processor imposes the hardware complexity for signature processing. This causes overall performance degradation due to the heavy workload on signature comparison. In this paper, we propose a new architecture of multiple signature comparison to improve conflict detection of signature based transactional memory systems.

Improving Lookup Time Complexity of Compressed Suffix Arrays using Multi-ary Wavelet Tree

  • Wu, Zheng;Na, Joong-Chae;Kim, Min-Hwan;Kim, Dong-Kyue
    • Journal of Computing Science and Engineering
    • /
    • v.3 no.1
    • /
    • pp.1-4
    • /
    • 2009
  • In a given text T of size n, we need to search for the information that we are interested. In order to support fast searching, an index must be constructed by preprocessing the text. Suffix array is a kind of index data structure. The compressed suffix array (CSA) is one of the compressed indices based on the regularity of the suffix array, and can be compressed to the $k^{th}$ order empirical entropy. In this paper we improve the lookup time complexity of the compressed suffix array by using the multi-ary wavelet tree at the cost of more space. In our implementation, the lookup time complexity of the compressed suffix array is O(${\log}_{\sigma}^{\varepsilon/(1-{\varepsilon})}\;n\;{\log}_r\;\sigma$), and the space of the compressed suffix array is ${\varepsilon}^{-1}\;nH_k(T)+O(n\;{\log}\;{\log}\;n/{\log}^{\varepsilon}_{\sigma}\;n)$ bits, where a is the size of alphabet, $H_k$ is the kth order empirical entropy r is the branching factor of the multi-ary wavelet tree such that $2{\leq}r{\leq}\sqrt{n}$ and $r{\leq}O({\log}^{1-{\varepsilon}}_{\sigma}\;n)$ and 0 < $\varepsilon$ < 1/2 is a constant.

Multi-Log Platform Based Vehicle Safety System (다중로그 플랫폼 기반 차량안전시스템)

  • Park, Hyunho;Kwon, Eunjung;Byon, Sungwon;Shin, Won-Jae;Jang, Dong Man;Jung, Eui-Suk;Lee, Yong-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.546-548
    • /
    • 2019
  • In recent days, vehicle safety technologies for supporting safe vehicle driving attract public attention. This paper proposes multi-log platform based vehicle safety system (MLPVSS) that analyzes multi-log data (i.e., log-data on human, object, and place) and supports vehicle safety. The MLPVSS gathers sensor data and image data on the human, object, and place, and then generates multi-log data that are context-aware data on the human, object, and place. The MLPVSS can detect, predict, and response vehicle dangers. The MLPVSS can contribute to reduce car accidents.

  • PDF

A study on the implementation of multi-velocity log system using ultrasonic doppler effect (초음파 도플러 효과를 이용한 선박 종합 속도 측정 시스템 구현에 관한연구)

  • 류점수;신동우;민경선;김영길;강동균;임종곤
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.3
    • /
    • pp.38-46
    • /
    • 1996
  • In this paper, a multi-velocity log system which uses ultrasonic pulsed doppler signal is developed. The output of the system is the absoluted velcocity of the ship. By using digitral signal processing, we get the vector velocity which displays the ship's speed about fore, aft, port and starboard. And this system give us the information about depth. This multi-velocity system has a large merit that is bottom and water track velocity. In addition, this has the high accuracy and can measure the water-depth according to the deep mode. And the fish finder, echo sounder or docking system will be made by applying the speed log system.

  • PDF

Early Detection of Intravenous Infiltration Using Multi-frequency Bioelectrical Impedance Measurement System: Pilot Study

  • Kim, Jaehyung;Shin, Beumjoo;Jeon, Gyerok
    • Journal of information and communication convergence engineering
    • /
    • v.15 no.2
    • /
    • pp.123-130
    • /
    • 2017
  • The early detection of intravenous (IV) infiltration is necessary to minimize the injury caused by the infiltration, which is one of the most important tasks for nurses. For detecting early infiltration in patients receiving invasive vein treatment, bioelectrical impedance was measured using multi-frequency bioelectrical impedance. The impedance decreased significantly at infiltration, and then decreased gradually over time after infiltration. The relative impedance at 20 kHz decreased remarkably at infiltration, and then gradually decreased thereafter. In addition, the impedance ratio increased temporarily at infiltration and then gradually decreased over time. Furthermore, the impedance at each frequency decreased quantitatively over time. This indicates that IV solution leaking from the vein due to infiltration accumulates in the subcutaneous tissues. Moreover, slopes of log Z vs. log f differently decreased with increasing log f, indicating that the impedance exhibits different responses depending on the frequency.

On the Multicast Capacity of Wireless Ad Hoc Networks with Network Coding

  • Wang, Zheng;Karande, Shirish S.;Sadjadpour, Hamid R.;Garcia-Luna-Aceves, J.J.
    • Journal of Communications and Networks
    • /
    • v.13 no.5
    • /
    • pp.525-535
    • /
    • 2011
  • In this paper, we study the contribution of network coding (NC) in improving the multicast capacity of random wireless ad hoc networks when nodes are endowed with multi-packet transmission (MPT) and multi-packet reception (MPR) capabilities. We show that a per session throughput capacity of ${\Theta}$(nT$^3$(n)) can be achieved as a tight bound when each session contains a constant number of sinks where n is the total number of nodes and T(n) is the transmission range. Surprisingly, an identical order capacity can be achieved when nodes have only MPR and MPT capabilities. This result proves that NC does not contribute to the order capacity of multicast traffic in wireless ad hoc networks when MPR and MPT are used in the network. The result is in sharp contrast to the general belief (conjecture) that NC improves the order capacity of multicast. Furthermore, if the communication range is selected to guarantee the connectivity in the network, i.e., ${\Omega}$($\sqrt{log\;n/n}$)=T(n) = O(log log n / log n), then the combination of MPR and MPT achieves a throughput capacity of ${\Theta}$(log$^{\frac{3}{2}}$ n/$\sqrt{n}$) which provides an order capacity gain of ${\Theta}$(log$^2$ n) compared to the point-to-point multicast capacity with the same number of destinations.

A Multiclass Classification of the Security Severity Level of Multi-Source Event Log Based on Natural Language Processing (자연어 처리 기반 멀티 소스 이벤트 로그의 보안 심각도 다중 클래스 분류)

  • Seo, Yangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.1009-1017
    • /
    • 2022
  • Log data has been used as a basis in understanding and deciding the main functions and state of information systems. It has also been used as an important input for the various applications in cybersecurity. It is an essential part to get necessary information from log data, to make a decision with the information, and to take a suitable countermeasure according to the information for protecting and operating systems in stability and reliability, but due to the explosive increase of various types and amounts of log, it is quite challenging to effectively and efficiently deal with the problem using existing tools. Therefore, this study has suggested a multiclass classification of the security severity level of multi-source event log using machine learning based on natural language processing. The experimental results with the training and test samples of 472,972 show that our approach has archived the accuracy of 99.59%.

Identification of Multiple Outlying Cells in Multi-way Tables

  • Lee, Jong Cheol;Hong, Chong Sun
    • Communications for Statistical Applications and Methods
    • /
    • v.7 no.3
    • /
    • pp.687-698
    • /
    • 2000
  • An identification method is proposed in order to detect more than one outlying cells in multi-way contingency tables. The iterative proportional fitting method is applied to get expected values of several suspected outlying cells. Since the proposed method uses minimal sufficient statistics under quasi log-linear models, expected counts of outlying cells could be estimated under any hierarchical log-linear models. This method is an extension of the backwards-stepping method of Simonoff(1988) and requires les iteration to identify outlying cells.

  • PDF

Creep Behaviour of Red Shale in the Haman Formation by Multi Stage Loading Test (다단계 재하시험에 의한 함안층 적색 셰일의 크리프특성)

  • Cho, Lae-Hun;Kim, Gyo-Won
    • The Journal of Engineering Geology
    • /
    • v.19 no.2
    • /
    • pp.165-175
    • /
    • 2009
  • This study is concerned with creep characteristics of red shale in the Haman Formation by the single stage and multi stage loading tests. Creep constants in the Griggs's experiential equation, ${\epsilon}_t$= a+$b{\cdot}log$ t + $c{\cdot}t$, are determined by regression analysis on the total data obtained. The transition time between the primary and second creep means the time when the differential value of $b{\cdot}log$ t is equal to the differential value of $c{\cdot}t$. The correlation equation between loads (${\sigma}$%) and creep constants is deduced from the three times multi stage loading tests. Also a failure time under each loads is anticipated from creep constants and maximum strain at the failure.