• Title/Summary/Keyword: one-to-one computing

Search Result 2,208, Processing Time 0.026 seconds

Estimation of the Ultimate Compressive Strength of Actual Ship Panels with Complex Initial Deflection (복잡(複雜)한 형상(形狀)의 초기(初期)처짐을 가진 실선(實船)의 Panel의 압괴강도(壓壞强度) 간이추정법(簡易推定法))

  • Paik, Jeom-K.;Kim, Gun
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.25 no.1
    • /
    • pp.33-46
    • /
    • 1988
  • This paper describes a simplified method for estimation of the ultimate compressive strength of actual ship panels with initial deflection of complex shape. The proposed method consists of the elastic analysis using the large deflection theory and the rigid-plastic analysis based on the collapse mechanism which also includes the large deformation effect. In order to reduce the computing time for the elastic large deflection theory and the rigid-plastic analysis based on the collapse mechanism which also includes the large deformation effect. In order to reduce the computing time for the elastic large deflection analysis, only one term of Fourier series for the plate deflection is considered. The results of the proposed method are in good agreement with those calculated by the elasto-plastic large deflection analysis using F.E.M. and the computing time of the proposed method is extremely short compared with that of F.E.M.

  • PDF

An Overview of Data Security Algorithms in Cloud Computing

  • D. I. George Amalarethinam;S. Edel Josephine Rajakumari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.65-72
    • /
    • 2023
  • Cloud Computing is one of the current research areas in computer science. Recently, Cloud is the buzz word used everywhere in IT industries; It introduced the notion of 'pay as you use' and revolutionized developments in IT. The rapid growth of modernized cloud computing leads to 24×7 accessing of e-resources from anywhere at any time. It offers storage as a service where users' data can be stored on a cloud which is managed by a third party who is called Cloud Service Provider (CSP). Since users' data are managed by a third party, it must be encrypted ensuring confidentiality and privacy of the data. There are different types of cryptographic algorithms used for cloud security; in this article, the algorithms and their security measures are discussed.

Fast Algorithms for Computing Floating-Point Reciprocal Cube Root Functions

  • Leonid Moroz;Volodymyr Samotyy;Cezary Walczyk
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.84-90
    • /
    • 2023
  • In this article the problem of computing floating-point reciprocal cube root functions is considered. Our new algorithms for this task decrease the number of arithmetic operations used for computing $1/{\sqrt[3]{x}}$. A new approach for selection of magic constants is presented in order to minimize the computation time for reciprocal cube roots of arguments with movable decimal point. The underlying theory enables partitioning of the base argument range x∈[1,8) into 3 segments, what in turn increases accuracy of initial function approximation and decreases the number of iterations to one. Three best algorithms were implemented and carefully tested on 32-bit microcontroller with ARM core. Their custom C implementations were favourable compared with the algorithm based on cbrtf(x) function taken from C <math.h> library on three different hardware platforms. As a result, the new fast approximation algorithm for the function $1/{\sqrt[3]{x}}$ was determined that outperforms all other algorithms in terms of computation time and cycle count.

New Medical Image Fusion Approach with Coding Based on SCD in Wireless Sensor Network

  • Zhang, De-gan;Wang, Xiang;Song, Xiao-dong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.6
    • /
    • pp.2384-2392
    • /
    • 2015
  • The technical development and practical applications of big-data for health is one hot topic under the banner of big-data. Big-data medical image fusion is one of key problems. A new fusion approach with coding based on Spherical Coordinate Domain (SCD) in Wireless Sensor Network (WSN) for big-data medical image is proposed in this paper. In this approach, the three high-frequency coefficients in wavelet domain of medical image are pre-processed. This pre-processing strategy can reduce the redundant ratio of big-data medical image. Firstly, the high-frequency coefficients are transformed to the spherical coordinate domain to reduce the correlation in the same scale. Then, a multi-scale model product (MSMP) is used to control the shrinkage function so as to make the small wavelet coefficients and some noise removed. The high-frequency parts in spherical coordinate domain are coded by improved SPIHT algorithm. Finally, based on the multi-scale edge of medical image, it can be fused and reconstructed. Experimental results indicate the novel approach is effective and very useful for transmission of big-data medical image(especially, in the wireless environment).

Operation-level Early Termination Algorithm for Inter-predictions in HEVC

  • Rhee, Chae Eun
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.5 no.4
    • /
    • pp.235-242
    • /
    • 2016
  • The emerging High-Efficiency Video Coding (HEVC) standard attempts to improve coding efficiency by a factor of two over H.264/Advanced Video Coding (AVC) at the expense of an increase in computational complexity. Mode decision with motion estimation (ME) is still one of the most time-consuming computations in HEVC, as it is with H.264/AVC. Thus, fast mode decisions are not only an important issue to be researched, but also an urgent one. Several schemes for fast mode decisions have been presented in reference software and in other studies. However, the conventional hierarchical mode decision can be useless when block-level parallelism is exploited. This paper proposes operation-level exploration that offers more chances for early termination. An early termination condition is checked between integer and fractional MEs and between the parts of one partition type. The fast decision points of the proposed algorithm do not overlap those in previous works. Thus, the proposed algorithms are easily used with other fast algorithms, and consequently, independent speed-up is possible.

Fuzzy One Class Support Vector Machine (퍼지 원 클래스 서포트 벡터 머신)

  • Kim, Ki-Joo;Choi, Young-Sik
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.159-170
    • /
    • 2005
  • OC-SVM(One Class Support Vector Machine) avoids solving a full density estimation problem, and instead focuses on a simpler task, estimating quantiles of a data distribution, i.e. its support. OC-SVM seeks to estimate regions where most of data resides and represents the regions as a function of the support vectors, Although OC-SVM is powerful method for data description, it is difficult to incorporate human subjective importance into its estimation process, In order to integrate the importance of each point into the OC-SVM process, we propose a fuzzy version of OC-SVM. In FOC-SVM (Fuzzy One-Class Support Vector Machine), we do not equally treat data points and instead weight data points according to the importance measure of the corresponding objects. That is, we scale the kernel feature vector according to the importance measure of the object so that a kernel feature vector of a less important object should contribute less to the detection process of OC-SVM. We demonstrate the performance of our algorithm on several synthesized data sets, Experimental results showed the promising results.

  • PDF

An Adaptation of Consistency Criteria for Applications in the Cloud (클라우드 환경에서 응용에 맞는 일관성의 적용)

  • Kim, Chi-Yeon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.2
    • /
    • pp.341-347
    • /
    • 2012
  • In cloud computing, a enterprise or a client can use resources of computers that they are not own them. In case of Web 2.0 applications, such as Facebook, it is difficult to predict the maximum popularity of the service. But, the cloud computing may give a solution about this problem without high cost, thus becomes wildly popular. One of the advantage of cloud computing is providing a high availability. To provide the availability when the cloud computing that has shared-nothing architecture, strict consistency is not well with cloud computing. So, some consistency was proposed including the eventual consistency that was weaken the traditional consistency and has been adopted to many cloud applications. In this paper, we observe various consistency criteria that can adjust to cloud computing and discuss about some consistency that can be adapted to many applications of cloud computing.

M2M Architecture: Can It Realize Ubiquitous Computing in Daily life?

  • Babamir, Seyed Morteza
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.566-579
    • /
    • 2012
  • Ubiquitous computing called pervasive one is based on the thought of pervading ability of computation in daily life applications. In other words, it aims to include computation in devices such as electronic equipment and automobiles. This has led to disengagement of computers from desktop form. Accordingly, the notice in ubiquitous computing being taken of a world steeped in remote and wireless computer-based-services. Handheld and wearable programmed devices such as sense and control appliances are such devices. This advancement is rapidly moving domestic tasks and life from device-and-human communication to the device-and-device model. This model called Machine to Machine (M2M) has led to acceleration of developments in sciences such as nano-science, bio-science, and information science. As a result, M2M led to appearance of applications in various fields such as, environment monitoring, agricultural, health care, logistics, and business. Since it is envisaged that M2M communications will play a big role in the future in all wireless applications and will be emerged as a progressive linkage for next-generation communications, this paper aims to consider how much M2M architectures can realize ubiquitous computing in daily life applications. This is carried out after acquainting and initiating readers with M2M architectures and arguments for M2M. Some of the applications was not achievable before but are becoming viable owing to emergence of M2M communications.

Design Optimization of A Multi-Blade Centrifugal Fan With Variable Design Flow Rate (설계유량을 변수로 한 원심다익송풍기의 최적설계)

  • Seo, Seung-Jin;Kim, Kwang-Yong
    • Proceedings of the KSME Conference
    • /
    • 2004.04a
    • /
    • pp.1726-1731
    • /
    • 2004
  • This paper presents the response surface optimization method using three-dimensional Navier-Stokes analysis to optimize the shape of a forward-curved blades centrifugal fan. For numerical analysis, Reynolds-averaged Navier-Stokes equations with $k-{\varepsilon}$ turbulence model are discretized with finite volume approximations. In order to reduce huge computing time due to a large number of blades in forward-curved blades centrifugal fan, the flow inside of the fan is regarded as steady flow by introducing the impeller force models. Three geometric variables, i.e., location of cut off, radius of cut off, and width of impeller, and one operating variable, i.e., flow rate, were selected as design variables. As a main result of the optimization, the efficiency was successfully improved. And, optimum design flow rate was found by using flow rate as one of design variables. It was found that the optimization process provides reliable design of this kind of fans with reasonable computing time.

  • PDF

Design Optimization of A Multi-Blade Centrifugal Fan With Variable Design Flow Rate (설계유량을 변수로 한 원심다익송풍기의 최적설계)

  • Seo, Seoung-Jin;Kim, Kwang-Yong
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.28 no.11
    • /
    • pp.1332-1338
    • /
    • 2004
  • This paper presents the response surface optimization method using three-dimensional Navier-Stokes analysis to optimize the shape of a forward-curved blades centrifugal fan. For numerical analysis, Reynolds-averaged Navier-Stokes equations with k-$\varepsilon$ turbulence model are discretized with finite volume approximations. In order to reduce huge computing time due to a large number of blades in forward-curved blades centrifugal fan, the flow inside of the fan is regarded as steady flow by introducing the impeller force models. Three geometric variables, i.e., location of cut off, radius of cut off, and width of impeller, and one operating variable, i.e., flow rate, were selected as design variables. As a main result of the optimization, the efficiency was successfully improved. And, optimum design flow rate was found by using flow rate as one of design variables. It was found that the optimization process provides reliable design of this kind of fans with reasonable computing time.