• Title/Summary/Keyword: order-preserving

Search Result 360, Processing Time 0.027 seconds

Weakly Prime Ideals in Involution po-Γ-Semigroups

  • Abbasi, M.Y.;Basar, Abul
    • Kyungpook Mathematical Journal
    • /
    • v.54 no.4
    • /
    • pp.629-638
    • /
    • 2014
  • The concept of prime and weakly prime ideal in semigroups has been introduced by G. Szasz [4]. In this paper, we define the involution in po-${\Gamma}$-semigroups, then we extend some results on prime, semiprime and weakly prime ideals to the involution po-${\Gamma}$-semigroup S. Also, we characterize intra-regular involution po-${\Gamma}$-semigroups. We establish that in the involution po-${\Gamma}$-semigroup S such that the involution preserves the order, an ideal of S is prime if and only if it is both weakly prime and semiprime and if S is commutative, then the prime and weakly prime ideals of S coincide. Finally, we prove that if S is a po-${\Gamma}$-semigroup with order preserving involution, then the ideals of S are prime if and only if S is intra-regular.

A New Code for Relativistic Hydrodynamics

  • Seo, Jeongbhin;Kang, Hyesung;Ryu, Dongsu
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.55.1-55.1
    • /
    • 2020
  • In an attempt to investigate the nonlinear dynamics such as shock, shear, and turbulence associated with ultra-relativistic jets, we develop a new relativistic hydrodynamics (RHD) code based on the weighted essentially non-oscillatory (WENO) scheme. It is a 5th-order accurate, finite-difference scheme, which has been widely used for solving hyperbolic systems of conservation equations. The code is parallelized with MPI and OpenMP. Through an extensive set of tests, the accuracy and efficiency of different WENO reconstructions, and different time discretizations are assessed. Different implementations of the equation of state (EOS) for relativistic fluid are incorporated, As the fiducial setup for simulations of ultra-relativistic jets, we adopt the EOS in Ryu et al. (2006) to treat arbitrary adiabatic index of relativistic fluid, the WENO-Z reconstructions to minimize numerical dissipation without loss of stability, and the strong stability preserving Runge-Kutta (SSPRK) method to achieve stable time stepping with large CFL numbers. In addition, the code includes a high-order flux averaging along the transverse directions for multi-dimensional problems, and the modified eigenvalues for the acoustic modes to effectively control the carbuncle instability. We find that the new code performs satisfactorily simulations of ultra-relativistic jets.

  • PDF

No Tardiness Rescheduling with Order Disruptions

  • Yang, Jaehwan
    • Industrial Engineering and Management Systems
    • /
    • v.12 no.1
    • /
    • pp.51-62
    • /
    • 2013
  • This paper considers a single machine rescheduling problem whose original (efficiency related) objective is minimizing makespan. We assume that disruptions such as order cancelations and newly arrived orders occur after the initial scheduling, and we reschedule this disrupted schedule with the objective of minimizing a disruption related objective while preserving the original objective. The disruption related objective measures the impact of the disruptions as difference of completion times in the remaining (uncanceled) jobs before and after the disruptions. The artificial due dates for the remaining jobs are set to completion times in the original schedule while newly arrived jobs do not have due dates. Then, the objective of the rescheduling is minimizing the maximum earliness without tardiness. In order to preserve the optimality of the original objective, we assume that no-idle time and no tardiness are allowed while rescheduling. We first define this new problem and prove that the general version of the problem is unary NP-complete. Then, we develop three simple but intuitive heuristics. For each of the three heuristics, we find a tight bound on the measure called modified z-approximation ratio. The best theoretical bound is found to be 0.5 - ${\varepsilon}$ for some ${\varepsilon}$ > 0, and it implies that the solution value of the best heuristic is at most around a half of the worst possible solution value. Finally, we empirically evaluate the heuristics and demonstrate that the two best heuristics perform much better than the other one.

A Study on Enhancing Accessibility to the National Archives (기록물관리기관의 열람환경 운영에 관한 연구)

  • Lee, Sook-hee
    • The Korean Journal of Archival Studies
    • /
    • no.10
    • /
    • pp.65-111
    • /
    • 2004
  • In the modern society, Archives are an available subject to the people of a nation and it is indispensable to build and appropriate access environment in order to connect the users and the registered records stored in the facilities. Specially, the Closed Shelves Access system, based on the notion of "a Policy of Archives Preservation", needs to be fully equipped with an access environment more adequate to its necessities. Hence, this study has analyzed all sorts of environments-institutional, organizational, human, physical and intellectual- from a general perspective in order to activate users to read the archives and based on this, the objective of the research is in proposing a program that effectively provides archives to the users and provides the basis for putting into practice an active access environment. The use of archives is the fountainhead in order to preserve archives. By using the archives, the meaning of preserving them is maximized. Whether these archives may be used or not will depend on the quality of information and the advancement of the access environment. Therefore, in order to motivate users to access the archives, first of all the facilities and the archivists must establish norms regarding the access, based on statutes and once they have been settled, they should provide other changes such as ; the development and fixation in the organization's structure, the education of specialized human labor, the expansion of physical space and the facilities and diverse positive services.

A Study on Chamber Design for the Efficient Preservation of a Small Amount of Archives (소량 기록물의 효율적 보존을 위한 보존챔버 설계에 관한 연구)

  • Bong, Choon-Keun;Park, Seong-Jin;Lee, Jeong-Joo;Shin, Hyun-Chang
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.1
    • /
    • pp.35-58
    • /
    • 2013
  • The archives preservation chamber is an equipment that is able to store important archives with air-cleaning and isothermal-isohumidity control functions to permanently store archives in a highly safe environment. The chamber can only store small amounts of archives but it is crucial for organizations preserving archives to economically store a variety of archives, be it a medium or a small amount of documents. An arm of this study researches the current preservation status of the local record center to determine the need for such a chamber. In addition, in order to improve the air-cleaning and isothermal-isohumidity functions, the researchers of this study have conducted analyses to design the core parts. The preservation chamber that had been designed includes an archives preservation area, air-cleaning equipment, and environment measurement equipment. A preservation chamber is used to preserve small amounts of important archives safely. Thus, when a local record center is preserving various types of archives in small or medium quantities in a stack room, the preservation chamber can be used to aid their long-term preservation.

On a Pitch Alteration Method using Scaling the Harmonics Compensated with the Phase for Speech Synthesis (위상 보상된 고조파 스케일링에 의한 음성합성용 피치변경법)

  • Bae, Myung-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.13 no.6
    • /
    • pp.91-97
    • /
    • 1994
  • In speech processing, the waveform codings are concerned with simply preserving the waveform of signal through a redundancy reduction process. In the case of speech synthesis, the waveform codings with high quality are mainly used to the synthesis by analysis. Because the parameters of this coding are not classified as both excitation and vocal tract, it is difficult to apply the waveform coding to the synthesis by rule. Thus, in order to apply the waveform coding to synthesis by rule, it is necessary to alter the pitches. In this paper, we proposed a new pitch alteration method that can change the pitch period in waveform coding by dividing the speech signals into the vocal tract and excitation parameters. This method is a time-frequency domain method preserving the phase component of the waveform in time domain and the magnitude component in frequency domain. Thus, it is possible that the waveform coding is carried out the synthesis by rule in speech processing. In case of using the algorithm, we can obtain spectrum distortion with $2.94\%$. That is, the spectrum distortion is decreased more $5.06\%$ than that of the pitch alteration method in time domain.

  • PDF

Privacy Preserving Sequential Patterns Mining for Network Traffic Data (사이트의 접속 정보 유출이 없는 네트워크 트래픽 데이타에 대한 순차 패턴 마이닝)

  • Kim, Seung-Woo;Park, Sang-Hyun;Won, Jung-Im
    • Journal of KIISE:Databases
    • /
    • v.33 no.7
    • /
    • pp.741-753
    • /
    • 2006
  • As the total amount of traffic data in network has been growing at an alarming rate, many researches to mine traffic data with the purpose of getting useful information are currently being performed. However, network users' privacy can be compromised during the mining process. In this paper, we propose an efficient and practical privacy preserving sequential pattern mining method on network traffic data. In order to discover frequent sequential patterns without violating privacy, our method uses the N-repository server model and the retention replacement technique. In addition, our method accelerates the overall mining process by maintaining the meta tables so as to quickly determine whether candidate patterns have ever occurred. The various experiments with real network traffic data revealed tile efficiency of the proposed method.

Fast 3D Model Extraction Algorithm with an Enhanced PBIL of Preserving Depth Consistency (깊이 일관성을 보존하는 향상된 개체군기반 증가 학습을 이용한 고속 3차원 모델 추출 기법)

  • 이행석;장명호;한규필
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.59-66
    • /
    • 2004
  • In this paper, a fast 3D model extraction algorithm with an enhanced PBIL of preserving depth consistency is proposed for the extraction of 3D depth information from 2D images. Evolutionary computation algorithms are efficient search methods based on natural selection and population genetics. 2D disparity maps acquired by conventional matching algorithms do not match well with the original image profile in disparity edge regions because of the loss of fine and precise information in the regions. Therefore, in order to decrease the imprecision of disparity values and increase the quality of matching, a compact genetic algorithm is adapted for matching environments, and the adaptive window, which is controlled by the complexity of neighbor disparities in an abrupt disparity point is used. As the result, the proposed algorithm showed more correct and precise disparities were obtained than those by conventional matching methods with relaxation scheme.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.

Physicochemical Quality Changes in Chinese Cabbage with Storage Period and Temperature: A Review

  • Shim, Joon-Yong;Kim, Do-Gyun;Park, Jong-Tae;Kandpal, Lalit Mohan;Hong, Soon-jung;Cho, Byoung-Kwan;Lee, Wang-Hee
    • Journal of Biosystems Engineering
    • /
    • v.41 no.4
    • /
    • pp.373-388
    • /
    • 2016
  • Background: Recent inquiries into high-quality foods have discussed the importance of the functional aspects of foods, in addition to traditional quality indicators such as color, firmness, weight, trimming loss, respiration rate, texture, and soluble solid content. Recently, functional Chinese cabbage, which makes up a large portion of the vegetables consumed in Korea, has been identified as an anticancer treatment. However, the investigation of practical issues, such as the effects of storage conditions on quality indicators (including functional compounds), is still limited. Purpose: We reviewed various studies on variations in the quality indicators and functional compounds of Chinese cabbage in response to different storage environments, focusing on storage temperature and storage period. In particular, we emphasized the effect of storage temperature and storage period on glucosinolate (GSL) levels, in order to provide guidelines for optimizing storage environments to maximize GSLs. Additionally, we used response surface methodology to propose experimental designs for future studies exploring the optimal storage conditions for enhancing GSL contents. Review: Large variations in quality indicators were observed depending on the cultivar, the type of storage, the storage conditions, and the harvest time. In particular, GSL content varied with storage conditions, indicating that either low temperatures or adequate air composition by controlled atmospheric storage may preserve GSL levels, as well as prolonging shelf life. Even though genetic and biochemical approaches are preferred for developing functional Chinese cabbage, it is important to establish a practical method for preserving quality for marketability; a prospective study into optimal storage conditions for preserving functional compounds (which can be applied in farms), is required. This may be achievable with the comprehensive meta-analysis of currently published data introduced in this review, or by conducting newly designed experiments investigating the relationship between storage conditions and the levels of functional compounds.