• Title/Summary/Keyword: set sharing

Search Result 346, Processing Time 0.033 seconds

CONSTRUCTION OF TWO- OR THREE-WEIGHT BINARY LINEAR CODES FROM VASIL'EV CODES

  • Hyun, Jong Yoon;Kim, Jaeseon
    • Journal of the Korean Mathematical Society
    • /
    • v.58 no.1
    • /
    • pp.29-44
    • /
    • 2021
  • The set D of column vectors of a generator matrix of a linear code is called a defining set of the linear code. In this paper we consider the problem of constructing few-weight (mainly two- or three-weight) linear codes from defining sets. It can be easily seen that we obtain an one-weight code when we take a defining set to be the nonzero codewords of a linear code. Therefore we have to choose a defining set from a non-linear code to obtain two- or three-weight codes, and we face the problem that the constructed code contains many weights. To overcome this difficulty, we employ the linear codes of the following form: Let D be a subset of ��2n, and W (resp. V ) be a subspace of ��2 (resp. ��2n). We define the linear code ��D(W; V ) with defining set D and restricted to W, V by $${\mathcal{C}}_D(W;V )=\{(s+u{\cdot}x)_{x{\in}D^{\ast}}|s{\in}W,u{\in}V\}$$. We obtain two- or three-weight codes by taking D to be a Vasil'ev code of length n = 2m - 1(m ≥ 3) and a suitable choices of W. We do the same job for D being the complement of a Vasil'ev code. The constructed few-weight codes share some nice properties. Some of them are optimal in the sense that they attain either the Griesmer bound or the Grey-Rankin bound. Most of them are minimal codes which, in turn, have an application in secret sharing schemes. Finally we obtain an infinite family of minimal codes for which the sufficient condition of Ashikhmin and Barg does not hold.

South Korea's Response to the Formation of the International Regime on Access and Benefit Sharing within the Convention on Biological Diversity (생물다양성협약상 ABS 국제레짐형성 논의와 우리의 대응)

  • Chung, Suh-Yong;Park, Young-Gyu
    • Journal of Environmental Policy
    • /
    • v.8 no.4
    • /
    • pp.1-24
    • /
    • 2009
  • As commercial use of genetic resources increases in modern society, calls for fair and equitable sharing of the benefits thereof have become increasingly prominent, particularly from developing countries. As a result, negotiations have been ongoing for the "International Regime on Access and Benefit Sharing (ABS)" for genetic resources as a successor to the non-binding Bonn Guideline. 2010 has been set as the target date for the Agreement. As South Korea is more likely to be a user country of genetic resources, it will be necessary for it to take part in the negotiating process and contribute to creating the International Regime on ABS, to ensure both appropriate access to genetic resources and fair and equitable sharing of the benefits arising there from. To develop appropriate response strategies for South Korea, it is critical not only to closely examine the negotiations within the framework of the CBD but also to engage in discussions within thescope of related international organizations and domestic legislation. To achieve this goal, it is imperative for South Korea to form a comprehensive Government Response System, composed of relevant governmental bodies including the Ministry of Foreign Affairs and Trade, and the Ministry of Environment, etc.

  • PDF

Improved Load Sharing Rate in Paralleled Operated Lead Acid Batteries (납 축전지의 병렬운전시 부하분담률 개선)

  • 반한식;최규하
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.6 no.1
    • /
    • pp.34-42
    • /
    • 2001
  • A battery is the device that transforms the chemical energy into the direct-current electrical energy directly without a mechanical process. Unit cells are connected in series to obtain the required voltage, while being connected in parallel to organize capacity for load current and to decrease the internal resistance for corresponding the sudden shift of the load current. Because the voltage droop down in one set of battery is faster than in tow one, it amy result in the low efficiency of power converter with the voltage drop and cause the system shutdown. However, when the system being driven in parallel, a circular-current can be generated. The changing current differs in each set of battery because the system including batteries, rectifiers and loads is connected in parallel and it makes the charge voltage constant. It is shown that, as a result the new batteries are heated by over-charge and over-discharge, and the over charge current increases rust of the positive grid and consequently shortens the lifetime of the new batteries. The difference between the new batteries and old ones is the amount of internal resistance. In this paper, we can detect the unbalance current using the micro-processor and achieve the balance current by adjusting resistance of each set. The internal resistance of each set becomes constant and the current of charge and discharge comes to be balanced by inserting the external resistance into the system and calculating the change of internal resistance.

  • PDF

Maximizing Bandwidth Utilization by Sharing Method of SSID Hiding in Multiple Wireless Routers (다중 무선 공유기에서 SSID Hiding 공유 기법을 이용한 대역폭 이용률 극대화)

  • Yoon, Young-Hyo;Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.15C no.2
    • /
    • pp.111-118
    • /
    • 2008
  • A wireless router is a device which allows several wireless clients to share an internet line using NAT (Network Address Translation). In a school or a small office environment where many clients use multiple wireless routers, a client may select any one of wireless routers so that most clients can be clustered to a small set of the wireless routers. In such a case, there exists load unbalancing problem between clients and wireless routers. One of its result is that clients using the busiest router get poor service. The other is that the resource utilization of the whole wireless routers becomes very low. In order to resolve the problems, we propose a load sharing scheme to maximize network bandwidth utilization based on SSID(Service Set IDentifier) hiding. The proposed scheme keeps checking the available bandwidth of all the possible wireless routers in a time interval and select the most available one. If a new client appears, the most available router is visible to him or her whereas the others are not visible. This is handled by SSID hiding in the proposed scheme. We implemented the proposed scheme with ASUS WL 500G wireless router and performed experiments. Experimental results show the bandwidth utilization improvement compared to the existing method.

A Study of New Evolutionary Approach for Multiobjective Optimization (다목적함수 최적화를 위한 새로운 진화적 방법 연구)

  • Shim, Mun-Bo;Suh, Myung-Won
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.26 no.6
    • /
    • pp.987-992
    • /
    • 2002
  • In an attempt to solve multiobjective optimization problems, many traditional methods scalarize the objective vector into a single objective. In those cases, the obtained solution is highly sensitive to the weight vector used in the scalarization process and demands the user to have knowledge about the underlying problem. Moreover, in solving multiobjective problems, designers may be interested in a set of Pareto-optimal points, instead of a single point. In this paper, pareto-based Continuous Evolutionary Algorithms for Multiobjective Optimization problems having continuous search space are introduced. This algorithm is based on Continuous Evolutionary Algorithms to solve single objective optimization problems with a continuous function and continuous search space efficiently. For multiobjective optimization, a progressive reproduction operator and a niche-formation method fur fitness sharing and a storing process for elitism are implemented in the algorithm. The operator and the niche formulation allow the solution set to be distributed widely over the Pareto-optimal tradeoff surface. Finally, the validity of this method has been demonstrated through a numerical example.

Design of a Graphic Processor for Multimedia Data Processing (멀티미디어 데이타 처리를 위한 그래픽 프로세서 설계)

  • 고익상;한우종;선우명동
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.10
    • /
    • pp.56-65
    • /
    • 1999
  • This paper presents an architecture and its instruction set for a graphic coprocessor(GCP) which can be used for a multimedia server. The proposed instruction set employs parallel architecture concepts, such as SIMD and Superscalar. GCP consists of a scheduler and four functional units. The scheduler solves an instruction bottleneck problem causing by sharing with four general processors(GPs). GCP can execute up to 4 instructions in parallel. It consists of about 56,000 gates and operates at 30 MHz clock frequency due to speed limitation of SOG technology. GCP meets the real-time DCT algorithm requirement of the CIF image format and can process up to 63 frames/sec for the DCT Algorithm and 21 frames/sec for the Full Block matching Algorithm of the CIF image format.

  • PDF

Cultural Sensitivity and Design Implications of MOOCs from Korean Learners' Perspectives: Case Studies on edX and Coursera

  • AHN, Mi Lee;YOON, Hwan Sun;CHA, Hyun Jin
    • Educational Technology International
    • /
    • v.16 no.2
    • /
    • pp.201-229
    • /
    • 2015
  • Culture is a crucial concept that forms the thinking and behaviors of a group of people, and it influences interactions in learning. Thus, it is also essential to consider cultural sensitivity in online learning technologies and instructional design as education is a set of learning actions based on values and perceptions. MOOCs, the latest online learning platform, are global online learning platforms that provide global learners with free and various learning resources including courses from different world-class institutions. Despite globalization having brought learners closer to sharing similar learning resources, the actual experiences with the resource are expected to vary according to cultures, mainly because learning behavior is a set of outcomes based on cultural differences. Taking this into consideration, this study aims to examine MOOCs from a cultural perspective in order to facilitate global learners, especially Korean learners, to utilize MOOCs with user-friendly services and contents. To achieve this objective, the study first identified and developed an evaluation criteria to examine the cultural sensitivity of MOOCs and conducted case studies on courses from major MOOC providers including edX and Coursera. From the findings, design recommendations of contents and courses on MOOCs were suggested to provide Korean learners with optimal learning experiences.

Formalization of Productivity Metrics for Equipment in Multi-sectioned Road Construction Projects (다(多)공구 도로 공사 현장 장비들의 운영 실태 파악을 위한 생산성 지표 정립에 관한 연구)

  • Kim, Hong-Yeul;Koo, Bon-Sang
    • Korean Journal of Construction Engineering and Management
    • /
    • v.13 no.4
    • /
    • pp.100-109
    • /
    • 2012
  • Large road construction projects are typically partitioned into sections that are then contracted individually to contractors. Each section requires using similar heavy equipment including excavators, dump trucks and pavers, which constitute the highest cost. Normally the equipment is not shared between them, as each contractor wishes to have their equipment readily available. However, such practices result in very low utilization of these equipment. The goal of this research is to develop a programmatic resource sharing system in which contractors can share equipment depending on the changing needs of a multi-sectioned road project. This paper introduces the results of a survey performed to investigate how contractors currently manage the supply and demand of equipment and the equipment that are practical for sharing across a project. More importantly, the paper describes a set of metrics (DPR, nDPR, SDI) needed to quantify the amount of supply/demand variance occurring in each section. The metrics were used on an actual road construction project, and the results show that each section suffers from an imbalance between its monthly planned and actual utilization of equipment. The results also indicate that the sharing of the equipment can lead to potentially large savings as equipment requirements can be met within a project as to short leasing from outside vendors.

Trends Analysis on Research Articles of the Sharing Economy through a Meta Study Based on Big Data Analytics (빅데이터 분석 기반의 메타스터디를 통해 본 공유경제에 대한 학술연구 동향 분석)

  • Kim, Ki-youn
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.97-107
    • /
    • 2020
  • This study aims to conduct a comprehensive meta-study from the perspective of content analysis to explore trends in Korean academic research on the sharing economy by using the big data analytics. Comprehensive meta-analysis methodology can examine the entire set of research results historically and wholly to illuminate the tendency or properties of the overall research trend. Academic research related to the sharing economy first appeared in the year in which Professor Lawrence Lessig introduced the concept of the sharing economy to the world in 2008, but research began in earnest in 2013. In particular, between 2006 and 2008, research improved dramatically. In order to grasp the overall flow of domestic academic research of trends, 8 years of papers from 2013 to the present have been selected as target analysis papers, focusing on titles, keywords, and abstracts using database of electronic journals. Big data analysis was performed in the order of cleaning, analysis, and visualization of the collected data to derive research trends and insights by year and type of literature. We used Python3.7 and Textom analysis tools for data preprocessing, text mining, and metrics frequency analysis for key word extraction, and N-gram chart, centrality and social network analysis and CONCOR clustering visualization based on UCINET6/NetDraw, Textom program, the keywords clustered into 8 groups were used to derive the typologies of each research trend. The outcomes of this study will provide useful theoretical insights and guideline to future studies.

Broadcast Encryption System Using Secret Sharing and Subset Difference Methods (비밀분산 기법과 Subset Difference 기법을 이용한 브로드캐스트 암호시스템)

  • Lee, Jae Hwan;Park, Jong Hwan
    • Journal of Broadcast Engineering
    • /
    • v.20 no.1
    • /
    • pp.92-109
    • /
    • 2015
  • Broadcast encryption is a cryptographic primitive that allows a sender to securely broadcast a message to a set of receivers. The most influential broadcast encryption system was proposed in 2001 by Naor, Naor, Lotspiech, based on a pseudo-random generator and the Subset Difference (SD) method. In this paper, we suggest a new broadcast encryption system that is based on secret sharing and SD methods. On an efficiency aspect, our system achieves O(r) transmission cost, O($log^2n$) storage cost, and O(1) computational cost for the number n of users and the number r of revoked users. Compared to O(log n) computational cost in the previous SD method, our system has the advantage that it needs only constant-sized computational cost for decryption, regardless of the number n or r. On a security aspect, our system can achieve tighter security reduction than the previous SD method and the gap of security loss is about O(n log n). Moreover, our result shows that it is possible to give the effect of the SD method while using an information-theoretically secure key distribution technique as in the Complete Subtree method.