• Title/Summary/Keyword: Algorithms and Procedures

Search Result 242, Processing Time 0.026 seconds

A Global Graph-based Approach for Transaction and QoS-aware Service Composition

  • Liu, Hai;Zheng, Zibin;Zhang, Weimin;Ren, Kaijun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1252-1273
    • /
    • 2011
  • In Web Service Composition (WSC) area, services selection aims at selecting an appropriate candidate from a set of functionally-equivalent services to execute the function of each task in an abstract WSC according to their different QoS values. In despite of many related works, few of previous studies consider transactional constraints in QoS-aware WSC, which guarantee reliable execution of Composite Web Service (CWS) that is composed by a number of unpredictable web services. In this paper, we propose a novel global selection-optimal approach in WSC by considering both transactional constraints and end-to-end QoS constraints. With this approach, we firstly identify building rules and the reduction method to build layer-based Directed Acyclic Graph (DAG) model which can model transactional relationships among candidate services. As such, the problem of solving global optimal QoS utility with transactional constraints in WSC can be regarded as a problem of solving single-source shortest path in DAG. After that, we present Graph-building algorithms and an optimal selection algorithm to explain the specific execution procedures. Finally, comprehensive experiments are conducted based on a real-world web service QoS dataset. The experimental results show that our approach has better performance over other competing selection approaches on success ratio and efficiency.

Speckle Noise Reduction and Edge Enhancement in Ultrasound Images Based on Wavelet Transform

  • Kim, Yong-Sun;Ra, Jong-Beom
    • Journal of Biomedical Engineering Research
    • /
    • v.29 no.2
    • /
    • pp.122-131
    • /
    • 2008
  • For B-mode ultrasound images, we propose an image enhancement algorithm based on a multi-resolution approach, which consists of edge enhancing and noise reducing procedures. Edge enhancement processing is applied sequentially to coarse-to-fine resolution images obtained from wavelet-transformed data. In each resolution, the structural features of each pixel are examined through eigen analysis. Then, if a pixel belongs to an edge region, we perform two-step filtering: that is, directional smoothing is conducted along the tangential direction of the edge to improve continuity and directional sharpening is conducted along the normal direction to enhance the contrast. In addition, speckle noise is alleviated by proper attenuation of the wavelet coefficients of the homogeneous regions at each band. This region-based speckle-reduction scheme is differentiated from other methods that are based on the magnitude statistics of the wavelet coefficients. The proposed algorithm enhances edges regardless of changes in the resolution of an image, and the algorithm efficiently reduces speckle noise without affecting the sharpness of the edge. Hence, compared with existing algorithms, the proposed algorithm considerably improves the subjective image quality without providing any noticeable artifacts.

A Study on design of The Internet-based scoring system for constructed responses (서답형 문항의 인터넷 기반 채점시스템 설계 연구)

  • Cho, Ji-Min;Kim, Kyung-Hoon
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.2
    • /
    • pp.89-100
    • /
    • 2007
  • Scoring the constructed responses in large-scale assessments needs great efforts and time to reduce the various types of error in Paper-based training and scoring. For the purpose of eliminating the complexities and problems in Paper and pencil based training and scoring, many of countries including U.S.A and England already have applied online scoring system. There, however, has been few studies to develop the scoring system for the constructed responses items in Korea. The purpose of this study is to develop the basic design of the Internet-based scoring system for the constructed responses. This study suggested the algorithms for assigning scorers to constructed responses, employing methods for monitoring reliability, etc. This system can ensure reliable, quick scoring such as monitor scorer consistency through ongoing reliability checks and assess the quality of scorer decision making through frequent various checking procedures.

  • PDF

Probabilistic-based assessment of composite steel-concrete structures through an innovative framework

  • Matos, Jose C.;Valente, Isabel B.;Cruz, Paulo J.S.;Moreira, Vicente N.
    • Steel and Composite Structures
    • /
    • v.20 no.6
    • /
    • pp.1345-1368
    • /
    • 2016
  • This paper presents the probabilistic-based assessment of composite steel-concrete structures through an innovative framework. This framework combines model identification and reliability assessment procedures. The paper starts by describing current structural assessment algorithms and the most relevant uncertainty sources. The developed model identification algorithm is then presented. During this procedure, the model parameters are automatically adjusted, so that the numerical results best fit the experimental data. Modelling and measurement errors are respectively incorporated in this algorithm. The reliability assessment procedure aims to assess the structure performance, considering randomness in model parameters. Since monitoring and characterization tests are common measures to control and acquire information about those parameters, a Bayesian inference procedure is incorporated to update the reliability assessment. The framework is then tested with a set of composite steel-concrete beams, which behavior is complex. The experimental tests, as well as the developed numerical model and the obtained results from the proposed framework, are respectively present.

Abnormal state diagnosis model tolerant to noise in plant data

  • Shin, Ji Hyeon;Kim, Jae Min;Lee, Seung Jun
    • Nuclear Engineering and Technology
    • /
    • v.53 no.4
    • /
    • pp.1181-1188
    • /
    • 2021
  • When abnormal events occur in a nuclear power plant, operators must conduct appropriate abnormal operating procedures. It is burdensome though for operators to choose the appropriate procedure considering the numerous main plant parameters and hundreds of alarms that should be judged in a short time. Recently, various research has applied deep-learning algorithms to support this problem by classifying each abnormal condition with high accuracy. Most of these models are trained with simulator data because of a lack of plant data for abnormal states, and as such, developed models may not have tolerance for plant data in actual situations. In this study, two approaches are investigated for a deep-learning model trained with simulator data to overcome the performance degradation caused by noise in actual plant data. First, a preprocessing method using several filters was employed to smooth the test data noise, and second, a data augmentation method was applied to increase the acceptability of the untrained data. Results of this study confirm that the combination of these two approaches can enable high model performance even in the presence of noisy data as in real plants.

Manipulation of the Compressed Video for Multimedia Networking : A Bit rate Shaping of the Compressed Video (멀티미디어 네트워킹을 위한 압축 신호상에서 동영상 처리 : 압축 동영상 비트율 변환)

  • 황대환;조규섭;황수용
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11A
    • /
    • pp.1908-1924
    • /
    • 2001
  • Interoperability and inter-working in the various network and media environment with different technology background is very important to enlarge the opportunity of service access and to increase the competitive power of service. The ITU-T and advanced counties are planning ahead for provision of GII enabling user to access advanced global communication services supporting multimedia communication applications, embracing all modes of information. In this paper, we especially forced the heterogeneity of end user applications for multimedia networking. The heterogeneity has several technical aspects, like different medium access methods, heterogeneous coding algorithms for audio-visual data and so on. Among these elements, we have been itemized bit rate shaping algorithm on the compressed moving video. Previous manipulations of video has been done on the uncompressed signal domain. That is, compressed video should be converted to linear PCM signal. To do such a procedures, we should decode, manipulate and then encode the video to compressed signal once again. The traditional approach for processing the video signa1 has several critical weak points, requiring complexity to implement, degradation of image quality and large processing delay. The bit rate shaping algorithm proposed in this paper process the manipulation of moving video on the completely compressed domain to cope with above deficit. With this algorithms. we could realized efficient video bit rate shaping and the result of software simulation shows that this method has significant advantage than that of pixel oriented algorithms.

  • PDF

Algorithm of Decoding the Data Codeword in Two-Dimensional QR Code (이차원 QR Code에서 데이터 코드워드의 디코딩 알고리즘)

  • Park, Kwang Wook;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.4
    • /
    • pp.21-29
    • /
    • 2013
  • Two-dimensional QR Code has improved greatly the limits on the capacity, size, direction of the one-dimensional bar code. And it has the capacity of compressing and storing the massive amount of data and is widely used in many applications. Recently, the two-dimensional QR Code has been spread rapidly because of introducing the smart phones and increasing the amount of using them. However, there is little documentations about decoding the QR Code in which can store the large amount of information. In this paper, therefore, we present specific processing procedures and algorithms on decoding the two-dimensional QR Code and then make us understand their decoding process by explaining some examples.

A FREQUENCY DOMAIN RAW SIGNAL SIMULATOR FOR SAR

  • Kwak Sunghee;Kim Moon-Gyu;Shin Dongseok;Shin Jae-Min
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.530-533
    • /
    • 2005
  • A raw signal simulator for synthetic aperture radar (SAR) is a useful tool for the design and implementation of SAR system. Also, in order to analyze and verify the developed SAR processor, the raw signal simulator is required. Moreover, there is the need for a test system to help designing new SAR sensors and mission of SAR system. The derived parameters of the SAR simulator also help to generate accurate SAR processing algorithms. Although the ultimate purpose of this research is to presents a general purpose SAR simulator, this paper presents a SAR simulator in frequency domain at the first step. The proposed simulator generates the raw signal by changing various simulation parameters such as antenna parameters, modulation parameters, and sampling parameters. It also uses the statistics from an actual SAR image to imitate actual physical scattering. This paper introduces the procedures and parameters of the simulator, and presents the simulation results. Experiments have been conducted by comparing the simulated raw data with original raw SAR image. In addition, the simulated raw data have been verified through commercial SAR processing software.

  • PDF

A Program Similarity Evaluation Algorithm (프로그램 유사도 평가 알고리즘)

  • Kim Young-Chul;Hwang Seog-Chan;Choi Jaeyoung
    • Journal of Internet Computing and Services
    • /
    • v.6 no.1
    • /
    • pp.51-64
    • /
    • 2005
  • In this paper, we introduce a system for evaluating similarity of C program source code using method which compares syntax-trees each others. This method supposes two characteristic features as against other systems. It is not sensitive for program style such as indentation, white space, and comments, and changing order of control structure like sentences, code block, procedures, and so on. Another is that it can detect a syntax-error cause of using paring technique, We introduce algorithms for similarity evaluation method and grouping method that reduces the number of comparison, In the examination section, we show a test result of program similarity evaluation and its reduced iteration by grouping algorithm.

  • PDF

On the usefulness of discrete element computer modeling of particle packing for material characterization in concrete technology

  • Stroeven, P.;Hu, J.;Stroeven, M.
    • Computers and Concrete
    • /
    • v.6 no.2
    • /
    • pp.133-153
    • /
    • 2009
  • Discrete element modeling (DEM) in concrete technology is concerned with design and use of models that constitute a schematization of reality with operational potentials. This paper discusses the material science principles governing the design of DEM systems and evaluates the consequences for their operational potentials. It surveys the two families in physical discrete element modeling in concrete technology, only touching upon probabilistic DEM concepts as alternatives. Many common DEM systems are based on random sequential addition (RSA) procedures; their operational potentials are limited to low configuration-sensitivity features of material structure, underlying material performance characteristics of low structure-sensitivity. The second family of DEM systems employs concurrent algorithms, involving particle interaction mechanisms. Static and dynamic solutions are realized to solve particle overlap. This second family offers a far more realistic schematization of reality as to particle configuration. The operational potentials of this family involve valid approaches to structure-sensitive mechanical or durability properties. Illustrative 2D examples of fresh cement particle packing and pore formation during maturation are elaborated to demonstrate this. Mainstream fields of present day and expected application of DEM are sketched. Violation of the scientific knowledge of to day underlying these operational potentials will give rise to unreliable solutions.