• Title/Summary/Keyword: Computer Algorithms

Search Result 3,787, Processing Time 0.029 seconds

A study on Radiowave Interference Analysis Algorithms for Enhancement of Radio-Frequency Management System (전파 분석 알고리즘 및 전파 간섭 분석 기준 연구를 통한 전파 관리 시스템 기능 강화 방안 도출)

  • Kim, Yu-Mi;Rhee, Ill-Keun;Bae, Suk-Hee
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.281-287
    • /
    • 2003
  • This paper proposed an improvement scheme for effective usage of radio-frequency management system(RFMS), which has been operated to facilitate national spectrum management and monitoring in Korea. Based on the wave propagation models, interference analysis algorithms, and sharing criteria recommended by ITU-R, we derived criteria for the automated selection of the channel interference analysis algorithms and sharing conditions adequate to the environment to be analysed. Then using the obtained criteria, computer and program has been made and shown to select the most appropriate propagation models, interference analysis algorithms, and sharing criteria from the ones provided in RFMS, with the illustrative example.

  • PDF

Analyzing the Impact of Buffer Capacity on Crosspoint-Queued Switch Performance

  • Chen, Guo;Zhao, Youjian;Pei, Dan;Sun, Yongqian
    • Journal of Communications and Networks
    • /
    • v.18 no.3
    • /
    • pp.523-530
    • /
    • 2016
  • We use both theoretical analysis and simulations to study the impact of crosspoint-queued (CQ) buffer size on CQ switch throughput and delay performance under different traffic models, input loads, and scheduling algorithms. In this paper, we present the following. 1) We prove the stability of CQ switch using any work-conserving scheduling algorithm. 2) We present an exact closed-form formula for the CQ switch throughput and a non-closed-form but convergent formula for its delay using static non-work-conserving random scheduling algorithms with any given buffer size under independent Bernoulli traffic. 3) We show that the above results can serve as a conservative guide on deciding the required buffer size in pure CQ switches using work-conserving algorithms such as the random scheduling, under independent Bernoulli traffic. 4) Furthermore, our simulation results under real-trace traffic show that simple round-robin and random work-conserving algorithms can achieve quite good throughput and delay performance with a feasible crosspoint buffer size. Our work reveals the impact of buffer size on the CQ switch performance and provides a theoretical guide on designing the buffer size in pure CQ switch, which is an important step toward building ultra-high-speed switch fabrics.

Incorporating RSA with a New Symmetric-Key Encryption Algorithm to Produce a Hybrid Encryption System

  • Prakash Kuppuswamy;Saeed QY Al Khalidi;Nithya Rekha Sivakumar
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.196-204
    • /
    • 2024
  • The security of data and information using encryption algorithms is becoming increasingly important in today's world of digital data transmission over unsecured wired and wireless communication channels. Hybrid encryption techniques combine both symmetric and asymmetric encryption methods and provide more security than public or private key encryption models. Currently, there are many techniques on the market that use a combination of cryptographic algorithms and claim to provide higher data security. Many hybrid algorithms have failed to satisfy customers in securing data and cannot prevent all types of security threats. To improve the security of digital data, it is essential to develop novel and resilient security systems as it is inevitable in the digital era. The proposed hybrid algorithm is a combination of the well-known RSA algorithm and a simple symmetric key (SSK) algorithm. The aim of this study is to develop a better encryption method using RSA and a newly proposed symmetric SSK algorithm. We believe that the proposed hybrid cryptographic algorithm provides more security and privacy.

A Framework for Computer Vision-aided Construction Safety Monitoring Using Collaborative 4D BIM

  • Tran, Si Van-Tien;Bao, Quy Lan;Nguyen, Truong Linh;Park, Chansik
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.1202-1208
    • /
    • 2022
  • Techniques based on computer vision are becoming increasingly important in construction safety monitoring. Using AI algorithms can automatically identify conceivable hazards and give feedback to stakeholders. However, the construction site remains various potential hazard situations during the project. Due to the site complexity, many visual devices simultaneously participate in the monitoring process. Therefore, it challenges developing and operating corresponding AI detection algorithms. Safety information resulting from computer vision needs to organize before delivering it to safety managers. This study proposes a framework for computer vision-aided construction safety monitoring using collaborative 4D BIM information to address this issue, called CSM4D. The suggested framework consists of two-module: (1) collaborative BIM information extraction module (CBIE) extracts the spatial-temporal information and potential hazard scenario of a specific activity; through that, Computer Vision-aid Safety Monitoring Module (CVSM) can apply accurate algorithms at the right workplace during the project. The proposed framework is expected to aid safety monitoring using computer vision and 4D BIM.

  • PDF

Analysis and Improvement of Ranking Algorithm for Web Mining System on the Hierarchical Web Environment

  • Heebyung Yoon;Lee, Kil-Seup;Kim, Hwa-Soo
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.455-458
    • /
    • 2003
  • The variety of document ranking algorithms have developed to provide efficient mining results for user's query on the web environment. The typical ranking algorithms are the Vector-Space Model based on the text, PsgeRank and HITS algorithms based on the hyperlink structures and other several improvement algorithms. All these are for the user's convenience and preference. However, these algorithms are usually developed on then Horizontal and non-hierarchial web environments and are not suitable for the hierarchial web environments such as enterprise and defense networks. Thus, we must consider the special environment factors in order to improve the ranking algorithms. In this paper, we analyze the several typical algorithms used by hyperlink structures on the web environment. We, then suggest a configuration of the hierarchical web environment and also give the relations between agents of the web mining system. Next, we propose an improved ranking algorithm suitable to this kind of special environments. The proposed algorithm is considered both the hyperlink structures of the documents and the location of the user of the hierarchical web.

  • PDF

New Error Control Algorithms for Residue Number System Codes

  • Xiao, Hanshen;Garg, Hari Krishna;Hu, Jianhao;Xiao, Guoqiang
    • ETRI Journal
    • /
    • v.38 no.2
    • /
    • pp.326-336
    • /
    • 2016
  • We propose and describe new error control algorithms for redundant residue number systems (RRNSs) and residue number system product codes. These algorithms employ search techniques for obtaining error values from within a set of values (that contains all possible error values). For a given RRNS, the error control algorithms have a computational complexity of $t{\cdot}O(log_2\;n+log_2\;{\bar{m}})$ comparison operations, where t denotes the error correcting capability, n denotes the number of moduli, and ${\bar{m}}$ denotes the geometric average of moduli. These algorithms avoid most modular operations. We describe a refinement to the proposed algorithms that further avoids the modular operation required in their respective first steps, with an increase of ${\lceil}log_2\;n{\rceil}$ to their computational complexity. The new algorithms provide significant computational advantages over existing methods.

A Study of Peak Finding Algorithms for the Autocorrelation Function of Speech Signal

  • So, Shin-Ae;Lee, Kang-Hee;You, Kwang-Bock;Lim, Ha-Young;Park, Ji Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.131-137
    • /
    • 2016
  • In this paper, the peak finding algorithms corresponding to the Autocorrelation Function (ACF), which are widely exploited for detecting the pitch of voiced signal, are proposed. According to various researchers, it is well known fact that the estimation of fundamental frequency (F0) in speech signal is not only very important task but quite difficult mission. The proposed algorithms, presented in this paper, are implemented by using many characteristics - such as monotonic increasing function - of ACF function. Thus, the proposed algorithms may be able to estimate both reliable and correct the fundamental frequency as long as the autocorrelation function of speech signal is accurate. Since the proposed algorithms may reduce the computational complexity it can be applied to the real-time processing. The speech data, is composed of Korean emotion expressed words, is used for evaluation of their performance. The pitches are measured to compare the performance of proposed algorithms.

Health Care Optimization by Maximizing the Air-Ambulance Operation Time

  • Melhim, Loai Kayed B.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.357-361
    • /
    • 2022
  • Employing the available technologies and utilizing the advanced means to improve the level of health care provided to citizens in their various locations. Citizens have the right to get a proper health care services despite the location of their residency or the distance from the health care delivery centers, a goal that can be achieved by utilizing air ambulance systems. In such systems, aircrafts and their life spans are the essential component, the flight duration of the aircraft during its life span is determined by the maintenance schedule. This research, enhances the air ambulance systems by presenting a proposal that maximizes the aircraft flight duration during its life span. The enhancement will be reached by developing a set of algorithms that handles the aircraft maintenance problem. The objective of these algorithms is to minimize the maximum completion time of all maintenance tasks, thus increasing the aircraft operation time. Practical experiments performed to these algorithms showed the ability of these algorithms to achieve the desired goal. The developed algorithms will manage the maintenance scheduling problem to maximize the uptime of the air ambulance which can be achieved by maximizing the minimum life of spare parts. The developed algorithms showed good performance measures during experimental tests. The 3LSL algorithm showed a higher performance compared to other algorithms during all performed experiments.

On Deploying Relays for Connected Indoor Sensor Networks

  • Zhu, Yanmin;Xue, Cuiyao;Cai, Haibin;Yu, Jiadi;Ni, Lei;Li, Minglu;Li, Bo
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.335-343
    • /
    • 2014
  • This paper considers the crucial problem of deploying wireless relays for achieving a connected wireless sensor network in indoor environments, an important aspect related to the management of the sensor network. Several algorithms have been proposed for ensuring full sensing coverage and network connectivity. These algorithms are not applicable to indoor environments because of the complexity of indoor environments, in which a radio signal can be dramatically degraded by obstacles such as walls. We first prove theoretically that the indoor relay placement problem is NP-hard. We then predict the radio coverage of a given relay deployment in indoor environments. We consider two practical scenarios; wire-connected relays and radio-connected relays. For the network with wire-connected relays, we propose an efficient greedy algorithm to compute the deployment locations of relays for achieving the required coverage percentage. This algorithm is proved to provide a $H_n$ factor approximation to the theoretical optimum, where $H_n=1+{\frac{1}{2}}+{\cdots}+{\frac{1}{n}}={\ln}(n)+1$, and n is the number of all grid points. In the network with radio-connected relays, relays have to be connected in an ad hoc mode. We then propose an algorithm based on the previous algorithm for ensuring the connectivity of relays. Experimental results demonstrate that the proposed algorithms achieve better performance than baseline algorithms.

Review of Data-Driven Multivariate and Multiscale Methods

  • Park, Cheolsoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.2
    • /
    • pp.89-96
    • /
    • 2015
  • In this paper, time-frequency analysis algorithms, empirical mode decomposition and local mean decomposition, are reviewed and their applications to nonlinear and nonstationary real-world data are discussed. In addition, their generic extensions to complex domain are addressed for the analysis of multichannel data. Simulations of these algorithms on synthetic data illustrate the fundamental structure of the algorithms and how they are designed for the analysis of nonlinear and nonstationary data. Applications of the complex version of the algorithms to the synthetic data also demonstrate the benefit of the algorithms for the accurate frequency decomposition of multichannel data.