• Title/Summary/Keyword: Information propagation

Search Result 2,175, Processing Time 0.032 seconds

Influence of preserved brewing yeast strains on fermentation behavior and flocculation capacity

  • Cheong, Chul;Wackerbauer, Karl;Beckmann, Martin;Kang, Soon-Ah
    • Nutrition Research and Practice
    • /
    • v.1 no.4
    • /
    • pp.260-265
    • /
    • 2007
  • Preservation methods on the physiological and brewing technical characters in bottom and top brewing yeast strains were investigated. The preserved yeasts were reactivated after 24 months storage and grown up to stationary phase. The samples of filter paper storage indicated a higher cell growth and viability during propagation than those of nitrogen and lyophilization storage independent on propagation temperature. In addition, the filter paper storage demonstrated a faster absorption of free amino nitrogen and a highest level of higher aliphatic alcohols production during propagation than other preservation methods, which can be attributed to intensive cell growth during propagation. Moreover, the filter paper storage showed a faster accumulation for glycogen and trehalose during propagation, whereas, in particular, lyophilization storage noted a longer adaptation time regarding synthesis of glycogen and trehalose with delayed cell growth. In beer analysis, the filter paper storage formed an increased higher aliphatic alcohols than control. In conclusion, the preservation of filter paper affected positively on yeast growth, viability and beer quality independent on propagation temperature. In addition, in this study, it was obtained that the HICF and Helm-test can be involved as rapid methods for determination of flocculation capacity.

Compare the accuracy of stereo matching using belief propagation and area-based matching (Belief Propagation를 적용한 스테레오 정합과 영역 기반 정합 알고리즘의 정확성 비교)

  • Park, Jong-Il;Kim, Dong-Han;Eum, Nak-Woong;Lee, Kwang-Yeob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.119-122
    • /
    • 2011
  • The Stereo vision using belief propagation algorithm that has been studied recently yields good performance in disparity extraction. In this paper, BP algorithm is proved theoretically to high precision for a stereo matching algorithm. We derive disparity map from stereo image by using Belief Propagation (BP) algorithm and area-based matching algorithm. Two algorithms are compared using stereo images provided by Middlebury web site. Disparity map error rate decreased from 52.3% to 2.3%.

  • PDF

Internet Worm Propagation Modeling using a Statistical Method (통계적 방법을 이용한 웜 전파 모델링)

  • Woo, Kyung-Moon;Kim, Chong-Kwon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.212-218
    • /
    • 2012
  • An Internet worm is a self-replicating malware program which uses a computer network. As the network connectivity among computers increases, Internet worms have become widespread and are still big threats. There are many approaches to model the propagation of Internet worms such as Code Red, Nimda, and Slammer to get the insight of their behaviors and to devise possible defense methods to suppress worms' propagation activities. The influence of the network characteristics on the worm propagation has usually been modeled by medical epidemic model, named SI model, due to its simplicity and the similarity of propagation patterns. So far, SI model is still dominant and new variations of the SI model, called SI-style models, are being proposed for the modeling of new Internet worms. In this paper, we elaborate the problems of SI-style models and then propose a new accurate stochastic model using an occupancy problem.

A Study on the Generation and Processing of Depth Map for Multi-resolution Image Using Belief Propagation Algorithm (신뢰확산 알고리즘을 이용한 다해상도 영상에서 깊이영상의 생성과 처리에 관한 연구)

  • Jee, Innho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.201-208
    • /
    • 2015
  • 3D image must have depth image for depth information in order for 3D realistic media broadcasting. We used generally belief propagation algorithm to solve probability model. Belief propagation algorithm is operated by message passing between nodes corresponding to each pixel. The high resolution image will be able to precisely represent but that required much computational complexity for 3D representation. We proposed fast stereo matching algorithm using belief propagation with multi-resolution based wavelet or lifting. This method can be shown efficiently computational time at much iterations for accurate disparity map.

Optimal Conditions for Propagation in Bottom and Top Brewing Yeast Strains

  • Cheong, Chul;Wackerbauer, Karl;Lee, Si-Kyung;Kang, Soon-Ah
    • Food Science and Biotechnology
    • /
    • v.17 no.4
    • /
    • pp.739-744
    • /
    • 2008
  • The method of yeast propagation has an influence on yeast physiology, fermentation ability, flocculation rate, and taste stability of beer. In order to find optimal conditions for propagation, several parameters were investigated in combinations. The bottom brewing yeast grown at $10^{\circ}C$ indicated that a higher flocculation capacity during the $1^{st}$ fermentation. However, the taste stability and the aroma profile were not affected by parameters of propagation investigated. The beer quality was rather affected by storage duration. In addition, a correlation between tasting and chemiluminescence was found at the beer, which was produced using bottom brewing yeast. The propagation at $10-25^{\circ}C$ with addition of zinc ion indicated the best condition to improve fermentation ability, flocculation rate, and filterability for bottom brewing yeast, whereas the propagation at $30^{\circ}C$ with addition of zinc ion showed the best condition to increase fermentation ability for top brewing yeasts.

Movie recommendation system using community detection based on label propagation (레이블 전파에 기반한 커뮤니티 탐지를 이용한 영화추천시스템)

  • Xinchang, Khamphaphone;Vilakone, Phonexay;Lee, Han-Hyung;Song, Min-Hyuk;Park, Doo-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.273-276
    • /
    • 2019
  • There is a lot of information in our world, quick access to the most accurate information or finding the information we need is more difficult and complicated. The recommendation system has become important for users to quickly find the product according to user's preference. A social recommendation system using community detection based on label propagation is proposed. In this paper, we applied community detection based on label propagation and collaborative filtering in the movie recommendation system. We implement with MovieLens dataset, the users will be clustering to the community by using label propagation algorithm, Our proposed algorithm will be recommended movie with finding the most similar community to the new user according to the personal propensity of users. Mean Absolute Error (MAE) is used to shown efficient of our proposed method.

Chosen Message Attack on the RSA-CRT Countermeasure Based on Fault Propagation Method (오류 확산 기법에 기반한 RSA-CRT 대응책에 대한선택 메시지 공격)

  • Baek, Yi-Roo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.135-140
    • /
    • 2010
  • The computation using Chinese Remainder Theorem in RSA cryptosystem is well suited in the digital signature or decryption processing due to its low computational load compared to the case of general RSA without CRT. Since the RSA-CRT algorithm is vulnerable to many fault insertion attacks, some countermeasures against them were proposed. Among several countermeasures, Yen et al. proposed two schemes based on fault propagation method. Unfortunately, a new vulnerability was founded in FDTC 2006 conference. To improve the original schemes, Kim et al. recently proposed a new countermeasure in which they adopt the AND operation for fault propagation. In this paper, we show that the proposed scheme using AND operation without checking procedure is also vulnerable to fault insertion attack with chosen messages.

Propagation Mode Analysis of Leaky Coaxial Cable with Periodic Symmetrical Slots (주기적인 대칭 슬롯을 가진 누설동축 케이블의 전파모드 해석)

  • 홍용인;맹명재;김정기
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.9
    • /
    • pp.53-63
    • /
    • 1994
  • In indoor radio systems, vehicular communication systems, and land mobile systems, a very important problem is that of maintaining stable communications at all locations. Therefore solutions for the indoor propagation problem are important aspects of the mobile communication system. leaky coxial cables are finding increasing use in communications systesm involving mines, tunnels, tailroads, and highways, and in new obstacle detection, or guided radar, schemes for ground transportation and perimenter surveilance. In this paper a leaky coaxial cable having periodic slots in the outer conductor is described to obtain the propagation modes in the various environments. We use aneccentric cylindrical model to develop the theory for surface-wave propagation on the cable. Numerical Results are also included for the propagation constants, field distribution and current distribution. First, we derive the electromagnetic equation for leaky coaxial cable having symmetrical periodic slots using mode-matching method and Floquet's theorem, and then find various modes, propagation constants, field distribution, etc.

  • PDF

Passive Benign Worm Propagation Modeling with Dynamic Quarantine Defense

  • Toutonji, Ossama;Yoo, Seong-Moo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.1
    • /
    • pp.96-107
    • /
    • 2009
  • Worm attacks can greatly distort network performance, and countering infections can exact a heavy toll on economic and technical resources. Worm modeling helps us to better understand the spread and propagation of worms through a network, and combining effective types of mitigation techniques helps prevent and mitigate the effects of worm attacks. In this paper, we propose a mathematical model which combines both dynamic quarantine and passive benign worms. This Passive Worm Dynamic Quarantine (PWDQ) model departs from previous models in that infected hosts will be recovered either by passive benign worms or quarantine measure. Computer simulation shows that the performance of our proposed model is significantly better than existing models, in terms of decreasing the number of infectious hosts and reducing the worm propagation speed.

The gate delay time and the design of VCO using variable MOS capacitance

  • Ryeo, Ji-Hwan
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.99-102
    • /
    • 2005
  • In the paper, a proposed VCO based on bondwire inductances and nMOS varactors was implemented in a standard $0.25\;{\mu}m$ CMOS process. Using the new drain current model and a propagation delay time model equations, the operation speed of CMOS gate will predict the dependence on the load capacitance and the depth of oxide, threshold voltage, the supply voltage, the channel length. This paper describes the result of simulation which calculated a gate propagation delay time by using new drain current model and a propagation delay time model. At the result, When the reverse bias voltage on the substrate changes from 0 voltage to 3 voltage, the propagation delay time is appeared the delay from 0.8 nsec to 1 nsec. When the reverse voltage is biased on the substrate, for reducing the speed delay time, a supply voltage has to reduce. The $g_m$ value of MOSFET is calculated by using new drain current model.

  • PDF