• Title/Summary/Keyword: K2-algorithm

Search Result 8,568, Processing Time 0.041 seconds

Farthest-k relay selection algorithm for efficient D2D message dissemination (효율적인 D2D 메시지 확산을 위한 최외곽 k개의 릴레이 선택 알고리즘)

  • Han, Seho;Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.543-548
    • /
    • 2017
  • In the conventional algorithm, the D2D message dissemination algorithm based on the Epidemic routing protocol frequently causes a problem of duplication of the received messages due to the overlaps of D2D transmission coverages. It is because all D2D devices that receive the messages perform relaying the message replicas to other D2D devices within their transmission range. Therefore, we herein propose the farthest-k relay selection algorithm to mitigate this message duplication problem. In the farthest-k relay selection algorithm, less than k devices within the D2D transmission range perform message relay. Furthermore, we perform comparative performance analysis between the conventional D2D data dissemination algorithm and our farthest-k relay selection algorithm. By using intensive MATLAB simulations we prove the performance excellency of our farthest-k relay algorithm compared with the conventional algorithm with respect to coverage probability, the total number of initially and duplicately received messages, and transmission efficiency.

Parameter Optimization of QUAL2K Using Influence Coefficient Algorithm and Genetic Algorithm (영향계수법과 유전알고리즘을 이용한 QUAL2K 모형의 매개변수 최적화)

  • Cho, Jae-Heon;Lee, Chang-Hun
    • Journal of Environmental Impact Assessment
    • /
    • v.18 no.2
    • /
    • pp.99-109
    • /
    • 2009
  • In general, manual calibration is commonly used for the stream water quality modelling. Because the manual calibration depends upon the subjectivity and experience of the researcher, it has a problem with the objectivity of the modelling. Thus, the interest about the automatic calibration by the optimization technique is deeply increased. In this study, Influence coefficient algorithm and Genetic algorithm are introduced to develop an automatic calibration model for the QUAL2K that are the latest version of the QUAL2E. Genetic algorithm, used in this study, is very simple and easy to understand but also applicable to any complicated mathematical problem, and it can find out the global optimum solution effectively. The developed automatic calibration model is applied to the Gangneung Namdaecheon. The calibration results about the 11 water quality variables show the good correspondence between the calculated and observed water quality values.

Integer Factorization Algorithm of Pollard's Rho Based on Multiple Initial Values (다중 초기치 Pollards's Rho 소인수분해 알고리즘)

  • Lee, Sang-Un
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.6
    • /
    • pp.19-25
    • /
    • 2017
  • This paper deals with integer factorization of two prime p,q of SHA-256 secure hash value n for Bit coin mining. This paper proposes an algorithm that greatly reduces the execution time of Pollard's rho integer factorization algorithm. Rho(${\rho}$) algorithm computes $x_i=x^2_{i-1}+1(mod\;n)$ and $y_i=[(y^2_{i-1}+1)^2+1](mod\;n)$ for intial values $(x_0,y_0)=(2,2)$ to find the factor 1 < $gcd({\mid}x_i-y_i{\mid},n)$ < n. It however fails to factorize some particular composite numbers. The algorithm proposed in this paper applies multiple initial values $(x_0,y_0)=(2^k,2^k)$ and ($2^k,2$), $2{\leq}k{\leq}10$ to the existing Pollard's Rho algorithm. As a results, the proposed algorithm achieves both the factorization of all the composite numbers and the reduction of the execution time of Pollard's Rho by 67.94%.

A SM2 Elliptic Curve Threshold Signature Scheme without a Trusted Center

  • Jie, Yan;Yu, Lu;Li-yun, Chen;Wei, Nie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.897-913
    • /
    • 2016
  • Threshold signature is very important in identity authentication and some other applications. In December 2010, Chinese Encryption Administration released the SM2 elliptic curve digital signature algorithm as the first standard of the digital signature algorithm in China. At present, the papers on the threshold signature scheme based on this algorithm are few. A SM2 elliptic curve threshold signature scheme without a trusted center is proposed according to the Joint-Shamir-RSS algorithm, the Joint-Shamir-ZSS algorithm, the sum or diff-SS algorithm, the Mul-SS algorithm, the Inv-SS algorithm and the PM-SS algorithm. The proposed scheme is analyzed from correctness, security and efficiency. The correctness analysis shows that the proposed scheme can realize the effective threshold signature. The security analysis shows that the proposed scheme can resist some kinds of common attacks. The efficiency analysis shows that if the same secret sharing algorithms are used to design the threshold signature schemes, the SM2 elliptic curve threshold signature scheme will be more efficient than the threshold signature scheme based on ECDSA.

Simplified 2-Dimensional Scaled Min-Sum Algorithm for LDPC Decoder

  • Cho, Keol;Lee, Wang-Heon;Chung, Ki-Seok
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.3
    • /
    • pp.1262-1270
    • /
    • 2017
  • Among various decoding algorithms of low-density parity-check (LDPC) codes, the min-sum (MS) algorithm and its modified algorithms are widely adopted because of their computational simplicity compared to the sum-product (SP) algorithm with slight loss of decoding performance. In the MS algorithm, the magnitude of the output message from a check node (CN) processing unit is decided by either the smallest or the next smallest input message which are denoted as min1 and min2, respectively. It has been shown that multiplying a scaling factor to the output of CN message will improve the decoding performance. Further, Zhong et al. have shown that multiplying different scaling factors (called a 2-dimensional scaling) to min1 and min2 much increases the performance of the LDPC decoder. In this paper, the simplified 2-dimensional scaled (S2DS) MS algorithm is proposed. In the proposed algorithm, we figure out a pair of the most efficient scaling factors which multiplications can be replaced with combinations of addition and shift operations. Furthermore, one scaling operation is approximated by the difference between min1 and min2. The simulation results show that S2DS achieves the error correcting performance which is close to or outperforms the SP algorithm regardless of coding rates, and its computational complexity is the lowest comparing to modified versions of MS algorithms.

Parallel Prefix Computation and Sorting on a Recursive Dual-Net

  • Li, Yamin;Peng, Shietung;Chu, Wanming
    • Journal of Information Processing Systems
    • /
    • v.7 no.2
    • /
    • pp.271-286
    • /
    • 2011
  • In this paper, we propose efficient algorithms for parallel prefix computation and sorting on a recursive dual-net. The recursive dual-net $RDN^k$(B) for k > 0 has $(2n_o)^{2K}/2$ nodes and $d_0$ + k links per node, where $n_0$ and $d_0$ are the number of nod es and the node-degree of the base-network B, respectively. Assume that each node holds one data item, the communication and computation time complexities of the algorithm for parallel prefix computation on $RDN^k$(B), k > 0, are $2^{k+1}-2+2^kT_{comm}(0)$ and $2^{k+1}-2+2^kT_{comp}(0)$, respectively, where $T_{comm}(0)$ and $T_{comp}(0)$ are the communication and computation time complexities of the algorithm for parallel prefix computation on the base-network B, respectively. The algorithm for parallel sorting on $RDN^k$(B) is restricted on B = $Q_m$ where $Q_m$ is an m-cube. Assume that each node holds a single data item, the sorting algorithm runs in $O((m2^k)^2)$ computation steps and $O((km2^k)^2)$ communication steps, respectively.

An Algorithm for Performance Index of Telecommunications Network

  • Shin, YongYeon;Lee, SoYeon;Koh, JaiSang
    • Journal of the Korean Society for Industrial and Applied Mathematics
    • /
    • v.2 no.2
    • /
    • pp.111-123
    • /
    • 1998
  • Performance index is a measure of telecommunications network integrating reliability and capacity simultaneously. This paper suggests a computerized algorithm evaluating a performance index for telecommunications network and compares this computerized algorithm with the algorithm[1] by experimenting on several benchmarks. A computerized algorithm proposed by this paper is superior to the algorithm[1] with respect to the computation time for most of the benchmarks.

  • PDF

DFT를 사용한 고속 constant modulus algorithm 의 성능분석

  • Yang, Yoon-Gi;Lee, Chang-Su;Yang, Soo-Mi
    • Journal of IKEEE
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2009
  • Recently, some frequency domain CMA (Constant Modulus Algorithm) have been introduced in an effort to reduce computational complexities [1,2]. In [1], a fast algorithm that minimizing cost function designed for block input signal is employed, while in [2], a novel cost function that minimizing sample by sample input is used. Although, the two fast algorithm save computational complexities as compared to CMA, the convergence behaviors of the two fast algorithm show different results with repsect to CMA. Thus, in this paper, some analytical results on the error surface of the fast frequency domain CMA are introduced. From the analytical results, we show that the more recent algorithm [2] outperforms the previous algorithm [1]. Simulation results reveals that the recent algorithm [2] shows 50% enhanced convergence with respect to the old fast algorithm [1]. Also, we show that the recent fast algorithm [2] has comparable convergence performance with respect to conventional CMA algorithm.

  • PDF

Performance evaluation for the channel estimation of RLS adaptive algorithm using pilot symbols for IMT-2000 system (IMT-2000 시스템의 파일럿 심볼을 이용한 RLS 적응형 채널추정 알고리즘의 성능 평가)

  • 구제길;최형진
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.2
    • /
    • pp.54-61
    • /
    • 2000
  • This paper presents the performance evaluation of channel estimation algorithm using RLS algorithm lot W-CDMA reverse link over Rayleigh fading channels. By obtaining BER(Bit Error Rate) performance through computer simulations, the RLS(Recursive Least Square) algorithm is compared with the existing WMSA(Weighted Averaging)(K=1,3) and constant gain algorithm. The channel structure, modulation and pilot patterns are applied to the ARIB (Association of Radio Industries and Business) and 3GPP (3rd Generation Partnership Project) ITU-R proposal for the IMT-2000. The BER performance of RLS algorithm with linear interpolation is similar to that of WMSA(K=1) and slightly superior to that of constant gain algorithm at low Doppler frequencies. Also, RLS algorithm performance is better than that of the WMSA(K=1,3) and constant gain algorithms about 4dB at BER=2.0$\times$$10^{-2}$ and Doppler frequencies $F_D$=320Hz. With increasing Doppler frequency, therefore, the BER performance of RLS algorithm with linear interpolation is superior to WMSA(K=L.3) and constant rain algorithms.

  • PDF

A STRONGLY CONVERGENT PARALLEL PROJECTION ALGORITHM FOR CONVEX FEASIBILITY PROBLEM

  • Dang, Ya-Zheng;Gao, Yan
    • Journal of applied mathematics & informatics
    • /
    • v.30 no.1_2
    • /
    • pp.93-100
    • /
    • 2012
  • In this paper, we present a strongly convergent parallel projection algorithm by introducing some parameter sequences for convex feasibility problem. To prove the strong convergence in a simple way, we transmit the parallel algorithm in the original space to an alternating one in a newly constructed product space. Thus, the strong convergence of the parallel projection algorithm is derived with the help of the alternating one under some parametric controlling conditions.