• Title/Summary/Keyword: Knowledge Trade

Search Result 322, Processing Time 0.03 seconds

Systematic Design of High-Resolution High-Frequency Cascade Continuous-Time Sigma-Delta Modulators

  • Tortosa, Ramon;Castro-Lopez, Rafael;De La Rosa, J.M.;Roca, Elisenda;Rodriguez-Vazquez, Angel;Fernandez, F.V.
    • ETRI Journal
    • /
    • v.30 no.4
    • /
    • pp.535-545
    • /
    • 2008
  • This paper introduces a systematic top-down and bottom-up design methodology to assist the designer in the implementation of continuous-time (CT) cascade sigma-delta (${\Sigma}{\Delta}$) modulators. The salient features of this methodology are (a) flexible behavioral modeling for optimum accuracy-efficiency trade-offs at different stages of the top-down synthesis process, (b) direct synthesis in the continuous-time domain for minimum circuit complexity and sensitivity, (c) mixed knowledge-based and optimization-based architectural exploration and specification transmission for enhanced circuit performance, and (d) use of Pareto-optimal fronts of building blocks to reduce re-design iterations. The applicability of this methodology will be illustrated via the design of a 12-bit 20 MHz CT ${\Sigma}{\Delta}$ modulator in a 1.2 V 130 nm CMOS technology.

  • PDF

New Constructions of Identity-based Broadcast Encryption without Random Oracles

  • Zhang, Leyou;Wu, Qing;Hu, Yupu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.428-439
    • /
    • 2011
  • The main challenge in building efficient broadcast systems is to encrypt messages with short ciphertexts. In this paper, we present a new construction based on the identity. Our construction contains the desirable features, such as constant size ciphertexts and private keys, short public keys and not fixing the total number of possible users in the setup. In addition, the proposed scheme achieves the full security which is stronger than the selective-identity security. Furthermore we show that the proof of security does not rely on the random oracles. To the best our knowledge, it is the first efficient scheme that is full security and achieves constant size ciphertexts and private keys which solve the trade-off between the ciphertext size and the private key size.

Mining Frequent Itemsets with Normalized Weight in Continuous Data Streams

  • Kim, Young-Hee;Kim, Won-Young;Kim, Ung-Mo
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.79-90
    • /
    • 2010
  • A data stream is a massive unbounded sequence of data elements continuously generated at a rapid rate. The continuous characteristic of streaming data necessitates the use of algorithms that require only one scan over the stream for knowledge discovery. Data mining over data streams should support the flexible trade-off between processing time and mining accuracy. In many application areas, mining frequent itemsets has been suggested to find important frequent itemsets by considering the weight of itemsets. In this paper, we present an efficient algorithm WSFI (Weighted Support Frequent Itemsets)-Mine with normalized weight over data streams. Moreover, we propose a novel tree structure, called the Weighted Support FP-Tree (WSFP-Tree), that stores compressed crucial information about frequent itemsets. Empirical results show that our algorithm outperforms comparative algorithms under the windowed streaming model.

Information Technologies In Teaching: The Basis Of Students' Knowledge

  • Morska, Nataliia;Fedorenko, Olena;Davydova, Olha;Andreev, Vitaly;Bohatyryova, Galina;Shcherbakova, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.44-53
    • /
    • 2021
  • The paper proposes to consider information technologies and their application in the educational process as a preparation of presentation material for students of higher educational institutions. The definition and place of information technologies in the educational space are considered. The object of research of this work is the pedagogical technology of presentation of educational information, which substantiates the pedagogical technology of visualization of educational information in higher education, as well as determine its composition and structure. The practical side of pedagogical technology of educational information presentation is considered.

Metatranscriptomic Analysis of Plant Viruses in Imported Pear and Kiwifruit Pollen

  • Lee, Hyo-Jeong;Jeong, Rae-Dong
    • The Plant Pathology Journal
    • /
    • v.38 no.3
    • /
    • pp.220-228
    • /
    • 2022
  • Pollen is a vector for viral transmission. Pollenmediated viruses cause serious economic losses in the fruit industry. Despite the commercial importance of pollen-associated viruses, the diversity of such viruses is yet to be fully explored. In this study, we performed metatranscriptomic analyses using RNA sequencing to investigate the viral diversity in imported apple and kiwifruit pollen. We identified 665 virus-associated contigs, which corresponded to four different virus species. We identified one virus, the apple stem grooving virus, from pear pollen and three viruses, including citrus leaf blotch virus, cucumber mosaic virus, and lychnis mottle virus in kiwifruit pollen. The assembled viral genome sequences were analyzed to determine phylogenetic relationships. These findings will expand our knowledge of the virosphere in fruit pollen and lead to appropriate management of international pollen trade. However, the pathogenic mechanisms of pollen-associated viruses in fruit trees should be further investigated.

A Study on Medical Contents of the Handbook of Jukgyo Written by Han, Seokhyo (한석효(韓錫斅)의 『죽교편람(竹僑便覽)』 의약(醫藥) 내용 연구)

  • Park, Hun-pyeong
    • Journal of Korean Medical classics
    • /
    • v.35 no.3
    • /
    • pp.33-40
    • /
    • 2022
  • Objectives : This paper analyzes medical contents of the Jukgyopyeonlam(Handbook of Jukgyo) which was written in 1849 by Han Seokhyo, a resident of Neungju, Jeolla-do. Methods : The author, bibliography, organization, cited literature, and content of the book were investigated. Results : 1. The author, Han, Seokhyo was not a doctor by trade, but rather a Confucian doctor. 2. The purpose of this book is to prepare non-medical personnel for emergencies. 3. While the book's organization follows those of existing books, the author's originality can be found among medical contents of the Jukgyopyeonlam. Conclusions : It can be understood that the medicinal contents of the Jukgyopyeonlam was written based on knowledge accumulated through numerous years of local clinical and medicinal experience in order for Confucian doctors in the countryside of Jeolla-do in the mid-19th century to be able to prepare for cases of emergency.

THE SUCCESS FACTORS OF PARTNERING IN THE SOUTH KOREA PM&CM MARKET

  • Bok-Nam Lee;Hyoun-Seung Jang;Seok-In Choi
    • International conference on construction engineering and project management
    • /
    • 2005.10a
    • /
    • pp.737-743
    • /
    • 2005
  • Since the designation of the South Korean Construction industry as an open market industry by the World Trade Organization (WTO) in 1994, South Korea's construction firms were exposed to competition from firms of other advanced countries. Increased competition in the industry raised quality of production and lowered the cost of construction projects. Therefore, many big construction projects were planned and constructed with foreign construction partners during the last decade. Also, from those projects the South Korea Construction industry accumulated experience in and knowledge of both project management and construction management perspectives. However, in the process of conducting those big projects, many problems - specifically responsibility and the limit of competence - occurred between foreign construction partners. Hence, this study attempts to improve its role model that is for local and foreign companies to enter into Joint Ventures in the South Korea construction industry.

  • PDF

Analysis and Priorities of State Regulation of the Labor Market in Crisis Conditions

  • Yurii Shpak;Vitaliy Davydenko;Vаsyl Pasichnyk;Valentyna Zhukovska;Viktoriya Ivanyuta
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.181-186
    • /
    • 2023
  • The main purpose of the study is to analyze the features of state regulation of the labor market in a crisis. Structural shifts in the labor market are due to the transformation of public and economic relations in today's globalized world. Increasing competition, the development of the knowledge economy, information technology, changes in the content and forms of labor require updating the labor market regulation system. The research methodology implies the use of modern methods of analysis. The analysis of the features of state regulation of the labor market in crisis conditions is carried out.

An Inverted-U Relationship for Environmental Pollution Loadings and Foreign Direct Investment (외국인 직접투자와 환경오염에 관한 연구)

  • Eun, Woong;Kim, Dong Yeub
    • Environmental and Resource Economics Review
    • /
    • v.12 no.4
    • /
    • pp.579-609
    • /
    • 2003
  • The role of foreign direct investment (FDI) as a channel of knowledge transfer and on the technological spillovers of know-how to other sectors in the economy is in the middle of this debate. Thus, foreign direct investment may have significant positive effects in reducing residual loadings and environmental pollution. There is an abiding concern expressed by many commentators that countries will lower their environmental standards to attract foreign investment, thereby creating so-called "pollution havens." Others argue that increasing foreign investment could promote "pollution halos" by introducing and transferring more efficient and less polluting technologies. The primary objective of this study is to show the dynamic relationship among pollution loadings, pollution abatement effort, and economic development with explicit consideration of FDI-related effects. This study found when foreign direct investment is evaluated in the model, the environmental pollution level is reduced and expenditure on pollution abatement is increased.

  • PDF

The World as Seen from Venice (1205-1533) as a Case Study of Scalable Web-Based Automatic Narratives for Interactive Global Histories

  • NANETTI, Andrea;CHEONG, Siew Ann
    • Asian review of World Histories
    • /
    • v.4 no.1
    • /
    • pp.3-34
    • /
    • 2016
  • This introduction is both a statement of a research problem and an account of the first research results for its solution. As more historical databases come online and overlap in coverage, we need to discuss the two main issues that prevent 'big' results from emerging so far. Firstly, historical data are seen by computer science people as unstructured, that is, historical records cannot be easily decomposed into unambiguous fields, like in population (birth and death records) and taxation data. Secondly, machine-learning tools developed for structured data cannot be applied as they are for historical research. We propose a complex network, narrative-driven approach to mining historical databases. In such a time-integrated network obtained by overlaying records from historical databases, the nodes are actors, while thelinks are actions. In the case study that we present (the world as seen from Venice, 1205-1533), the actors are governments, while the actions are limited to war, trade, and treaty to keep the case study tractable. We then identify key periods, key events, and hence key actors, key locations through a time-resolved examination of the actions. This tool allows historians to deal with historical data issues (e.g., source provenance identification, event validation, trade-conflict-diplomacy relationships, etc.). On a higher level, this automatic extraction of key narratives from a historical database allows historians to formulate hypotheses on the courses of history, and also allow them to test these hypotheses in other actions or in additional data sets. Our vision is that this narrative-driven analysis of historical data can lead to the development of multiple scale agent-based models, which can be simulated on a computer to generate ensembles of counterfactual histories that would deepen our understanding of how our actual history developed the way it did. The generation of such narratives, automatically and in a scalable way, will revolutionize the practice of history as a discipline, because historical knowledge, that is the treasure of human experiences (i.e. the heritage of the world), will become what might be inherited by machine learning algorithms and used in smart cities to highlight and explain present ties and illustrate potential future scenarios and visionarios.