• Title/Summary/Keyword: Sequential processing

Search Result 478, Processing Time 0.023 seconds

Design of modified Feistel structure for high-capacity and high speed achievement (대용량 고속화 수행을 위한 변형된 Feistel 구조 설계에 관한 연구)

  • Lee Seon-Keun;Jung Woo-Yeol
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.183-188
    • /
    • 2005
  • Parallel processing in block cryptographic algorithm is difficult, because Feistel structure that is basis structure of block cryptographic algorithm is sequential processing structure. Therefore this paper changes these sequential processing structure and Feistel structure made parallel processing to be possible. This paper that apply this modified structure designed DES that have parallel Feistel structure. Proposed parallel Feistel structure could prove greatly block cryptographic algorithm's performance such as DES and so on that could not but have trade-off relation the data processing speed and data security interval because block cryptographic algorithm can not use pipeline method because of itself structural problem. Therefore, modified Feistel structure is going to display more superior security function and processing ability of high speed than now in case apply way that is proposed to SEED, AES's Rijndael, Twofish etc. that apply Feistel structure.

  • PDF

For-loop for Logic Programming (논리 프로그래밍을 위한 for-loop 구문)

  • Kwon, Kee-Hang;Ha, Hong-Pyo
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.69-72
    • /
    • 2012
  • Logic programming based on classical or linear logic has traditionally lacked devices for expressing sequential tasks and sequential iterative tasks. Expressing sequential goal tasks has been addressed by a recent proposal of sequential goals of the form $G_1{\cap}G_2$ which is based on the game semantics of Japaridze. This paper proposes sequential iterative goal formulas of the form ${\cap}_x^LG$ where $G$ is a goal, $x$ is a variable, and $L$ is a list. ${\cap}_x^L$ is called a sequential bounded quantier. These goals allow us to specify the following task: sequentially iterate $G$ with $x$ ranging over all the elements of $L$.

Analysis of Electromagnetic Forming Using Sequential Electromagnetic-Mechanical Coupled Simulations (순차적 전자기-구조 연성해석을 통한 전자기성형 공정 해석)

  • Kim, J.;Noh, H.G.;Ko, S.J.;Kim, T.J.
    • Transactions of Materials Processing
    • /
    • v.21 no.7
    • /
    • pp.441-446
    • /
    • 2012
  • A sequential coupled field analysis of electromagnetic free bulging was performed by using FEM. A 2D axi-symmetric electromagnetic model based on the magnetic vector potential is proposed for the calculation of magnetic field and Lorentz's forces. The Newmark integration method is used to calculate the transient dynamic plastic deformation of sheet during free bulging. In the finite element model, the effect of sheet deformation on the electromagnetic field analysis is taken into consideration. In order to confirm the sequential electromagnetic-mechanical coupling analysis, an experiment with an electromagnetic forming apparatus was conducted. The results showed that the final bulge height of the sheet predicted from the proposed method is in good agreement with experimentally measured height.

Implementation of interlock in Process Control System Described by Sequential Function Chart Graphical Language (Sequential Function Chart 그래픽 언어로 記述된 공정제어 시스템에서 인터록의 실현)

  • 유정봉;우광준;허경무
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.12 no.2
    • /
    • pp.54-61
    • /
    • 1998
  • Ladder Diagram(LD) is the most extensively used among Programmable Logic Controller(PLC) standard languages for the design of process control system with PLC. But LD has the disadvantages for data processing and maintenance. On the other hand, there is full support for describing sequences so that complete sequential behavior can be easily broken down using a concise graphical language called Sequential Function Chart(SFC). Inspite of those characteristics, SFC is not suitable for describing interlock logic. In this paper, we propose the method for implementing interlock logic by using conventional SFC compiler and verify the effectiveness by applying proposed scheme to the In-Line Spin Coater.Coater.

  • PDF

A Sequential Pattern Mining based on Dynamic Weight in Data Stream (스트림 데이터에서 동적 가중치를 이용한 순차 패턴 탐사 기법)

  • Choi, Pilsun;Kim, Hwan;Kim, Daein;Hwang, Buhyun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-144
    • /
    • 2013
  • A sequential pattern mining is finding out frequent patterns from the data set in time order. In this field, a dynamic weighted sequential pattern mining is applied to a computing environment that changes depending on the time and it can be utilized in a variety of environments applying changes of dynamic weight. In this paper, we propose a new sequence data mining method to explore the stream data by applying the dynamic weight. This method reduces the candidate patterns that must be navigated by using the dynamic weight according to the relative time sequence, and it can find out frequent sequence patterns quickly as the data input and output using a hash structure. Using this method reduces the memory usage and processing time more than applying the existing methods. We show the importance of dynamic weighted mining through the comparison of different weighting sequential pattern mining techniques.

Sequential Pattern Mining for Intrusion Detection System with Feature Selection on Big Data

  • Fidalcastro, A;Baburaj, E
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5023-5038
    • /
    • 2017
  • Big data is an emerging technology which deals with wide range of data sets with sizes beyond the ability to work with software tools which is commonly used for processing of data. When we consider a huge network, we have to process a large amount of network information generated, which consists of both normal and abnormal activity logs in large volume of multi-dimensional data. Intrusion Detection System (IDS) is required to monitor the network and to detect the malicious nodes and activities in the network. Massive amount of data makes it difficult to detect threats and attacks. Sequential Pattern mining may be used to identify the patterns of malicious activities which have been an emerging popular trend due to the consideration of quantities, profits and time orders of item. Here we propose a sequential pattern mining algorithm with fuzzy logic feature selection and fuzzy weighted support for huge volumes of network logs to be implemented in Apache Hadoop YARN, which solves the problem of speed and time constraints. Fuzzy logic feature selection selects important features from the feature set. Fuzzy weighted supports provide weights to the inputs and avoid multiple scans. In our simulation we use the attack log from NS-2 MANET environment and compare the proposed algorithm with the state-of-the-art sequential Pattern Mining algorithm, SPADE and Support Vector Machine with Hadoop environment.

Design of Sequential System Controller Using Incidence Matrix (접속 행렬을 이용한 순차 시스템 제어기 설계)

  • 전호익;류창근;우광준
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.12 no.1
    • /
    • pp.85-92
    • /
    • 1998
  • In this paper, we design a sequential system controller, which is capable of processing parallel sequence, on the basis of analysis of control specification described by Petri Net with incidence matrix. The sequential system controller consists of input conditioning unit and petri net control unit which is composed of the token control unit and firing unit. The firing unit determines the firing condition of the transfer signal on the basis of the token status of token control unit. By the proposed scheme, we can easily develop and implement the sequential system controller of automated warehousing system, automated transportation system, elevator system, and so on, as it is possible to modify control specification by changing simply the content of incidence matrix ROM and to expand easily functional capacity as the result of modular design.design.

  • PDF

Design and Implementation of a USN Middleware for Context-Aware and Sensor Stream Mining

  • Jin, Cheng-Hao;Lee, Yang-Koo;Lee, Seong-Ho;Yun, Un-il;Ryu, Keun-Ho
    • Spatial Information Research
    • /
    • v.19 no.1
    • /
    • pp.127-133
    • /
    • 2011
  • Recently, with the advances in sensor techniques and net work computing, Ubiquitous Sensor Network (USN) has been received a lot of attentions from various communities. The sensor nodes distributed in the sensor network tend to continuously generate a large amount of data, which is called stream data. Sensor stream data arrives in an online manner so that it is characterized as high-speed, real-time and unbounded and it requires fast data processing to get the up-to-date results. The data stream has many application domains such as traffic analysis, physical distribution, U-healthcare and so on. Therefore, there is an overwhelming need of a USN middleware for processing such online stream data to provide corresponding services to diverse applications. In this paper, we propose a novel USN middleware which can provide users both context-aware service and meaningful sequential patterns. Our proposed USN middleware is mainly focused on location based applications which use stream location data. We also show the implementation of our proposed USN middleware. By using the proposed USN middleware, we can save the developing cost of providing context aware services and stream sequential patterns mainly in location based applications.

Sequential Polyadenylation to Enable Alternative mRNA 3' End Formation

  • Yajing Hao;Ting Cai;Chang Liu;Xuan Zhang;Xiang-Dong Fu
    • Molecules and Cells
    • /
    • v.46 no.1
    • /
    • pp.57-64
    • /
    • 2023
  • In eukaryotic cells, a key RNA processing step to generate mature mRNA is the coupled reaction for cleavage and polyadenylation (CPA) at the 3' end of individual transcripts. Many transcripts are alternatively polyadenylated (APA) to produce mRNAs with different 3' ends that may either alter protein coding sequence (CDS-APA) or create different lengths of 3'UTR (tandem-APA). As the CPA reaction is intimately associated with transcriptional termination, it has been widely assumed that APA is regulated cotranscriptionally. Isoforms terminated at different regions may have distinct RNA stability under different conditions, thus altering the ratio of APA isoforms. Such differential impacts on different isoforms have been considered as post-transcriptional APA, but strictly speaking, this can only be considered "apparent" APA, as the choice is not made during the CPA reaction. Interestingly, a recent study reveals sequential APA as a new mechanism for post-transcriptional APA. This minireview will focus on this new mechanism to provide insights into various documented regulatory paradigms.

Modeling and Verification of Workflows with Various Parallel Dependencies (다양한 병행 종속성을 포함한 워크플로우 모델링 및 검증)

  • 정희택;이도헌
    • The Journal of Information Technology and Database
    • /
    • v.6 no.1
    • /
    • pp.59-72
    • /
    • 1999
  • A study on workflow system as an automated business processing system is done recently. However, it did not consider various dependencies between parallel tasks. Therefore, this paper proposes modeling and verification of workflows with various parallel dependencies. For this, firstly, we propose four dependencies to specify various parallel dependencies between tasks. They contain sequential starts, parallel starts, sequential commits, and parallel commits. Secondly, we suggest a method to specify various parallel dependencies on workflow graph. Thirdly, we propose a verification method to detect contradictions on workflow specifications.

  • PDF