• Title/Summary/Keyword: Valid Time

Search Result 725, Processing Time 0.029 seconds

A single-phase algorithm for mining high utility itemsets using compressed tree structures

  • Bhat B, Anup;SV, Harish;M, Geetha
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1024-1037
    • /
    • 2021
  • Mining high utility itemsets (HUIs) from transaction databases considers such factors as the unit profit and quantity of purchased items. Two-phase tree-based algorithms transform a database into compressed tree structures and generate candidate patterns through a recursive pattern-growth procedure. This procedure requires a lot of memory and time to construct conditional pattern trees. To address this issue, this study employs two compressed tree structures, namely, Utility Count Tree and String Utility Tree, to enumerate valid patterns and thus promote fast utility computation. Furthermore, the study presents an algorithm called single-phase utility computation (SPUC) that leverages these two tree structures to mine HUIs in a single phase by incorporating novel pruning strategies. Experiments conducted on both real and synthetic datasets demonstrate the superior performance of SPUC compared with IHUP, UP-Growth, and UP-Growth+algorithms.

Numerical Study of the Magnetohydrodynamic Heat Transfer Peristaltic Flow in Tube Against High Reynolds Number

  • Hamid, A.H.;Javed, Tariq;Ali, N.
    • Journal of the Korean Physical Society
    • /
    • v.73 no.9
    • /
    • pp.1295-1302
    • /
    • 2018
  • In the present investigation, we have studied the magnetohydrodynamic (MHD) heat transfer of peristaltic flow in a tube. The analysis is made without imposing any assumption to obtain the streamline and isothermal line directly. Galerkin's finite element method has been used on the governing Navier-Stoke's equation in the form of ${\psi}-{\omega}$. The graphs of the computed longitudinal velocity, temperature and pressure are plotted against different value of the emerging parameter by using the stream function and vorticity. The results are valid beyond the long wavelength and the low Reynolds number limits. We conclude that higher values of the parameters are not independent of the time mean flow rate.

Improved Dual Sinc Pulses to Reduce ICI Power and PAPR in OFDM-based Systems

  • Kamal, Shaharyar;Kang, Hojin;Meza, Cesar A. Azurdia;Kim, Dong Seong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4927-4945
    • /
    • 2020
  • A newfangled family of Nyquist-I pulses is proposed and named improved dual sinc pulse (IDSP). The IDSP is designed to improve performance in orthogonal frequency division multiplexing (OFDM)-based systems. The IDSP is a generalization of the dual sinc pulse (DSPP). This is because the DSP was formulated for α = 1 whereas the IDSPP is valid for 0 ≤ α ≤ 1. The behavior of the IDSP is promising in terms of its frequency and time domain responses. Theoretical and numerical outcomes indicate that the IDSP outperformed other existing pulses applied in OFDM-based systems for various key evaluation metrics.

Effect of "Green-one" organic nutrient on mycelial growth and fruiting of Pleurotus ostreatus (유기농 자재 『그린원』이 느타리버섯(Pleurotus ostreatus)의 균사생장 및 자실체 생육에 미치는 영향)

  • Chang, H.Y.;Kim, S.J.;Kim, J.K.;Kim, J.H.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.12 no.1
    • /
    • pp.21-27
    • /
    • 2010
  • The objective of this study was to determine the effects of "Green-one" organic nutrient on mycelial growth and fruiting of P. ostreatus. The dilution concentrations of "Green-one" was treated as follows. There was control, 100, 200, 400 concentrations. That treatments were treated with step of each mycelial growth step. The best of growth steps was mycelial scratching step. At that time, DPI(Day required for primordial formation after inoculation) was shortened for 1 day. Valid germination stipe are 15 pieces, 3 pieces more than control. Stipe length and stipe diameter was long each 4mm, 3mm more than control. Pileus size is shortened than control. Yields per one bottle(g/850cc) was 146g increased 6.5% than control 137g/850cc.

Denoising 3D Skeleton Frames using Intersection Over Union

  • Chuluunsaikhan, Tserenpurev;Kim, Jeong-Hun;Choi, Jong-Hyeok;Nasridinov, Aziz
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.474-475
    • /
    • 2021
  • The accuracy of real-time video analysis system based on 3D skeleton data highly depends on the quality of data. This study proposes a methodology to distinguish noise in 3D skeleton frames using Intersection Over Union (IOU) method. IOU is metric that tells how similar two rectangles (i.e., boxes). Simply, the method decides a frame as noise or not by comparing the frame with a set of valid frames. Our proposed method distinguished noise in 3D skeleton frames with the accuracy of 99%. According to the result, our proposed method can be used to track noise in 3D skeleton frames.

The Effect of Chatbot Service Quality on Customer Satisfaction and Continuous Use Intention (챗봇 서비스품질이 고객만족과 지속사용의도에 미치는 영향)

  • Min Jeong KIM
    • Journal of Korea Artificial Intelligence Association
    • /
    • v.2 no.1
    • /
    • pp.15-24
    • /
    • 2024
  • This study is about the effect of chatbot service quality on customer satisfaction and continuous use intention. Data collection was conducted for 13 days from October 23 to November 5, 2023, and a survey was conducted on customers who have used chatbot services. A total of 572 questionnaires were targeted, of which 545 valid data were used for analysis, excluding those that responded insincerely or did not meet the purpose of the study. The analysis results of this study are as follows: First, chatbot service quality partially had a significant effect on satisfaction. Second, customer satisfaction had a significant effect on continuous use intention. Therefore, in order to have a positive impact on continuous use intention, it is necessary to focus on marketing strategies related to chatbot service quality. Also, research focusing on data analysis and performance evaluation is crucial for enhancing chatbot services, necessitating studies that address real-time changes. Through sophisticated data analysis and variable measurement, chatbot services can be effectively improved, leading to enhanced customer satisfaction.

Development of Classification System for Critical Care Nursing Based on Nursing Needs (간호요구도에 따른 중환자간호 분류도구 개발)

  • Yoo, Cheong Suk;Kim, Keum Soon
    • Journal of Korean Clinical Nursing Research
    • /
    • v.19 no.1
    • /
    • pp.33-44
    • /
    • 2013
  • Purpose: This study was done to develop a valid and reliable Classification System for Critical Care Nursing (CSCCN) to be used in Intensive Care Units (ICUs). Methods: Head nurses and staff nurses of 17 ICUs in 6 hospitals classified 307 patients to verify interrater reliability. To verify construct validity, the staff nurses classified 404 patients according to CSCCN comparing difference in medical department and type of stay in ICU. For conversion index, 78 patients from 4 ICUs of 'S' hospital were classified and nursing time was measured by 107 nurses and 18 nurse aids using stopwatches. Results: The developed CSCCN has 11 categories, 76 nursing activities and 101 criteria. The reliability was verified as having high agreement (r=.946). The construct validity was verified comparing differences in medical department and type of stay in ICU. According to scores, four groups in the CSCCN classification were identified. According to the conversion index, one score on the CSCCN means 7.2 minutes of nursing time. Conclusion: CSCCN can be used to measure diverse and complex nursing demands including psycho-social aspects of ICU patients and convert nursing demands to numbers.

Study of the Unsteady Gas Flow in a Critical Nozzle (임계노즐에서 발생하는 비정상유동에 관한 연구)

  • Kim, Jae-Hyung;Kim, Heuy-Dong;Park, Kyung-Am
    • 유체기계공업학회:학술대회논문집
    • /
    • 2002.12a
    • /
    • pp.337-345
    • /
    • 2002
  • The present study addresses a computational result of unsteady gas flow through a critical nozzle. The axisymmetric, unsteady, compressible, Wavier-Stokes equations are solved using a finite volume method that makes use of the second order upwind scheme for spatial derivatives and the multi-stage Runge-Kutta integral scheme for time derivatives. The steady solutions of the governing equation system are validated with the previous experimental data to ensure that the present computational method is valid to predict the critical nozzle flows. In order to simulate the effects of back pressure fluctuations on the critical nozzle flows, an excited pressure oscillation with an amplitude and frequency is assumed downstream of the exit of the critical nozzle. The results obtained show that for low Reynolds numbers, the unsteady effects of the pressure fluctuations can propagate upstream of the throat of critical nozzle, and thus giving rise to the applicable fluctuations in mass flow rate through the critical nozzle, while for high Reynolds numbers, the pressure signals occurring at the exit of the critical nozzle do not propagate upstream beyond the nozzle throat. For very low Reynolds number, it is found that the sonic line near the throat of the critical nozzle remarkably fluctuateswith time, providing an important mechanism for pressure signals to propagate upstream of the nozzle throat, even in choked flow conditions. The present study is the first investigation to clarify the unsteady effects on the critical nozzle flows.

  • PDF

Discussion on the Practical Use of CFD for Grate Type Waste Incinerators (회격자식 소각로의 열유동 해석과 결과 분석에 대한 고찰)

  • Ryu C.;Choi S.
    • Journal of computational fluids engineering
    • /
    • v.7 no.3
    • /
    • pp.17-26
    • /
    • 2002
  • Computational fluid dynamic(CFD) analysis has been frequently applied to the waste incinerators to understand the flow performance for various design and operating parameters. Since the computational modeling inevitably requires many simplifications and complicated sub-models, validity of the results should be carefully evaluated. In this study, major computational modeling and procedure of usual simulation methods for the grate-type waste incinerators were assessed. Usual simulation method does not explicitly incorporate the waste combustion, simply by assuming the combustion gas properties from the waste bed which is treated as an inlet plane. However, effect of this arbitrary assumption on the overall flow pattern is not significant, since the flow pattern is dominated by strong pattern of jet flows of the secondary air. Thus, this method is valid in understanding the effect of flow-related parameters. In analyzing the results, deriving conclusive information directly from temperature and chemical species concentration should be avoided, since the model prediction for the gaseous reaction and the radiation reveals significant discrepancies against the actual phenomena. Use of quantitative measures such as residence time is very efficient in evaluating the flow performance.

Functional Privacy-preserving Outsourcing Scheme with Computation Verifiability in Fog Computing

  • Tang, Wenyi;Qin, Bo;Li, Yanan;Wu, Qianhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.281-298
    • /
    • 2020
  • Fog computing has become a popular concept in the application of internet of things (IoT). With the superiority in better service providing, the edge cloud has become an attractive solution to IoT networks. The data outsourcing scheme of IoT devices demands privacy protection as well as computation verification since the lightweight devices not only outsource their data but also their computation. Existing solutions mainly deal with the operations over encrypted data, but cannot support the computation verification in the same time. In this paper, we propose a data outsourcing scheme based on an encrypted database system with linear computation as well as efficient query ability, and enhance the interlayer program in the original system with homomorphic message authenticators so that the system could perform computational verifying. The tools we use to construct our scheme have been proven secure and valid. With our scheme, the system could check if the cloud provides the correct service as the system asks. The experiment also shows that our scheme could be as effective as the original version, and the extra load in time is neglectable.