• Title/Summary/Keyword: graph-based approach

Search Result 289, Processing Time 0.025 seconds

An Architecture for Efficient RDF Data Management Using Structure Index with Relation-Based Data Partitioning Approach

  • Nguyen, Duc;Oh, Sang-yoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.5 no.1
    • /
    • pp.14-17
    • /
    • 2013
  • RDF data is widely used for exchanging data nowadays to enable semantic web era. This leads to the need for storing and retrieving these data efficiently and effectively. Recently, the structure index in graph-based perspective is considered as a promising approach to deal with issues of complex query graphs. However, even though there are many researches based on structure indexing, there can be a better architectural approach instead of addressing the issue as a part. In this research, we propose architecture for storing, query processing and retrieving RDF data in efficient manner using structure indexing. Our research utilizes research results from iStore and 2 relation-based approaches and we focus on improving query processing to reduce the time of loading data and I/O cost.

A New Digital Image Steganography Approach Based on The Galois Field GF(pm) Using Graph and Automata

  • Nguyen, Huy Truong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4788-4813
    • /
    • 2019
  • In this paper, we introduce concepts of optimal and near optimal secret data hiding schemes. We present a new digital image steganography approach based on the Galois field $GF(p^m)$ using graph and automata to design the data hiding scheme of the general form ($k,N,{\lfloor}{\log}_2p^{mn}{\rfloor}$) for binary, gray and palette images with the given assumptions, where k, m, n, N are positive integers and p is prime, show the sufficient conditions for the existence and prove the existence of some optimal and near optimal secret data hiding schemes. These results are derived from the concept of the maximal secret data ratio of embedded bits, the module approach and the fastest optimal parity assignment method proposed by Huy et al. in 2011 and 2013. An application of the schemes to the process of hiding a finite sequence of secret data in an image is also considered. Security analyses and experimental results confirm that our approach can create steganographic schemes which achieve high efficiency in embedding capacity, visual quality, speed as well as security, which are key properties of steganography.

A Bayesian Approach to Dependent Paired Comparison Rankings

  • Kim, Hea-Jung;Kim, Dae-Hwang
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2003.05a
    • /
    • pp.85-90
    • /
    • 2003
  • In this paper we develop a method for finding optimal ordering of K statistical models. This is based on a dependent paired comparison experimental arrangement whose results can naturally be represented by a completely oriented graph (also so called tournament graph). Introducing preference probabilities, strong transitivity conditions, and an optimal criterion to the graph, we show that a Hamiltonian path obtained from row sum ranking is the optimal ordering. Necessary theories involved in the method and computation are provided. As an application of the method, generalized variances of K multivariate normal populations are compared by a Bayesian approach.

  • PDF

Adaptive Learning Path Recommendation based on Graph Theory and an Improved Immune Algorithm

  • BIAN, Cun-Ling;WANG, De-Liang;LIU, Shi-Yu;LU, Wei-Gang;DONG, Jun-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2277-2298
    • /
    • 2019
  • Adaptive learning in e-learning has garnered researchers' interest. In it, learning resources could be recommended automatically to achieve a personalized learning experience. There are various ways to realize it. One of the realistic ways is adaptive learning path recommendation, in which learning resources are provided according to learners' requirements. This paper summarizes existing works and proposes an innovative approach. Firstly, a learner-centred concept map is created using graph theory based on the features of the learners and concepts. Then, the approach generates a linear concept sequence from the concept map using the proposed traversal algorithm. Finally, Learning Objects (LOs), which are the smallest concrete units that make up a learning path, are organized based on the concept sequences. In order to realize this step, we model it as a multi-objective combinatorial optimization problem, and an improved immune algorithm (IIA) is proposed to solve it. In the experimental stage, a series of simulated experiments are conducted on nine datasets with different levels of complexity. The results show that the proposed algorithm increases the computational efficiency and effectiveness. Moreover, an empirical study is carried out to validate the proposed approach from a pedagogical view. Compared with a self-selection based approach and the other evolutionary algorithm based approaches, the proposed approach produces better outcomes in terms of learners' homework, final exam grades and satisfaction.

Spatial Reuse Algorithm Using Interference Graph in Millimeter Wave Beamforming Systems

  • Jo, Ohyun;Yoon, Jungmin
    • ETRI Journal
    • /
    • v.39 no.2
    • /
    • pp.255-263
    • /
    • 2017
  • This paper proposes a graph-theatrical approach to optimize spatial reuse by adopting a technique that quantizes the channel information into single bit sub-messages. First, we introduce an interference graph to model the network topology. Based on the interference graph, the computational requirements of the algorithm that computes the optimal spatial reuse factor of each user are reduced to quasilinear time complexity, ideal for practical implementation. We perform a resource allocation procedure that can maximize the efficiency of spatial reuse. The proposed spatial reuse scheme provides advantages in beamforming systems, where in the interference with neighbor nodes can be mitigated by using directional beams. Based on results of system level measurements performed to illustrate the physical interference from practical millimeter wave wireless links, we conclude that the potential of the proposed algorithm is both feasible and promising.

A Dependability Modeling of Software Under Memory Faults for Digital System in Nuclear Power Plants

  • Park, Jong-Gyun;Seong, Poong-Hyun
    • Nuclear Engineering and Technology
    • /
    • v.29 no.6
    • /
    • pp.433-443
    • /
    • 1997
  • In this work, an analytic approach to the dependability of software in the operational phase is suggested with special attention to the hardware fault effects on the software behavior : The hardware faults considered are memory faults and the dependability measure in question is the reliability. The model is based on the simple reliability theory and the graph theory which represents the software with graph composed of nodes and arcs. Through proper transformation, the graph can be reduced to a simple two-node graph and the software reliability is derived from this graph. Using this model, we predict the reliability of an application software in the digital system (ILS) in the nuclear power plant and show the sensitivity of the software reliability to the major physical parameters which affect the software failure in the normal operation phase. We also found that the effects of the hardware faults on the software failure should be considered for predicting the software dependability accurately in operation phase, especially for the software which is executed frequently. This modeling method is particularly attractive for the medium size programs such as the microprocessor-based nuclear safety logic program.

  • PDF

Transient Analysis of Self-Powered Energy-Harvesting using Bond-Graph

  • Makihara, Kanjuro;Shigeta, Daisuke;Fujita, Yoshiyuki;Yamamoto, Yuta
    • International Journal of Aerospace System Engineering
    • /
    • v.2 no.1
    • /
    • pp.47-52
    • /
    • 2015
  • The transient phenomenon of self-powered energy-harvesting is assessed using a bond-graph method. The bond-graph is an energy-based approach to describing physical-dynamic systems. It shows power flow graphically, which helps us understand the behavior of complicated systems in simple terms. Because energy-harvesting involves conversion of power in mechanical form to the electrical one, the bond-graph is a good tool to analyze this power flow. Although the bond-graph method can be used to calculate the dynamics of combining mechanical and electrical systems simultaneously, it has not been used for harvesting analysis. We demonstrate the usability and versatility of bond-graph for not only steady analysis but also transient analysis of harvesting.

Representation and Implementation of Graph Algorithms based on Relational Database (관계형 데이타베이스에 기반한 그래프 알고리즘의 표현과 구현)

  • Park, Hyu-Chan
    • Journal of KIISE:Databases
    • /
    • v.29 no.5
    • /
    • pp.347-357
    • /
    • 2002
  • Graphs have provided a powerful methodology to solve a lot of real-world problems, and therefore there have been many proposals on the graph representations and algorithms. But, because most of them considered only memory-based graphs, there are still difficulties to apply them to large-scale problems. To cope with the difficulties, this paper proposes a graph representation and graph algorithms based on the well-developed relational database theory. Graphs are represented in the form of relations which can be visualized as relational tables. Each vertex and edge of a graph is represented as a tuple in the tables. Graph algorithms are also defined in terms of relational algebraic operations such as projection, selection, and join. They can be implemented with the database language such as SQL. We also developed a library of basic graph operations for the management of graphs and the development of graph applications. This database approach provides an efficient methodology to deal with very large- scale graphs, and the graph library supports the development of graph applications. Furthermore, it has many advantages such as the concurrent graph sharing among users by virtue of the capability of database.

Content-based Image Retrieval Using Fuzzy Multiple Attribute Relational Graph (퍼지 다중특성 관계 그래프를 이용한 내용기반 영상검색)

  • Jung, Sung-Hwan
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.533-538
    • /
    • 2001
  • In this paper, we extend FARGs single mode attribute to multiple attributes for real image application and present a new CBIR using FMARG(Fuzzy Multiple Attribute Relational Graph), which can handle queries involving multiple attributes, not only object label, but also color, texture and spatial relation. In the experiment using the synthetic image database of 1,024 images and the natural image database of 1.026 images built from NETRA database and Corel Draw, the proposed approach shows 6~30% recall increase in the synthetic image database and a good performance, at the displacements and the retrieved number of similar images in the natural image database, compared with the single attribute approach.

  • PDF

A Study on the Automatic Synthesis of Signed Directed Graph Using Knowledge-based Approach and Loop Verification (지식 기반 접근법과 Loop 검증을 이용한 부호운향그래프 자동합성에 관한 연구)

  • Lee Sung-gun;An Dae-Myung;Hwang Kyu Suk
    • Journal of the Korean Institute of Gas
    • /
    • v.2 no.1
    • /
    • pp.53-58
    • /
    • 1998
  • By knowledge-based approach, the SDG(Signed Directed Graph) is automatically synthesized, which is commonly used to represent the causal effects between process variables. Automatic synthesis of SDG is progressed by two steps : (1)inference step uses knowledge base and (2)verification step uses Loop-Verifier. First, Topology and Knowledge Base are constructed by using the information on equipment. And then, Primary-SDG is synthesized by Character Pattern Matching between Variable-Relation-Representation generated by using Topology and Variable-Tendency-Data contained in Knowledge Base. Finally, a modified SDG is made after the Primary-SDG is verified by Loop-Verifier.

  • PDF