• Title/Summary/Keyword: logical operators

Search Result 24, Processing Time 0.023 seconds

An Improved Non-CSD 2-Bit Recursive Common Subexpression Elimination Method to Implement FIR Filter

  • Kamal, Hassan;Lee, Joo-Hyun;Koo, Bon-Tae
    • ETRI Journal
    • /
    • v.33 no.5
    • /
    • pp.695-703
    • /
    • 2011
  • The number of adders and critical paths in a multiplier block of a multiple constant multiplication based implementation of a finite impulse response (FIR) filter can be minimized through common subexpression elimination (CSE) techniques. A two-bit common subexpression (CS) can be located recursively in a noncanonic sign digit (CSD) representation of the filter coefficients. An efficient algorithm is presented in this paper to improve the elimination of a CS from the multiplier block of an FIR filter so that it can be realized with fewer adders and low logical depth as compared to the existing CSE methods in the literature. Vinod and others claimed the highest reduction in the number of logical operators (LOs) without increasing the logic depth (LD) requirement. Using the design examples given by Vinod and others, we compare the average reduction in LOs and LDs achieved by our algorithm. Our algorithm shows average LO improvements of 30.8%, 5.5%, and 22.5% with a comparative LD requirement over that of Vinod and others for three design examples. Improvement increases as the filter order increases, and for the highest filter order and lowest coefficient width, the LO improvements are 70.3%, 75.3%, and 72.2% for the three design examples.

An empirical comparison of static fuzzy relational model identification algorithms

  • Bae, Sang-Wook;Lee, Kee-Sang;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1994.10a
    • /
    • pp.146-151
    • /
    • 1994
  • An empirical comparison of static fuzzy relational models which are identified with different fuzzy implication operators and inferred by different composition operators is made in case that all the information is represented by the fuzzy discretization. Four performance measures (integral of mean squared error, maximal error, fuzzy equality index and mean lack of sharpness) are adopted to evaluate and compare the quality of the fuzzy relational models both at the numerical level and logical level. As the results, the fuzzy implication operators useful in various fuzzy modeling problems are discussed and it is empirically shown that the selection of data pairs is another important factor for identifying the fuzzy model with high quality.

  • PDF

An efficient Component Retrieval Scheme for multiple facet values and multiple facets (다중 패싯값과 다중 패싯을 위한 컴포넌트의 효율적인 검색 방법)

  • 금영욱
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.3
    • /
    • pp.16-22
    • /
    • 2002
  • Effective component retrieval is very essential for component based software development. Facet scheme is one of typical component retrieval methods and is being widely researched. In this paper, an efficient algorithm which supports a query with logical operator NOT for more than one facet values is presented. With this new algorithm the complexity to calculate a weighted synaptic connectivity matrix is enhanced. Also a new scheme is presented to support a query with logical operators for multiple facets.

  • PDF

A Study on the Application for Domestic Remote Operator Licensing System for Maritime Autonomous Surface Ships Using the AHP (AHP를 활용한 자율운항선박 원격운영자의 국내 면허체계 적용방안에 관한 연구)

  • HanKyu PARK;MinJae HA
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.6
    • /
    • pp.628-638
    • /
    • 2023
  • Maritime Autonomous Surface ships(MASS) are gradually gaining importance. Until fully autonomous ships are developed, they will likely be controlled by remote operators who are based in a Remote Operations Center. However, there is currently no internationally or domestically established licensing for them. This issue can potentially pose a risk to navigation safety due to operations being handled by unqualified remote operators. We conducted a literature review and proposed criteria for the adoption of a licensing system for remote operators. We have futher offered alternatives to integrate this license into the existing officer licensing system, and analyzed them using Analytic Hierarchy Process(AHP). Subsequently,, theprimary need to enact legislation for remote operators is observed. The most preferred approach is to include the occupation of a remote operator in the Ship Officer Act, Article 4: Occupational Categories and Class of Licenses. Therefore, it would be logical for the organizational structure of the Remote Operation Center to mirror the traditional Bridge Resource Management. This study will contribute to the efficient training of remote operators and the safe navigation of autonomous ships with a focus on human resource management.

Main causes of missing errors during software testing

  • Young-Mi Kim;Myung-Hwan Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.89-100
    • /
    • 2024
  • The primary goal of software testing is to identify and correct errors within software. A key challenge in this process is error masking, where errors disappear internally before reaching the output. This paper investigates the causes and characteristics of error masking, which complicates software testing. The study involved injecting artificial errors into three software programs to examine the extent of error masking by various test cases and to explore the underlying reasons. The experiment yielded four major findings. First, about 50% of the error masking occurred because the errors were not executed. Second, among various operators, logical and arithmetic operators masked errors less frequently, while relational and temporal operators tended to mask errors more extensively. Third, certain test cases demonstrated exceptional effectiveness in propagating errors to the output. Fourth, the type of error injected influenced the masking effect.

Scaling Network Information Services to Support HetNets and Dynamic Spectrum Access

  • Piri, Esa;Schulzrinne, Henning
    • Journal of Communications and Networks
    • /
    • v.16 no.2
    • /
    • pp.202-208
    • /
    • 2014
  • Wireless network information services allow end systems to discover heterogeneous networks and spectrum available for secondary use at or near their current location, helping them to cope with increasing traffic and finite spectrum resources. We propose a unified architecture that allows end systems to find nearby base stations that are using either licensed, shared or unlicensed spectrum across multiple network operators. Our study evaluates the performance and scalability of spatial databases storing base station coverage area geometries. The measurement results indicate that the current spatial databases perform well even when the number of coverage areas is very large. A single logical spatial database would likely be able to satisfy the query load for a large national cellular network. We also observe that coarse geographic divisions can significantly improve query performance.

A Study on the Curation Factors through Reverse Engineering Design of YouTube Algorithm - Focusing on Gender Keyword Search (유튜브 알고리즘의 역공학설계를 통한 큐레이션 요인 연구 - 성별 키워드 검색을 중심으로)

  • Bae, Seung-Ju;Lee, Sang-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.133-146
    • /
    • 2022
  • Despite the fact that Internet users around the world watch YouTube every day, very few users accurately recognize the recommendation algorithm for search results, and Google and YouTube are not disclosing it. Researchers tried to explore the undisclosed algorithm of YouTube in a reverse engineering design method, find key factors, and check the logical structure in which media platform operators recommend keyword search results and arrange them on the screen. Therefore, researchers studied the basic content priority factors through several months of discussion and data collection, and tried to reverse engineer the influencing factors based on the recommendation results according to male and female gender among the collected keyword search results. Although researchers' design only analyzed some of the almost infinite level of data uploaded and viewed for more than hundreds of hours every hour, these exploratory attempts will study media platform algorithms in the future, understand the intentions of operators, and protect users. thought it could be done.

A Study on RCM Application Focused on the Urban Railway (도시철도 중심의 RCM 적용에 관한 연구)

  • Shin, Kook-Ho;Oh, Ahn-Sup;Shin, Kun-Young;Hwang, Hong-Hwan;Seo, Seog-Chul
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.38-46
    • /
    • 2011
  • Recently railway operators are doing a lot of researches and studies in order to apply reliability technologies to their maintenance tasks. The maintenance in the aviation and the munitions industry has been developed enough to be benchmarked with the high quality reliability technologies; however, railway industry is still situated in a rudimentary stage with insufficient & limited data. 5678 Seoul Metropolitan Rapid Transit Corporation, which has 17 year experience of the EMU maintenance and system development, has made a constant effort for appling RCM (Reliability Centered Maintenance) to the maintenance for a few years. In this connection, the case study is to be introduced. This paper is based on 'RCM Gateway to World Class Maintenance' by Anthony M. Smith". The reliability technology are applied to the specific EMU and its system by 7 stages; accordingly, applying SMRT's maintenance experience, a unique standard for FMEA(failure mode effect analysis) & LTA(logical tree analysis) is established. Moreover, for reasonable and effective preventive maintenance tasks, the case considering an analysis of failure effects is selected in the final step 7. SMRT will develop reliability technologies through the application of the results to all the EMU systems.

  • PDF

Practical Alarm Suppression Rules and their Implementation for Nuclear Power Plants (원자력발전소의 출력감발모드를 위한 경보축약 규칙)

  • Hwang, In-Koo;Kim, Yang-Mo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.10
    • /
    • pp.1804-1810
    • /
    • 2011
  • It is necessary to adopt some logical techniques and methods of alarm processing for a large complex plant such as nuclear power plants in order to present the occurred alarm messages properly and concisely. Among such alarm processing techniques, the alarm suppressing function is a strong tool to avoid alarm flooding during the sudden transients of plant output power such as turbine trips, reactor trips and other incidents. Unless any suppression or representation technologies are used in an alarm message listing system, it cannot provide quick assistance to plant operators or supervisors during plant upsets because too many alarm messages are presented in an alarm list window. This paper presents the key suppression methods and analysis processes developed for implementing a suppressed alarm message listing function of an integrated alarm system called LogACTs which has been applied to a CANDU nuclear power plant. A simulation testing of the suppressing function conducted with the real plant alarm message list data has demonstrated an effective performance of the developed logics with the high suppression rate.

A Study of Construct Fuzzy Inference Network using Neural Logic Network

  • Lee, Jae-Deuk;Jeong, Hye-Jin;Kim, Hee-Suk;Lee, Malrey
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.5 no.1
    • /
    • pp.7-12
    • /
    • 2005
  • This paper deals with the fuzzy modeling for the complex and uncertain nonlinear systems, in which conventional and mathematical models may fail to give satisfactory results. Finally, we provide numerical examples to evaluate the feasibility and generality of the proposed method in this paper. The expert system which introduces fuzzy logic in order to process uncertainties is called fuzzy expert system. The fuzzy expert system, however, has a potential problem which may lead to inappropriate results due to the ignorance of some information by applying fuzzy logic in reasoning process in addition to the knowledge acquisition problem. In order to overcome these problems, We construct fuzzy inference network by extending the concept of reasoning network in this paper. In the fuzzy inference network, the propositions which form fuzzy rules are represented by nodes. And these nodes have the truth values representing the belief values of each proposition. The logical operators between propositions of rules are represented by links. And the traditional propagation rule is modified.