• Title/Summary/Keyword: random algorithm

Search Result 1,806, Processing Time 0.031 seconds

Cache Memory and Replacement Algorithm Implementation and Performance Comparison

  • Park, Na Eun;Kim, Jongwan;Jeong, Tae Seog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.11-17
    • /
    • 2020
  • In this paper, we propose practical results for cache replacement policy by measuring cache hit and search time for each replacement algorithm through cache simulation. Thus, the structure of each cache memory and the four types of alternative policies of FIFO, LFU, LRU and Random were implemented in software to analyze the characteristics of each technique. The paper experiment showed that the LRU algorithm showed hit rate and search time of 36.044% and 577.936ns in uniform distribution, 45.636% and 504.692ns in deflection distribution, while the FIFO algorithm showed similar performance to the LRU algorithm at 36.078% and 554.772ns in even distribution and 45.662% and 489.574ns in bias distribution. Then LFU followed, Random algorithm was measured at 30.042% and 622.866ns at even distribution, 36.36% at deflection distribution and 553.878ns at lowest performance. The LRU replacement method commonly used in cache memory has the complexity of implementation, but it is the most efficient alternative to conventional alternative algorithms, indicating that it is a reasonable alternative method considering the reference information of data.

A Study on Mobile Wireless Communication Network Optimization Using Global Search Algorithm (전역 탐색 알고리듬을 이용한 이동 무선통신 네트워크의 최적화에 대한 연구)

  • 김성곤
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.1
    • /
    • pp.87-93
    • /
    • 2004
  • In the design of mobile wireless communication network, BSC(Base Station Location), BSC(Base Station Controller) and MSC(Mobile Switching Center) are the most important parameters. Designing base station location, the cost must be minimized by combining various, complex parameters. We can solve this Problem by combining optimization algorithm, such as Simulated Annealing, Tabu Search, Genetic Algorithm, Random Walk Algorithm that have been used extensively for global optimization. This paper shows the 4 kinds of algorithm to be applied to the optimization of base station location for communication system and then compares, analyzes the results and shows optimization process of algorithm.

  • PDF

An Effective RED Algorithm for Congestion Control in the Internet (인터넷에서 혼잡제어를 위한 개선된 RED 알고리즘)

  • Jung, Kyu-Jung;Lee, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.39-44
    • /
    • 2003
  • The network performance gets down during congestion periods to solve the problem effectively. A RED(Random Earl Detection) algorithm of the queue management algorithm is proposed and IETF recommends it as a queue management. A RED algorithm controls a congestion aspect dynamically. In analyzing parameters when static value of parameter is set in the gateway cannot be handled the status of current network traffic properly We propose the Effective RED algorithm to solve with the weakness of RED In this algorithm the maximum drop probability decides to accept or drop the interning packets, is adjusted dynamically on the current queue state for controlling the congestion phase effectively in the gateway. This algorithm is confirmed by computer simulation using the NS(Network Simulator)-2.

Discrete Optimization of Structural System by Using the Harmony Search Heuristic Algorithm with Penalty Function (벌칙함수를 도입한 하모니서치 휴리스틱 알고리즘 기반 구조물의 이산최적설계법)

  • Jung, Ju-Seong;Choi, Yun-Chul;Lee, Kang-Seok
    • Journal of the Architectural Institute of Korea Structure & Construction
    • /
    • v.33 no.12
    • /
    • pp.53-62
    • /
    • 2017
  • Many gradient-based mathematical methods have been developed and are in use for structural size optimization problems, in which the cross-sectional areas or sizing variables are usually assumed to be continuous. In most practical structural engineering design problems, however, the design variables are discrete. The main objective of this paper is to propose an efficient optimization method for structures with discrete-sized variables based on the harmony search (HS) meta-heuristic algorithm that is derived using penalty function. The recently developed HS algorithm was conceptualized using the musical process of searching for a perfect state of harmony. It uses a stochastic random search instead of a gradient search so that derivative information is unnecessary. In this paper, a discrete search strategy using the HS algorithm with a static penalty function is presented in detail and its applicability using several standard truss examples is discussed. The numerical results reveal that the HS algorithm with the static penalty function proposed in this study is a powerful search and design optimization technique for structures with discrete-sized members.

A Novel Random PWM Technique with a Constant Switching Frequency Utilizing an Offset Voltage (옵셋 전압을 이용한 일정 스위칭 주파수의 Random PWM 기법)

  • Kim, Do-Kyeom;Kim, Sang-Hoon
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.22 no.1
    • /
    • pp.67-74
    • /
    • 2017
  • This study proposes a novel random pulse-width modulation (PWM) technique with a constant switching frequency utilizing a random offset voltage. The proposed PWM technique spreads switching harmonics by varying the position of an active voltage vector without a switching frequency variation. The implementation of the proposed PWM technique is simple because it does not require additional hardware and complex algorithm. The proposed random PWM technique is compared with the conventional PWM technique on the factors of harmonic spectrum, total harmonic distortion, and harmonic spread factor to confirm the harmonic spread effect. The validity of the proposed method is verified by simulations and experiments on a three-phase inverter drive system.

A Study on Image Restoration Algorithm in Random-Valued Impulse Noise Environment

  • Yinyu, Gao;Kim, Nam-Ho
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.331-335
    • /
    • 2011
  • Digital images are often corrupted by impulse noise, and it is very important to remove random-valued impulse noise. Cleaning such noise is far more difficult than cleaning salt and pepper impulse noise. In this paper, we proposed an efficient way to remove random-valued impulse noise from digital images. This novel method comprises two stages. The first stage is to detect the random-valued impulse noise in the image and the pixels are roughly divided into two classes, which are "noise-free pixel" and "noise pixel". Then, the second stage is to eliminate the random-valued impulse noise from the image. In this stage, only the "noise pixels" are processed. The "noise-free pixels" are copied directly to the output image. Simulation results indicated that our method provides a significant improvement over many other existing algorithms.

A SOLUTION OF THE ORNSTEIN-UHLENBECK EQUATION

  • MOON BYUNG SOO;THOMPSON RUSSEL C.
    • Journal of applied mathematics & informatics
    • /
    • v.20 no.1_2
    • /
    • pp.445-454
    • /
    • 2006
  • We describe a solution to the Ornstein-Uhlenbeck equation $\frac{dI}{dt}-\frac{1}{\tau}$I(t)=cV(t) where V(t) is a constant multiple of a Gaussian white noise. Our solution is based on a discrete set of Gaussian white noise obtained by taking sample points from a sum of single frequency harmonics that have random amplitudes, random frequencies, and random phases. Hence, it is different from the solution by the standard random walk using random numbers generated by the Box-Mueller algorithm. We prove that the power of the signal has the additive property, from which we derive that the Lyapunov characteristic exponent for our solution is positive. This compares with the solution by other methods where the noise is kept to be in an error range so that its Lyapunov exponent is negative.

An improved Bellman-Ford algorithm based on SPFA (SPFA를 기반으로 개선된 벨만-포드 알고리듬)

  • Chen, Hao;Suh, Hee-Jong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.721-726
    • /
    • 2012
  • In this paper, we proposed an efficient algorithm based on SPFA(shortest path faster algorithm), which is an improved the Bellman-Ford algorithm. The Bellman-Ford algorithm can be used on graphs with negative edge weights unlike Dijkstra's algorithm. And SPFA algorithm used a queue to store the nodes, to avoid redundancy, though the Bellman-Ford algorithm takes a long time to update the nodes table. In this improved algorithm, an adjacency list is also used to store each vertex of the graph, applying dynamic optimal approach. And a queue is used to store the data. The improved algorithm can find the optimal path by continuous relaxation operation to the new node. Simulations to compare the efficiencies for Dijkstra's algorithm, SPFA algorithm and improved Bellman-Ford were taken. The result shows that Dijkstra's algorithm, SPFA algorithm have almost same efficiency on the random graphs, the improved algorithm, although the improved algorithm is not desirable, on grid maps the proposed algorithm is very efficient. The proposed algorithm has reduced two-third times processing time than SPFA algorithm.

A Combined Random Scalar Multiplication Algorithm Resistant to Power Analysis on Elliptic Curves (전력분석 공격에 대응하는 타원곡선 상의 결합 난수 스칼라 곱셈 알고리즘)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.25-29
    • /
    • 2020
  • The elliptic curve crypto-algorithm is widely used in authentication for IoT environment, since it has small key size and low communication overhead compare to the RSA public key algorithm. If the scalar multiplication, a core operation of the elliptic curve crypto-algorithm, is not implemented securely, attackers can find the secret key to use simple power analysis or differential power analysis. In this paper, an elliptic curve scalar multiplication algorithm using a randomized scalar and an elliptic curve point blinding is suggested. It is resistant to power analysis but does not significantly reduce efficiency. Given a random r and an elliptic curve random point R, the elliptic scalar multiplication kP = u(P+R)-vR is calculated by using the regular variant Shamir's double ladder algorithm, where l+20-bit u≡rn+k(modn) and v≡rn-k(modn) using 2lP=∓cP for the case of the order n=2l±c.

A Simple Algorithm to Predict Committed Bit

  • Kim, Hyoung-Joong
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.2
    • /
    • pp.32-35
    • /
    • 2003
  • This paper presents a simple method to show that the committed bit based on pseudo-random sequence can be predicted with a probability very close to.

  • PDF