• Title/Summary/Keyword: redundant data

Search Result 442, Processing Time 0.026 seconds

Reallocation Data Reusing Technique for BISR of Embedded Memory Using Flash Memory (플래시 메모리를 이용한 내장 메모리 자가 복구의 재배치 데이타 사용 기술)

  • Shim, Eun-Sung;Chang, Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.8
    • /
    • pp.377-384
    • /
    • 2007
  • With the advance of VLSI technology, the capacity and density of memories is rapidly growing. In this paper, We proposed a reallocation algorithm for faulty memory part to efficient reallocation with row and column redundant memory. Reallocation information obtained from faulty memory by only every test. Time overhead problem occurs geting reallocation information as every test. To its avoid, one test resulted from reallocation information can save to flash memory. In this paper, reallocation information increases efficiency using flash memory.

Vehicle Mobility Management Scheme Using AdaBoost Algorithm (AdaBoost 기법을 이용한 차량 이동성 관리 방안)

  • Han, Sang-Hyuck;Lee, Hyukjoon;Choi, Yong-Hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.1
    • /
    • pp.53-60
    • /
    • 2014
  • Redundant handovers cause degraded quality of service to passengers in vehicle. This paper proposes a handover scheme suitable for users traveling in vehicles, which enables continuous learning of the handover process using a discrete-time Markov chain (DTMC). Through AdaBoost machine learning algorithm, the proposed handover scheme avoids unnecessary handover trials when a short dwell time in a target cell is expected or when the target cell is an intermediate cell through which the vehicle quickly passes. Simulation results show that the proposed scheme reduces the number of handover occurrences and maintains adequate throughput.

Compact Boundary Representation and Generalized Eular Operators for Non-manifold Geometric Modeling (비다양체 형상 모델링을 위한 간결한 경계 표현 및 확장된 오일러 작업자)

  • 이상헌;이건우
    • Korean Journal of Computational Design and Engineering
    • /
    • v.1 no.1
    • /
    • pp.1-19
    • /
    • 1996
  • Non-manifold topological representations can provide a single unified representation for mixed dimensional models or cellular models and thus have a great potential to be applied in many application areas. Various boundary representations for non-manifold topology have been proposed in recent years. These representations are mainly interested in describing the sufficient adjacency relationships and too redundant as a result. A model stored in these representations occupies too much storage space and is hard to be manipulated. In this paper, we proposed a compact hierarchical non-manifold boundary representation that is extended from the half-edge data structure for solid models by introducing the partial topological entities to represent some non-manifold conditions around a vertex, edge or face. This representation allows to reduce the redundancy of the existing schemes while full topological adjacencies are still derived without the loss of efficiency. To verify the statement above, the storage size requirement of the representation is compared with other existing representations and present some main procedures for querying and traversing the representation. We have also implemented a set of the generalized Euler operators that satisfy the Euler-Poincare formula for non-manifold geometric models.

  • PDF

Validation of an Instrument to Measure Exercise of Self-Care Agency and its Predictors (자가간호역량의 행사 측정도구의 타당성 및 예측요인 조사)

  • 소향숙;이은숙
    • Journal of Korean Academy of Nursing
    • /
    • v.19 no.3
    • /
    • pp.273-284
    • /
    • 1989
  • The aim of this investigation was to delineate concepts contributing to the Exercise of Self-Care Agency (E.S.C.A.) Scale developed by Kearney & Fleischer (1979) and to test its construct validity and its predictors. The results are summarized as follows ; 1. By means of principal factor analysis and maximal likelihood factor analysis upon data generated from 280 undergraduate students, the factors of Concern about Health Knowledge, self-Concept, Information - Seeking Behavior, Decision -making and Responsibility, Self-esteem, and Passivity emerged. The total percent of variance explained by the 6 factors was 75.1% 2. To assess factor independence and instrument homogeneity, correlations among the 6 factors were computed. The correlations ranged from .24 to .46 indicating that the factors and the items were not too similar or redundant. 3. Test-retest reliability of the total scale is r=.70. Cronbach's $\alpha$ coefficient for internal consistency of the total scale is .86 and that of the factors ranged from .750 to .661 (only factor 6 .497). 4. In additional analysis of the Exercise of Self-Care Agency Scale in relationship to Multiple Health Locus of Control, Family Environmental Scale, and Cornell Medical Index using stepwise multiple regression, the Internal Health Locus of Control Score predicted 21.8%(F=53.34, p=.0001), Family Environmental Score 8.3%(F=22.59, P=.0001), Modified Cornell Medical Index Score 5.4%(F=15.74, P=.0001) of the score of the E.S.C.A.

  • PDF

Effective Dimensionality Reduction of Payload-Based Anomaly Detection in TMAD Model for HTTP Payload

  • Kakavand, Mohsen;Mustapha, Norwati;Mustapha, Aida;Abdullah, Mohd Taufik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3884-3910
    • /
    • 2016
  • Intrusion Detection System (IDS) in general considers a big amount of data that are highly redundant and irrelevant. This trait causes slow instruction, assessment procedures, high resource consumption and poor detection rate. Due to their expensive computational requirements during both training and detection, IDSs are mostly ineffective for real-time anomaly detection. This paper proposes a dimensionality reduction technique that is able to enhance the performance of IDSs up to constant time O(1) based on the Principle Component Analysis (PCA). Furthermore, the present study offers a feature selection approach for identifying major components in real time. The PCA algorithm transforms high-dimensional feature vectors into a low-dimensional feature space, which is used to determine the optimum volume of factors. The proposed approach was assessed using HTTP packet payload of ISCX 2012 IDS and DARPA 1999 dataset. The experimental outcome demonstrated that our proposed anomaly detection achieved promising results with 97% detection rate with 1.2% false positive rate for ISCX 2012 dataset and 100% detection rate with 0.06% false positive rate for DARPA 1999 dataset. Our proposed anomaly detection also achieved comparable performance in terms of computational complexity when compared to three state-of-the-art anomaly detection systems.

The Novel Efficient Dual-field FIPS Modular Multiplication

  • Zhang, Tingting;Zhu, Junru;Liu, Yang;Chen, Fulong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.738-756
    • /
    • 2020
  • The modular multiplication is the key module of public-key cryptosystems such as RSA (Rivest-Shamir-Adleman) and ECC (Elliptic Curve Cryptography). However, the efficiency of the modular multiplication, especially the modular square, is very low. In order to reduce their operation cycles and power consumption, and improve the efficiency of the public-key cryptosystems, a dual-field efficient FIPS (Finely Integrated Product Scanning) modular multiplication algorithm is proposed. The algorithm makes a full use of the correlation of the data in the case of equal operands so as to avoid some redundant operations. The experimental results show that the operation speed of the modular square is increased by 23.8% compared to the traditional algorithm after the multiplication and addition operations are reduced about (s2 - s) / 2, and the read operations are reduced about s2 - s, where s = n / 32 for n-bit operands. In addition, since the algorithm supports the length scalable and dual-field modular multiplication, distinct applications focused on performance or cost could be satisfied by adjusting the relevant parameters.

A Review of the Opinion Target Extraction using Sequence Labeling Algorithms based on Features Combinations

  • Aziz, Noor Azeera Abdul;MohdAizainiMaarof, MohdAizainiMaarof;Zainal, Anazida;HazimAlkawaz, Mohammed
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.111-119
    • /
    • 2016
  • In recent years, the opinion analysis is one of the key research fronts of any domain. Opinion target extraction is an essential process of opinion analysis. Target is usually referred to noun or noun phrase in an entity which is deliberated by the opinion holder. Extraction of opinion target facilitates the opinion analysis more precisely and in addition helps to identify the opinion polarity i.e. users can perceive opinion in detail of a target including all its features. One of the most commonly employed algorithms is a sequence labeling algorithm also called Conditional Random Fields. In present article, recent opinion target extraction approaches are reviewed based on sequence labeling algorithm and it features combinations by analyzing and comparing these approaches. The good selection of features combinations will in some way give a good or better accuracy result. Features combinations are an essential process that can be used to identify and remove unneeded, irrelevant and redundant attributes from data that do not contribute to the accuracy of a predictive model or may in fact decrease the accuracy of the model. Hence, in general this review eventually leads to the contribution for the opinion analysis approach and assist researcher for the opinion target extraction in particular.

A Study on Redundancy System for Fault Tolerance of PLC (PLC 고장허용에 대한 이중화 시스템 연구)

  • 이석용;이홍규
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.14 no.1
    • /
    • pp.47-52
    • /
    • 2000
  • Redundant programmable logic controllers are used in practice with the aim of achieving a higher degree of availability or fault tolerance. Redundancy system is fault tolerant programmable logic controller for machine and plant. It is event synchronized master-standby system with a 2 channel(1-out-of-2) structure. A data link connects line the master to the standby controller.Fault tolerant systems should always be used when it is necessary to keep the probability of a total control system failure to a minimum. The objective of using high availability programmable logic controller is a reduction of losses of fault tolerant system are quickly compensated by the avoidance of loss of production.

  • PDF

The Operators' Non-compliance Behavior to Conduct Emergency Operating Procedures - Comparing with the Complexity of the Procedural Steps

  • Park Jinkyun;Jung Wondea
    • Nuclear Engineering and Technology
    • /
    • v.35 no.5
    • /
    • pp.412-425
    • /
    • 2003
  • According to the results of related studies, one of the typical factors related to procedure related human errors is the complexity of procedures. This means that comparing the change of the operators' behavior with respect to the complexity of procedures may be meaningful in clarifying the reasons for the operators' non-compliance behavior. In this study, to obtain data related to the operators' non-compliance behavior, emergency training records were collected using a full scope simulator. And three types of the operators' behavior (such as strict adherence, skipping redundant actions and modifying action sequences) observed from the collected emergency training records were compared with the complexity of the procedural steps. As the results, two remarkable relationships are obtained. They are: 1) the operators seem to frequently adopt non-compliance behavior to conduct the procedural steps that have an intermediate procedural complexity, 2) the operators seems to accommodate their non-compliance behavior to the complexity of the procedural steps. Therefore, it is expected that these relationships can be used as meaningful clues not only to scrutinize the reason for non-compliance behavior but also to suggest appropriate remedies for the reduction of non-compliance behavior that can result in procedure related human error.

Civil Aircraft Digital Fly-By-Wire System Technology Development Trend (민간항공기 디지털 Fly-By-Wire 시스템 기술 개발 동향)

  • Kim, Eung-Tai;Chang, Jae-Won;Choi, Hyoung-Sik;Lee, Sug-Chon
    • Current Industrial and Technological Trends in Aerospace
    • /
    • v.7 no.2
    • /
    • pp.85-94
    • /
    • 2009
  • The Fly-By-Wire system was first applied to the fighter and its inherent advantages lead to the advent of the Fly-By-Wire civil aircraft. Recently even the small jet aircraft shows the trend of adopting the Fly-By-Wire system. In the future, most of the aircraft are expected to be the Fly-By-Wire type. In this paper, the structure and the characteristics of the Fly-By-Wire system applied to the civil aircraft was described. The development trend of the redundant method of the flight control system, data communication system, control surface actuation system and the control laws implemented by the Fly-By-Wire system of the civil aircraft are discussed.

  • PDF