• 제목/요약/키워드: software algorithms

Search Result 1,093, Processing Time 0.025 seconds

A study on the Production and distribution planning using a genetic algorithm (유전 알고리즘을 이용한 생산 및 분배 계획)

  • 정성원;장양자;박진우
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.253-256
    • /
    • 2001
  • Today's rapid development in the computer and network technology makes the environment which enables the companies to consider their decisions on the wide point of view and enables the software vendors to make the software packages to help these decisions. To make these software packages, many algorithms should be developed. The production and distribution planning problem belongs to those problems that industry manufacturers daily face in organizing their overall production plan. However, this combinatorial optimization problem can not be solved optimally in a reasonable time when large instances are considered. This legitimates the search for heuristic techniques. As one of these heuristic techniques, genetic algorithm has been considered in many researches. A standard genetic algorithm is a problem solving method that apply the rules of reproduction, gene crossover, and mutation to these pseudo-organisms so those organisms can Pass beneficial and survival-enhancing traits to new generation. This standard genetic algorithm should not be applied to this problem directly because when we represent the chromosome of this problem, there may exist high epitasis between genes. So in this paper, we proposed the hybrid genetic algorithm which turns out to better result than standard genetic algorithms

  • PDF

Software Implementation of WAVE Security Algorithms (WAVE 보안 알고리즘의 소프트웨어 구현)

  • Kang, Jung-Ha;Ok, Sung-Jin;Kim, Jae Young;Kim, Eun-Gi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1691-1699
    • /
    • 2014
  • IEEE developing WAVE specifications are able to support V2V and V2I wireless communications, and these functionalities can be used to enhance vehicle operational safety. To overcome any security weaknesses that are inherent in wireless communications, WAVE specification should support message encryption and authentication functions. In this study, we have implemented WAVE security algorithms in IEEE P1609.2 with openssl library and C language. We have verified the normal operation of implemented software, using the test vectors of related specifications, and measured their performance. Our software is platform independent, and can be used for the full implementation of WAVE specification.

Privacy-Preserving H.264 Video Encryption Scheme

  • Choi, Su-Gil;Han, Jong-Wook;Cho, Hyun-Sook
    • ETRI Journal
    • /
    • v.33 no.6
    • /
    • pp.935-944
    • /
    • 2011
  • As a growing number of individuals are exposed to surveillance cameras, the need to prevent captured videos from being used inappropriately has increased. Privacy-related information can be protected through video encryption during transmission or storage, and several algorithms have been proposed for such purposes. However, the simple way of evaluating the security by counting the number of brute-force trials is not proper for measuring the security of video encryption algorithms, considering that attackers can devise specially crafted attacks for specific purposes by exploiting the characteristics of the target video codec. In this paper, we introduce a new attack for recovering contour information from encrypted H.264 video. The attack can thus be used to extract face outlines for the purpose of personal identification. We analyze the security of previous video encryption schemes against the proposed attack and show that the security of these schemes is lower than expected in terms of privacy protection. To enhance security, an advanced block shuffling method is proposed, an analysis of which shows that it is more secure than the previous method and can be an improvement against the proposed attack.

HisCoM-mimi: software for hierarchical structural component analysis for miRNA-mRNA integration model for binary phenotypes

  • Kim, Yongkang;Park, Taesung
    • Genomics & Informatics
    • /
    • v.17 no.1
    • /
    • pp.10.1-10.3
    • /
    • 2019
  • To identify miRNA-mRNA interaction pairs associated with binary phenotypes, we propose a hierarchical structural component model for miRNA-mRNA integration (HisCoM-mimi). Information on known mRNA targets provided by TargetScan is used to perform HisCoM-mimi. However, multiple databases can be used to find miRNA-mRNA signatures with known biological information through different algorithms. To take these additional databases into account, we present our advanced application software for HisCoM-mimi for binary phenotypes. The proposed HisCoM-mimi supports both TargetScan and miRTarBase, which provides manually-verified information initially gathered by text-mining the literature. By integrating information from miRTarBase into HisCoM-mimi, a broad range of target information derived from the research literature can be analyzed. Another improvement of the new HisCoM-mimi approach is the inclusion of updated algorithms to provide the lasso and elastic-net penalties for users who want to fit a model with a smaller number of selected miRNAs and mRNAs. We expect that our HisCoM-mimi software will make advanced methods accessible to researchers who want to identify miRNA-mRNA interaction pairs related with binary phenotypes.

Evolutionary Computing Driven Extreme Learning Machine for Objected Oriented Software Aging Prediction

  • Ahamad, Shahanawaj
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.232-240
    • /
    • 2022
  • To fulfill user expectations, the rapid evolution of software techniques and approaches has necessitated reliable and flawless software operations. Aging prediction in the software under operation is becoming a basic and unavoidable requirement for ensuring the systems' availability, reliability, and operations. In this paper, an improved evolutionary computing-driven extreme learning scheme (ECD-ELM) has been suggested for object-oriented software aging prediction. To perform aging prediction, we employed a variety of metrics, including program size, McCube complexity metrics, Halstead metrics, runtime failure event metrics, and some unique aging-related metrics (ARM). In our suggested paradigm, extracting OOP software metrics is done after pre-processing, which includes outlier detection and normalization. This technique improved our proposed system's ability to deal with instances with unbalanced biases and metrics. Further, different dimensional reduction and feature selection algorithms such as principal component analysis (PCA), linear discriminant analysis (LDA), and T-Test analysis have been applied. We have suggested a single hidden layer multi-feed forward neural network (SL-MFNN) based ELM, where an adaptive genetic algorithm (AGA) has been applied to estimate the weight and bias parameters for ELM learning. Unlike the traditional neural networks model, the implementation of GA-based ELM with LDA feature selection has outperformed other aging prediction approaches in terms of prediction accuracy, precision, recall, and F-measure. The results affirm that the implementation of outlier detection, normalization of imbalanced metrics, LDA-based feature selection, and GA-based ELM can be the reliable solution for object-oriented software aging prediction.

The Structure of Boundary Decision Using the Back Propagation Algorithms (역전파 알고리즘을 이용한 경계결정의 구성에 관한 연구)

  • Lee, Ji-Young
    • The Journal of Information Technology
    • /
    • v.8 no.1
    • /
    • pp.51-56
    • /
    • 2005
  • The Back propagation algorithm is a very effective supervised training method for multi-layer feed forward neural networks. This paper studies the decision boundary formation based on the Back propagation algorithm. The discriminating powers of several neural network topology are also investigated against five manually created data sets. It is found that neural networks with multiple hidden layer perform better than single hidden layer.

  • PDF

Test bed for autonomous controlled space robot (우주로봇 자율제어 테스트 베드)

  • 최종현;백윤수;박종오
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.1828-1831
    • /
    • 1997
  • this paper, to represent the robot motion approximately in space, delas with algorithm for position recognition of space robot, target and obstacle with vision system in 2-D. And also there are algorithms for precise distance-measuring and calibration usign laser displacement system, and for trajectory selection for optimizing moving to object, and for robot locomtion with air-thrust valve. And the software synthesizing of these algorithms hleps operator to realize the situation certainly and perform the job without any difficulty.

  • PDF

A New Rate Control Algorithm for improving picture quality (화질 개선을 위한 새로운 비트율 제어 알고리즘)

  • 이정우;김대희;호요성;홍문호;이병렬;박종철
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1997.11a
    • /
    • pp.187-190
    • /
    • 1997
  • Test Model15, which is used widely for the MPEG-2 bit rate control, has several problems such as non-unform picture quality, scene change and buffer underflow. Therefore, various algorithms have been developed to solve these problems. In this paper, we study various algorithms for the MPEG-2 bit rate control and compare their performances using software simulations. We also propose a new bit rate control strategy based on coded types of macroblocks within a picture.

  • PDF

Design Application of Evolutionary Algorithms in Architecture (디지털 디자인 미디어 - Evolutionary Algorithms의 현대건축에의 적용 방법론)

  • Kim, Ho-Jeong
    • Journal of Industrial Technology
    • /
    • v.27 no.A
    • /
    • pp.39-46
    • /
    • 2007
  • I discuss the preliminary version of an investigative software, GSE, - Genetic 3D Surface Explorer, in which genetic operations interact with AutoCAD to generate novel 3D Forms for the Architect. GSE allows us to comment on design issues concerning computer aided design tools based on evolutionary algorithms.

  • PDF