• Title/Summary/Keyword: 연산 효율

Search Result 2,610, Processing Time 0.03 seconds

Privacy-Preserving Parallel Range Query Processing Algorithm Based on Data Filtering in Cloud Computing (클라우드 컴퓨팅에서 프라이버시 보호를 지원하는 데이터 필터링 기반 병렬 영역 질의 처리 알고리즘)

  • Kim, Hyeong Jin;Chang, Jae-Woo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.9
    • /
    • pp.243-250
    • /
    • 2021
  • Recently, with the development of cloud computing, interest in database outsourcing is increasing. However, when the database is outsourced, there is a problem in that the information of the data owner is exposed to internal and external attackers. Therefore, in this paper, we propose a parallel range query processing algorithm that supports privacy protection. The proposed algorithm uses the Paillier encryption system to support data protection, query protection, and access pattern protection. To reduce the operation cost of a checking protocol (SRO) for overlapping regions in the existing algorithm, the efficiency of the SRO protocol is improved through a garbled circuit. The proposed parallel range query processing algorithm is largely composed of two steps. It consists of a parallel kd-tree search step that searches the kd-tree in parallel and safely extracts the data of the leaf node including the query, and a parallel data search step through multiple threads for retrieving the data included in the query area. On the other hand, the proposed algorithm provides high query processing performance through parallelization of secure protocols and index search. We show that the performance of the proposed parallel range query processing algorithm increases in proportion to the number of threads and the proposed algorithm shows performance improvement by about 5 times compared with the existing algorithm.

Low-complexity Local Illuminance Compensation for Bi-prediction mode (양방향 예측 모드를 위한 저복잡도 LIC 방법 연구)

  • Choi, Han Sol;Byeon, Joo Hyung;Bang, Gun;Sim, Dong Gyu
    • Journal of Broadcast Engineering
    • /
    • v.24 no.3
    • /
    • pp.463-471
    • /
    • 2019
  • This paper proposes a method for reducing the complexity of LIC (Local Illuminance Compensation) for bi-directional inter prediction. The LIC performs local illumination compensation using neighboring reconstruction samples of the current block and the reference block to improve the accuracy of the inter prediction. Since the weight and offset required for local illumination compensation are calculated at both sides of the encoder and decoder using the reconstructed samples, there is an advantage that the coding efficiency is improved without signaling any information. Since the weight and the offset are obtained in the encoding prediction step and the decoding step, encoder and decoder complexity are increased. This paper proposes two methods for low complexity LIC. The first method is a method of applying illumination compensation with offset only in bi-directional prediction, and the second is a method of applying LIC after weighted average step of reference block obtained by bidirectional prediction. To evaluate the performance of the proposed method, BD-rate is compared with BMS-2.0.1 using B, C, and D classes of MPEG standard experimental image under RA (Random Access) condition. Experimental results show that the proposed method reduces the average of 0.29%, 0.23%, 0.04% for Y, U, and V in terms of BD-rate performance compared to BMS-2.0.1 and encoding/decoding time is almost same. Although the BD-rate was lost, the calculation complexity of the LIC was greatly reduced as the multiplication operation was removed and the addition operation was halved in the LIC parameter derivation process.

A Performance Comparison of CCA and RMMA Algorithm for Blind Adaptive Equalization (블라인드 적응 등화를 위한 CCA와 RMMA 알고리즘의 성능 비교)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.51-56
    • /
    • 2019
  • This paper related with the performance comparison of CCA and RMMA blind adaptive equalization in order to reduce the intersymbol interference which is occurred in channel when transmitting the 16-QAM signal, high spectrum efficiencies of nonconstant modulus characteristic. The CCA possible to improve the misadustment and initial convergence by compacting the every signal constellation of 16 by using the sliced symbol of the decision device output, namely statistical symbol, but incresing the computational cost. The RMMA possible to minimize the fast convergence speed and misadjustment and channel tracking capability without increasing the computational cost by obtain the error signal after transform to 4 constant modulus signal based on the region of signal constellation located. In this paper, these algorithm were implemented in the same channel, and the blind adaptive equalization performance were compared using the equalizer output signal constellation, residual isi, MSE, SER. As a result of simulation, the RMMA has better performance in output signal constellation, residual isi and MSE compared to the CCA, but has slow convergence speed about 1.3 times. And the SER performance presenting the robustness to the noise signal, the CCA has more beeter in less SNR, but the RMMA has better in greater than 6dB in SNR.

Design of a Secure Web-mail System based on End-to-End (End-to-End 기반의 안전한 웹 메일 시스템 설계)

  • 전철우;이종후;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.2
    • /
    • pp.13-29
    • /
    • 2003
  • Web-mail system is worthy of note as a next generation e-mail system for its mobility and easiness. But many web-mail system does not have any kind of security mechanism. Even if web-mail system provides security services, its degree of strength is too low. Using these web-mail systems, the e-mail is tabbed, modified or forged by attacker easily. To solve these problems, we design and implement secure web-mail system based on the international e-mail security standard S/MIME in this thesis. This secure web-mail system is composed of server system and client system The server system performs basic mail functions - sending/receiving the mails, storing the mails, and management of user information, etc. And the client system performs cryptographic functions - encryption/decryption of the mails, digital signing and validation, etc. Because client system performs cryptographic functions this secure web-mail system gives its reliability and safety, and provides end-to-end security between mail users. Also, this secure web-mail system increase system efficiency by minimize server load.

Development of the Automatic Method for Detecting the National River Networks Using the Sentinel-2 Satellite Imagery -A Case Study for Han River, Seoul- (Sentinel-2 위성영상을 활용하여 국가하천망 제작을 위한 자동화 기술 개발 -서울시 한강을 사례로-)

  • KIM, Seon-Woo;KWON, Yong-Ha;CHUNG, Youn-In;CHOUNG, Yun-Jae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.2
    • /
    • pp.88-99
    • /
    • 2022
  • The river network is one of the essential topographical characteristics in river management. The river network which as previously constructed by the ground surveying method has recently begun to be efficiently constructed using the remote sensing datasets. Since it is difficult to remove these obstacles such as bridges in the urban rivers, it is rare to construct the urban river networks with the various obstacles. In this study, the Sentinel-2 satellite imagery was used to develop the automatic method for detecting the urban river networks without the obstacles and with the preserved boundaries as follows. First, the normalized difference water index image was generated using the multispectral bands of the given Sentinel-2 satellite imagery, and the binary image that could classify the water body and other regions was generated. Next, the morphological operations were employed for detecting the complete river networks with the obstacles removed and the boundaries preserved. As a result of applying the proposed methodology to Han River in Seoul, the complete river networks with the obstacles removed and the boundaries preserved were well constructed.

3D Mesh Reconstruction Technique from Single Image using Deep Learning and Sphere Shape Transformation Method (딥러닝과 구체의 형태 변형 방법을 이용한 단일 이미지에서의 3D Mesh 재구축 기법)

  • Kim, Jeong-Yoon;Lee, Seung-Ho
    • Journal of IKEEE
    • /
    • v.26 no.2
    • /
    • pp.160-168
    • /
    • 2022
  • In this paper, we propose a 3D mesh reconstruction method from a single image using deep learning and a sphere shape transformation method. The proposed method has the following originality that is different from the existing method. First, the position of the vertex of the sphere is modified to be very similar to the 3D point cloud of an object through a deep learning network, unlike the existing method of building edges or faces by connecting nearby points. Because 3D point cloud is used, less memory is required and faster operation is possible because only addition operation is performed between offset value at the vertices of the sphere. Second, the 3D mesh is reconstructed by covering the surface information of the sphere on the modified vertices. Even when the distance between the points of the 3D point cloud created by correcting the position of the vertices of the sphere is not constant, it already has the face information of the sphere called face information of the sphere, which indicates whether the points are connected or not, thereby preventing simplification or loss of expression. can do. In order to evaluate the objective reliability of the proposed method, the experiment was conducted in the same way as in the comparative papers using the ShapeNet dataset, which is an open standard dataset. As a result, the IoU value of the method proposed in this paper was 0.581, and the chamfer distance value was It was calculated as 0.212. The higher the IoU value and the lower the chamfer distance value, the better the results. Therefore, the efficiency of the 3D mesh reconstruction was demonstrated compared to the methods published in other papers.

Performance analysis and prediction through various over-provision on NAND flash memory based storage (낸드 플래시 메모리기반 저장 장치에서 다양한 초과 제공을 통한 성능 분석 및 예측)

  • Lee, Hyun-Seob
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.343-348
    • /
    • 2022
  • Recently, With the recent rapid development of technology, the amount of data generated by various systems is increasing, and enterprise servers and data centers that have to handle large amounts of big data need to apply high-stability and high-performance storage devices even if costs increase. In such systems, SSD(solid state disk) that provide high performance of read/write are often used as storage devices. However, due to the characteristics of reading and writing on a page-by-page basis, erasing operations on a block basis, and erassing-before-writing, there is a problem that performance is degraded when duplicate writes occur. Therefore, in order to delay this performance degradation problem, over-provision technology of SSD has been applied internally. However, since over-provided technologies have the disadvantage of consuming a lot of storage space instead of performance, the application of inefficient technologies above the right performance has a problem of over-costing. In this paper, we proposed a method of measuring the performance and cost incurred when various over-provisions are applied in an SSD and predicting the system-optimized over-provided ratio based on this. Through this research, we expect to find a trade-off with costs to meet the performance requirements in systems that process big data.

Automated Satellite Image Co-Registration using Pre-Qualified Area Matching and Studentized Outlier Detection (사전검수영역기반정합법과 't-분포 과대오차검출법'을 이용한 위성영상의 '자동 영상좌표 상호등록')

  • Kim, Jong Hong;Heo, Joon;Sohn, Hong Gyoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.26 no.4D
    • /
    • pp.687-693
    • /
    • 2006
  • Image co-registration is the process of overlaying two images of the same scene, one of which represents a reference image, while the other is geometrically transformed to the one. In order to improve efficiency and effectiveness of the co-registration approach, the author proposed a pre-qualified area matching algorithm which is composed of feature extraction with canny operator and area matching algorithm with cross correlation coefficient. For refining matching points, outlier detection using studentized residual was used and iteratively removes outliers at the level of three standard deviation. Throughout the pre-qualification and the refining processes, the computation time was significantly improved and the registration accuracy is enhanced. A prototype of the proposed algorithm was implemented and the performance test of 3 Landsat images of Korea. showed: (1) average RMSE error of the approach was 0.435 pixel; (2) the average number of matching points was over 25,573; (3) the average processing time was 4.2 min per image with a regular workstation equipped with a 3 GHz Intel Pentium 4 CPU and 1 Gbytes Ram. The proposed approach achieved robustness, full automation, and time efficiency.

A Design of Power Management IC for CCD Image Sensor (CCD 이미지 센서용 Power Management IC 설계)

  • Koo, Yong-Seo;Lee, Kang-Yoon;Ha, Jae-Hwan;Yang, Yil-Suk
    • Journal of IKEEE
    • /
    • v.13 no.4
    • /
    • pp.63-68
    • /
    • 2009
  • The power management integrated circuit(PMIC) for CCD image sensor is presented in this study. A CCD image sensor is very sensitive against temperature. The temperature, that is heat, is generally generated by the PMIC with low efficiency. Since the generated heat influences performance of CCD image sensor, it should be minimized by using a PMIC which has a high efficiency. In order to develop the PMIC with high efficiency, the input stage is designed with synchronous type step down DC-DC converter. The operating range of the converter is from 5V to 15V and the converter is controlled using PWM method. The PWM control circuit consists of a saw-tooth generator, a band-gap reference circuit, an error amplifier and a comparator circuit. The saw-tooth generator is designed with 1.2MHz oscillation frequency. The comparator is designed with the two stages OP Amp. And the error amplifier has 40dB DC gain and $77^{\circ}$ phase margin. The output of the step down converter is connected to input stage of the charge pump. The output of the charge pump is connected to input of the LDO which is the output stage of the PMIC. Finally, the PMIC, based on the PWM control circuit and the charge pump and the LDO, has output voltage of 15V, -7.5V, 3.3V and 5V. The PMIC is designed with a 0.35um process.

  • PDF

Extraction and Recognition of Concrete Slab Surface Cracks using ART2-based RBF Network (ART2 기반 RBF 네트워크를 이용한 콘크리트 슬래브 표면의 균열 추출 및 인식)

  • Kim, Kwang-Baek
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.1068-1077
    • /
    • 2007
  • This paper proposes a method that extracts characteristics of cracks such as length, thickness and direction from a concrete slab surface image with image processing techniques. These techniques extract the cracks from the concrete surface image in variable conditions including bad image conditions) using the ART2-based RBF network to recognize the dominant directions -45 degree, 45 degree, horizontal and vertical) of the extracted cracks from the automatically calculated specifications like the lengths, directions and widths of the cracks. Our proposed extraction algorithms and analysis of the concrete cracks used a Robert operation to emphasize the cracks, and a Multiple operation to increase the difference in brightness between the cracks and background. After these treatments, the cracks can be extracted from the image by using an iterated binarization technique. Noise reduction techniques are used three separate times on this binarized image, and the specifications of the cracks are extracted form this noiseless image. The dominant directions can be recognized by using the ART2-based RBF network. In this method, the ART2 is used between the input layer and the middle layer to learn, and the Delta learning method is used between the middle layer and the output layer. The experiments using real concrete images showed that the cracks were effectively extracted, and the Proposed ART2-based RBF network effectively recognized the directions of the extracted cracks.

  • PDF