• Title/Summary/Keyword: 연산 효율

Search Result 2,610, Processing Time 0.031 seconds

Study on Improvement of Convergence in Harmony Search Algorithms (Harmony Search 알고리즘의 수렴성 개선에 관한 연구)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.21 no.3
    • /
    • pp.401-406
    • /
    • 2011
  • In order to solve a complex optimization problem more efficiently than traditional approaches, various meta-heuristic algorithms such as genetic algorithm, ant-colony algorithm, and harmony search algorithm have been extensively researched. Compared with other meta-heuristic algorithm, harmony search algorithm shows a better result to resolve the complex optimization issues. Harmony search algorithm is inspired by the improvision process of musician for most suitable harmony. In general, the performance of harmony search algorithm is determined by the value of harmony memory considering rate, and pitch adjust rate. In this paper, modified harmony search algorithm is proposed in order to derive best harmony. If the optimal solution of a specific problem can not be found for a certain period of time, a part of original harmony memory is updated as the selected suitable harmonies. Experimental results using test function demonstrate that the updated harmony memory can induce the approximation of reliable optimal solution in the short iteration, because of a few change of fitness.

Determination of Spectrum-Exposure Rate Conversion Factor for a Portable High Purity Germanium Detector (휴대형 고순도 게르마늄검출기에 대한 스펙트럼-조사선량율 변환연산자의 결정)

  • Kwak, Sang-Soo;Park, Chong-Mook;Ro, Seung-Gy
    • Journal of Radiation Protection and Research
    • /
    • v.13 no.2
    • /
    • pp.29-40
    • /
    • 1988
  • A spectrum-exposure rate conversion operator G(E) for a portable HPGe detector used for field environmental radiation survey was theoretically developed on the basis of a space distribution function of gamma flux emitted from a disk source and an areal efficiency of the detector. The radiation exposure rates measured using this G(E) and the portable HPGe. detector connected to a portable multichannel analyzer were compared with those measured by a 3' ${\phi}\;{\times}$3' NaI(Tl) scintillation detector with the reported G(E) and a pressurized ionization chamber. A comparison of the three results showed that the result obtained using the HPGe detector was lower than those determined using the NaI(Tl) detector and ionization chamber by 17% to 29%, The difference obtained is close to that reported in literature. The method developed here can be easily applicable to obtain a G(E) factor suitable to any detector for detecting the exposure rate of environmental gamma radiation, since the spectrum-exposure rate conversion operator can be calculated by a hand calculator.

  • PDF

Design of CAVLC Decoder for H.264/AVC (H.264/AVC용 CAVLC 디코더의 설계)

  • Jung, Duck-Young;Sonh, Seung-Il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1104-1114
    • /
    • 2007
  • Digital video compression technique has played an important role that enables efficient transmission and storage of multimedia data where bandwidth and storage space are limited. The new video coding standard, H.264/AVC, developed by Joint Video Team(JVT) significantly outperforms previous standards in compression performance. Especially, variable length code(VLC) plays a crucial pun in video and image compression applications. H.264/AVC standard adopted Context-based Adaptive Variable Length Coding(CAVLC) as the entropy coding method. CAVLC of H.264/AVC requires a large number of the memory accesses. This is a serious problem for applications such as DMB and video phone service because of the considerable amount of power that is consumed in accessing the memory. In order to overcome this problem in this paper, we propose a variable length technique that implements memory-free coeff_token, level, and run_before decoding based on arithmetic operations and using only 70% of the required memory at total_zero variable length decoding.

One time password key exchange Authentication technique based on MANET (MANET 기반 원타임 패스워드 키교환 인증기법)

  • Lee, Cheol-Seung;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1367-1372
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on MANET and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier. The suggested authentication technique requires exponentiation and is applicable in the wireless network environment because it transmits data at a time for key sharing, which proves it is a strong and reliable authentication technique based on the complete MANET.

A key management scheme for the cluster-based sensor network using polar coordinated (극 좌표를 이용한 클러스터 기반 센서 네트워크의 키 관리 기법)

  • Hong, Seong-Sik;Ryou, Hwang-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.870-878
    • /
    • 2008
  • The level of security of most sensor nodes that comprise the sensor networks is low, but because of the low computing power and small storage capacity, it is even very difficult to apply a security algorithm efficiently to the sensor nodes. Therefore, preventing the join of an illegal node to a sensor network is impossible, and the transmitting information is easily exposed and overheard when the transmitting algorithm of the sensor node is hewn. In this paper, we propose a group key management scheme for the sensor network using polar coordinates, so that the sensor nodes can deliver information securely inside a cluster and any illegal node is prevented from joining to the cluster where a sensor network is composed of many clusters. In the proposed scheme, all of the sensor nodes in a cluster set up the authentication keys based on the pivot value provided by the CH. The intensive simulations show that the proposed scheme outperforms the pair-wise scheme in terms of the secure key management and the prevention of the illegal nodes joining to the network.

Implementation of Middleware Security System for Home Networking (홈 네트워킹을 위한 미들웨어 보안시스템 구현)

  • Seol, Jeong-Hwan;Lee, Ki-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.863-869
    • /
    • 2008
  • In this paper, a system with sensor network security mechanism which can be applied to home network structure is designed and it is implemented on a virtual network of a home network middleware. The basic structure of home networking middleware supports one-to-one (unicast) or broadcast communication mode between the lookup server and service nodes on the network. Confidentiality and authentication are key security factors of the one-to-one communication and user authentication is crucial for broadcasting mode. One of the sensor network's security techniques SPINS consists of SNEP and ${\mu}TESLA$. The SNEP ensures confidentiality and authentication, and ${\mu}TESLA$ provides broadcast authentication. We propose a SPIN based home network middleware and it is implemented by using the CBC-MAC for MAC generation, the counter mode (CTR) for message freshness, the pseudo random function (PRF) and RC5 as encryption algorithm. The implementation result shows that an attacker cannot decrypt the message though he gets the secure key because of CTR mode. In addition, we confirmed that a received message of the server is authenticated using MAC.

FImplementation of RF Controller based on Digital System for TRS Repeater (실시간 디지털 홀로그래피를 위한 고성능 CGH프로세서)

  • Seo, Young-Ho;Choi, Hyun-Jun;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1424-1433
    • /
    • 2007
  • In this paper, we propose a hardware architecture to generate digital hologram using the modified CGH (Computer Generated Hologram) algorithm for hardware implementation and design to FPGA (Field Programmable Gate Array) platform. After analyzing the CGH algorithm, we propose an architecture of CGH cell which efficiently products digital hologram, and design CGH Kernel from configuring CGH Cell. Finally we implement CGH Processor using CGH Kernel, SDRAM Controller, DMA, etc. Performance of the proposed hardware can be proportionally increased through simply addition of CGH Cell in CGH Kernel, since a CGH Cell has operational independency. The proposed hardware was implemented using XC2VP70 FPGA of Xilinx and was stably operated in 200MHz clock frequency. It take 0.205 second for generating $1,280{\times}1,024$ digital hologram from 3 dimensional object which has 40,000 light sources.

Geometric Modelling and Coordinate Transformation of Satellite-Based Linear Pushbroom-Type CCD Camera Images (선형 CCD카메라 영상의 기하학적 모델 수립 및 좌표 변환)

  • 신동석;이영란
    • Korean Journal of Remote Sensing
    • /
    • v.13 no.2
    • /
    • pp.85-98
    • /
    • 1997
  • A geometric model of pushbroom-type linear CCD camera images is proposed in this paper. At present, this type of cameras are used for obtaining almost all kinds of high-resolution optical images from satellites. The proposed geometric model includes not only a forward transformation which is much more efficient. An inverse transformation function cannot be derived analytically in a closed form because the focal point of an image varies with time. In this paper, therefore, an iterative algorithm in which a focal point os converged to a given pixel position is proposed. Although the proposed model can be applied to any pushbroom-type linear CCD camera images, the geometric model of the high-resolution multi-spectral camera on-board KITSAT-3 is used in this paper as an example. The flight model of KITSAT-3 is in development currently and it is due to be launched late 1998.

Development of a numerical algorithm for wave modeling over complex structure in a CFD model (파랑해석 CFD 모형의 복합구조 구현을 위한 수치 알고리즘 개발)

  • Yoon, Jae Seon;Ha, Taemin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2019.05a
    • /
    • pp.281-281
    • /
    • 2019
  • 수리모형실험은 수로 내에서 장시간 파랑을 발생시킬 경우, 수로 내에 반사 파랑의 성분이 누적될 수 있어 상당한 계측 오차를 발생시킬 우려가 있어 수리모형실험 결과의 검증이 필요하다. 일반적으로 수리모형실험 결과의 검증을 위해서는 동일 실험을 무수히 반복하여 불확실성을 제거하거나 다양한 수리실험실에서 수리모형실험을 수행하고 결과를 분석하여 불확실성을 제거할 수 있다. 그러나 이는 엄청난 시간과 노력은 물론 막대한 실험비용이 소요되기 때문에 경제적으로 효용성이 매우 낮아 현실적으로 수행이 어렵다. 이에 비해 수치모형실험은 상대적으로 저렴한 비용으로 수행할 수 있으며, 다수의 실험을 수행하지 않아도 불확실성을 제거할 수 있어 수리모형실험의 검증에 효율적이다. 일반적으로 난류 거동을 동반하는 복잡한 구조물 주변의 흐름 해석에는 3차원 CFD 모형이 필요하다. 특히, 병렬연산이 가능한 CFD 모형을 활용하면 수리모형실험에서도 재현이 쉽지 않은 다양한 조건에 따른 복잡한 흐름을 해석할 수 있어 효용성이 점점 증가하고 있다. 그러나 복잡한 구조물이 존재하게 되면 구조물에 재현에 막대한 격자구조가 필요하여 현실적으로 적용이 쉽지 않다. 이에 대한 대안으로 복잡한 구조물을 비교적 큰 격자에서 재현할 수 있는 가상경계법을 활용하는 연구가 활발히 진행되고 있다. 가상경계법은 Navier-Stokes 방정식에서 유체 내에 존재하는 고체를 모멘텀 이론으로 대체하여 고려하는 기법으로 수치모델링 수행 시 매질을 유체만으로 구성할 수 있어 안정적으로 적용할 수 있는 것으로 알려져 있다. 본 과업에서는 다양한 분야에서 널리 활용되고 있는 3차원 CFD 모형인 OpenFOAM®기반으로 파랑해석에 필요한 경계조건을 계산할 수 있는 olaFlow를 활용하여 복잡한 구조물을 지나는 파랑해석을 수행하기 위해 가상경계법을 olaFlow에 도입한 수치 알고리즘을 개발하였다. 개발한 수치알고리즘을 활용하여 복잡한 구조를 수치모델에서 재현하였으며, 수치모델에 적용된 수치 알고리즘의 안정성에 대해 고찰하였다.

  • PDF

An Efficient Candidate Activation Pattern Set Generation Scheme for GSM in Optical Wireless Communication with High Interference Environment (높은 상호간섭 환경의 광무선통신에서 일반화된 공간변조 방식의 효율적인 후보 활성화 패턴집합 생성방법)

  • Kim, Jung-Hyun;Hong, Sung-Hun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.863-870
    • /
    • 2019
  • In the GSM method for OWC-MIMO System, it is important to select an activation pattern set(: APS) for the performance optimization in the environment where mutual interference is high depending on the location of the transmitter and receiver. However, due to the high computational complexity, a high cost is paid in selecting the transmission APS. In this paper, we propose a method to reduce the candidate APS by pre-determining basic APS when generating candidate APS. The simulation results show that the proposed method has the same BER performance and reduce the computational complexity by 90% compared to the general GSM method in the high interfering environment.