• Title/Summary/Keyword: BITs

Search Result 1,637, Processing Time 0.021 seconds

Low Power TLB Supporting Multiple Page Sizes without Operation System (운영체제 도움 없이 멀티 페이지를 지원하는 저전력 TLB 구조)

  • Jung, Bo-Sung;Lee, Jung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.1-9
    • /
    • 2013
  • Even though the multiple pages TLB are effective in improving the performance, a conventional method with OS support cannot utilize multiple page sizes in user application. Thus, we propose a new multiple-TLB structure supporting multiple page sizes for high performance and low power consumption without any operating system support. The proposed TLB is organised as two parts of a S-TLB(Small TLB) with a small page size and a L-TLB(Large TLB) with a large page size. Both are designed as fully associative bank structures. The S-TLB stores small pages are evicted from the L-TLB, and the L-TLB stores large pages including a small page generated by the CPU. Each one bank module of S-TLB and L-TLB can be selectively accessed base on particular one and two bits of the virtual address generated from CPU, respectively. Energy savings are achieved by reducing the number of entries accessed at a time. Also, this paper proposed the simple 1-bit LRU policy to improve the performance. The proposed LRU policy can present recently referenced block by using an additional one bit of each entry on TLBs. This method can simply select a least recently used page from the L-TLB. According to the simulation results, the proposed TLB can reduce Energy * Delay by about 76%, 57%, and 6% compared with a fully associative TLB, a ARM TLB, and a Dual TLB, respectively.

Study on EPB TBM performance by conducting lab-scaled excavation tests with different foam injection for artificial sand (실내 굴진 시험을 통한 폼 주입 조건에 따른 인공 사질토 지반에서 EPB TBM 굴진성능에 대한 고찰)

  • Lee, Hyobum;Shin, Dahan;Kim, Dae-Young;Shin, Young Jin;Choi, Hangseok
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.21 no.4
    • /
    • pp.545-560
    • /
    • 2019
  • During EPB TBM tunnelling, an appropriate application of additives such as foam and polymer is an essential factor to secure the stability of TBM as well as tunnelling performance. From the '90s, there have been many studies on the optimal injection of additives worldwidely contrary to the domestic situation. Therefore, in this paper, the foam, which is widely adopted for soil conditioning, was selected as an additive in order to investigate the effect of foam injection on TBM performance through a series of laboratory excavation tests. The excavation experiments were carried out on artificial sandy soil specimens with consideration of the variance of FIR (Foam Injection Ratio), FER (Foam Expansion Ratio) and $C_f$ (Surfactant Concentration), which indicate the amount and quality of the foam. During the tests, torque values were measured, and the workability of conditioned soil was evaluated by comparing the slump values of muck after each experiment. In addition, a weight loss of the replaceable aluminum cutter bits installed on the blade was measured to estimate the degree of abrasion. Finally, the foam injection ratio for the optimal TBM excavation for the typical soil specimen was determined by comparing the measured torque, slump value and abrasion. Note that the foam injection conditions satisfying the appropriate level of machine load, mechanical wear and workability are essential in the EPB TBM operational design.

Performance Analysis of Super-Resolution based Video Coding for HEVC (HEVC 기반 초해상화를 이용한 비디오 부호화 효율 성능 분석)

  • Ki, Sehwan;Kim, Dae-Eun;Jun, Ki Nam;Baek, Seung Ho;Choi, Jeung Won;Kim, Dong Hyun;Kim, Munchurl
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.306-314
    • /
    • 2019
  • Since the resolutions of videos increase rapidly, there are continuing needs for effective video compression methods despite an increase in the transmission bandwidth. In order to satisfy such a demand, a reconstructive video coding (RVC) method by using a super resolution has been proposed. Since RVC reduces the resolution of the input video, when frames are compressed to the same size, the number of bits per pixel increases, thereby reducing coding artifacts caused by video coding. However, RVC method using super resolution is not effective in all target bitrates. Comparing the size of the loss generated while downsizing the resolution and the size of the loss caused by the video compression, only when the size of loss generated in the video compression is larger, RVC method can perform the improved compression performance compared to direct video coding. In particular, since HEVC has considerably higher compression performance than the previous standard video codec, it can be experimentally confirmed that the compression distortions become larger than the distortions of downsizing the resolution only in the very low-bitrate conditions. In this paper, we applied RVC based HEVC in various video types and measured the target bitrates that RVC method can be effectively applied.

The Most Efficient Extension Field For XTR (XTR을 가장 효율적으로 구성하는 확장체)

  • 한동국;장상운;윤기순;장남수;박영호;김창한
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.17-28
    • /
    • 2002
  • XTR is a new method to represent elements of a subgroup of a multiplicative group of a finite field GF( $p^{6m}$) and it can be generalized to the field GF( $p^{6m}$)$^{[6,9]}$ This paper progress optimal extention fields for XTR among Galois fields GF ( $p^{6m}$) which can be aplied to XTR. In order to select such fields, we introduce a new notion of Generalized Opitimal Extention Fields(GOEFs) and suggest a condition of prime p, a defining polynomial of GF( $p^{2m}$) and a fast method of multiplication in GF( $p^{2m}$) to achieve fast finite field arithmetic in GF( $p^{2m}$). From our implementation results, GF( $p^{36}$ )longrightarrowGF( $p^{12}$ ) is the most efficient extension fields for XTR and computing Tr( $g^{n}$ ) given Tr(g) in GF( $p^{12}$ ) is on average more than twice faster than that of the XTR system on Pentium III/700MHz which has 32-bit architecture.$^{[6,10]/ [6,10]/6,10]}$

Multiple Linear Cryptanalysis-Revisited (블록 암호에 대한 효율적인 선형 공격 방법)

  • Choi, Jun;Hong, Deuk-Jo;Hong, Seok-Hee;Lee, Sang-Jin;Im, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.6
    • /
    • pp.59-69
    • /
    • 2002
  • Many Linear attacks have introduced after M. Matsui suggested Linear Cryptanalysis in 1993. The one of them is the method suggested by B. Kaliski and M. Robshaw. It was a new method using multiple linear approximations to attack for block ciphers. It requires less known plaintexts than that of Linear Cryptanalysis(LC) by Matsui, but it has a problem. In this paper, we will introduce the new method using multiple linear approximation that can solve the problem. Using the new method, the requirements of the known plaintexts is 5(1.25) times as small as the requirements in LC on 8(16) round DES with a success rate of 95%(86%) respectively. We can also adopt A Chosen Plaintext Linear Attack suggested by L. R. Knudsen and J. E. Mathiassen and then our attack requires about $2^{40.6}$ chosen plaintexts to recover 15 key bits with 86% success rate. We believe that the results in this paper contain the fastest attack on the DES full round reported so far in the open literature.

Design of FMCW Radar Signal Processor for Human and Objects Classification Based on Respiration Measurement (호흡 기반 사람과 사물 구분 가능한 FMCW 레이다 신호처리 프로세서의 설계)

  • Lee, Yungu;Yun, Hyeongseok;Kim, Suyeon;Heo, Seongwook;Jung, Yunho
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.4
    • /
    • pp.305-312
    • /
    • 2021
  • Even though various types of sensors are being used for security applications, radar sensors are being suggested as an alternative due to the privacy issues. Among those radar sensors, PD radar has high-complexity receiver, but, FMCW radar requires fewer resources. However, FMCW has disadvantage from the use of 2D-FFT which increases the complexity, and it is difficult to distinguish people from objects those are stationary. In this paper, we present the design and the implementation results of the radar signal processor (RSP) that can distinguish between people and object by respiration measurement using phase estimation without 2D-FFT. The proposed RSP is designed with Verilog-HDL and is implemented on FPGA device. It was confirmed that the proposed RSP includes 6,425 LUT, 4,243 register, and 12,288 memory bits with 92.1% accuracy for target's breathing status.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.

Optimization of Approximate Modular Multiplier for R-LWE Cryptosystem (R-LWE 암호화를 위한 근사 모듈식 다항식 곱셈기 최적화)

  • Jae-Woo, Lee;Youngmin, Kim
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.736-741
    • /
    • 2022
  • Lattice-based cryptography is the most practical post-quantum cryptography because it enjoys strong worst-case security, relatively efficient implementation, and simplicity. Ring learning with errors (R-LWE) is a public key encryption (PKE) method of lattice-based encryption (LBC), and the most important operation of R-LWE is the modular polynomial multiplication of rings. This paper proposes a method for optimizing modular multipliers based on approximate computing (AC) technology, targeting the medium-security parameter set of the R-LWE cryptosystem. First, as a simple way to implement complex logic, LUT is used to omit some of the approximate multiplication operations, and the 2's complement method is used to calculate the number of bits whose value is 1 when converting the value of the input data to binary. We propose a total of two methods to reduce the number of required adders by minimizing them. The proposed LUT-based modular multiplier reduced both speed and area by 9% compared to the existing R-LWE modular multiplier, and the modular multiplier using the 2's complement method reduced the area by 40% and improved the speed by 2%. appear. Finally, the area of the optimized modular multiplier with both of these methods applied was reduced by up to 43% compared to the previous one, and the speed was reduced by up to 10%.

S-PRESENT Cryptanalysis through Know-Plaintext Attack Based on Deep Learning (딥러닝 기반의 알려진 평문 공격을 통한 S-PRESENT 분석)

  • Se-jin Lim;Hyun-Ji Kim;Kyung-Bae Jang;Yea-jun Kang;Won-Woong Kim;Yu-Jin Yang;Hwa-Jeong Seo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.193-200
    • /
    • 2023
  • Cryptanalysis can be performed by various techniques such as known plaintext attack, differential attack, side-channel analysis, and the like. Recently, many studies have been conducted on cryptanalysis using deep learning. A known-plaintext attack is a technique that uses a known plaintext and ciphertext pair to find a key. In this paper, we use deep learning technology to perform a known-plaintext attack against S-PRESENT, a reduced version of the lightweight block cipher PRESENT. This paper is significant in that it is the first known-plaintext attack based on deep learning performed on a reduced lightweight block cipher. For cryptanalysis, MLP (Multi-Layer Perceptron) and 1D and 2D CNN(Convolutional Neural Network) models are used and optimized, and the performance of the three models is compared. It showed the highest performance in 2D convolutional neural networks, but it was possible to attack only up to some key spaces. From this, it can be seen that the known-plaintext attack through the MLP model and the convolutional neural network is limited in attackable key bits.

A Study for Predicting Rotational Cutting Torque from Electrical Energy Required for Ground Drilling (지반절삭 전기에너지를 활용한 회전굴착토크 예측에 관한 연구)

  • Choi, Chang-Ho;Cho, Jin-Woo;Lee, Yong-Soo;Chung, Ha-Ik;Park, Yong-Boo
    • Journal of the Korean Geotechnical Society
    • /
    • v.23 no.7
    • /
    • pp.57-64
    • /
    • 2007
  • This study proposes a method to estimate drilling torque during ground boring with an aid of electrical energy required for rotating a boring-auger. Ground boring is commonly used in geotechnical engineering such as preboring precast pile installation, soil-cement grouting, ground exploration and so forth. In order to understand the correlation between required electrical energy to rotate the boring auger and the drilling torque, a small laboratory apparatus was designed and a pilot study was performed. The apparatus rotates common drill bits of $D=5{\sim}25mm$ in CBR specimens. The velocity of a bit is 19 RPM and predefined using a reduction gear which connects a main rotation axis to a 25 Watts AC electrical motor shaft. In the middle of drilling the motor current increments and the drilling torque were measured and the correlation between the current and the torque was obtained through linear square fits. Based on the correlation the acquired motor current during drilling was applied to predict the drilling torque in consequent testing and the prediction results were compared to the measured torque. The comparison leads a conclusion that the motor current during drilling using electrical power may be a good indicator to estimate/determine strength characteristics of the ground.