• Title/Summary/Keyword: Binary Code Optimization

Search Result 18, Processing Time 0.022 seconds

A Real Code Genetic Algorithm for Optimum Design (실수형 Genetic Algorithm에 의한 최적 설계)

  • 양영순;김기화
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 1995.04a
    • /
    • pp.187-194
    • /
    • 1995
  • Traditional genetic algorithms(GA) have mostly used binary code for representing design variable. The binary code GA has many difficulties to solve optimization problems with continuous design variables because of its targe computer core memory size, inefficiency of its computing time, and its bad performance on local search. In this paper, a real code GA is proposed for dealing with the above problems. So, new crossover and mutation processes of read code GA are developed to use continuous design variables directly. The results of real code GA are compared with those of binary code GA for several single and multiple objective optimization problems. As results of comparisons, it is found that the performance of the real code GA is better than that of the binary code GA, and concluded that the rent code GA developed here can be used for the general optimization problem.

  • PDF

A Real Code Genetic Algorithm for Optimum Design (실수형 Genetic-Algorithm에 의한 최적 설계)

  • 양영순;김기화
    • Computational Structural Engineering
    • /
    • v.8 no.2
    • /
    • pp.123-132
    • /
    • 1995
  • Genetic Algorithms(GA), which are based on the theory of natural evolution, have been evaluated highly for their robust performances. Traditional GA has mostly used binary code for representing design variable. The binary code GA has many difficulties to solve optimization problems with continuous design variables because of its large computer core memory size, inefficiency of its computing time, and its bad performance on local search. In this paper, a real code GA is proposed for dealing with the above problems. So, new crossover and mutation processes of GA are developed to use continuous design variables directly. The results of read code GA are compared with those of binary code GA for several single and multiple objective optimization problems. As a result of comparisons, it is found that the performance of the real code GA is better than that of the binary code GA, and concluded that the real code GA developed here can be used for the general optimization problem.

  • PDF

A Study on Computational Efficiency Enhancement by Using Full Gray Code Genetic Algorithm (전 영역 그레이코드 유전자 알고리듬의 효율성 증대에 관한 연구)

  • 이원창;성활경
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.10
    • /
    • pp.169-176
    • /
    • 2003
  • Genetic algorithm (GA), which has a powerful searching ability and is comparatively easy to use and also to apply, is in the spotlight in the field of the optimization for mechanical systems these days. However, it also contains some problems of slow convergence and low efficiency caused by a huge amount of repetitive computation. To improve the processing efficiency of repetitive computation, some papers have proposed paralleled GA these days. There are some cases that mention the use of gray code or suggest using gray code partially in GA to raise its slow convergence. Gray code is an encoding of numbers so that adjacent numbers have a single digit differing by 1. A binary gray code with n digits corresponds to a hamiltonian path on an n-dimensional hypercube (including direction reversals). The term gray code is open used to refer to a reflected code, or more specifically still, the binary reflected gray code. However, according to proposed reports, gray code GA has lower convergence about 10-20% comparing with binary code GA without presenting any results. This study proposes new Full gray code GA (FGGA) applying a gray code throughout all basic operation fields of GA, which has a good data processing ability to improve the slow convergence of binary code GA.

Improvement of Dynamic encoding algorithm with history information (동부호화 최적화 기법의 성능개선을 위한 과거 검색정보의 활용)

  • Park, Young-Su;Kim, Jong-Wook;Kim, Yeon-Tak
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.111-113
    • /
    • 2006
  • DEAS is an direct searching and optimization method that based on the binary code space. It can be classified as an direct hill climbing searching. However, because of binary code space based searching, the searching in low resolution has random property. As the resolution of code increases during the search, its property of searching changes like that of hill climbing search. This paper propose a method for improving the performance of minimum seeking ability of DEAS with history information. The cost evaluation is increased. However the minimum searching ability of DEAS is improved along the same starting resolution.

  • PDF

Translated Block Optimization of Dynamic Binary Translator for Embedded System Virtualization (임베디드 시스템 가상화를 위한 동적 이진 변환기의 변환 블록 최적화)

  • Hwang, Wonjun;Park, Sihyeong;Kim, Hyungshin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.385-393
    • /
    • 2017
  • As the use of mobile devices such as smartphones increases, there is growing interest on the benefits of virtualization in embedded systems. Full virtualization has the advantage of running the guest virtual machine without modifying the guest operating system. However, full virtualization suffers slow execution speed due to the cost of context switching between the virtual machines and the virtual machine monitor. In this paper, we propose a translated block and context switching optimization to improve the guest execution speed in the embedded system. As a result, the improved dynamic binary translator is up to 5.95 times faster than the native execution. Performance degradation is less than that of the other virtualization system.

Optimum Interleaver Design and Performance Analysis of Double-Binary Turbo Code for Wireless Metropolitan Area Networks (WMAN 시스템의 이중 이진 구조 터보부호 인터리버 최적화 설계 및 성능 분석)

  • Park, Sung-Joon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.1
    • /
    • pp.17-22
    • /
    • 2008
  • Double-binary turbo code has been adopted as an error control code of various future communication systems including wireless metropolitan area networks(WMAN) due to its powerful error correction capability. One of the components affecting the performance of turbo code is internal interleaver. In 802.16 d/e system, an almost regular permutation(ARP) interleaver has been included as a part of specification, however it seems that the interleaver is not optimized in terms of decoding performance. In this paper, we propose three optimization methods for the interleaver based on spatial distance, spread and minimum distance between original and interleaved sequence. We find optimized interleaving parameters for each optimization method and evaluate the performances of the proposed methods by computer simulation under additive white Gaussian noise(AWGN) channel. Optimized parameters can provide up to 1.0 dB power gain over the conventional method and furthermore the obtainable gain does not require any additional hardware complexity.

  • PDF

Characteristics of Spatial Coded Binary Phase Only Filter Applied by Simulated Annealing Algorithm (Simulated Annealing 알고리즘을 적용한 이진공간부호필터 특성)

  • 박성균;정창규;전석희;박한규
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.31A no.9
    • /
    • pp.64-71
    • /
    • 1994
  • In this study, optimizing BPOFs are encoded by Simulated Annealing algorithm that is widely used among the optimization algorithms. Two BPOFs are trained by digit patterns, 0~9, and the digits each having 4 intraclass patterns are multiplexed. When each digit is encoded by four bit binary code, from the results of computer simulation, the correlation pezk is shown at binary value 1 position among the spatially separated four positions at the correlation plane And then, the designed BPOFs are implemented by CGH technique. Through the optical correlation experiment, satisactory results are achieved, inspite of some experimental errors and information loss owing to the amplitude type CGH filter.

  • PDF

Optimization of Code Combination in Multi-Code Ultrasonic Sensors for Multi-Robot Systems (군집로봇을 위한 다중 코드 초음파센서의 코드조합 최적화)

  • Moon, Woo-Sung;Cho, Bong-Su;Baek, Kwang Ryul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.7
    • /
    • pp.614-619
    • /
    • 2013
  • In multi-robot systems, ultrasonic sensors are widely used for localization and/or obstacle detection. However, conventional ultrasonic sensors have a drawback, that is, the interference problem among ultrasonic transmitters. There are some previous studies to avoid interferences, such as TDMA (Time Division Multiple Access) and CDMA (Code Division Multiple Access). In multiple autonomous mobile robots systems, the Doppler-effect has to be considered because ultrasonic transceivers are attached to the moving robots. To overcome this problem, we find out the ASK (Amplitude Shift Keying)-CDMA technique is more robust to the Doppler-effect than the BPSK (Binary Phase Shift Keying)-CDMA technique. In this paper, we propose a new code-expression method and a Monte-Carlo based algorithm that optimizes the ultrasonic code combination in the ASK-CDMA ultrasonic system. The experimental results show that the proposed algorithm improves the performance of the ultrasonic multiple accessing capacity in the ASK-CDMA ultrasonic system.

Code Automatic Analysis Technique for Virtualization-based Obfuscation and Deobfuscation (가상화 기반 난독화 및 역난독화를 위한 코드 자동 분석 기술)

  • Kim, Soon-Gohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.724-731
    • /
    • 2018
  • Code obfuscation is a technology that makes programs difficult to understand for the purpose of interpreting programs or preventing forgery or tampering. Inverse reading is a technology that analyzes the meaning of origin through reverse engineering technology by receiving obfuscated programs as input. This paper is an analysis of obfuscation and reverse-toxicization technologies for binary code in a virtualized-based environment. Based on VMAttack, a detailed analysis of static code analysis, dynamic code analysis, and optimization techniques were analyzed specifically for obfuscation and reverse-dipidization techniques before obfuscating and reverse-dipulation techniques. Through this thesis, we expect to be able to carry out various research on virtualization and obfuscation. In particular, it is expected that research from stack-based virtual machines can be attempted by adding capabilities to enable them to run on register-based virtual machines.