• Title/Summary/Keyword: Efficiency of operations

Search Result 1,344, Processing Time 0.027 seconds

Super-resolution Algorithm using Discrete Wavelet Transform for Single-image (이산 웨이블릿 변환을 이용한 영상의 초고해상도 기법)

  • Lim, Jong-Myeong;Yoo, Ji-Sang
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.344-353
    • /
    • 2012
  • In this paper, we propose a super-resolution algorithm using discrete wavelet transform. In general super-resolution algorithms for single-image, probability based operations have been used for searching high-frequency components. Consequently, the complexity of the algorithm causes the increase of processing time. In the proposed algorithm, we use discrete wavelet transform to find high-frequency sub-bands. We perform inverse discrete wavelet transform using input image and high-frequency sub-bands of the same resolution as the input image which are obtained by performing discrete wavelet transform without down-sampling and then we obtain image with high-resolution. In the proposed algorithm, we use the down-sampled version of the original image ($512{\times}512$) as a test image ($256{\times}256$) to compare the performance of algorithms. Through experimental results, we confirm the improved efficiency of the proposed algorithm comparing with conventional interpolation algorithms and also decreased processing time comparing the probability based operations.

A Study of Practical Field Application Cryptographic Module through Evaluation Derived by Connection Indicators (품질 연계지표 평가방법을 사용한 암호화 모듈 실무현장 적용체계 연구)

  • Noh, SiChoon;Na, SangYeob
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.55-60
    • /
    • 2014
  • In this study, we propose a cryptographic module quality evaluation system referenced by ISO/IEC 9000 quality system with Quality, Quality Factor, Quality Subfactor, Metric. Practical application process encryption algorithm based on the encryption algorithm to encrypt the pros and cons valuation of diagnosis, point selection algorithm, analysis, and quality items(quality factor), eliciting constraints derived, such as the cryptographic module design quality evaluation system is set to step 5. The five steps are examples of field-based diagnostic tool for cryptographic operations, the most essential work to be done in order to derive one will work. 2-Factor encryption module for connection between indicator items(quality factor) to identify and ensure the quality of the item the constraints of the environment are two kinds of cryptographic operations. This study is an encryption module and a practical field application system, it presents the standardized model. We have to meet the rapid changes in information technology. The environment, development and the encryption algorithm applied to model a wide variety of on-site development encryption will be able to expect the efficiency.

A Study of the Improvement for the Military Logistics, focusing on the PLS Truck and the Dual Pallet Standard (PLS트럭 및 표준 파렛트 규격 복수화 적용이 군수지원에 미치는 영향 연구)

  • Kwon, Kang-Min;Kim, Min-Woo;Kang, Seong-Jin;Kang, Kyung-Woo;Suh, Sun-Duck
    • Journal of the military operations research society of Korea
    • /
    • v.35 no.2
    • /
    • pp.87-98
    • /
    • 2009
  • In the military logistics, the Outsourcing such as 3PL (3rd Party Logistics) and 4PL has emerged recently as an important agenda. However, when 3PL applied prematurely, side effects will occur such as the loss of combat power in wartime, the security vulnerabilities and the high cost by a small amount of military order. Recently, the developed countries such as the United States and the Britain want to compensate for these side effects. Therefore, They are developing the private-public competitive sourcing concept for the complementary partnership and the foster competition with the private sector. To apply this concept to the Korean Military, they need to be reorganized and promote the efficiency in the military logistics. Especially, the transportation sector. Therefore, this study, which is focused on the transportation sector, offers two kinds of measures to improve such as the Dual Pallet Standard (T11, T12) and the PLS(Palletized Loading System) truck system. Finally, these improvements will be analyzed by the simulation in this paper.

A Study on the Operational Planning Assist System for Ground Forces (지상군 작전계획 수립 보조 시스템 설계 연구)

  • Ikhyun Kim;Sunju Lee
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.1
    • /
    • pp.7-18
    • /
    • 2023
  • The military leader makes an operation plan to accomplish combat missions. The current doctrine for an operation planning requires the use of simple and clear procedures and methods that can be carried out with human effort under adverse conditions in the field. The work in the process of an operation planning can be said to be a series of decision-making, and the criteria for decision-making generally apply mission variables. However, detailed standards are not fixed as doctrine, but are creatively established and applied. However, for AI-based decision-making, it is necessary to formalize the criteria and the format used. This paper first aims to standardize various criteria and forms to present a method that can be used in a semi-automated assist system, and to seek a plan to artificialize it. To this end, mathematical models and decision-making methods established in the field of operations research were applied to improve efficiency.

  • PDF

Proposed STAR Procedure of Incheon International Airport Considering Safety and Efficiency (인천공항 도착항공기의 안전 및 효율 향상을 위한 표준접근절차 수정방안 연구)

  • Chang, Jaeho
    • Journal of Advanced Navigation Technology
    • /
    • v.20 no.4
    • /
    • pp.292-297
    • /
    • 2016
  • Since continuous descent operations (CDO) is one of several tools available to aircraft operators and air navigation service providers (ANSPs) to increase safety, flight predictability, and airspace capacity while reducing noise, controller-pilot communications, fuel burn and emissions, widespread implementation of CDO would result in significant reductions in the environmental impact and aircraft operation costs in south korea as well. After analyzing each procedure from standard terminal arrival routes used for the Incheon international airport, it can be noticed that one of the procedures has a relatively high altitude constraint at initial approach fix than others, which lead the pilots to use unnecessary drag device in certain situations. Therefore we came to a conclusion that some arrival procedures need to be revised, so unnecessary procedure required during approach can be minimized, thereby reducing fuel consumption, noise and emissions compared to current approach procedures. And it is going to increase the safety margin significantly during approach phase due to reduced workload.

A Design of Hybrid Lossless Audio Coder (Hybrid 무손실 오디오 부호화기의 설계)

  • 박세형;신재호
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.253-260
    • /
    • 2004
  • This paper proposes a novel algorithm for hybrid lossless audio coding, which employs an integer wavelet transform and a linear prediction model. The proposed algorithm divides the input signal into flames of a proper length, decorrelates the framed data using the integer wavelet transform and linear prediction and finally entropy-codes the frame data. In particular, the adaptive Golomb-Rice coding method used for the entropy coding selects an optimal option which gives the best compression efficiency. Since the proposed algorithm uses integer operations, it significantly improves the computation speed in comparison with an algorithm using real or floating-point operations. When the coding algorithm is implemented in hardware, the system complexity as well as the power consumption is remarkably reduced. Finally, because each frame is independently coded and is byte-aligned with respect to the frame header, it is convenient to move, search, and edit the coded, compressed data.

MPIRace-Check V 1.0: A Tool for Detecting Message Races in MPI Parallel Programs (MPIRace-Check V 1.0: MPI 병렬 프로그램의 메시지경합 탐지를 위한 도구)

  • Park, Mi-Young;Chung, Sang-Hwa
    • The KIPS Transactions:PartA
    • /
    • v.15A no.2
    • /
    • pp.87-94
    • /
    • 2008
  • Message races should be detected for debugging effectively message-passing programs because they can cause non-deterministic executions of a program. Previous tools for detecting message races report that message races occur in every receive operation which is expected to receive any messages. However message races might not occur in the receive operation if each of messages is transmitted through a different logical communication channel so that their incorrect detection makes it a difficult task for programmers to debug programs. In this paper we suggest a tool, MPIRace-Check, which can exactly detect message races by checking the concurrency between send/receive operations, and by inspecting the logical communication channels of the messages. To detect message races, this tool uses the vector timestamp to check if send and receive operations are concurrent during an execution of a program and it also uses the message envelop to inspect if the logical communication channels of transmitted messages are the same. In our experiment, we show that our tool can exactly detect message races with efficiency using MPI_RTED and a benchmark program. By detecting message races exactly, therefore, our tool enables programmers to develop reliable parallel programs reducing the burden of debugging.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

GPU Resource Contention Management Technique for Simultaneous GPU Tasks in the Container Environments with Share the GPU (GPU를 공유하는 컨테이너 환경에서 GPU 작업의 동시 실행을 위한 GPU 자원 경쟁 관리기법)

  • Kang, Jihun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.10
    • /
    • pp.333-344
    • /
    • 2022
  • In a container-based cloud environment, multiple containers can share a graphical processing unit (GPU), and GPU sharing can minimize idle time of GPU resources and improve resource utilization. However, in a cloud environment, GPUs, unlike CPU or memory, cannot logically multiplex computing resources to provide users with some of the resources in an isolated form. In addition, containers occupy GPU resources only when performing GPU operations, and resource usage is also unknown because the timing or size of each container's GPU operations is not known in advance. Containers unrestricted use of GPU resources at any given point in time makes managing resource contention very difficult owing to where multiple containers run GPU tasks simultaneously, and GPU tasks are handled in black box form inside the GPU. In this paper, we propose a container management technique to prevent performance degradation caused by resource competition when multiple containers execute GPU tasks simultaneously. Also, this paper demonstrates the efficiency of container management techniques that analyze and propose the problem of degradation due to resource competition when multiple containers execute GPU tasks simultaneously through experiments.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.