• Title/Summary/Keyword: Fast Computation

Search Result 750, Processing Time 0.028 seconds

A Solution of Production Scheduling Problem adapting Fast Model of Parallel Heuristics (병렬 휴리스틱법의 고속화모델을 적용한 생산 스케쥴링 문제의 해법)

  • Hong, Seong-Chan;Jo, Byeong-Jun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.959-968
    • /
    • 1999
  • several papers have reported that parallel heuristics or hybrid approaches combining several heuristics can get better results. However, the parallelization and hybridization of any search methods on the single CPU type computer need enormous computation time. that case, we need more elegant combination method. For this purpose, we propose Fast Model of Parallel Heuristics(FMPH). FMPH is based on the island model of parallel genetic algorithms and takes local search to the elite solution obtained form each island(sub group). In this paper we introduce how can we adapt FMPH to the job-shop scheduling problem notorious as the most difficult NP-hard problem and report the excellent results of several famous benchmark problems.

  • PDF

Low Complexity Bilateral Search Successive Interference Cancellation for OFDM in Fast Time-Varying Channels (고속 시변 채널 OFDM을 위한 저복잡도 양방향 탐색 순차적 간섭 제거)

  • Lim, Dongmin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.1
    • /
    • pp.9-14
    • /
    • 2013
  • In this paper, we propose a low complexity bilateral search SIC for OFDM in fast time-varying channels. Due to the possibility of error propagation in SIC, symbol detection ordering within the block of symbols has a significant effect on the overall performance. In this paper, the first symbol to be detected is determined based on CSEP values, and then the next symbol to be detected is selected according to the updated CSEP while bilaterally searching from the boundary of the detected symbol group. Through computer simulations, we show that the proposed method has performance improvements with almost the same computation complexity over the conventional methods in the high SNR region. It has a performance approaching the MFB, known as the performance upper bound, within 2dB at the BER of $10^{-5}$.

NTGST-Based Parallel Computer Vision Inspection for High Resolution BLU (NTGST 병렬화를 이용한 고해상도 BLU 검사의 고속화)

  • 김복만;서경석;최흥문
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.6
    • /
    • pp.19-24
    • /
    • 2004
  • A novel fast parallel NTGST is proposed for high resolution computer vision inspection of the BLUs in a LCD production line. The conventional computation- intensive NTGST algorithm is modified and its C codes are optimized into fast NTGST to be adapted to the SIMD parallel architecture. And then, the input inspection image is partitioned and allocated to each of the P processors in multi-threaded implementation, and the NTGST is executed on SIMD architecture of N data items simultaneously in each thread. Thus, the proposed inspection system can achieve the speedup of O(NP). Experiments using Dual-Pentium III processor with its MMX and extended MMX SIMD technology show that the proposed parallel NTGST is about Sp=8 times faster than the conventional NTGST, which shows the scalability of the proposed system implementation for the fast, high resolution computer vision inspection of the various sized BLUs in LCD production lines.

A Fast Authentication based on Hierarchical Key Structure for Roaming Mobile Nodes Between Domains (모바일 네트워크에서 로밍을 위한 계층적 인증 방법)

  • Hong, Ki-Hun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1288-1296
    • /
    • 2006
  • This paper proposes a fast authentication scheme based on hierarchical key structure (HiFA) for roaming mobile nodes in both intra-domain and inter-domain. The full authentication procedure standardized in IEEE 802.11 and 802.16 is difficult to be applied to a handover since it needs a heavy operation and long delay time during a handover. Though a number of schemes were proposed to solve the problem, the existing schemes might degrade the security of authentication or impose heavy administrative burden on the Pome authentication server. The main contribution of this paper is to reduce the communication and computation overhead of the home authentication sewer without degrading the security strength of the fast roaming authentication using hierarchical authentication key structure. The proposed scheme iii this paper decentralizes the administrative burden of the home authentication server to other network entities such as a local authentication server or access point and supports the security separation of the authentication key among local authentication servers using hash key chain.

A New Fast Training Algorithm for Vector Quantizer Design (벡터양자화기의 코드북을 구하는 새로운 고속 학습 알고리듬)

  • Lee, Dae-Ryong;Baek, Seong-Joon;Sung, Koeng-Mo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.5
    • /
    • pp.107-112
    • /
    • 1996
  • In this paper we propose a new fast codebook training algorithm for reducing the searching time of LBG algorithm. For each training data, the proposed algorithm stores the indexes of codewords that are close to that training data in the first iteration. It reduces computation time by searching only those codewords, the indexes of which are stored for each training data. Compared to one of the previous fast training algorithm, FSLBG, it obtains a better codebook with less exccution time. In our experiment, the performance of the codebook generated by the proposed algorithm in terms of peak signal-to-noise ratio(TSNR) is very close to that of LBG algorithm. However, the codewords to be searched for each training data of the proposed algorithm is only about 6%, for a codebook size of 256 and 1.6%, for a codebook size of 1.24, of LBG algorithm.

  • PDF

Fast Block-Matching Motion Estimation Using Constrained Diamond Search Algorithm (구속조건을 적용한 다이아몬드 탐색 알고리즘에 의한 고속블록정합움직임추정)

  • 홍성용
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.13-20
    • /
    • 2003
  • Based on the studies on the motion vector distributions estimated on the image sequences, we proposed constrained diamond search (DS) algorithm for fast block-matching motion estimation. By considering the fact that motion vectors are searched within the 2 pixels distance in vertically and horizontally on average, we confirmed that DS algorithm achieves close performance on error ratio and requires less computation compared with new three-step search (NTSS) algorithm. Also, by applying displaced frame difference (DFD) to DS algorithm, we reduced the computational loads needed to estimate the motion vectors within the stable block that do not have motions. And we reduced the possibilities falling into the local minima in the course of estimation of motion vectors by applying DFD to DS algorithm. So, we knew that proposed constrained DS algorithm achieved enhanced results as aspects of error ratio and the number of search points to be necessary compared with conventional DS algorithm, four step search (FSS) algorithm, and block-based gradient-descent search algorithm

  • PDF

A Past Elimination Algorithm of Impossible Candidate Vectors Using Matching Scan Method in Motion Estimation of Full Search (전영역 탐색 방식의 움직임 예측에서 매칭 스캔 방법을 이용한 불가능한 후보 벡터의 고속 제거 알고리즘)

  • Kim Jone-Nam
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1080-1087
    • /
    • 2005
  • Significant computations for full search (FS) motion estimation have been a big obstacle in real-time video coding and recent MPEG-4 AVC (advanced video coding) standard requires much more computations than conventional MPEG-2 for motion estimation. To reduce an amount of computation of full search (FS) algorithm for fast motion estimation, we propose a new and fast matching algorithm without any degradation of predicted images like the conventional FS. The computational reduction without any degradation in predicted image comes from fast elimination of impossible candidate motion vectors. We obtain faster elimination of inappropriate motion vectors using efficient matching units from localization of complex area in image data and dithering order based matching scan. Our algorithm reduces about $30\%$ of computations for block matching error compared with the conventional partial distortion elimination (PDE) algorithm, and our algorithm will be useful in real-time video coding applications using MPEG-4 AVC or MPEG-2.

  • PDF

COMPUTATION OF LAMINAR NATURAL CONVECTION OF NANOFLUID USING BUONGIORNO'S NONHOMOGENEOUS MODEL (Buongiorno의 비균질 모델을 사용한 나노유체의 층류 자연대류 해석)

  • Choi, S.K.;Kim, S.O.;Lee, T.H.
    • Journal of computational fluids engineering
    • /
    • v.18 no.4
    • /
    • pp.25-34
    • /
    • 2013
  • A numerical study of a laminar natural convection of the CuO-water nanofluid in a square cavity using the Buongiorno's nonhomogeneous model is presented. All the governing equations including the volume fraction equation are discretized on a cell-centered, non-uniform grid employing the finite-volume method with a primitive variable formulation. Calculations are performed over a range of Rayleigh numbers and volume fractions of the nanopartile. From the computed results, it is shown that both the homogeneous and nonhomogeneous models predict the deterioration of the natural convection heat transfer well with an increase of the volume fraction of nanoparticle at the same Rayleigh number, which was observed in the previous experimental studies. It is also shown that the differences in the computed results of the average Nusselt number at the wall between the homogeneous and nonhomogeneous models are very small, and this indicates that the slip mechanism of the Brown diffusion and thermophoresis effects are negligible in the laminar natural convection of the nanofluid. The degradation of the heat transfer with an increase of the volume fraction of the nanoparticle in the natural convection of nanofluid is due to the increase of the viscosity and the decrease of the thermal expansion coefficient and the specific heat. It is clarified in the present study that the previous controversies between the numerical and experimental studies are owing to the different definitions of the Nusselt number.

A Fast Full-Search Motion Estimation Algorithm using Adaptive Matching Scans based on Image Complexity (영상 복잡도와 다양한 매칭 스캔을 이용한 고속 전영역 움직임 예측 알고리즘)

  • Kim Jong-Nam
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.10
    • /
    • pp.949-955
    • /
    • 2005
  • In this Paper, we propose fast block matching algorithm by dividing complex areas based on complexity order of reference block and square sub-block to reduce an amount of computation of full starch(FS) algorithm for fast motion estimation, while keeping the same prediction quality compared with the full search algorithm. By using the fact that matching error is proportional to the gradient of reference block, we reduced unnecessary computations with square sub-block adaptive matching scan based image complexity instead of conventional sequential matching scan and row/column based matching scan. Our algorithm reduces about $30\%$ of computations for block matching error compared with the conventional partial distortion elimination(PDE) algorithm without any prediction quality, and our algorithm will be useful in real-time video coding applications using MPEG-4 AVC or MPEG-2.

Fast k-NN based Malware Analysis in a Massive Malware Environment

  • Hwang, Jun-ho;Kwak, Jin;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6145-6158
    • /
    • 2019
  • It is a challenge for the current security industry to respond to a large number of malicious codes distributed indiscriminately as well as intelligent APT attacks. As a result, studies using machine learning algorithms are being conducted as proactive prevention rather than post processing. The k-NN algorithm is widely used because it is intuitive and suitable for handling malicious code as unstructured data. In addition, in the malicious code analysis domain, the k-NN algorithm is easy to classify malicious codes based on previously analyzed malicious codes. For example, it is possible to classify malicious code families or analyze malicious code variants through similarity analysis with existing malicious codes. However, the main disadvantage of the k-NN algorithm is that the search time increases as the learning data increases. We propose a fast k-NN algorithm which improves the computation speed problem while taking the value of the k-NN algorithm. In the test environment, the k-NN algorithm was able to perform with only the comparison of the average of similarity of 19.71 times for 6.25 million malicious codes. Considering the way the algorithm works, Fast k-NN algorithm can also be used to search all data that can be vectorized as well as malware and SSDEEP. In the future, it is expected that if the k-NN approach is needed, and the central node can be effectively selected for clustering of large amount of data in various environments, it will be possible to design a sophisticated machine learning based system.