• Title/Summary/Keyword: Optimized implementation

Search Result 509, Processing Time 0.029 seconds

LOTOS Protocol Conformance Testing for Formal Description Specifications (형식 기술 기법에 의한 LOTOS 프로토콜 적합성 시험)

  • Chin, Byoung-Moon;Kim, Sung-Un;Ryu, Young-Suk
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1821-1841
    • /
    • 1997
  • This paper presents an automated protocol conformance test sequence generation based on formal methods for LOTOS specification by using and applying many existing related algorithms and technique, such as the testing framework, Rural Chinese Postman tour concepts. We use the state-transition graphs obtained from LOTOS specifications by means of the CAESAR tool. This tool compiles a specification written in LOTOS into an extended Petri net, from which a transition graph of a event finite-state machine(EvFSM) including data is generated. A new characterizing sequence(CS), called Unique Event sequence(UE sequence) is defined. An UE sequence for a state is a sequence of accepted gate events that is unique for this state. Some experiences about UE sequence, partial UE sequence and signature are also explained. These sequences are combined with the concept of the Rural Chinese Postman Tour to obtain an optimal test sequence which is a minimum cost tour of the reference transition graph of the EvFSM. This paper also presents a fault coverage estimation experience of an automated method for optimized test sequences generation and the translation of the test sequence obtained by using our tool to TTCN notation are also given. A prototype of the proposed framework has been built with special attention to real application in order to generated the executable test cases in an automatic way. This formal method on conformance testing can be applied to the protocols related to IN, PCS and ATM for the purpose of verifying the correctness of implementation with respect to the given specification.

  • PDF

Design and Implementation of BNN based Human Identification and Motion Classification System Using CW Radar (연속파 레이다를 활용한 이진 신경망 기반 사람 식별 및 동작 분류 시스템 설계 및 구현)

  • Kim, Kyeong-min;Kim, Seong-jin;NamKoong, Ho-jung;Jung, Yun-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.211-218
    • /
    • 2022
  • Continuous wave (CW) radar has the advantage of reliability and accuracy compared to other sensors such as camera and lidar. In addition, binarized neural network (BNN) has a characteristic that dramatically reduces memory usage and complexity compared to other deep learning networks. Therefore, this paper proposes binarized neural network based human identification and motion classification system using CW radar. After receiving a signal from CW radar, a spectrogram is generated through a short-time Fourier transform (STFT). Based on this spectrogram, we propose an algorithm that detects whether a person approaches a radar. Also, we designed an optimized BNN model that can support the accuracy of 90.0% for human identification and 98.3% for motion classification. In order to accelerate BNN operation, we designed BNN hardware accelerator on field programmable gate array (FPGA). The accelerator was implemented with 1,030 logics, 836 registers, and 334.904 Kbit block memory, and it was confirmed that the real-time operation was possible with a total calculation time of 6 ms from inference to transferring result.

Optimization of Approximate Modular Multiplier for R-LWE Cryptosystem (R-LWE 암호화를 위한 근사 모듈식 다항식 곱셈기 최적화)

  • Jae-Woo, Lee;Youngmin, Kim
    • Journal of IKEEE
    • /
    • v.26 no.4
    • /
    • pp.736-741
    • /
    • 2022
  • Lattice-based cryptography is the most practical post-quantum cryptography because it enjoys strong worst-case security, relatively efficient implementation, and simplicity. Ring learning with errors (R-LWE) is a public key encryption (PKE) method of lattice-based encryption (LBC), and the most important operation of R-LWE is the modular polynomial multiplication of rings. This paper proposes a method for optimizing modular multipliers based on approximate computing (AC) technology, targeting the medium-security parameter set of the R-LWE cryptosystem. First, as a simple way to implement complex logic, LUT is used to omit some of the approximate multiplication operations, and the 2's complement method is used to calculate the number of bits whose value is 1 when converting the value of the input data to binary. We propose a total of two methods to reduce the number of required adders by minimizing them. The proposed LUT-based modular multiplier reduced both speed and area by 9% compared to the existing R-LWE modular multiplier, and the modular multiplier using the 2's complement method reduced the area by 40% and improved the speed by 2%. appear. Finally, the area of the optimized modular multiplier with both of these methods applied was reduced by up to 43% compared to the previous one, and the speed was reduced by up to 10%.

A Study of the Application of Amenity Resources for a Rural Community Development Project (농촌마을 종합개발 사업의 어메니티 자원 활용에 관한 연구)

  • Choi, Yoo Na;Suh, Joo Hwan
    • Journal of recreation and landscape
    • /
    • v.8 no.4
    • /
    • pp.43-51
    • /
    • 2014
  • This research is based on a rural village reconstruction business that is a priority under the national support act for rural village vitalization. Allowing for an analysis of the regional and annual classification of business contents as part of the master district implementation plan, this research presents amenity resource applications for the purpose of understanding the business contents and resource status reports. To analyze the utilization of amenity resources in the rural villages' overall development business, a content analysis of the business characteristics and resources of 299 districts was conducted for a seven-year period (2005-2011). Information that included district names, enterprise types, and specifications of a particular business, were coded in Excel, through exhaustive research of the 299 districts. Using this process, a more detailed categorization of seven years of business data, periodic, and regional business contents were defined. As a result of this research, it is apparent that the overall district's facility resources are optimized for the most, and that the environmental management of resources, including animal and plant resources, as well as water resources, is continuously decreasing, as was shown in the annual amenity resource usage transition. The annual amenity resource usage transition data denotes the highest rates in Jun-Ra-Buk-Do and Kyung-Sang-Buk-Do. In summary, this analysis verified the urgent need for diverse amenity resource utilization, research on practical alternatives, and the resource optimization of environmental controls for sustainable development in rural areas.

Implementation of reliable dynamic honeypot file creation system for ransomware attack detection (랜섬웨어 공격탐지를 위한 신뢰성 있는 동적 허니팟 파일 생성 시스템 구현)

  • Kyoung Wan Kug;Yeon Seung Ryu;Sam Beom Shin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.27-36
    • /
    • 2023
  • In recent years, ransomware attacks have become more organized and specialized, with the sophistication of attacks targeting specific individuals or organizations using tactics such as social engineering, spear phishing, and even machine learning, some operating as business models. In order to effectively respond to this, various researches and solutions are being developed and operated to detect and prevent attacks before they cause serious damage. In particular, honeypots can be used to minimize the risk of attack on IT systems and networks, as well as act as an early warning and advanced security monitoring tool, but in cases where ransomware does not have priority access to the decoy file, or bypasses it completely. has a disadvantage that effective ransomware response is limited. In this paper, this honeypot is optimized for the user environment to create a reliable real-time dynamic honeypot file, minimizing the possibility of an attacker bypassing the honeypot, and increasing the detection rate by preventing the attacker from recognizing that it is a honeypot file. To this end, four models, including a basic data collection model for dynamic honeypot generation, were designed (basic data collection model / user-defined model / sample statistical model / experience accumulation model), and their validity was verified.

A study on the strategies to lower technologist occupational exposure according to the performance form in PET scan procedure (PET 검사실 종사자의 업무 행위 별 방사선피폭 조사에 따른 피폭선량 저감화를 위한 연구)

  • Ko, Hyun Soo;Kim, Ho Sung;Nam-Kung, Chang Kyeoung;Yoon, Soon Sang;Song, Jae Hyuk;Ryu, Jae Kwang;Jung, Woo Young;Chang, Jung Chan
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.19 no.1
    • /
    • pp.17-29
    • /
    • 2015
  • Purpose For nuclear medicine technologists, it is difficult to stay away from or to separate from radiation sources comparing with workers who are using radiation generating devices. Nuclear medicine technologists work is recognized as an optimized way when they are familiar with work practices. The aims of this study are to measure radiation exposure of technologists working in PET and to evaluate the occupational radiation dose after implementation of strategies to lower exposure. Materials and Methods We divided into four working types by QC for PET, injection, scan and etc. in PET scan procedure. In QC of PET, we compared the radiation exposure controlling next to $^{68}Ge$ cylinder phantom directly to controlling the table in console room remotely. In injection, we compared the radiation exposure guiding patient in waiting room before injection to after injection. In scan procedure of PET, we compared the radiation exposure moving the table using the control button located next to the patient to moving the table using the control button located in the far distance. PERSONAL ELECTRONIC DOSEMETER (PED), Tracerco$^{TM}$ was used for measuring exposed radiation doses. Results The average doses of exposed radiation were $0.27{\pm}0.04{\mu}Sv$ when controlling the table directly and $0.13{\pm}0.14{\mu}Sv$ when controlling the table remotely while performing QC. The average doses of exposed radiation were $0.97{\pm}0.36{\mu}Sv$ when guiding patient after injection and $0.62{\pm}0.17{\mu}Sv$ when guiding patient before injection. The average doses of exposed radiation were $1.33{\pm}0.54{\mu}Sv$ when using the control button located next to the patient and $0.94{\pm}0.50{\mu}Sv$ when using the control button located in far distance while acquiring image. As a result, there were statistically significant differences(P<0.05). Conclusion: From this study, we found that how much radiation doses technologists are exposed on average at each step of PET procedure while working in PET center and how we can reduce the occupational radiation dose after implementation of strategies to lower exposure. And if we make effort to seek any other methods to reduce technologist occupational radiation, we can minimize and optimize exposed radiation doses in department of nuclear medicine. Conclusion From this study, we found that how much radiation doses technologists are exposed on average at each step of PET procedure while working in PET center and how we can reduce the occupational radiation dose after implementation of strategies to lower exposure. And if we make effort to seek any other methods to reduce technologist occupational radiation, we can minimize and optimize exposed radiation doses in department of nuclear medicine.

  • PDF

Memory Organization for a Fuzzy Controller.

  • Jee, K.D.S.;Poluzzi, R.;Russo, B.
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 1993.06a
    • /
    • pp.1041-1043
    • /
    • 1993
  • Fuzzy logic based Control Theory has gained much interest in the industrial world, thanks to its ability to formalize and solve in a very natural way many problems that are very difficult to quantify at an analytical level. This paper shows a solution for treating membership function inside hardware circuits. The proposed hardware structure optimizes the memoried size by using particular form of the vectorial representation. The process of memorizing fuzzy sets, i.e. their membership function, has always been one of the more problematic issues for the hardware implementation, due to the quite large memory space that is needed. To simplify such an implementation, it is commonly [1,2,8,9,10,11] used to limit the membership functions either to those having triangular or trapezoidal shape, or pre-definite shape. These kinds of functions are able to cover a large spectrum of applications with a limited usage of memory, since they can be memorized by specifying very few parameters ( ight, base, critical points, etc.). This however results in a loss of computational power due to computation on the medium points. A solution to this problem is obtained by discretizing the universe of discourse U, i.e. by fixing a finite number of points and memorizing the value of the membership functions on such points [3,10,14,15]. Such a solution provides a satisfying computational speed, a very high precision of definitions and gives the users the opportunity to choose membership functions of any shape. However, a significant memory waste can as well be registered. It is indeed possible that for each of the given fuzzy sets many elements of the universe of discourse have a membership value equal to zero. It has also been noticed that almost in all cases common points among fuzzy sets, i.e. points with non null membership values are very few. More specifically, in many applications, for each element u of U, there exists at most three fuzzy sets for which the membership value is ot null [3,5,6,7,12,13]. Our proposal is based on such hypotheses. Moreover, we use a technique that even though it does not restrict the shapes of membership functions, it reduces strongly the computational time for the membership values and optimizes the function memorization. In figure 1 it is represented a term set whose characteristics are common for fuzzy controllers and to which we will refer in the following. The above term set has a universe of discourse with 128 elements (so to have a good resolution), 8 fuzzy sets that describe the term set, 32 levels of discretization for the membership values. Clearly, the number of bits necessary for the given specifications are 5 for 32 truth levels, 3 for 8 membership functions and 7 for 128 levels of resolution. The memory depth is given by the dimension of the universe of the discourse (128 in our case) and it will be represented by the memory rows. The length of a world of memory is defined by: Length = nem (dm(m)+dm(fm) Where: fm is the maximum number of non null values in every element of the universe of the discourse, dm(m) is the dimension of the values of the membership function m, dm(fm) is the dimension of the word to represent the index of the highest membership function. In our case then Length=24. The memory dimension is therefore 128*24 bits. If we had chosen to memorize all values of the membership functions we would have needed to memorize on each memory row the membership value of each element. Fuzzy sets word dimension is 8*5 bits. Therefore, the dimension of the memory would have been 128*40 bits. Coherently with our hypothesis, in fig. 1 each element of universe of the discourse has a non null membership value on at most three fuzzy sets. Focusing on the elements 32,64,96 of the universe of discourse, they will be memorized as follows: The computation of the rule weights is done by comparing those bits that represent the index of the membership function, with the word of the program memor . The output bus of the Program Memory (μCOD), is given as input a comparator (Combinatory Net). If the index is equal to the bus value then one of the non null weight derives from the rule and it is produced as output, otherwise the output is zero (fig. 2). It is clear, that the memory dimension of the antecedent is in this way reduced since only non null values are memorized. Moreover, the time performance of the system is equivalent to the performance of a system using vectorial memorization of all weights. The dimensioning of the word is influenced by some parameters of the input variable. The most important parameter is the maximum number membership functions (nfm) having a non null value in each element of the universe of discourse. From our study in the field of fuzzy system, we see that typically nfm 3 and there are at most 16 membership function. At any rate, such a value can be increased up to the physical dimensional limit of the antecedent memory. A less important role n the optimization process of the word dimension is played by the number of membership functions defined for each linguistic term. The table below shows the request word dimension as a function of such parameters and compares our proposed method with the method of vectorial memorization[10]. Summing up, the characteristics of our method are: Users are not restricted to membership functions with specific shapes. The number of the fuzzy sets and the resolution of the vertical axis have a very small influence in increasing memory space. Weight computations are done by combinatorial network and therefore the time performance of the system is equivalent to the one of the vectorial method. The number of non null membership values on any element of the universe of discourse is limited. Such a constraint is usually non very restrictive since many controllers obtain a good precision with only three non null weights. The method here briefly described has been adopted by our group in the design of an optimized version of the coprocessor described in [10].

  • PDF

Evaluation of Viral Inactivation Efficacy of a Continuous Flow Ultraviolet-C Reactor (UVivatec) (연속 유동 Ultraviolet-C 반응기(UVivatec)의 바이러스 불활화 효과 평가)

  • Bae, Jung-Eun;Jeong, Eun-Kyo;Lee, Jae-Il;Lee, Jeong-Im;Kim, In-Seop;Kim, Jong-Su
    • Microbiology and Biotechnology Letters
    • /
    • v.37 no.4
    • /
    • pp.377-382
    • /
    • 2009
  • Viral safety is an important prerequisite for clinical preparations of all biopharmaceuticals derived from plasma, cell lines, or tissues of human or animal origin. To ensure the safety, implementation of multiple viral clearance (inactivation and/or removal) steps has been highly recommended for manufacturing of biopharmaceuticals. Of the possible viral clearance strategies, Ultraviolet-C (UVC) irradiation has been known as an effective viral inactivating method. However it has been dismissed by biopharmaceutical industry as a result of the potential for protein damage and the difficulty in delivering uniform doses. Recently a continuous flow UVC reactor (UVivatec) was developed to provide highly efficient mixing and maximize virus exposure to the UV light. In order to investigate the effectiveness of UVivatec to inactivate viruses without causing significant protein damage, the feasibility of the UVC irradiation process was studied with a commercial therapeutic protein. Recovery yield in the optimized condition of $3,000\;J/m^2$ irradiation was more than 98%. The efficacy and robustness of the UVC reactor was evaluated with regard to the inactivation of human immunodeficiency virus (HIV), hepatitis A virus (HAV), bovine herpes virus (BHV), bovine viral diarrhea virus (BVDV), porcine parvovirus (PPV), bovine parvovirus (BPV), minute virus of mice (MVM), reovirus type 3 (REO), and bovine parainfluenza virus type 3 (BPIV). Non enveloped viruses (HAV, PPV, BPV, MVM, and REO) were completely inactivated to undetectable levels by $3,000\;J/m^2$ irradiation. Enveloped viruses such as HIV, BVDV, and BPIV were completely inactivated to undetectable levels. However BHV was incompletely inactivated with slight residual infectivity remaining even after $3,000\;J/m^2$ irradiation. The log reduction factors achieved by UVC irradiation were ${\geq}3.89$ for HIV, ${\geq}5.27$ for HAV, 5.29 for BHV, ${\geq}5.96$ for BVDV, ${\geq}4.37$ for PPV, ${\geq}3.55$ for BPV, ${\geq}3.51$ for MVM, ${\geq}4.20$ for REO, and ${\geq}4.15$ for BPIV. These results indicate that UVC irradiation using UVivatec was very effective and robust in inactivating all the viruses tested.

Review of the Radiation Risk and Clinical Efficacy Associated with Computed Tomography Cancer Screening (암의 조기발견을 위한 CT촬영에서의 임상적 효능과 방사선위해에 대한 고찰)

  • Kim, Hyun Ja
    • Journal of Radiation Protection and Research
    • /
    • v.38 no.4
    • /
    • pp.214-227
    • /
    • 2013
  • Computed tomographic scan as a screening procedures in asymptomatic individuals has seen a steady increase with the introduction of multiple-raw detector CT scanners. This report provides a brief review of the current controversy surrounding CT cancer screening, with a focus on the radiation induced cancer risks and clinical efficacy. 1. A large study of patients at high risk of lung cancer(the National Lung Screening Trial[NLST]) showed that CT screening reduced cancer deaths by 20%(1.33% in those screened compared with 1.67% in those not screened). The rate of positive screening tests was 24.2% and 96.4% of the positive screening results in the low-dose CT group were false-positive. Radiation induced lung cancer risk was estimated the most important in screening population because ERR of radiation induced lung cancer does not show the decrease with increasing age and synergistic connection between smoking and radiation risk. Therefore, the radiation risk may be on the same order of magnitude as the benefit observed in the NLST. Optimal screening strategy remain uncertain, CT lung cancer screening is not yet ready for implementation. 2. Computed tomographic colonography is as good as colonoscopy for detecting colon cancer and is almost as good as colonoscopy for detecting advanced adenomas, but significantly less sensitive and specific for smaller lesions and disadvantageous for subsequent therapeutic optical colonoscopy if polyps are detected. The average effective dose from CT colonography was estimated 8-10 $mS{\nu}$, which could be a significant dose if administered routinely within the population over many years. CT colonography should a) achieve at least 90% sensitivity and specificity in the size category from 6 and 10 mm, b) offer non-cathartic bowl preparation and c) be optimized and standardized CT parameters if it is to be used for mass screening. 3. There is little evidence that demonstrates, for whole-body scanning, the benefit outweighs the detriment. This test found large portion of patient(86~90.8%) had at least one abnormal finding, whereas only 2% were estimated to have clinically significant disease. Annual scans from ages 45 to 75 years would accrue an estimated lifetime cancer mortality risk of 1.9%. There is no group within the medical community that recommends whole-body CT. No good studies indicate the accuracy of screening CT, at this time. The benefit/risk balance for any of the commonly suggested CT screening techniques has yet to be established. These areas need further research. Therefore wild screening should be avoided.