• Title/Summary/Keyword: Product Complexity

Search Result 305, Processing Time 0.024 seconds

Embodiment of PWM converter by using the VHDL (VHDL을 이용한 PWM 컨버터의 구현)

  • Baek, Kong-Hyun;Joo, Hyung-Jun;Lee, Hyo-Sung;Lim, Yong-Kon;Lee, Heung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2002.11d
    • /
    • pp.197-199
    • /
    • 2002
  • The invention of VHDL(Very High Speed Integrated Circuit Hardware Description Language), Technical language of Hardware, is a kind of turning point in digital circuit designing, which is being more and more complicated and integrated. Because of its excellency in expression ability of hardware, VHDL is not only used in designing Hardware but also in simulation for verification, and in exchange and conservation, composition of the data of designs, and in many other ways. Especially, It is very important that VHDL is a Technical language of Hardware standardized by IEEE, intenational body with an authority. The biggest problem in modern circuit designing can be pointed out in two way. One is a problem how to process the rapidly being complicated circuit complexity. The other is minimizing the period of designing and manufacturing to survive in a cutthroat competition. To promote the use of VHDL, more than a simple use of simulation by VHDL, it is requested to use VHDL in composing logical circuit with chip manufacturing. And, by developing the quality of designing technique, it can contribute for development in domestic industry related to ASIC designing. In this paper in designing SMPS(Switching mode power supply), programming PWM by VHDL, it can print static voltage by the variable load, connect computer to chip with byteblaster, and download in Max(EPM7064SLCS4 - 5)chip of ALTER. To achieve this, it is supposed to use VHDL in modeling, simulating, compositing logic and product of the FPGA chip. Despite its limit in size and operating speed caused by the specific property of FPGA chip, it can be said that this method should be introduced more aggressively because of its prompt realization after designing.

  • PDF

Efficiency Evaluation of Defence Industry Firms by Utilizing DEA (DEA를 활용한 국내 방산업체 효율성 분석)

  • Choi, Jae-Ho;Lee, Yoon-Woo;Jang, Min-uk;Seo, Sang-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.9
    • /
    • pp.501-507
    • /
    • 2018
  • Owing to the complexity and modernization of weapon systems, the role of the defense industry in producing military supplies has become increasingly important. In previous defense industries, price competitiveness was a key factor in the product choice. On the other hand, as exports of domestic military supplies are expanding rapidly based on superior quality, there is a need to evaluate objectively the efficiency of management in the domestic defense industry. In this study, the efficiency of management was measured using DEA, which is one of the decision methodologies. In addition, the number of employees (QA Employee) and R&D performance were set as input variables to utilize DEA, and the output variables were based on sales and operating profit. Based on the results of the analysis, a future study will measure the efficiency of the management of domestic defense industry to help guide a strategic development plan.

Diffie-Hellman Based Asymmetric Key Exchange Method Using Collision of Exponential Subgroups (지수연산 부분군의 충돌을 이용한 Diffie-Hellman 기반의 비대칭 키 교환 방법)

  • Song, Jun Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • In this paper, we show a modified Diffie-Hellman key exchange protocol that can exchange keys by exposing only minimal information using pre-computable session key pairs. The discrete logarithm problem, which provides the safety of existing Diffie-Hellman and Diffie-Hellman based techniques, is modified to prevent exposure of primitive root. We prove the algorithm's operation by applying the actual value to the proposed scheme and compare the execution time and safety with the existing algorithm, shown that the security of the algorithm is improved more than the product of the time complexity of the two base algorithms while maintaining the computation amount at the time of key exchange. Based on the proposed algorithm, it is expected to provide a key exchange environment with improved security.

Performance Comparison of DCT Algorithm Implementations Based on Hardware Architecture (프로세서 구조에 따른 DCT 알고리즘의 구현 성능 비교)

  • Lee Jae-Seong;Pack Young-Cheol;Youn Dae-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6C
    • /
    • pp.637-644
    • /
    • 2006
  • This paper presents performance and implementation comparisons of standard and fast DCT algorithms that are commonly used for subband filter bank in MPEG audio coders. The comparison is made according to the architectural difference of the implementation hardware. Fast DCT algorithms are known to have much less computational complexity than the standard method that involves computing a vector dot product of cosine coefficient. But, due to structural irregularity, fast DCT algorithms require extra cycles to generate the addresses for operands and to realign interim data. When algorithms are implemented using DSP processors that provide special operations such as single-cycle MAC (multiply-accumulate), zero-overhead nested loop, the standard algorithm is more advantageous than the fast algorithms. Also, in case of the finite-precision processing, the error performance of the standard method is far superior to that of the fast algorithms. In this paper, truncation errors and algorithmic suitability are analyzed and implementation results are provided to support the analysis.

A Study on Quality evaluation Methodology Establishment of Anti-Virus Software based on the Real Test Environment (리얼 테스트 환경 기반의 안티바이러스 소프트웨어의 품질평가 방법론 정립에 관한 연구)

  • Maeng, Doo-Iyel;Park, Jong-Kae;Kim, Sung-Joo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.440-452
    • /
    • 2010
  • For an evaluation of the software product, the national/international organizations and labs have been studying various methodologies for the quality on the basis of ISO/IEC Quality Assurance System, but they still have many issues in evaluation of the anti-virus software that has special characteristics of complexity. In this paper, to establish a methodology of the quality evaluation for the anti-virus software, fulfilling the requirements more than reasonable level, a process to draw the evaluation items and quantification was established. And the information of weight was objectified by analyzing the relative magnitude between each factors. Based on the defined information (evaluation item, weight), conducting the quality evaluations for 70 kinds of open anti-virus software collected from the portal sites in the real test environment, and as a result of the positive analysis with user's long-term experience, this paper justifies the evaluation item and the weight.

For Improving Security Log Big Data Analysis Efficiency, A Firewall Log Data Standard Format Proposed (보안로그 빅데이터 분석 효율성 향상을 위한 방화벽 로그 데이터 표준 포맷 제안)

  • Bae, Chun-sock;Goh, Sung-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.157-167
    • /
    • 2020
  • The big data and artificial intelligence technology, which has provided the foundation for the recent 4th industrial revolution, has become a major driving force in business innovation across industries. In the field of information security, we are trying to develop and improve an intelligent security system by applying these techniques to large-scale log data, which has been difficult to find effective utilization methods before. The quality of security log big data, which is the basis of information security AI learning, is an important input factor that determines the performance of intelligent security system. However, the difference and complexity of log data by various product has a problem that requires excessive time and effort in preprocessing big data with poor data quality. In this study, we research and analyze the cases related to log data collection of various firewall. By proposing firewall log data collection format standard, we hope to contribute to the development of intelligent security systems based on security log big data.

A Study on the IUU Governance System of Regional Fishery Management Organization and Major State (국제 지역 수산 관리 기구와 주요 국가의 IUU 통제제도 연구)

  • Park, Min-Gyu
    • The Journal of Fisheries Business Administration
    • /
    • v.41 no.3
    • /
    • pp.103-127
    • /
    • 2010
  • The FAO reports that IUU fishing activities have widespread economic, social, and management consequences, including depriving legitimate fishers of harvest opportunities. It affects all fisheries from small scale to industrial. It also affects the ability of governments to support sustainable livelihoods for fishers and, more broadly, to achieve food security. The complexity of IUU requires various measures to combat IUU fishing such as adoption of IUU vessel lists; stronger port State controls; improved monitoring, control and surveillance (MCS); implementation of market-related measures to help ensure compliance; and capacity-building assistance. Trade and market measures reduce opportunities for IUU fishing activities by precluding or impeding access to markets for IUU product in a manner consistent with international law. ICCAT, CCAMLR, and IATTC, have put in place trade tracking programs or catch documentation schemes, and WCPFC is considering such a program. Vessel lists assist enforcement authorities in determining which vessels are or are not authorized to be fishing or conducting fishing support activities in specified areas. A number of RFMOs maintain records of IUU vessels: CCAMLR, IATTC, ICCAT, NAFO, NASCO, NPAFC, WCPFC. Section 608 of the US MSRA calling on the Secretary of Commerce, in consultation with the Secretary of State, and in cooperation with relevant regional fishery management councils and any relevant advisory committees, to take actions to improve the effectiveness of international fishery management organizations in conserving and managing stocks under their jurisdiction. EU IUU Regulation entered into force on 1 January 2010, was intended to regulate the highly complex multi-channel fisheries supply system of the European Community (EC) in an effort to improve global fisheries sustainability.

A Study on Production and Its Usefulness of AAPM TG18 Guiding Instrument for Diagnostic Monitor QC (영상의학 검사 판독용 모니터 정도관리 Guiding Instrument 제작과 유용성 고찰)

  • Son, Gi-Gyeong;Sung, Dong-Wook;Jeong, Jae-Ho;Kang, Hui-Doo;Ryu, Kyung-Nam
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.1
    • /
    • pp.21-28
    • /
    • 2008
  • Diagnostic display monitor QA according to AAPM TG18 is usually performed by PACS administrator, product manager and reading doctor, and for acceptance testing and periodic quality control evaluation, a combination of visual and quantitative tests can be used, as outlined in sections 5 and 6 of 'assessment of display performance for medical imaging systems'. Although many display tests can be performed visually, a more objective and quantitative evaluation of display performance requires special test tools. The required instruments vary in their complexity and cost, depending on the context of the evaluation(research, acceptance testing, or quality control) and how thorough the evaluation needs to be. Objective and reliable assessment of many display characteristics can be performed with relatively inexpensive equipment, So, we made 'AAPM TG18 guiding instrument' to ues variable purpose of the evaluation of 'geometrical distortions(quantitative"', 'veiling glare(visual)' and 'sensor calibration'. The spatial measurements for the quantitative evaluation of geometric distortions, and the measurement of the veling-glare ring response function which provides information regarding the spatial extent of the luminance spread, can be performed using the TG18 guiding instrument can be used to sensor calibration to standardize the basic rate of 0% luminance when periodic calibration.

  • PDF

Multiagent-based Intellignet Electronic Commerce System (다중에이저트 기반의 지능형 전자상거래 시스템)

  • Lee, Eun-Seok;Lee, Jin-Goo
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.855-864
    • /
    • 2001
  • With the increasing importance and complexity of EC (Electronic Commerce) across the Internet, the need and expectation for intelligent software agents to support both consumers and suppliers through the whole process of EC are growing rapidly. To realize the intelligent EC. a multiagent based EC system. which includes foundational technologies such as the establishment of standard product ontology the definition of message and negotiation protocol and brockering, is required. In this paper we propose an intelligent EC System named ICOMA(Intelligent electronic CO mmerce system based on Multi-Agent) as an open infrastructure of multiagent-based EC. Concretely we have proposed. designed and implemented an architecture of multiagent-based EC system including 6-types of agents message protocol for inter-agent negotiation, personalized produst retrieval and filtering., We have confirmed the effectiveness of the system through experiments.

  • PDF

Method and Application of Searching Hot Spot For Reengineering Software Using AOP (AOP를 이용한 재공학에서의 핫 스팟 탐색과 응용)

  • Lee, Ei-Sung;Choi, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.83-92
    • /
    • 2009
  • Complicated business logic makes program complexity more complicated. It's inevitable that the program must undergo reengineering processes all the way of in its lifetime. Hot spot analysis that has diverse purposes is getting an important question more and more. As a rule, reengineering process is done by UML model-based approach to analyze the legacy system. The smallest fragment of targets to be analysed is unit, that is function or class. Today's software development is to deal with huge change of software product and huge class including heavy quantity of LOC(Lines Of Code). However, analysis of unit is not precise approach process for reliable reengineering consequence. In this paper, we propose very precise hot spot analysis approach using Aspect-Oriented Programming languages, such as AspectJ. Typically the consistency between UML and source is needed code to redefine the modified library or framework boundaries. But reengineering approach using AOP doesn't need to analyze UML and source code. This approach makes dynamic event log data that contains detailed program interaction information. This dynamic event log data makes it possible to analyze hot spot.