• Title/Summary/Keyword: Round Complexity

Search Result 77, Processing Time 0.025 seconds

An Efficient Scheduling for Input Queued Switch (입력큐 교환기를 위한 스케줄링기법)

  • Lee, Sang-Ho;Shin, Dong-Ryeol
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.12
    • /
    • pp.58-66
    • /
    • 2001
  • Input queueing is useful for high bandwidth switches and routers because of lower complexity and fewer circuits than output queueing. The input queueing switch, however, suffers HOL-Blocking, which limits the throughput to 58%. To get around this low throughput, many input queueing switches have centralized scheduler, which centralized scheduler restrict the design of the switch architecture. To overcome this problem, we propose a simple scheduler called PRR(Pipelined Round Robin), which is intrinsically distributed and presents to show the effectiveness of the proposed scheduling.

  • PDF

A Technique for Measuring Ship's Draught by ultrasonic Pulse Signal

  • Lee, Eun-Bang;Lee, Sang-Jib
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 1995.11a
    • /
    • pp.184-192
    • /
    • 1995
  • Although ship's draught information onboard is substantial for both the safety of navigation and the estimation of loaded cargoes its accuracy depends in traditional surveying method on the skillfulness of observers and the condition of the sea surface round the vessel. To obtain more accurate information accessibly measuring instruments with sophisticated sensors such as mechanical electronic and ultrasonic transducers have been developed. however they have still limitation in accuracy and in making up a system due to the complexity of processing signal. In this paper we propose a he technique for analyzing ultrasonic pulse signal in order to improve the measurement accuracy and simplify a remote sensing system of draught by ultrasonic waves. This technique is useful for measuring draught being considered the influence of sea surface fluctuation and for transferring its data briefly to required equipment in integrated bridge system.

  • PDF

New Construction of Order-Preserving Encryption Based on Order-Revealing Encryption

  • Kim, Kee Sung
    • Journal of Information Processing Systems
    • /
    • v.15 no.5
    • /
    • pp.1211-1217
    • /
    • 2019
  • Developing methods to search over an encrypted database (EDB) have received a lot of attention in the last few years. Among them, order-revealing encryption (OREnc) and order-preserving encryption (OPEnc) are the core parts in the case of range queries. Recently, some ideally-secure OPEnc schemes whose ciphertexts reveal no additional information beyond the order of the underlying plaintexts have been proposed. However, these schemes either require a large round complexity or a large persistent client-side storage of size O(n) where n denotes the number of encrypted items stored in EDB. In this work, we propose a new construction of an efficient OPEnc scheme based on an OREnc scheme. Security of our construction inherits the security of the underlying OREnc scheme. Moreover, we also show that the construction of a non-interactive ideally-secure OPEnc scheme with a constant client-side storage is theoretically possible from our construction.

Fair Bandwidth Allocation in Core-Stateless Networks (Core-Stateless망에서의 공정한 대역폭 할당 방식)

  • Kim Mun-Kyung;Park Seung-Seob
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.695-700
    • /
    • 2005
  • To provide the fair rate and achieve the fair bandwidth allocation, many per-flow scheduling algorithms have been proposed such as fair queueing algorithm for congestion control. But these algorithms need to maintain the state, manage buffer and schedule packets on a per-flow basis; the complexity of these functions may prevent them from being cost-effectively implemented. In this paper, therefore, to acquire cost-effectively for implementation, we propose a CS-FNE(Core Stateless FNE) algorithm that is based on FM(Flow Number Estimation), and evaluated CS-FNE scheme together with CSFQ(Core Stateless Fair Queueing), FRED(Fair Random Early Detection), RED(Random Early Detection), and DRR(Dynamic Round Robin) in several different configurations and traffic sources. Through the simulation results, we showed that CS-FNE algorithm can allocate fair bandwidth approximately than other algorithms, and CS-FNE is simpler than many per-flow basis queueing mechanisms and it can be easily implemented.

Depth-Sizing Technique for Crack Indications in Steam Generator Tubing (증기발생기 전열관 균열깊이 평가기술)

  • Cho, Chan-Hee;Lee, Hee-Jong;Kim, Hong-Deok
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.29 no.2
    • /
    • pp.98-103
    • /
    • 2009
  • The nuclear power plants have been safely operated by plugging the steam generator tubes which have the crack indications. Tube rupture events can occur if analysts fail to detect crack indications during in-service inspection. There are various types of crack indication in steam generator tubes and they have been detected by the eddy current test. The integrity assessment should be performed using the crack-sizing results from eddy current data when the crack indication is detected. However, it is not easy to evaluate the crack-depth precisely and consistently due to the complexity of the methods. The current crack-sizing methods were reviewed in this paper and the suitable ones were selected through the laboratory tests. The retired steam generators of Kori Unit 1 were used for this study. The round robin tests by the domestic qualified analysts were carried out and the statistical models were introduced to establish the appropriate depth-sizing techniques. It is expected that the proposed techniques in this study can be utilized in the Steam Generator Management Program.

A Hierarchical Deficit Round-Robin Algorithm for Packet Scheduling (패킷 스케쥴링을 위한 결손 보완 계층적 라운드로빈 알고리즘)

  • Pyun Kihyun;Cho Sung-Ik;Lee Jong-Yeol
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.2
    • /
    • pp.147-155
    • /
    • 2005
  • For the last several decades, many researches have been performed to distribute bandwidth fairly between sessions. In this problem, the most important challenge is to realize a scalable implementation and high fairness simultaneously. Here high fairness means that bandwidth is distributed fairly even in short time intervals. Unfortunately, existing scheduling algorithms either are lack of scalable implementation or can achieve low fairness. In this paper, we propose a scheduling algorithm that can achieve feasible fairness without losing scalability. The proposed algorithm is a Hierarchical Deficit Round-Robin (H-DRR). While H-DRR requires a constant time for implementation, the achievable fairness is similar to that of Packet-by-Packet Generalized Processor Sharing(PGPS) algorithm. PGPS has worse scalability since it uses a sorted-priority queue requiring O(log N) implementation complexity where N is the number of sessions.

A Hierarchical Deficit Round-Robin Packet Scheduling Algorithm for User-Oriented Relative Differentiated Services (사용자 기반 상대적 차별화를 위한 계층적 결손 보완 라운드-로빈 스케줄링 알고리즘)

  • Pyun Kihyun;Lee Jong-Yeol;Cho Sung-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.676-686
    • /
    • 2005
  • The Internet users as well as network providers are eager to have different qualities of service among users beyond the best-effort. In this paper, we propose a scheduling algorithm that provides a differentiated service in the granularity of user sessions. The proposed algorithm is a Hierarchical Deficit Round-Robin (H-DRR) algorithm that is an extension of an existing DRR algorithm. A main advantage is that H-DRR provides service differentiation for throughput-intensive applications such as FTP as well as delay-sensitive applications such as telnet or VoIP without distinguishing the types of applications. The most importance in providing a service differentiation in term of network providers is to have controllability and predictability. We show that H-DRR is superior to DRR in terms of controllability and predictability through both mathematical analysis and simulation experiments. Nevertheless, H-DRR requires O(1) complexity for implementation.

A Modified-DWRR Cell Scheduling Algorithm improved the QoS of Delay (지연 특성을 개선한 Modified-DWRR 셀 스케쥴링 알고리즘)

  • Gwak, Ji-Yeong;Nam, Ji-Seung
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.805-814
    • /
    • 2001
  • In this paper, we propose a new scheduling algorithm that guarantees the delay property of real-time traffic, not considered in previous DWRR(Dynamic Weighted Round Robin) algorithm and also transmits non-real-time traffic efficiently. The proposed scheduling algorithm is a variation of DWRR algorithm to guarantee the delay property of real-time traffic by adding cell transmission method based on delay priority. It also uses the threshold to prevent the cell loss of non-real-time traffic due to cell transmission method based on delay priority. Proposed scheduling algorithm may increase some complexity over conventional DWRR scheme because of cell transmission method based on delay priority. However, the consideration of delay priority can minimize cell delay and require less size of temporary buffer. Also, the results of our performance study shows that the proposed scheduling algorithm has better performance than conventional DWRR scheme due to reliable ABR service and congestion avoidance capacity.

  • PDF

An Optimized Hardware Implementation of SHA-3 Hash Functions (SHA-3 해시 함수의 최적화된 하드웨어 구현)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.886-895
    • /
    • 2018
  • This paper describes a hardware design of the Secure Hash Algorithm-3 (SHA-3) hash functions that are the latest version of the SHA family of standards released by NIST, and an implementation of ARM Cortex-M0 interface for security SoC applications. To achieve an optimized design, the tradeoff between hardware complexity and performance was analyzed for five hardware architectures, and the datapath of round block was determined to be 1600-bit on the basis of the analysis results. In addition, the padder with a 64-bit interface to round block was implemented in hardware. A SoC prototype that integrates the SHA-3 hash processor, Cortex-M0 and AHB interface was implemented in Cyclone-V FPGA device, and the hardware/software co-verification was carried out. The SHA-3 hash processor uses 1,672 slices of Virtex-5 FPGA and has an estimated maximum clock frequency of 289 Mhz, achieving a throughput of 5.04 Gbps.

Analysis of Attacks and Security Level for Multivariate Quadratic Based Signature Scheme Rainbow (다변수 이차식 기반 서명 기법 Rainbow의 공격 기법 및 보안강도 분석)

  • Cho, Seong-Min;Kim, Jane;Seo, Seung-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.533-544
    • /
    • 2021
  • Using Shor algorithm, factoring and discrete logarithm problem can be solved effectively. The public key cryptography, such as RSA and ECC, based on factoring and discrete logarithm problem can be broken in polynomial time using Shor algorithm. NIST has been conducting a PQC(Post Quantum Cryptography) standardization process to select quantum-resistant public key cryptography. The multivariate quadratic based signature scheme, which is one of the PQC candidates, is suitable for IoT devices with limited resources due to its short signature and fast sign and verify process. We analyzes classic attacks and quantum attacks for Rainbow which is the only multivatiate quadratic based signature scheme to be finalized up to the round 3. Also we compute the attack complexity for the round 3 Rainbow parameters, and analyzes the security level of Rainbow, one of the PQC standardization candidates.