• Title/Summary/Keyword: computation complexity

Search Result 607, Processing Time 0.029 seconds

A Throughput Computation Method for Throughput Driven Floorplan (처리량 기반 평면계획을 위한 처리량 계산 방법)

  • Kang, Min-Sung;Rim, Chong-Suck
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.12
    • /
    • pp.18-24
    • /
    • 2007
  • As VLSI technology scales to nano-meter order, relatively increasing global wire-delay has added complexity to system design. Global wire-delay could be reduced by inserting pipeline-elements onto wire but it should be coupled with LIP(Latency Intensive Protocol) to have correct system timing. This combination however, drops the throughput although it ensures system functionality. In this paper, we propose a computation method useful for minimizing throughput deterioration when pipeline-elements are inserted to reduce global wire-delay. We apply this method while placing blocks in the floorplanning stage. When the necessary for this computation is reflected on the floorplanning cost function, the throughput increases by 16.97% on the average when compared with the floorplanning that uses the conventional heuristic throughput-evaluation-method.

Efficient Multiplication of Boolean Matrices and Algorithm for D-Class Computation (D-클래스 계산을 위한 불리언 행렬의 효율적 곱셈 및 알고리즘)

  • Han, Jae-Il;Shin, Bum-Joo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.12 no.2
    • /
    • pp.68-78
    • /
    • 2007
  • D-class is defined as a set of equivalent $n{\times}n$ boolean matrices according to a given equivalence relation. The D-class computation requires the multiplication of three boolean matrices for each of all possible triples of $n{\times}n$ boolean matrices. However, almost all the researches on boolean matrices focused on the efficient multiplication of only two boolean matrices and a few researches have recently been shown to deal with the multiplication of all boolean matrices. The paper suggests a mathematical theory that enables the efficient multiplication for all possible boolean matrix triples and the efficient computation of all D-classes, and discusses algorithms designed with the theory and their execution results.

  • PDF

Finite Element Analysis of Auto-body Panel Stamping (리어 힌지 패널 스템핑의 유한요소해석)

  • 정동원;이장희;양동열
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1996.06a
    • /
    • pp.97-109
    • /
    • 1996
  • In the present work computations are carried out for analysis of complicated sheet metal forming process such as forming of a rear hinge. Finite element formulation using dynamic explicit time integration scheme and step-wise combined Implicit/Explicit scheme are introduced for numerical analysis of sheet metal forming process. The rigid-plastic finite element method based on membrane elements has long been employed as a useful numerical technique for the analysis of sheet metal forming because of its time effectiveness. The explicit scheme in general use is based on the elastic-plastic modelling of material requiring large computation time. In finite element simulation of sheet metal forming processes, the robustness and stability of computation are important requirements since the computation time and convergency become major points of consideration besides the solution accuracy due to the complexity of geometry and boundary conditions. The implicit scheme employs a more reliable and rigorous scheme in considering the equilibrium at each step of deformation, while in the explicit scheme the problem of convergency is eliminated at the cost of solution accuracy. The explicit approach and the implicit approach have merits and demerits, respectively. In order to combine the merits of these two methods a step-wise combined implicit/explicit scheme has been developed.

A Computational Interactive Approach to Multi-agent Motion Planning

  • Ji, Sang-Hoon;Choi, Jeong-Sik;Lee, Beom-Hee
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.3
    • /
    • pp.295-306
    • /
    • 2007
  • It is well known that mathematical solutions for multi-agent planning problems are very difficult to obtain due to the complexity of mutual interactions among multi-agents. Most of the past research results are thus based on the probabilistic completeness. However, the practicality and effectiveness of the solution from the probabilistic completeness is significantly reduced by heavy computational burden. In this paper, we propose a practically applicable solution technique for multi-agent planning problems, which assures a reasonable computation time and a real world application for more than 3 multi-agents, for the case of general shaped paths in agent movement. First, to reduce the computation time, an extended collision map is developed and utilized for detecting potential collisions and obtaining collision-free solutions for multi-agents. Second, a priority for multi-agents is considered for successive and interactive modifications of the agent movements with lower priority. Various solutions using speed reduction and time delay of the relevant agents are investigated and compared in terms of the computation time. A practical implementation is finally provided for three different types of agents to emphasize the effectiveness of the proposed interactive approach to multi-agent planning problems.

A SoC design and implementation for JPEG 2000 Floating Point Filter (JPEG 2000 부동소수점 연산용 Filter의 SoC 설계 및 구현)

  • Chang Jong-Kwon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.3 s.100
    • /
    • pp.185-190
    • /
    • 2006
  • JPEG 2000 is used as an alternative to solve the blocking artifact problem with the existing still image compression JPEG algorithm. However, it has shortcomings such as longer floating point computation time and more complexity in the procedure of enhancing the image compression rate and decompression rate. To compensate for these we implemented with hardware the JPEG 2000 algorithm's filter part which requires a lot of floating point computation. This DWT Filter[1] chip is designed on the basis of Daubechies 9/7 filter[6] and is composed of 3-stage pipeline system to optimize the performance and chip size. Our implemented Filter was 7 times faster than software based Filter in the floating point computation.

A Low-Computation Indirect Model Predictive Control for Modular Multilevel Converters

  • Ma, Wenzhong;Sun, Peng;Zhou, Guanyu;Sailijiang, Gulipali;Zhang, Ziang;Liu, Yong
    • Journal of Power Electronics
    • /
    • v.19 no.2
    • /
    • pp.529-539
    • /
    • 2019
  • The modular multilevel converter (MMC) has become a promising topology for high-voltage direct current (HVDC) transmission systems. To control a MMC system properly, the ac-side current, circulating current and submodule (SM) capacitor voltage are taken into consideration. This paper proposes a low-computation indirect model predictive control (IMPC) strategy that takes advantages of the conventional MPC and has no weighting factors. The cost function and duty cycle are introduced to minimize the tracking error of the ac-side current and to eliminate the circulating current. An optimized merge sort (OMS) algorithm is applied to keep the SM capacitor voltages balanced. The proposed IMPC strategy effectively reduces the controller complexity and computational burden. In this paper, a discrete-time mathematical model of a MMC system is developed and the duty ratio of switching state is designed. In addition, a simulation of an eleven-level MMC system based on MATLAB/Simulink and a five-level experimental setup are built to evaluate the feasibility and performance of the proposed low-computation IMPC strategy.

Step-wise Combinded Implicit/Explicit Finite Element Simulation of Autobody Stamping Processes (차체 스템핑공정을 위한 스텝형식의 내연적/외연적 결함 유한요소해석)

  • Jung, D.W.;Yang, D.Y.
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.13 no.12
    • /
    • pp.86-98
    • /
    • 1996
  • An combined implicit/explicit scheme for the analysis of sheet forming problems has been proposed in this work. In finite element simulation of sheet metal forming processes, the robustness and stability of computation are important requirements since the computation time and convergency become major points of consideration besides the solution accuracy due to the complexity of geometry and boundary conditions. The implicit scheme dmploys a more reliable and rigorous scheme in considering the equilibrium at each step of deformation, while in the explict scheme the problem of convergency is elimented at thecost of solution accuracy. The explicit approach and the implicit approach have merits and demerits, respectively. In order to combine the merits of these two methods a step-wise combined implici/explicit scheme has been developed. In the present work, the rigid-plastic finite element method using bending energy augmented membraneelements(BEAM)(1) is employed for computation. Computations are carried out for some typical sheet forming examples by implicit, combined implicit/explicit schemes including deep drawing of an oil pan, front fender and fuel tank. From the comparison between the methods the advantages and disadvantages of the methods are discussed.

  • PDF

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.

A Practical Privacy-Preserving Cooperative Computation Protocol without Oblivious Transfer for Linear Systems of Equations

  • Kang, Ju-Sung;Hong, Do-Won
    • Journal of Information Processing Systems
    • /
    • v.3 no.1
    • /
    • pp.21-25
    • /
    • 2007
  • We propose several practical SMC protocols for privacy-preserving cooperative scientific computations. We consider two important scientific computations which involve linear equations: the linear systems of equations problem and the linear least-square problem. The protocols proposed in this paper achieve acceptable security in the sense of Du-Zhan's paradigm and t-wise collusion-resistance, and their communication complexity is O(tm), where t is a security parameter and m is the total number of participants. The complexity of our protocol is significantly better than the previous result O($m^2/{\mu}$) of [4], in which the oblivious transfer protocol is used as an important building block.

A Comparative Study of Branch Metric Calculator in QAM-TCM Decoder (QAM-TCM 복호기의 가지척도계산방식 비교 연구)

  • 김진우;최시연;강병희;오길남;김덕현
    • Proceedings of the IEEK Conference
    • /
    • 2001.09a
    • /
    • pp.249-252
    • /
    • 2001
  • TCM(Trellis Coded Modulation) has soft decision scheme so that BM(Branch Metric) calculates the ED(Euclidean Distance) between the received signal and each code words in signal space. For computing the ED, square and square root computations increase the hardware complexity. Some simplified method is known for convolutional codes with QPSK(Quadrature Phase Shift Keying), PSK(Phase Shift Keying) modulation. But it is not acceptable for QAM (Quadrature Amplitude Modulation)-TCM scheme. In this paper, we suggest that two modified BM computation methods, which is applicable for QAM-TCM. By comparative study, we also assessed two proposed method in the case of hardware complexity and BER (Bit Error Rate) performance.

  • PDF