• Title/Summary/Keyword: design and analysis of algorithms

Search Result 621, Processing Time 0.028 seconds

A Design and Performance Analysis of Web Cache Replacement Policy Based on the Size Heterogeneity of the Web Object (웹 객체 크기 이질성 기반의 웹 캐시 대체 기법의 설계와 성능 평가)

  • Na Yun Ji;Ko Il Seok;Cho Dong Uk
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.443-448
    • /
    • 2005
  • Efficient using of the web cache is becoming important factors that decide system management efficiency in the web base system. The cache performance depends heavily on the replacement algorithm which dynamically selects a suitable subset of objects for caching in a finite cache space. In this paper, the web caching algorithm is proposed for the efficient operation of the web base system. The algorithm is designed based on a divided scope that considered size reference characteristic and heterogeneity on web object. With the experiment environment, the algorithm is compared with conservative replacement algorithms, we have confirmed more than $15\%$ of an performance improvement.

Hardware Design of Elliptic Curve processor Resistant against Simple Power Analysis Attack (단순 전력분석 공격에 대처하는 타원곡선 암호프로세서의 하드웨어 설계)

  • Choi, Byeong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.143-152
    • /
    • 2012
  • In this paper hardware implementation of GF($2^{191}$) elliptic curve cryptographic coprocessor which supports 7 operations such as scalar multiplication(kP), Menezes-Vanstone(MV) elliptic curve cipher/decipher algorithms, point addition(P+Q), point doubling(2P), finite-field multiplication/division is described. To meet structure resistant against simple power analysis, the ECC processor adopts the Montgomery scalar multiplication scheme which main loop operation consists of the key-independent operations. It has operational characteristics that arithmetic units, such GF_ALU, GF_MUL, and GF_DIV, which have 1, (m/8), and (m-1) fixed operation cycles in GF($2^m$), respectively, can be executed in parallel. The processor has about 68,000 gates and its simulated worst case delay time is about 7.8 ns under 0.35um CMOS technology. Because it has about 320 kbps cipher and 640 kbps rate and supports 7 finite-field operations, it can be efficiently applied to the various cryptographic and communication applications.

Reverse Simulation Software Architecture for Required Performance Analysis of Defense System (국방 시스템의 요구 성능 분석을 위한 역 방향 시뮬레이션 소프트웨어 아키텍처)

  • Hong, Jeong Hee;Seo, Kyung-Min;Kim, Tag Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.4
    • /
    • pp.750-759
    • /
    • 2015
  • This paper focuses on reverse simulation methods to find and analyze the required performance of a defense system under a given combat effectiveness. Our approach is motivated that forward simulation, that traditionally employs the effectiveness analysis of performance alternatives, is not suitable for resolving the above issue because it causes a high computational cost due to repeating simulations of all possible alternatives. To this end, the paper proposes a reverse simulation software architecture, which consists of several functional sub-modules that facilitate two types of reverse simulations according to possibility of inverse model design. The proposed architecture also enable to apply various search algorithms to find required operational capability efficiently. With this architecture, we performed two case studies about underwater and anti-air warfare scenarios. The case studies show that the proposed reverse simulation incurs a smaller computational cost, while finding the same level of performance alternatives compared with traditional forward simulation. Finally we expect that this study provides a guide those who desire to make decisions about new defense systems development.

Development of Approximate Cost Estimate Model for Aqueduct Bridges Restoration - Focusing on Comparison between Regression Analysis and Case-Based Reasoning - (수로교 개보수를 위한 개략공사비 산정 모델 개발 - 회귀분석과 사례기반추론의 비교를 중심으로 -)

  • Jeon, Geon Yeong;Cho, Jae Yong;Huh, Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.33 no.4
    • /
    • pp.1693-1705
    • /
    • 2013
  • To restore old aqueduct in Korea which is a irrigation bridge to supply water in paddy field area, it is needed to estimate approximate costs of restoration because the basic design for estimation of construction costs is often ruled out in current system. In this paper, estimating models of construction costs were developed on the basis of performance data for restoration of RC aqueduct bridges since 2003. The regression analysis (RA) model and case-based reasoning (CBR) model for the estimation of construction costs were developed respectively. Error rate of simple RA model was lower than that of multiple RA model. CBR model using genetic algorithm (GA) has been applied in the estimation of construction costs. In the model three factors like attribute weight, attribute deviation and rank of case similarity were optimized. Especially, error rate of estimated construction costs decreased since limit ranges of the attribute weights were applied. The results showed that error rates between RA model and CBR models were inconsiderable statistically. It is expected that the proposed estimating method of approximate costs of aqueduct restoration will be utilized to support quick decision making in phased rehabilitation project.

Development of the Information Delivery System for the Home Nursing Service (가정간호사업 운용을 위한 정보전달체계 개발 I (가정간호 데이터베이스 구축과 뇌졸중 환자의 가정간호 전산개발))

  • Park, J.H;Kim, M.J;Hong, K.J;Han, K.J;Park, S.A;Yung, S.N;Lee, I.S;Joh, H.;Bang, K.S
    • Journal of Home Health Care Nursing
    • /
    • v.4
    • /
    • pp.5-22
    • /
    • 1997
  • The purpose of the study was to development an information delivery system for the home nursing service, to demonstrate and to evaluate the efficiency of it. The period of research conduct was from September 1996 to August 31, 1997. At the 1st stage to achieve the purpose, Firstly Assessment tool for the patients with cerebral vascular disease who have the first priority of HNS among the patients with various health problems at home was developed through literature review. Secondly, after identification of patient nursing problem by the home care nurse with the assessment tool, the patient's classification system developed by Park (1988) that was 128 nursing activities under 6 categories was used to identify the home care nurse's activities of the patient with CAV at home. The research team had several workshops with 5 clinical nurse experts to refine it. At last 110 nursing activities under 11 categories for the patients with CVA were derived. At the second stage, algorithms were developed to connect 110 nursing activities with the patient nursing problems identified by assessment tool. The computerizing process of the algorithms is as follows: These algorithms are realized with the computer program by use of the software engineering technique. The development is made by the prototyping method, which is the requirement analysis of the software specifications. The basic features of the usability, compatibility, adaptability and maintainability are taken into consideration. Particular emphasis is given to the efficient construction of the database. To enhance the database efficiency and to establish the structural cohesion, the data field is categorized with the weight of relevance to the particular disease. This approach permits the easy adaptability when numerous diseases are applied in the future. In paralleled with this, the expandability and maintainability is stressed through out the program development, which leads to the modular concept. However since the disease to be applied is increased in number as the project progress and since they are interrelated and coupled each other, the expand ability as well as maintainability should be considered with a big priority. Furthermore, since the system is to be synthesized with other medical systems in the future, these properties are very important. The prototype developed in this project is to be evaluated through the stage of system testing. There are various evaluation metrics such as cohesion, coupling and adaptability so on. But unfortunately, direct measurement of these metrics are very difficult, and accordingly, analytical and quantitative evaluations are almost impossible. Therefore, instead of the analytical evaluation, the experimental evaluation is to be applied through the test run by various users. This system testing will provide the viewpoint analysis of the user's level, and the detail and additional requirement specifications arising from user's real situation will be feedback into the system modeling. Also. the degree of freedom of the input and output will be improved, and the hardware limitation will be investigated. Upon the refining, the prototype system will be used as a design template. and will be used to develop the more extensive system. In detail. the relevant modules will be developed for the various diseases, and the module will be integrated by the macroscopic design process focusing on the inter modularity, generality of the database. and compatibility with other systems. The Home care Evaluation System is comprised of three main modules of : (1) General information on a patient, (2) General health status of a patient, and (3) Cerebrovascular disease patient. The general health status module has five sub modules of physical measurement, vitality, nursing, pharmaceutical description and emotional/cognition ability. The CVA patient module is divided into ten sub modules such as subjective sense, consciousness, memory and language pattern so on. The typical sub modules are described in appendix 3.

  • PDF

Development and Usability Testing of a User-Centered 3D Virtual Liver Surgery Planning System

  • Yang, Xiaopeng;Yu, Hee Chul;Choi, Younggeun;Yang, Jae Do;Cho, Baik Hwan;You, Heecheon
    • Journal of the Ergonomics Society of Korea
    • /
    • v.36 no.1
    • /
    • pp.37-52
    • /
    • 2017
  • Objective: The present study developed a user-centered 3D virtual liver surgery planning (VLSP) system called Dr. Liver to provide preoperative information for safe and rational surgery. Background: Preoperative 3D VLSP is needed for patients' safety in liver surgery. Existing systems either do not provide functions specialized for liver surgery planning or do not provide functions for cross-check of the accuracy of analysis results. Method: Use scenarios of Dr. Liver were developed through literature review, benchmarking, and interviews with surgeons. User interfaces of Dr. Liver with various user-friendly features (e.g., context-sensitive hotkey menu and 3D view navigation box) was designed. Novel image processing algorithms (e.g., hybrid semi-automatic algorithm for liver extraction and customized region growing algorithm for vessel extraction) were developed for accurate and efficient liver surgery planning. Usability problems of a preliminary version of Dr. Liver were identified by surgeons and system developers and then design changes were made to resolve the identified usability problems. Results: A usability testing showed that the revised version of Dr. Liver achieved a high level of satisfaction ($6.1{\pm}0.8$ out of 7) and an acceptable time efficiency ($26.7{\pm}0.9 min$) in liver surgery planning. Conclusion: Involvement of usability testing in system development process from the beginning is useful to identify potential usability problems to improve for shortening system development period and cost. Application: The development and evaluation process of Dr. Liver in this study can be referred in designing a user-centered system.

Design of a Transformable Track Mechanism for Wall Climbing Robots (변형 트랙 메커니즘을 이용한 등반로봇 설계)

  • Lee, Gi-Uk;Seo, Kun-Chan;Kim, Hwang;Kim, Sun-Ho;Jeon, Dong-Su;Kim, Hong-Seok;Kim, Jong-Won
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.29 no.2
    • /
    • pp.178-184
    • /
    • 2012
  • This paper presents a transformable track mechanism for wall climbing robots. The proposed mechanism allows a wall climbing robot to go over obstacles by transforming the track shape, and also increases contact area between track and wall surface for safe attachment. The track mechanism is realized using a timing belt track with one driving actuator. The inner frame of the track consists of serially connected 5R-joints and 1P-joint, and all joints of the inner frame are passively operated by springs, so the mechanism does not require any actuators and complex control algorithms to change its shape. Static analysis is carried out to determine design parameters which enable $90^{\circ}$ wall-to-wall transition and driving over projected obstacles on wall surfaces. A Prototype is manufactured using the transformable track on which polymer magnets are installed for adhesion force. The size of the prototype is $628mm{\times}200mm{\times}150mm$ ($Length{\times}Width{\times}Height$) and weight is 4kgf. Experiments are performed to verify its climbing capability focusing on $90^{\circ}$ wall to wall transition and driving over projected obstacle.

Fast k-NN based Malware Analysis in a Massive Malware Environment

  • Hwang, Jun-ho;Kwak, Jin;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6145-6158
    • /
    • 2019
  • It is a challenge for the current security industry to respond to a large number of malicious codes distributed indiscriminately as well as intelligent APT attacks. As a result, studies using machine learning algorithms are being conducted as proactive prevention rather than post processing. The k-NN algorithm is widely used because it is intuitive and suitable for handling malicious code as unstructured data. In addition, in the malicious code analysis domain, the k-NN algorithm is easy to classify malicious codes based on previously analyzed malicious codes. For example, it is possible to classify malicious code families or analyze malicious code variants through similarity analysis with existing malicious codes. However, the main disadvantage of the k-NN algorithm is that the search time increases as the learning data increases. We propose a fast k-NN algorithm which improves the computation speed problem while taking the value of the k-NN algorithm. In the test environment, the k-NN algorithm was able to perform with only the comparison of the average of similarity of 19.71 times for 6.25 million malicious codes. Considering the way the algorithm works, Fast k-NN algorithm can also be used to search all data that can be vectorized as well as malware and SSDEEP. In the future, it is expected that if the k-NN approach is needed, and the central node can be effectively selected for clustering of large amount of data in various environments, it will be possible to design a sophisticated machine learning based system.

Design of Pedestrian Detection and Tracking System Using HOG-PCA and Object Tracking Algorithm (HOG-PCA와 객체 추적 알고리즘을 이용한 보행자 검출 및 추적 시스템 설계)

  • Jeon, Pil-Han;Park, Chan-Jun;Kim, Jin-Yul;Oh, Sung-Kwun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.4
    • /
    • pp.682-691
    • /
    • 2017
  • In this paper, we propose the fusion design methodology of both pedestrian detection and object tracking system realized with the aid of HOG-PCA based RBFNN pattern classifier. The proposed system includes detection and tracking parts. In the detection part, HOG features are extracted from input images for pedestrian detection. Dimension reduction is also dealt with in order to improve detection performance as well as processing speed by using PCA which is known as a typical dimension reduction method. The reduced features can be used as the input of the FCM-based RBFNNs pattern classifier to carry out the pedestrian detection. FCM-based RBFNNs pattern classifier consists of condition, conclusion, and inference parts. FCM clustering algorithm is used as the activation function of hidden layer. In the conclusion part of network, polynomial functions such as constant, linear, quadratic and modified quadratic are regarded as connection weights and their coefficients of polynomial function are estimated by LSE-based learning. In the tracking part, object tracking algorithms such as mean shift(MS) and cam shift(CS) leads to trace one of the pedestrian candidates nominated in the detection part. Finally, INRIA person database is used in order to evaluate the performance of the pedestrian detection of the proposed system while MIT pedestrian video as well as indoor and outdoor videos obtained from IC&CI laboratory in Suwon University are exploited to evaluate the performance of tracking.

A variable-length FFT/IFFT processor design using single-memory architecture (단일메모리 구조의 가변길이 FFT/IFFT 프로세서 설계)

  • Yeem, Chang-Wan;Shin, Kyung-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.393-396
    • /
    • 2009
  • This paper describes a design of variable-length FFT/IFFT processor for OFDM-based communication systems. The designed FFT/IFFT processor adopts the in-place single-memory architecture, and uses a hybrid structure of radix-4 and radix-2 DIF algorithms to accommodate FFT lengths of $N=64{\times}2^k$ ($0{\leq}k{\leq}7$). To achieve both memory size reduction and the improved SQNR, a two-step conditional scaling technique is devised, which conditionally scales the intermediate results of each computational stage. The performance analysis results show that the average SQNR's of 64~8,192-point FFT's are over 60-dB. The processor synthesized with a $0.35-{\mu}m$ CMOS cell library can operate with 75-MHz@3.3-V clock, and 64-point and 8,192-point FFT's can be computed in $2.55-{\mu}s$ and $762.7-{\mu}s$, respectively, thus it satisfies the specifications of wireless LAN, DMB, and DVB systems.

  • PDF