• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.029 seconds

A Study on Adaptive Stereo Matching for DEM Generation (DEM 제작을 위한 Adaptive Stereo Matching 에 관한 연구)

  • 김정기;김정호;엄기문;이쾌희
    • Korean Journal of Remote Sensing
    • /
    • v.8 no.1
    • /
    • pp.15-26
    • /
    • 1992
  • This paper describes an implementation of adaptive stereo matching for DBM generation. The matching method of two stereo satellite images to find corresponding points used in this paper is area-based matching, which is usually used in the field of making DBM. Same window size and search area used as in the conventional matching methods and we propose adaptive stereo matching algorithm in this paper. We cluster three areas which are consist of mountainous areas, cultivated areas and cities, and rivers and lakes by using proposed linear feature extracting method. These classified areas are matched by adaptive window size and search area, but rivers and lakes is excluded in this experiment. The matching time is three times faster than conventional methods.

An Implementation of Hybrid-Simulation in Manufacturing Environments using Object-Oriented Methodology (객체지향 기법을 이용한 공장운용 환경 하에서의 혼합시뮬레이션 구현)

  • 김성식
    • Journal of the Korea Society for Simulation
    • /
    • v.7 no.1
    • /
    • pp.15-26
    • /
    • 1998
  • In building a shell-based FMS, which is known as one of the top-down approaches in the field of factory automation, we may take a hybrid simulation into consideration. The modeling of a hybrid simulation consists of real physical entities, virtual simulation, and central clock algorithm, etc. to carry out the whole system operation. In this paper, we sow a way to construct a hybrid simulation software system in manufacturing environments. We bring in the object-oriented methodology in system design and it can contribute in dealing with a wide variety of production types and configurations. Some classes such as project, product, process, order, schedule, stage are defined. These are used and tested by implementing a specific LSI circuit assembly line process.

  • PDF

Design and Implementation of Software Vulnerability Analysis Algorithm through Static Data Access Analysis

  • Lim, Hyun-il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.8
    • /
    • pp.69-75
    • /
    • 2015
  • Nowadays, software plays various roles in applications in wide areas. However, the security problems caused by software vulnerabilities increase. So, it is necessary to improve software security and safety in software execution. In this paper, we propose an approach to improve the safety of software execution by managing information used in software through static data access analysis. The approach can detect the exposures of secure data in software execution by analyzing information property and flows through static data access analysis. In this paper, we implemented and experimented the proposed approach with a base language, and verify that the proposed approach can effectively detect the exposures of secure information. The proposed approach can be applied in several areas for improving software safety by analysing vulnerabilities from information flows in software execution.

Implementation of DES Algorithm using CUDA (CUDA를 이용한 DES 구현)

  • Kim, Juho;Park, Neungsoo
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.1086-1087
    • /
    • 2012
  • GPU를 이용하여 병렬 처리 연산을 하는 연구는 활발히 진행되고 있고, 이미 많은 곳에서 사용되고 있다. 본 논문에서는 엔비디아에서 개발한 CUDA를 사용하여 DES 알고리즘을 고속으로 구현하기 위해 CUDA overlapping을 이용했다. 이것은 GPU 에서 연산을 하는 동시에 연산 결과를 바로 Host로 보내어 연산시간과 전송시간을 Overlap 하여 시간을 더 단축 하도록 하는 구현방법이다. 그 결과 Overlap 하기 전보다 약 30%의 성능향상을 확인 할 수 있었다. 향후 DES 뿐만 아니라 3DES, AES, SEED 등 여러 암호화 알고리즘들도 적용할 예정이다.

Implementation of a Data Dependence Graph Generator Based on Worklist Algorithm (워크리스트 알고리즘에 기반한 자료 의존성 그래프 생성기 구현)

  • Lee, Jongwon;Youn, Jonghee M.;Kim, Yongjoo;Paek, Yunheung
    • Annual Conference of KIPS
    • /
    • 2012.04a
    • /
    • pp.49-52
    • /
    • 2012
  • 컴파일러의 명령어 스케줄링 기법이 제대로 동작하기 위해서는 자료 의존성 그래프가 필요하다. 본 논문에서는 워크리스트 알고리즘을 사용한 자료 의존성 그래프 생성 구현에 대하여 설명하고자 한다.

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Implementation of Real-Time Data Logging System for Radar Algorithm Analysis (레이다 알고리즘 분석을 위한 실시간 로깅 시스템 구현)

  • Jin, YoungSeok;Hyun, Eugin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.253-258
    • /
    • 2021
  • In this paper, we developed a hardware and software platform of the real-time data logging system to verify radar FEM (Front-end Module) and signal-processing algorithms. We developed a hardware platform based on FPGA (Field Programmable Gate Array) and DSP (Digital Signal Processor) and implemented firmware software to verify the various FEMs. Moreover, we designed PC based software platform to control radar logging parameters and save radar data. The developed platform was verified using 24 GHz multiple channel FMCW (Frequency Modulated Continuous Wave) in an environment of stationary and moving targets of chamber room.

Development and Implementation of an open Medical Device Platform (의료기기 공용기술 활용 촉진을 위한 개방형 의료기기 플랫폼 개발 및 구현)

  • Kim, Daegwan;Hong, JooHyun;Lee, Hyojin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.16 no.6
    • /
    • pp.313-321
    • /
    • 2021
  • The global market for medical devices is huge, and it will continue showing remarkable growth in the future. However, due to the entry barrier to develop medical devices, many domestic companies have technical problems in entering the medical device industry. In this paper, we introduce an open platform that can help with research and development for companies in the healthcare industry. This open platform consists of a hardware part and a software part. A hardware part is combined into CPU, base and other modules that are easy to replace and assemble. A software part is based on application software for development developed by Bionet. We test the performance of the open medical device platform using a biosignal processing algorithm.

IoT Connectivity Application for Smart Building based on Analysis and Prediction System

  • COROTINSCHI, Ghenadie;FRANCU, Catalin;ZAGAN, Ionel;GAITAN, Vasile Gheorghita
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.103-108
    • /
    • 2021
  • The emergence of new technologies and their implementation by different manufacturers of electronic devices are experiencing an ascending trend. Most of the time, these protocols are expected to reach a certain degree of maturity, and electronic equipment manufacturers use simplified communication standards and interfaces that have already reached maturity in terms of their development such as ModBUS, KNX or CAN. This paper proposes an IoT solution of the Smart Home type based on an Analysis and Prediction System. A data acquisition component was implemented and there was defined an algorithm for the analysis and prediction of actions based on the values collected from the data update component and the data logger records.

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.