• Title/Summary/Keyword: in-memory computing

Search Result 766, Processing Time 0.023 seconds

An Analysis of Social Networking Service on the Organizational Performance: Mediating effect on Transactive Memory Capabilities and Moderating effect on Time (소셜네트워킹서비스와 업무성과와의 관계 연구 : 트랜스엑티브 메모리역량의 매개효과와 사용시간의 조절효과를 중심으로)

  • Lee, Miran;Kim, Yongwon
    • Journal of Internet Computing and Services
    • /
    • v.17 no.1
    • /
    • pp.109-118
    • /
    • 2016
  • As Internet technology further develops, a social networking service (SNS) also develops. But most studies on SNS are not appropriate for business purposes since they mainly focus on personal characteristics. Unlike previous studies, however, this study tries to understand the effect of SNS on performance in the perspective of business. As the result of analysis, SNSE(Social Networking Service Engagement) appears to have positive effect on TMC(Transactive Memory Capability) and PER(Performance), and TMC also seems to affect PER. On the assumption that there should be some parameters between SNSE and PER that earlier studies did not consider, this study has proved that a new way of memories, or TMC, forms the bridge between SNS and PER. It also found out that the time spent on SNS is positively controlled when SNSE affects TMC. These results are different from those of the previous studies arguing that SNS has nothing to do with PER.

Accelerating Self-Similarity-Based Image Super-Resolution Using OpenCL

  • Jun, Jae-Hee;Choi, Ji-Hoon;Lee, Dae-Yeol;Jeong, Seyoon;Cho, Suk-Hee;Kim, Hui-Yong;Kim, Jong-Ok
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.1
    • /
    • pp.10-15
    • /
    • 2015
  • This paper proposes the parallel implementation of a self-similarity based image SR (super-resolution) algorithm using OpenCL. The SR algorithm requires tremendous computations to search for a similar patch. This becomes a bottleneck for the real-time conversion from a FHD image to UHD. Therefore, it is imperative to accelerate the processing speed of SR algorithms. For parallelization, the SR process is divided into several kernels, and memory optimization is performed. In addition, two GPUs are used for further acceleration. The experimental results shows that a GPGPU implementation can speed up over 140 times compared to a single-core CPU. Furthermore, it was confirmed experimentally that utilizing two GPUs can speed up the execution time proportionally, up to 277 times.

A Method of Determining Whether a Smart-Phone is Moving (스마트폰이 이동 중인지 아닌지를 판단하는 방법)

  • Yim, Jae-Geol;Lee, Gye-Young;Shim, Kyu-Bark;Le, Thanh Cong
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.632-638
    • /
    • 2012
  • A smartphone is one of the best candidate devices on which context based services can be provided because a smartphone has considerably powerful computing ability and large memory capacity and it is a personal belonging. One of the most important factors of context is the moving status of the smartphone. For example, if the smartphone is not moving and the user is in an exhibition room then we can conclude that the user is watching an exhibit. This paper proposes an algorithm of determining the moving status of a smartphone for the first time. Our test results showed that the proposed algorithm is 100% correct.

Key Recovery Algorithm for Randomly-Decayed AES Key Bits (랜덤하게 변형된 AES 키 비트열에 대한 키 복구 알고리즘)

  • Baek, Yoo-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.327-334
    • /
    • 2016
  • Contrary to the common belief, DRAM which is used for the main memory of various computing devices retains its content even though it is powered-off. Especially, the data-retaining time can increase if DRAM is cooled down. The Cold Boot Attack, a kind of side-channel attacks, tries to recover the sensitive information such as the cryptographic key from the powered-off DRAM. This paper proposes a new algorithm which recovers the AES key under the symmetric-decay cold-boot-attack model. In particular, the proposed algorithm uses the strategy of reducing the size of the candidate key space by testing the randomness of the extracted AES key bit stream.

A Secure Protocol for High-Performance RFID Tag using Dynamic ID Allocating (동적 ID 할당을 이용한 고기능 RFID 태그용 보안 프로토콜)

  • Park Jin-Sung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.642-648
    • /
    • 2006
  • In this paper, I have proposed a secure dynamic ID allocation protocol using mutual authentication on the RFID tag. Currently, there are many security protocols focused on the low-price RFID tag. The conventional low-price tags have limitation of computing power and rewritability of memory. The proposed secure dynamic ID allocation protocol targets to the high-performance RFID tags which have more powerful performance than conventional low-price tag by allocating a dynamic ID to RFID using mutual authentication based on symmetric encryption algorithm. This protocol can be used as a partial solution for ID tracing and forgery.

  • PDF

Finite-EIement Analysis with Localized Functional for Alternating Magnetic Field Problems (국부범함수를 사용한 교류자장 문제의 유한요소 해석)

  • 김원범;정현교;고창섭;한송엽
    • Journal of the Korean Magnetics Society
    • /
    • v.1 no.2
    • /
    • pp.79-84
    • /
    • 1991
  • A variational approach employing localized functional is presented to solve alternating magnetic field problems with open boundary. The functional used in the approach consists of the domain integral of finite element region only and the boundary integral of the interfacial boundary between the finite and infinite element regions. The boundary integral is obtained by transforming the infinite domain integral for the infinite element region into the interfacial boundary integral. The proposed algorithm is then applied to a simple two-dimensional problem where the analytic solutions are available. It is shown that the algorithm makes it possible to yield good agreements between the numerical and analytic solutions. and that it requires less computer storage memory and computation time than the conventional finite element method due to the reduction of the computing region.

  • PDF

A Real Code Genetic Algorithm for Optimum Design (실수형 Genetic-Algorithm에 의한 최적 설계)

  • 양영순;김기화
    • Computational Structural Engineering
    • /
    • v.8 no.2
    • /
    • pp.123-132
    • /
    • 1995
  • Genetic Algorithms(GA), which are based on the theory of natural evolution, have been evaluated highly for their robust performances. Traditional GA has mostly used binary code for representing design variable. The binary code GA has many difficulties to solve optimization problems with continuous design variables because of its large computer core memory size, inefficiency of its computing time, and its bad performance on local search. In this paper, a real code GA is proposed for dealing with the above problems. So, new crossover and mutation processes of GA are developed to use continuous design variables directly. The results of read code GA are compared with those of binary code GA for several single and multiple objective optimization problems. As a result of comparisons, it is found that the performance of the real code GA is better than that of the binary code GA, and concluded that the real code GA developed here can be used for the general optimization problem.

  • PDF

THE INVESTIGATION OF HELICOPTER ROTOR AERODYNAMIC ANALYSIS METHODS (헬리콥터 로터 공력해석을 위한 수치적 방법 연구)

  • Park, N.E.;Woo, C.H.;Rho, H.W.;Kim, C.H.;Yee, S.J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2007.04a
    • /
    • pp.120-124
    • /
    • 2007
  • Helicopters and rotary-wing vehicles encounter a wide variety of complex aerodynamic phenomena and these phenomena present substantial challenges for computational fluid dynamics(CFD) models. This investigation presents the rotor aerodynamic analysis items for the helicopter development and variety aerodynamic analysis methods to provide the better solution to researchers and helicopter developers between aerodynamic problems and numerical aerodynamic analysis methods. The numerical methods to make an analysis of helicopter rotor are as below - CFD Modelling : actuator disk model, BET model, fully rotor model,... - Grid : sliding mesh, chimera mesh / structure mesh, unstructure mesh,... - etc. : panel method periodic boundary, quasi-steady simulation, incompressible,... The choice of CFD methodology and the numerical resolution for the overall problem have been driven mostly by available computer speed and memory at any point in time. The combination of the knowledge of aerodynamic analysis items, available computing power and choice of CFD methods now allows the solution of a number of important rotorcraft aerodynamics design problems.

  • PDF

A Hybrid of Smartphone Camera and Basestation Wide-area Indoor Positioning Method

  • Jiao, Jichao;Deng, Zhongliang;Xu, Lianming;Li, Fei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.723-743
    • /
    • 2016
  • Indoor positioning is considered an enabler for a variety of applications, the demand for an indoor positioning service has also been accelerated. That is because that people spend most of their time indoor environment. Meanwhile, the smartphone integrated powerful camera is an efficient platform for navigation and positioning. However, for high accuracy indoor positioning by using a smartphone, there are two constraints that includes: (1) limited computational and memory resources of smartphone; (2) users' moving in large buildings. To address those issues, this paper uses the TC-OFDM for calculating the coarse positioning information includes horizontal and altitude information for assisting smartphone camera-based positioning. Moreover, a unified representation model of image features under variety of scenarios whose name is FAST-SURF is established for computing the fine location. Finally, an optimization marginalized particle filter is proposed for fusing the positioning information from TC-OFDM and images. The experimental result shows that the wide location detection accuracy is 0.823 m (1σ) at horizontal and 0.5 m at vertical. Comparing to the WiFi-based and ibeacon-based positioning methods, our method is powerful while being easy to be deployed and optimized.

Optimizing the Manifold Design of a Fuel Cell Stack for Uniform Distribution of Reactant Gases within Fuel Cell Channels (연료전지 채널 내 균일한 유량분배를 위한 연료전지 스택의 매니폴드 디자인 최적화 연구)

  • Jo, A-Rae;Kang, Kyung-Mun;Oh, Sung-Jin;Ju, Hyun-Chul
    • The KSFM Journal of Fluid Machinery
    • /
    • v.15 no.5
    • /
    • pp.11-19
    • /
    • 2012
  • The main function of fuel cell manifold is to render reactants distribution as uniform as possible into a fuel cell stack. The purpose of this study is to numerically investigate the effects of stack manifold design on reactants distribution within a fuel cell stack. Four manifold designs with different manifold entrance shapes (expansion or diffuser) and different values of the extra width between the cell outer channel and manifold side wall are considered and applied to the fuel cell stack consisting of 50 cells. Since the fuel cell stack geometry involves several millions of grid points for numerical calculations, a parallel computing methodology is employed to substantially reduce the computational time and overcome the memory requirement. The numerical simulations are carried out and calculated results clearly demonstrate that both the manifold entrance shape and extra width have a substantial influence on manifold performance, controlling the degree of flow separation and entrance length for fully developed flow in the manifold channel. Finally, we suggest the optimum design of fuel cell manifold based on the simulation results.