• Title/Summary/Keyword: right multiplication

Search Result 37, Processing Time 0.031 seconds

Neural Basis Involved in the Interference Effects During Dual Task: Interaction Between Calculation and Memory Retrieval (이중과제 수행시의 간섭효과에 수반되는 신경기반: 산술연산과 기억인출간의 상호작용)

  • Lee, Byeong-Taek;Lee, Kyoung-Min
    • Korean Journal of Cognitive Science
    • /
    • v.18 no.2
    • /
    • pp.159-178
    • /
    • 2007
  • Lee & Kang (2002) showed that simultaneous phonological rehearsal significantly delayed the performance of multiplication but not subtraction, whereas holding an image in the memory delayed subtraction but not multiplication. This result indicated that arithmetic function is related to working memory in a subsystem-specific manner. The aim of the current study was to examine the neural correlates of previous finding using fMRI. For this goal, dual task conditions that required suppression or no suppression were manipulated. In general, several areas were more activated in the interference conditions than in the less interference conditions, although both conditions were dual condition. More important finding is that the specific areas activated in the phonological suppression rendition were right inferior frontal gyrus, left angular, and inferior parietal lobule, while the areas activated in the other condition were mainly in the right superior temporal gyrus and anterior cingulate gyrus. Furthermore, the areas activated in the phonological or visual less suppression condition were right medial frontal gyrus, left middle frontal gyrus, and bilateral medial frontal gyri, anterior cingulate cortices, and parahippocampal gyri, respectively. These results revealed that sharing the processing code invokes interference, and its neural basis.

  • PDF

Algorithm for Addition Minimization Shift-and-Add of Binary Multiplication Problem (이진수 곱셈 문제의 덧셈 최소화 자리이동-덧셈 알고리즘)

  • Sang-Un Lee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.55-60
    • /
    • 2023
  • When performing the multiplication m×r=p of two binary numbers m and r on a computer, there is a shift-and-add(SA) method in which no time-consuming multiplication is performed, but only addition and shift-right(SR). SA is a very simple method in which when the value of the multiplier ri is 0, the result p is only SR with m×0=0, and when ri is 1, the result p=p+m is performed with m×1=m, and p is SR. In SA, the number of SRs can no longer be shortened, and the improvement part is whether the number of additions is shortened. This paper proposes an SA method to minimize addition based on the fact that setting a smaller number to r when converted to a binary number to be processed by a computer can significantly reduce the number of additions compared to the case of setting a smaller number to r based on the decimals that humans perform. The number of additions to the proposed algorithm was compared for four cases with signs (-,-), (-,+), (+,-), and (+,+) for some numbers in the range [-127,128]. The conclusion obtained from the experiment showed that when determining m and r, it should be determined as a binary number rather than a decimal number.

A Multi-Level Accumulation-Based Rectification Method and Its Circuit Implementation

  • Son, Hyeon-Sik;Moon, Byungin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3208-3229
    • /
    • 2017
  • Rectification is an essential procedure for simplifying the disparity extraction of stereo matching algorithms by removing vertical mismatches between left and right images. To support real-time stereo matching, studies have introduced several look-up table (LUT)- and computational logic (CL)-based rectification approaches. However, to support high-resolution images, the LUT-based approach requires considerable memory resources, and the CL-based approach requires numerous hardware resources for its circuit implementation. Thus, this paper proposes a multi-level accumulation-based rectification method as a simple CL-based method and its circuit implementation. The proposed method, which includes distortion correction, reduces addition operations by 29%, and removes multiplication operations by replacing the complex matrix computations and high-degree polynomial calculations of the conventional rectification with simple multi-level accumulations. The proposed rectification circuit can rectify $1,280{\times}720$ stereo images at a frame rate of 135 fps at a clock frequency of 125 MHz. Because the circuit is fully pipelined, it continuously generates a pair of left and right rectified pixels every cycle after 13-cycle latency plus initial image buffering time. Experimental results show that the proposed method requires significantly fewer hardware resources than the conventional method while the differences between the results of the proposed and conventional full rectifications are negligible.

Design of Linear Systolic Arrays of Modular Multiplier for the Fast Modular Exponentiation (고속 모듈러 지수연산을 위한 모듈러 곱셈기의 선형 시스톨릭 어레이 설계)

  • Lee, Geon-Jik;Heo, Yeong-Jun;Yu, Gi-Yeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.9
    • /
    • pp.1055-1063
    • /
    • 1999
  • 공개키 암호화 시스템에서 주된 연산은 512비트 이상의 큰 수에 의한 모듈러 지수 연산으로 표현되며, 이 연산은 내부적으로 모듈러 곱셈을 반복적으로 수행함으로써 계산된다. 본 논문에서는 Montgomery 알고리즘을 분석하여 right-to-left 방식의 모듈러 지수 연산에서 공통으로 계산 가능한 부분을 이용하여 모듈러 제곱과 모듈러 곱셈을 동시에 수행하는 선형 시스톨릭 어레이를 설계한다. 설계된 시스톨릭 어레이는 VLSI 칩과 같은 하드웨어로 구현함으로써 IC 카드나 smart 카드에 이용될 수 있다.Abstract The main operation of the public-key cryptographic system is represented the modular exponentiation containing 512 or more bits and computed by performing the repetitive modular multiplications. In this paper, we analyze Montgomery algorithm and design the linear systolic array for performing modular multiplication and modular squaring simultaneously using the computable part in common in right-to-left modular exponentiation. The systolic array presented in this paper could be designed on VLSI hardware and used in IC and smart card.

Weakly np-Injective Rings and Weakly C2 Rings

  • Wei, Junchao;Che, Jianhua
    • Kyungpook Mathematical Journal
    • /
    • v.51 no.1
    • /
    • pp.93-108
    • /
    • 2011
  • A ring R is called left weakly np- injective if for each non-nilpotent element a of R, there exists a positive integer n such that any left R- homomorphism from $Ra^n$ to R is right multiplication by an element of R. In this paper various properties of these rings are first developed, many extending known results such as every left or right module over a left weakly np- injective ring is divisible; R is left seft-injective if and only if R is left weakly np-injective and $_RR$ is weakly injective; R is strongly regular if and only if R is abelian left pp and left weakly np- injective. We next introduce the concepts of left weakly pp rings and left weakly C2 rings. In terms of these rings, we give some characterizations of (von Neumann) regular rings such as R is regular if and only if R is n- regular, left weakly pp and left weakly C2. Finally, the relations among left C2 rings, left weakly C2 rings and left GC2 rings are given.

The Intelligent Algorithm for sweet spot (ICCAS 2003)

  • Lim, Sung-Jin;Jung, Kyung-Kwon;Eom, Ki-Hwan;Onodera, Sosuke;Sato, Yoichi
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1763-1766
    • /
    • 2003
  • Millimeter-wave networking is composed of narrow beam link. it is very substantial that beam connecting point to point is fixed in right direction. It is major requirement in the beam network to keep the beam in best direction. In this paper, We propose the method to find a best suited direction of the antenna's beam using the Genetic Algorithm (GA) in point-to-point link. Proposed method presume that each station knows his direction ${\theta}_1$ , ${\theta}_2$ at every step of GA, then it can be expected that GA is possible to search the ideal solution. Intensity of the received signal is evaluated by the multiplication of lengths to the point which the lobe meets with the horizontal line.

  • PDF

Sweet spot search using Genetic Algorithm (Genetic Algorithm을 이용한 sweet spot search)

  • ;;;Sosuke Onodera;Yoichi Sato
    • Proceedings of the IEEK Conference
    • /
    • 2003.07a
    • /
    • pp.274-277
    • /
    • 2003
  • Millimeter-wave networking is composed of narrow beam link. High directivity of the beam provides either advantage or disadvantage in comparison with conventional wide-lobe microwave communications. In such networks, it is very substantial that beam connecting point to point is fixed in right direction. It is major requirement in the beam network to keep the beam in best direction. In this paper, We propose the method to find a best suited direction of the antenna's beam using the Genetic Algorithm in point-to-point link. Proposed method presume that each station knows his direction $\theta$$_1$,$\theta$$_2$ at every step of Genetic Algorithm, then it can be expected that GA is possible to search the ideal solution. Intensity of the received signal is evaluated by the multiplication of lengths to the point which the lobe meets with the horizontal line.

  • PDF

An Analysis of Mastering Concept and Connection with Operations in Natural Number and Fraction in Elementary School Mathematics (초등 수학에서 자연수와 분수의 사칙연산에 대한 개념 익히기 및 연산 사이의 연결 분석)

  • Roh, Eun Hwan;Jeong, Sang Tae;Kim, Min Jeong
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.19 no.4
    • /
    • pp.563-588
    • /
    • 2015
  • In elementary school, didactical transposition is inevitable due to several reasons. In mathematics, addition and multiplication are taught as binary operations, subtraction and division are taught as unary operations. But in elementary school, we try to teach all the four operations as binary operations by didactical transposition. In 'Mastering' the concepts of the four operations, the way of concept introduction is dealt importantantly. So it is different from understanding the four operations. In this study, we analyzed the four operations of natural numbers and fractions from two perspectives: concept understanding (how to introduce concepts and how to choose an operation) and connection between the operations. As a result, following implications were obtained. In division of fractions, students attempted a connection with multiplication of fractions right away without choosing an operation, based on the situation. Also, to understand division of fractions itself, integrate division of fractions presented from the second semester of the fifth grade to the first semester of the sixth grade are needed. In addition, this result can be useful in the future textbook development.

Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm (CIOS 몽고메리 모듈러 곱셈 알고리즘 기반 Scalable RSA 공개키 암호 프로세서)

  • Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.100-108
    • /
    • 2018
  • This paper describes a design of scalable RSA public-key cryptography processor supporting four key lengths of 512/1,024/2,048/3,072 bits. The modular multiplier that is a core arithmetic block for RSA crypto-system was designed with 32-bit datapath, which is based on the CIOS (Coarsely Integrated Operand Scanning) Montgomery modular multiplication algorithm. The modular exponentiation was implemented by using L-R binary exponentiation algorithm. The scalable RSA crypto-processor was verified by FPGA implementation using Virtex-5 device, and it takes 456,051/3,496347/26,011,947/88,112,770 clock cycles for RSA computation for the key lengths of 512/1,024/2,048/3,072 bits. The RSA crypto-processor synthesized with a $0.18{\mu}m$ CMOS cell library occupies 10,672 gate equivalent (GE) and a memory bank of $6{\times}3,072$ bits. The estimated maximum clock frequency is 147 MHz, and the RSA decryption takes 3.1/23.8/177/599.4 msec for key lengths of 512/1,024/2,048/3,072 bits.

The formativeness of Maximalism expressed in the modern women's collection - Focusing on the women's collection from 2011 to 2016 - (현대 여성복 컬렉션에 표현된 맥시멀리즘의 조형성에 관한 연구 - 2011년 ~ 2016년 여성복 컬렉션을 중심으로 -)

  • Kim, Kyung-Hee
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.20 no.2
    • /
    • pp.101-115
    • /
    • 2018
  • The purpose of this study is to contribute to the development of the women's fashion field with the goal of creating creative and experimental fashion styles through the categorization of cases of women's fashion design expressed with Maximalism, a type of expression used in modern fashion, as well as analyzing and examining the formativeness of this style. Qualitative research was conducted through a literature review and design case analysis. The scope of this research was from 2011 S/S to 2016 F/W, and the regional scope included the women's collections from Paris, Milano, London and New York. The results acquired are as follows. Initially, exaggeration was expressed through excessively exaggerating the overall silhouette of clothing or exaggeratedly distorting certain parts of the overall silhouette. Secondly, decoration was expressed through the use of the same colors and materials and the addition of excessive details and trimmings to express an exaggerated style of clothing as well as to express a luxurious and handcrafted style of clothing. Thirdly, fusion was expressed through integrating multiple items from different cultures, deconstruction, which destroys the concept of gender and use of clothing, and fashion style that transcends time and space. Fourthly, non-structurality was expressed through differentiating multiple weight feelings applied to the left/right sides of clothing or expressing a structural designs that is asymmetrical to the upper/lower/left/right directions to create a silhouette that displays a creative avant-garde style. As examined above, it was found that the maximalism expressed in fashion after 2011 created new images and expressed maximized emotional orientations through the exaggerated use of multiple silhouettes and decorations or through the integration of colors, patterns, ages and images. Through this process, maximalism is expected to not only provide an infinite possibility to the modern fashion that pursues diversification and multiplication, but also serve as an example that represents diversified post-modernism fashion trends in the future.