• 제목/요약/키워드: simultaneous optimization scheme

검색결과 18건 처리시간 0.025초

모바일 내장형 시스템을 위한 듀얼-포트SDRAM의 성능 평가 및 최적화 (Performance Evaluation and Optimization of Dual-Port SDRAM Architecture for Mobile Embedded Systems)

  • 양회석;김성찬;박해우;김진우;하순회
    • 한국정보과학회논문지:컴퓨팅의 실제 및 레터
    • /
    • 제14권5호
    • /
    • pp.542-546
    • /
    • 2008
  • 최근 듀얼-프로세서 기반의 모바일 내장형 시스템을 위한 듀얼-포트 SDRAM이 발표되었다. 이는 단일 메모리 칩이 두 프로세서의 로컬 메모리와 공유 메모리 역할을 모두 담당하므로 공유 메모리를 위하여 추가의 SRAM 메모리를 사용하는 기존의 구조에 비해 더 간단한 통신 구조이다. 양 포트로부터의 동시적인 접근에서의 상호배타성을 보장하기 위하여 모든 공유 메모리 접근에는 특수한 동기화 기법이 수반되어야 하는데 이는 잠재적인 성능 악화의 원인이 된다. 이 논문에서는 이러한 동기화 비용을 고려하여 듀얼-포트SDRAM 구조의 성능을 평가하고, 주 응용의 통신 특성을 고려하여 최적화한 락우선권 기법과 정적복사 기법을 제안한다. 더 나아가, 공유 뱅크를 여러 블록으로 나눔으로써 서로 다른 블록들에 대한 동시적인 접근을 가능케 하여 성능을 개선하도록 한다. 가상 프로토타이핑 환경에서 수행된 실험은 이러한 최적화 기법들이 기본 듀얼-포트SDRAM 구조에 비하여 20-50%의 성능 향상을 가져옴을 보여준다.

Goal-Pareto 기반의 NSGA 최적화 알고리즘 (Goal-Pareto based NSGA Optimization Algorithm)

  • 박준수;박순규;신요안;유명식;이원철
    • 대한전자공학회논문지SP
    • /
    • 제44권2호
    • /
    • pp.108-115
    • /
    • 2007
  • 본 논문에서는 최적화 알고리즘의 속도를 향상시킬 수 있는 방안으로 설계자가 원하는 목적함수들의 수렴 범위를 Goal로 설정하여 최적화를 수행하는 GBNSGA(Goal-Pareto based Non-dominated Sorting Genetic Algorithm)를 제안한다. 많은 공학문제들은 하나의 목표치를 충족하는 해를 찾는 것이 아니라 다수 목적함수들을 충족하는 해를 찾는 것이 일반적이다 특히, 이러한 목적함수들은 서로 상충적인 관계를 갖는 경우가 대부분이기 때문에 모든 목적함수들을 만족하는 유일해를 찾는 것은 거의 불가능하다. 그 대안으로 일부 목적을 희생하며 설계에 부합되는 최적해를 찾는 파레토(Pareto) 방식의 최적화 알고리즘들에 대한 많은 연구가 진행되었다. 본 논문에서는 이러한 파레토 기반의 최적화 알고리즘들의 성능 향상을 도모하기 위하여 설계자의 목적을 파레토 할당에 반영하는 GBNSGA를 제안하고, 그 성능을 NSGA와 weighted-sum 접근 방식과의 비교를 통해 그 우수성을 검증하였다.

수력발전기의 경쟁적 입찰전략이 전력시장에 미치는 영향 (Effect of Bidding Strategies of Hydro Generation on an Electricity Market)

  • 이광호
    • 대한전기학회논문지:전력기술부문A
    • /
    • 제54권9호
    • /
    • pp.461-466
    • /
    • 2005
  • This paper addresses the bidding strategies of a hydro generator in an electricity market, and their effect on the electricity market in accordance with some parameters: the water volume, the demand elasticity, and the hydro unit performance. The competition of a hydro generator is formulated as a hi-level optimization problem, and the solving scheme for the equilibrium condition is proposed as a set of nonlinear simultaneous equations. The equilibrium of the oligopolistic model is evaluated by comparison with that of a perfect competition model from the viewpoint of a market power. Simulation results show some parameters have an influence on the market power of an electricity market including a hydro generator.

전력시장에서 수력발전기의 입찰전략 분석 (Analysis on a Bidding Strategy of the Hydro Generation in an Electricy Market)

  • 신재홍;이광호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 제36회 하계학술대회 논문집 A
    • /
    • pp.807-809
    • /
    • 2005
  • This paper addresses the bidding strategies of a hydro generator in an electricity market, and their effect on the electricity market in accordance with some parameters: the water volume, the demand elasticity, and the hydro unit performance. The competition of a hydro generator is formulated as a hi-level optimization problem, and the solving scheme for the equilibrium condition is proposed as a set of nonlinear simultaneous equations. The equilibrium of the oligopolistic model is evaluated by comparison with that of a perfect competition model from the viewpoint of a market power.

  • PDF

Optimal vibration energy harvesting from nonprismatic piezolaminated beam

  • Biswal, Alok R;Roy, Tarapada;Behera, Rabindra K
    • Smart Structures and Systems
    • /
    • 제19권4호
    • /
    • pp.403-413
    • /
    • 2017
  • The present article encompasses a nonlinear finite element (FE) and genetic algorithm (GA) based optimal vibration energy harvesting from nonprismatic piezo-laminated cantilever beams. Three cases of cross section profiles (such as linear, parabolic and cubic) are modelled to analyse the geometric nonlinear effects on the output responses such as displacement, voltage, and power. The simultaneous effects of taper ratios (such as breadth and height taper) on the output power are also studied. The FE based nonlinear dynamic equation of motion has been solved by an implicit integration method (i.e., Newmark method in conjunction with the Newton-Raphson method). Besides this, a real coded GA based constrained optimization scheme has also been proposed to determine the best set of design variables for optimal harvesting of power within the safe limits of beam stress and PZT breakdown voltage.

Game Model Based Co-evolutionary Solution for Multiobjective Optimization Problems

  • Sim, Kwee-Bo;Kim, Ji-Yoon;Lee, Dong-Wook
    • International Journal of Control, Automation, and Systems
    • /
    • 제2권2호
    • /
    • pp.247-255
    • /
    • 2004
  • The majority of real-world problems encountered by engineers involve simultaneous optimization of competing objectives. In this case instead of single optima, there is a set of alternative trade-offs, generally known as Pareto-optimal solutions. The use of evolutionary algorithms Pareto GA, which was first introduced by Goldberg in 1989, has now become a sort of standard in solving Multiobjective Optimization Problems (MOPs). Though this approach was further developed leading to numerous applications, these applications are based on Pareto ranking and employ the use of the fitness sharing function to maintain diversity. Another scheme for solving MOPs has been presented by J. Nash to solve MOPs originated from Game Theory and Economics. Sefrioui introduced the Nash Genetic Algorithm in 1998. This approach combines genetic algorithms with Nash's idea. Another central achievement of Game Theory is the introduction of an Evolutionary Stable Strategy, introduced by Maynard Smith in 1982. In this paper, we will try to find ESS as a solution of MOPs using our game model based co-evolutionary algorithm. First, we will investigate the validity of our co-evolutionary approach to solve MOPs. That is, we will demonstrate how the evolutionary game can be embodied using co-evolutionary algorithms and also confirm whether it can reach the optimal equilibrium point of a MOP. Second, we will evaluate the effectiveness of our approach, comparing it with other methods through rigorous experiments on several MOPs.

MOBA based design of FOPID-SSSC for load frequency control of interconnected multi-area power systems

  • Falehi, Ali Darvish
    • Smart Structures and Systems
    • /
    • 제22권1호
    • /
    • pp.81-94
    • /
    • 2018
  • Automatic Generation Control (AGC) has functionally controlled the interchange power flow in order to suppress the dynamic oscillations of frequency and tie-line power deviations as a perturbation occurs in the interconnected multi-area power system. Furthermore, Flexible AC Transmission Systems (FACTS) can effectively assist AGC to more enhance the dynamic stability of power system. So, Static Synchronous Series Compensator (SSSC), one of the well-known FACTS devices, is here applied to accurately control and regulate the load frequency of multi-area multi-source interconnected power system. The research and efforts made in this regard have caused to introduce the Fractional Order Proportional Integral Derivative (FOPID) based SSSC, to alleviate both the most significant issues in multi-area interconnected power systems i.e., frequency and tie-line power deviations. Due to multi-objective nature of aforementioned problem, suppression of the frequency and tie-line power deviations is formularized in the form of a multi-object problem. Considering the high performance of Multi Objective Bees Algorithm (MOBA) in solution of the non-linear objectives, it has been utilized to appropriately unravel the optimization problem. To verify and validate the dynamic performance of self-defined FOPID-SSSC, it has been thoroughly evaluated in three different multi-area interconnected power systems. Meanwhile, the dynamic performance of FOPID-SSSC has been accurately compared with a conventional controller based SSSC while the power systems are affected by different Step Load Perturbations (SLPs). Eventually, the simulation results of all three power systems have transparently demonstrated the dynamic performance of FOPID-SSSC to significantly suppress the frequency and tie-line power deviations as compared to conventional controller based SSSC.

클라우드 스토리지에서의 중요데이터 보호 (Securing Sensitive Data in Cloud Storage)

  • 이셜리;이훈재
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.871-874
    • /
    • 2011
  • The fast emerging of network technology and the high demand of computing resources have prompted many organizations to outsource their storage and computing needs. Cloud based storage services such as Microsoft's Azure and Amazon's S3 allow customers to store and retrieve any amount of data, at anytime from anywhere via internet. The scalable and dynamic of the cloud storage services help their customer to reduce IT administration and maintenance costs. No doubt, cloud based storage services brought a lot of benefits to its customer by significantly reducing cost through optimization increased operating and economic efficiencies. However without appropriate security and privacy solution in place, it could become major issues to the organization. As data get produced, transferred and stored at off premise and multi tenant cloud based storage, it becomes vulnerable to unauthorized disclosure and unauthorized modification. An attacker able to change or modify data while data inflight or when data is stored on disk, so it is very important to secure data during its entire life-cycle. The traditional cryptography primitives for the purpose of data security protection cannot be directly adopted due to user's lose control of data under off premises cloud server. Secondly cloud based storage is not just a third party data warehouse, the data stored in cloud are frequently update by the users and lastly cloud computing is running in a simultaneous, cooperated and distributed manner. In our proposed mechanism we protect the integrity, authentication and confidentiality of cloud based data with the encrypt- then-upload concept. We modified and applied proxy re-encryption protocol in our proposed scheme. The whole process does not reveal the clear data to any third party including the cloud provider at any stage, this helps to make sure only the authorized user who own corresponding token able to access the data as well as preventing data from being shared without any permission from data owner. Besides, preventing the cloud storage providers from unauthorized access and making illegal authorization to access the data, our scheme also protect the data integrity by using hash function.