• Title/Summary/Keyword: 계층이론

Search Result 453, Processing Time 0.026 seconds

Optimization Between Design Blocks using Carry-Save-Adders in VLSI Design (VLSI 설계에서 캐리-세이브 가산기를 이용한 설계 블록들 간의 최적화)

  • Kim, Tae-Hwan;Eom, Jun-Hyeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.5
    • /
    • pp.620-626
    • /
    • 1999
  • 캐리-세이브 가산기는 (CSA)는 실제 산업체에서 회로를 설계할 때 연산수식의 계산을 빠르게 처리하기위해 가장 많이 사용되는 구성요소들 가운데 하나이다. [3]의 자료에 의하면 실제 회로 설계에서 나오는 전형적인 연산식에 CSA를 이용했을 때 그렇지 않은 경우보다 최대 54%의 연산처리속도와 42%의 회로 면적 향상을 갖는다고 보고하고 있다. 그러나, 이는 그 연산식이 하나의 설계 블록(sub-design)에 포함되어 있다는 전제하에 도출된 것이다. 회로 설계 규모와 복잡도가 큰 응용이 많아지는 상황에서 설계 블록단위의 계층적 설계는 필수적인 추세이므로, CSA를 이용한 회로 최적화를 실현하기위해서는 설계 블록들간에 걸쳐있는 연산식에 대한 CSA 최적화 또한 매우 중요한 문제이다. 이를 해결하기위해서 이 논문에서는 auxiliary port라는 개념을 이용하여 설계 블록들간의 연산식에 대한 CSA 최적화 방법을 제안한다. 실제 실험에서 우리가 제안한 기법은 회로의 전체적인 영역에 걸쳐 CSA를 적용하는 데 매우 효과적이었으며, 이 기법을 적용하지 않고 얻은 CSA 최적화 회로와 비교했을 때 회로에서의 연산식 계산속도와 그 회로 면적이 상당히 향상되었음을 확인하였다.

Combined Radiation-Natural Convection Heat Transfer in a Rectangular Enclosure (직사각형 밀폐공간내에서의 복사 및 자연대류 열전달)

  • 김기훈;이택식;이준식
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.11 no.2
    • /
    • pp.331-344
    • /
    • 1987
  • A numerical analysis has been conducted on the interaction of the thermal radiation and natural convection in a rectangular enclosure filled with a gray fluid. P-1 approximation is adopted for the radiative transfer and its application limit is examined. Considered are the Stark number effect, the optical thickness effect and the wall emissivity effect on the flow and heat transfer characteristics. As the Stark number increase or the optical thickness decreases, the boundary layer thickness and the flow velocity increase. Transition to turbulence is retarded with the increase of the radiation effect. When the optical thickness is one, the radiation effect is negligible for the Stark numbers larger than 10.

Analysis on the Expandable Brick System Toy Model Through Characteristic Diversification (특성 다변화를 통한 확장형 브릭 시스템 완구 모델 분석)

  • Kwon, Hyo-Jeong;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.9
    • /
    • pp.1175-1184
    • /
    • 2007
  • Brick toys, once regarded as one of the most basic formative equipments, have succeeded in increasing user base and more experiments have been made to link with a variety of areas in a creative way. However, previous studies on brick were limited to its role as a tool of play and education, which resulted in relatively less number of studies on endless possibility and variability. In this regard, this study examined what made bricks evolve in the unique and advanced form and how it has developed in detail. This study presented information on the basis of theories regarding fundamental features and characteristics of brick and analyzes actual cases in a systematic way. Finally, VR design based on 3D-brick system was implemented.

  • PDF

Memory Management for Improving User Response Time in Web Server Clusters (웹 서버 클러스터에서 사용자 응답시간 개선을 위한 메모리 관리)

  • Chung, Ji-Yeong;Kim, Sung-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.9
    • /
    • pp.434-441
    • /
    • 2001
  • The concept of network memory was introduced for the efficient exploitation of main memory in a cluster. Network memory can be used to speed up applications that frequently access large amount of disk data. In this paper, we present a memory a management algorithm that does not require prior knowledge of access patterns and that is practical to implement under the web server cluster, In addition, our scheme has a good user response time for various access distributions of web documents. Through a detailed simulation, we evaluate the performance of our memory managment algorithms.

  • PDF

An Efficient FTL Algorithm for Flash Memory (플래시 메모리를 위한 효율적인 사상 알고리즘)

  • Chung Tae-Sun;Park Hyung-Seok
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.9
    • /
    • pp.483-490
    • /
    • 2005
  • Recently, flash memory is widely used in embedded applications since it has strong points: non-volatility, fast access speed, shock resistance, and low power consumption. However, due to its hardware characteristics, it requires a software layer called FTL(flash translation layer). The main functionality of FTL is to convert logical addresses from the host to physical addresses of flash memory We present a new FTL algorithm called STAFF(State Transition Applied Fast Flash Translation Layer). Compared to the previous FTL algorithms, STAFF shows five times higher performance than basic block mapping scheme and requires less memory. We provide performance results based on our implementation of STAFF and previous FTL algorithms.

Weighted Secret Sharing Scheme (가중치를 갖는 비밀분산법)

  • Park, So-Young;Lee, Sang-Ho;Kwon, Dae-Sung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.213-219
    • /
    • 2002
  • A secret sharing scheme is a kind of cryptographic protocol to maintain secret information by splitting it to many small pieces of shares and sharing between shareholders. In case of shareholders having different authorization to reconstruct the original secret, it is required a new secret sharing scheme to reflect any hierarchical structure between shareholders. In this paper, we propose a new weighted secret sharing scheme, that is, each shareholder has a weight according to the authorization of reconstructing the secret and an access set which is a subset of shareholders can reconstruct the secret if the sum of weights is equal or greater than a predefined threshold.

Wavelet-Based Level-of-Detail Representation of 3D Objects (웨이브릿 기반의 3차원 물체 LOD 표현)

  • Lee, Ha-Sup;Yang, Hyun-Seung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.4
    • /
    • pp.185-191
    • /
    • 2002
  • In this paper, we propose a 3D object LOD(Level of Detail) modeling system that constructs a mesh from range images and generates the mesh of various LOD using the wavelet transform. In the initial mesh generation, we use the marching cube algorithm. We modify the original algorithm to apply it to construct the mesh from multiple range images efficiently. To get the base mesh we use the decimation algorithm which simplifies a mesh with preserving the topology Finally, when reconstructing new mesh which is similar to initial mesh we calculate the wavelet coefficients by using the wavelet transform. We solve the critical problem of wavelet-based methods - the surface crease problem (1) - by using the mesh simplification as the base mesh generation method.

Performance Analysis of Physical Layer Security using Partial Relay Selection in Cooperative Communication based on Decode-and-Forward with Multi-Relay (다수의 중계기가 존재하는 복호 후 재전송 기반 협력 통신 시스템에서 부분적인 중계기 선택을 사용하는 물리 계층 보안의 성능 분석)

  • Park, Sol;Kong, Hyung-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.21-27
    • /
    • 2019
  • In this paper, we investigate the secrecy outage probability when using a partial relay selection scheme in cooperative communication systems based on decode-and-forward with multi-relay. It is assumed that both the receiving node and the eavesdropping node receive signals at both the transmitting node and the relaying node. The two received signals are used to obtain the diversity gain using the MRC scheme. In this paper, we compute the theoretical formula of secrecy outage probability and compare the theoretical value with the simulation value to prove that equation is valid. The simulation results show how the secrecy outage probability varies with the number of relays.

Analysis of Preference for Encryption Algorithm Based on Decision Methodology (의사 결정 방법론을 기반한 암호화 알고리즘 선호도 분석)

  • Jin, Chan-Yong;Shin, Seong-Yoon;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.167-168
    • /
    • 2019
  • Lately, variety of algorithms using encryption technology has been adopted as methods of unlocking smartphone. It is advancing toward the direction to solve through human biometrics technology which has already succeeded in commercialization. These include finger print recognition, face recognition, and iris recognition. In this study, we selected biometrics recognition technology and pattern recognition and password input methods which are already commercialized as evaluation items. The evaluation items are five algorithms including finger print recognition, face recognition iris recognition, pattern recognition and password input method. Based on these algorithms, analytic hierarchy process is used to analyze the preference of smartphone users. Also, the theoretical implications are presented based on the analysis results.

  • PDF

Thoracic Spine Segmentation of X-ray Images Using a Modified HRNet (수정된 HRNet을 이용한 X-ray 영상의 흉추 분할 기법)

  • Lee, Ye-Eun;Lee, Dong-Gyu;Jeong, Ji-Hoon;Kim, Hyung-Kyu;Kim, Ho-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.705-707
    • /
    • 2022
  • 인체의 흉부 X-ray 영상으로부터 척추질환과 관련된 의료 진단지표를 자동으로 추출하는 과정을 위하여 흉추조직의 정확한 분할이 필요하다. 본 연구에서는 HRNet 기반의 학습을 통하여 흉추조직을 분할하는 방법을 고찰한다. 분할 과정에서 영상 내의 상대적인 위치 정보가 효과적으로 반영될 수 있도록, 계층별로 영상의 고해상도의 표현이 그대로 유지되는 구조와 저해상도의 특징 지도로 변환되는 구조가 병렬적으로 연결되는 형태의 심층 신경망 모델을 채택하였다. 흉부 X-ray 영상에서 콥각도(Cobb's angle)를 산출하는 문제를 대상으로 흉추 분할을 위한 학습 방법, 진단지표 추출 방법 등을 소개하며, 부수적으로 피사체의 위치 변화 및 크기 변화 등에 강인한 성능을 제공하기 위하여 학습 데이터를 증강하는 방법론을 제시하였다. 총 145개의 영상을 사용한 실험을 통하여 제안된 이론의 타당성을 평가하였다.