• Title/Summary/Keyword: 메모리 효율적 알고리즘

Search Result 451, Processing Time 0.026 seconds

A Cache Management Technique for an Efficient Video Proxy Server (효율적인 비디오 프록시 서버를 위한 캐시 관리 방법)

  • Lee, Jun-Pyo;Park, Sung-Han
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.82-88
    • /
    • 2009
  • Video proxy server which is located near clients can store the frequently requested video data in storage space in order to minimize initial latency and network traffic significantly. However, due to the limited storage space in video proxy server, an appropriate video selection method is needed to store the videos which are frequently requested by users. Thus, we present a virtual caching technique to efficiently store the video in video proxy server. For this purpose, we employ a virtual memory in video poky server. If the video is requested by user, it is loaded in virtual memory first and then, delivered to the user. A video which is loaded in virtual memory is deleted or moved into the storage space of video poxy sewer depending on the request condition. In addition, virtual memory is divided into each segment area in order to store the segments efficiently and to avoid the fragmentation. The simulation results show that the proposed method performs better than other methods in terms of the block hit rate and the number of block deletion.

Elliptic Curve Scalar Multiplication Resistant against Side Channel Attacks (부채널 공격에 안전한 타원곡선 스칼라 곱셈 알고리즘)

  • Kim Tae Hyun;Jang Sang-Woon;Kim Woong Hee;Park Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.125-134
    • /
    • 2004
  • When cryptosystem designers implement devices that computing power or memory is limited such as smart cards, PDAs and so on, not only he/she has to be careful side channel attacks(SCA) but also the cryptographic algorithms within the device has to be efficient using small memory. For this purpose, countermeasures such as Moiler's method, Okeya-Takagi's one and overlapping window method, based on window method to prevent SCA were proposed. However, Moiler's method and Okeya-Talngi's one require additional cost to prevent other SCA such as DPA, Second-Order DPA, Address-DPA, and so on since they are immune to only SPA. Also, overlapping window method has a drawback that requires big memory. In this paper, we analyze existing countermeasures and propose an efficient and secure countermeasure that is immune to all existing SCA using advantages of each countermeasure. Moreover, the proposed countermeasure can enhance the efficiency using mixed coordinate systems.

A Study on Efficient Alarm Code Generation Algorithm in Memory Module Handler (메모리 모듈 핸들러의 효율적인 알람코드 생성에 관한 알고리즘 연구)

  • Kim, Dong-Su;Park, Koo-Rack;Kim, Joon-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.01a
    • /
    • pp.45-46
    • /
    • 2018
  • 메모리 모듈 핸들러가 동작을 할 때에는 정상적인 동작을 주로 하지만, 모터나 실린더 혹은 센서의 오동작으로 인하여 알람이 발생할 때가 있다. 이때 해당 알람에 대한 고유의 알람 코드가 있어야 하며, 기존 방식은 알람을 순서대로 나열하여 작성하거나, 모터나 IO를 기준으로 하여 알람 코드를 작성하였다. 그러나 모터나 IO수가 늘어남에 따라 알람코드를 생성하는 일이 매우 큰 일이 되었다. 또한 작성자에 따라서 일관성도 없어서 알람코드가 추가되지 않은 알람에 대해서는 소스 없이 알람 코드만 보고 어떤 알람인지 판단하기가 어려워져, 알람 발생에 대해 신속한 대응을 할 수가 없게 되었다. 이러한 문제를 해결하기 위해 모터와 IO에 대한 알람은 알람코드에 일정한 규칙을 만들어 신속히 생성하고, 소스에도 바로 추가시킬 수 있으며, 작성자가 다르더라도 일관성 있는 알람 코드가 추가되어 어떤 장비라도 어느 알람인지 알 수 있는 알고리즘을 제안한다.

  • PDF

Constant Time Algorithm for the Window Operation of Linear Quadtrees on RMESH (RMESH구조에서 선형 사진트리의 윈도우 연산을 위한 상수시간 알고리즘)

  • Kim, Kyung-Hoon;Jin, Woon-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.3
    • /
    • pp.134-142
    • /
    • 2002
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The window operation is one of important geometry operations in image processing, which extracts a sub-image indicated by a window in the image. In this paper, we present an algorithm to perform the window operation of binary images represented by quadtrees, using three-dimensional $n{\times}n{\times}n$ processors on RMESH(Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of $n{\times}n{\times}n$ RMESH.

Constant Time Algorithms for Region Expansion and Scaling of Linear Quadtrees on RMESH (RMESH 구조에서 선형 사진트리의 영역 확장과 스케일링을 위한 상수시간 알고리즘)

  • Woo, Jin-Woon
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.173-180
    • /
    • 2004
  • Quadtree, which 11 a hierarchical data structure, is a very important data structure to represent images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related to quadtrees. The region expansion is an operation to expand images by a given distance and the scaling If an operation to scale images by a given scale factor. In this paper, we present algorithms to perform the region expansion and scaling of images represented by quadtrees, using three-dimensional n${\times}$n${\times}$n processors on RMESH(Reconfigurable MESH). These algorithms have constant time complexities by using efficient basic operations to route the locational codes of quadtree on the hierarchical structure of n${\times}$n${\times}$n RMESH.

Constant Time RMESH Algorithm for Linear Translation of Linear Quadtrees (선형 사진트리의 선형이동을 위한 상수시간 RMESH 알고리즘)

  • Kim, Kyung-Hoon;Woo, Jin-Woon
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.207-214
    • /
    • 2003
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The linear translation is one of important operations in image processing, which moves the image by a given distance. In this paper, we present an algorithm to perform the linear translation of binary images represented by quadtrees, using three-dimensional $n{\times}n{\times}n$ processors on RMESH (Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of n${\times}$n${\times}$n RMESH.

A Study on the Speech Recognition Moduleas Design Using HMM Speech Recognition Algorithm (HMM(Hidden Markov Model) 음성인식 알고리즘을 이용한 효율적인 음성인식 모듈 개발 설계에 관한 연구)

  • 김정훈;류홍석;강재명;강성인;이상배
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2002.12a
    • /
    • pp.337-340
    • /
    • 2002
  • 본 논문에서는 휠체어 시스템에 화자 독립 고립단어 인식을 위한 임베디드 시스템 설계에 관한 내용을 서술한다. 실제 환경에서는 잡음이 포함되어 있어 인식률을 저하시키므로, 잡음을 제거하는 방식 중 가장 간단한 방식인 스펙트럼 차감법(Spectral subtraction method)을 사용하여 잡음을 제거했다 전처리 단계에서는 12차 LPC&Cepstrum 방식을 사용했고, 인식 알고리즘은 DHMM (Discrete Hidden Markov Model)을 전반부 인식기로 사용했다. 이 알고리즘을 적용하기 위해서는 데이터 간소화를 위해 벡터양자화(Vector Quantization) 처리가 전제되어야한다 또한 인식알고리즘은 인식률을 향상을 위해 후처리 인식기로 신경망(MLP:Multi-layer Perceptron)을 통해서 인식률을 향상시켰다 화자 독립 시스템에 맞는 인식 단어의 구성은 총 7개단어로 남녀 총 25명 목소리로 구성하였다. 그리고 하드웨어 구성은 32-bits floating point 방식인 TMS320C32를 적용했고, 메모리 부분은 4Mbyte로 설계를 했으며, 메인보드의 설계는 현재 완성 단계에 있다.

Design of an Embedded Linux File System with LZSS Algorithm for the PDA System (LZSS 압축 알고리즘을 적용한 PDA용 Embedded Linux 파일 시스템 설계)

  • Jang Seung-Ju
    • The KIPS Transactions:PartA
    • /
    • v.13A no.2 s.99
    • /
    • pp.95-100
    • /
    • 2006
  • I design an Embedded File System in Linux Operating System by applying modified LZSS compressed algorithm. This suggested Compressed File System which is modified file system of the Linux O.S saves the storage space. The compressed file system supports efficient use of storage space. The suggesting file system solves the small space of embedded system. The suggesting file system of this paper gives effect of the large storage space without extending the storage space.

Development of Network Event Audit Module Using Data Mining (데이터 마이닝을 통한 네트워크 이벤트 감사 모듈 개발)

  • Han, Seak-Jae;Soh, Woo-Young
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2005
  • Network event analysis gives useful information on the network status that helps protect attacks. It involves finding sets of frequently used packet information such as IP addresses and requires real-time processing by its nature. Apriori algorithm used for data mining can be applied to find frequent item sets, but is not suitable for analyzing network events on real-time due to the high usage of CPU and memory and thus low processing speed. This paper develops a network event audit module by applying association rules to network events using a new algorithm instead of Apriori algorithm. Test results show that the application of the new algorithm gives drastically low usage of both CPU and memory for network event analysis compared with existing Apriori algorithm.

  • PDF

Efficient Implementation of the rank Function for Succinct Representation (Succinct 표현을 위한 rank 함수의 효율적인 구현)

  • 김지은;김동규
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.715-717
    • /
    • 2004
  • 컴퓨터 상에서 집합, 트리, 그래프 등의 이산 객체(discrete object)는 메모리 주소와 같은 정수 값으로 표현되어 왔다. Succinct 표현(succinct representation)은 이산 객체를 이진화 하여 표현하는 방법으로, 정수 값으로 표현된 이산객체보다 적은 공간에 저장된다. Succinct 표현의 데이터는 이산 객체의 개별적 저장 위치를 파악하기 위해서rank와 select함수가 기본적으로 필요하다. rant와 select함수를 MBRAM 모델 상에서 O(1)시간에 계산하는 알고리즘이 제시되었다. MBRAM 모델은 비트연산을 unit cost로 수행하는 모델이다. 그러나 범용 컴퓨터는 바이트 단위의 기본 명령어를 제공하므로 비트연산을 unit cost에 수행할 수 없다. 본 논문은 범용 컴퓨터에서 효율적으로 rank함수를 구현하는 방법을 제시한다. rank함수의 효율적인 구현은 FM-index 등의 패턴 검색에 유용하다.

  • PDF