• 제목/요약/키워드: 연산력

검색결과 254건 처리시간 0.027초

Efficient Small Write Method for DDR-SSD based Software RAID (DDR-SSD를 위한 소프트웨어 RAID의 효과적인 작은 쓰기 처리 기법)

  • Khil, Ki-Jeong;Kwak, Dong-Ho;Kwak, Yun-Sik;Cheong, Seung-Kook;Hwang, Jung-Yeon;Choi, Kil-Seong;Song, Seok-Il
    • Journal of Advanced Navigation Technology
    • /
    • 제14권5호
    • /
    • pp.752-759
    • /
    • 2010
  • In this paper, we propose differential-logging method to improve the performance of RMW(Read Modify Write) operations of DDR-SSD based software RAID. Small writes that are frequently occurred in enterprise applications are main factor to degrade the performance of RAID5. Once a block is updated in RAID5, the parity block of the block must be updated to maintain consistency of parity. Therefore, to process a small write request, we need to read its parity block stored in disk, read old data, perform XOR operation, and write updated data and parity block. Several methods for hard disk based software RAID are proposed to solve the small write problems in RAID 5. Ln this paper, we propose a differential-logging method which carefully considers the DDR-SSD to solve the small write problem in RAID 5. We show that our proposed method out performs the existing software RAID in LINUX through simulations.

A Recommender System Model Combining Collaborative filtering and SOM Neural Networks (협동적 필터링과 SOM 신경망을 결합한 추천시스템 모델)

  • Lee, Mi-Hee;Woo, Young-Tae
    • Journal of Korea Multimedia Society
    • /
    • 제11권9호
    • /
    • pp.1213-1226
    • /
    • 2008
  • A recommender system supports people in making recommendations finding a set of people who are likely to provide good recommendations for a given person, or deriving recommendations from implicit behavior such as browsing activity, buying patterns, and time on task. We proposed new recommender system which combined SOM(Self-Organizing Map) neural networks with the Collaborative filtering which most recommender systems hat applied First, we segmented user groups according to demographic characteristics and then we trained the SOM with people's preferences as ito inputs. Finally we applied the classic collaborative filtering to the clustering with similarity in which an recommendation seeker belonged to, and therefore we didn't have to apply the collaborative filtering to the whose data set. Experiments were run for EachMovies data set. The results indicated that the predictive accuracy was increased in terms of MAE(Mean-Absolute-Error).

  • PDF

WEC-Sim: A Simulator for Optimum Management of Wastewater Treatment Plant (WEC-Sim : 하수처리장 최적 운영을 위한 시뮬레이터)

  • Lee, Sung-Koo;Ahn, Sae-Young
    • Journal of Digital Contents Society
    • /
    • 제11권4호
    • /
    • pp.463-471
    • /
    • 2010
  • In the management of a wastewater treatment plant which is a combination system of physical, chemical, and biological processes, computer simulator is an indispensable part for analysis of the operation status and evaluation of the treatment performance due to its fast computing speed. As an application software carrying out the data input-output operations and the mathematical calculations of the models, simulator is to be a powerful tool for estimating the treatment reaction and calculating mass balance of substrates, microorganisms, and chemicals within the treatment system in a given condition. Qualitative and quantitative prediction of treatment performance provides the plant manager with validity of decision-making through implementing modeling and simulation as a role of knowledge-based expert system in charge of automation and control. This paper shows the proceeding of design and development of the "WEC-Sim" software which is owned the various functions of data acquisition, monitoring, simulation, and control.

Performance and Power Consumption Improvement of Embedded RISC Core (임베디드 RISC 코어의 성능 및 전력 개선)

  • Jung, Hong-Kyun;Ryoo, Kwang-Ki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제14권2호
    • /
    • pp.453-461
    • /
    • 2010
  • This paper presents a branch prediction algorithm and a 4-way set-associative cache for performance improvement of embedded RISC core and a clock-gating algorithm using ODC (Observability Don't Care) operation to improve the power consumption of the core. The branch prediction algorithm has a structure using BTB(Branch Target Buffer) and 4-way set associative cache has lower miss rate than direct-mapped cache. Pseudo-LRU Policy, which is one of the Line Replacement Policies, is used for decreasing the number of bits that store LRU value. The clock gating algorithm reduces dynamic power consumption. As a result of estimation of performance and dynamic power, the performance of the OpenRISC core applied the proposed architecture is improved about 29% and dynamic power of the core using Chartered $0.18{\mu}m$ technology library is reduced by 16%.

An Implementation of Efficient M-tree based Indexing on Flash-Memory Storage System (플래시 메모리 저장장치에서 효율적인 M-트리 기반의 인덱싱 구현)

  • Yu, Jeong-Soo;Nang, Jong-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제16권1호
    • /
    • pp.70-74
    • /
    • 2010
  • As the storage capacity of the flash memories increased portable devices began to store mass amount of multimedia data on flash memory. Therefore, there has been a need for an effective data management scheme by indexing structure. Among many indexing schemes, M-tree is well known for it's suitability for multimedia data with high dimensional matrix space. Since flash memories have writing operation restriction, there is a performance limitation in indexing scheme with frequent write operation. In this paper, a new node split method with reduced write operation for m-tree indexing scheme in flash memory is proposed. According to experiments the proposed method reduced the write operation to about 7% of the original method. The proposed method will effectively construct an indexing structure for multimedia data in flash memories.

A Dualistic Development in Korean Industrialization (한국 산업화의 이중구조)

  • Lee, Jai Min
    • International Area Studies Review
    • /
    • 제16권3호
    • /
    • pp.27-51
    • /
    • 2012
  • Among the hypotheses regarding the internal process of industrialization, the debates about 'labor-surplus' model have been intensive. The basic idea of this neoclassical theory is that industrial development is brought about by the transfer of the unlimited cheap labor to the modern sector, and thus, under the labor-surplus situation labor-using technologies should be used for industrialization. Fei and Rannis attempted to confirm this theory by applying it to the Japanese economy. The purpose of this paper is to study whether the theory can be applied to Korean economic development. The neoclassical dualistic model which was designed by Kelly and Williamson was utilized. Simulating Korea's major economic variables for the period of 1965-1992 by using computable general equilibrium (CGE) model, we found that there are significant differentials between the simulation and the actual data. It suggests that Korea's economic development has not followed the neoclassical path -- creation of comparative advantage on the basis of market force.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • 제19권2호
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

Authentication and Key Agreement Protocol based on NTRU in the Mobile Communication (NTRU기반의 이동 통신에서의 인증 및 키 합의 프로토콜)

  • 박현미;강상승;최영근;김순자
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제12권3호
    • /
    • pp.49-59
    • /
    • 2002
  • As the electronic commerce increases rapidly in the mobile communication, security issues become more important. A suitable authentication and key agreement for the mobile communication environment is a essential condition. Some protocols based on the public key cryptosystem such as Diffie-Hellman, EIGamal etc. were adapted in the mobile communication. But these protocols that are based on the difficult mathematical problem in the algebra, are so slow and have long key-length. Therefore, these have many limitation to apply to the mobile communication. In this paper, we propose an authentication and key agreement protocol based on NTRU to overcome the restriction of the mobile communication environment such as limited sources. low computational fewer, and narrow bandwidth. The proposed protocol is faster than other protocols based on ECC, because of addition and shift operation with small numbers in the truncated polynomial ring. And it is as secure as other existent mathematical problem because it is based on finding the Shortest or Closest Vector Problem(SVP/CVP).

Implications for Memory Reference Analysis and System Design to Execute AI Workloads in Personal Mobile Environments (개인용 모바일 환경의 AI 워크로드 수행을 위한 메모리 참조 분석 및 시스템 설계 방안)

  • Seokmin Kwon;Hyokyung Bahn
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제24권1호
    • /
    • pp.31-36
    • /
    • 2024
  • Recently, mobile apps that utilize AI technologies are increasing. In the personal mobile environment, performance degradation may occur during the training phase of large AI workload due to limitations in memory capacity. In this paper, we extract memory reference traces of AI workloads and analyze their characteristics. From this analysis, we observe that AI workloads can cause frequent storage access due to weak temporal locality and irregular popularity bias during memory write operations, which can degrade the performance of mobile devices. Based on this observation, we discuss ways to efficiently manage memory write operations of AI workloads using persistent memory-based swap devices. Through simulation experiments, we show that the system architecture proposed in this paper can improve the I/O time of mobile systems by more than 80%.

Seismic Data Processing Using BERT-Based Pretraining: Comparison of Shotgather Arrays (BERT 기반 사전학습을 이용한 탄성파 자료처리: 송신원 모음 배열 비교)

  • Youngjae Shin
    • Geophysics and Geophysical Exploration
    • /
    • 제27권3호
    • /
    • pp.171-180
    • /
    • 2024
  • The processing of seismic data involves analyzing earthquake wave data to understand the internal structure and characteristics of the Earth, which requires high computational power. Recently, machine learning (ML) techniques have been introduced to address these challenges and have been utilized in various tasks such as noise reduction and velocity model construction. However, most studies have focused on specific seismic data processing tasks, limiting the full utilization of similar features and structures inherent in the datasets. In this study, we compared the efficacy of using receiver-wise time-series data ("receiver array") and synchronized receiver signals ("time array") from shotgathers for pretraining a Bidirectional Encoder Representations from Transformers (BERT) model. To this end, shotgather data generated from a synthetic model containing faults was used to perform noise reduction, velocity prediction, and fault detection tasks. In the task of random noise reduction, both the receiver and time arrays showed good performance. However, for tasks requiring the identification of spatial distributions, such as velocity estimation and fault detection, the results from the time array were superior.