• Title/Summary/Keyword: 컴퓨터응용공학

Search Result 704, Processing Time 0.032 seconds

Fast Computation of DWT and JPEG2000 using GPU (GPU를 이용한 DWT 및 JPEG2000의 고속 연산)

  • Lee, Man-Hee;Park, In-Kyu;Won, Seok-Jin;Cho, Sung-Dae
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.44 no.6
    • /
    • pp.9-15
    • /
    • 2007
  • In this paper, we propose an efficient method for Processing DWT (Discrete Wavelet Transform) on GPU (Graphics Processing Unit). Since the DWT and EBCOT (embedded block coding with optimized truncation) are the most complicated submodules in JPEG2000, we design a high-performance processing framework for performing DWT using the fragment shader of GPU based on the render-to-texture (RTT) architecture. Experimental results show that the performance increases significantly, in which DWT running on modern GPU is more than 10 times faster than on modern CPU. Furthermore, by replacing the DWT part of Jasper which is the JPEG2000 reference software, the overall processing is 2$\sim$16 times faster than the original JasPer. The GPU-driven render-to-texture architecture proposed in this paper can be used in the general image and computer vision processing for high-speed processing.

Development of Optimum Design Program for PPC Structures using DCOC (이산성 연속형 최적성 규준을 이용한 PPC 구조의 최적설계프로그램 개발)

  • 한상훈;조홍동;이상근
    • Computational Structural Engineering
    • /
    • v.10 no.4
    • /
    • pp.315-325
    • /
    • 1997
  • This paper describes the application of discretized continuum-type optimality criteria (DCOC) and the development of optimum design program for the multispan partially prestressed concrete beams. The cost of construction as objective function which includes the costs of concrete, prestressing steel, non-prestressing steel and formwork is minimized. The design constraints include limits on the maximum deflection, flexural and shear strengths, in addition to ductility requirements, and upper and lower bounds on design variables as stipulated by the design Code. Based on Kuhn-Tucker necessary conditions, the optimality criteria are explicitly derived in terms of the design variables-effective depth, eccentricity of prestressing steel and non-prestressing steel ratio. The prestressing profile is prescribed by parabolic functions. The self-weight of the structure is included in the equilibrium equation of the real system, as is the secondary effect resulting from the prestressing force. An iterative procedure and computer program for updating the design variables are developed. Two numerical examples of multispan PPC beams with rectangular cross-section are solved to show the applicability and efficiency of the DCOC-based technique.

  • PDF

Comparative Study of Approximate Optimization Techniques in CAE-Based Structural Design (구조 최적설계를 위한 다양한 근사 최적화기법의 적용 및 비교에 관한 연구)

  • Song, Chang-Yong;Lee, Jong-Soo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1603-1611
    • /
    • 2010
  • The comparative study of regression-model-based approximate optimization techniques used in the strength design of an automotive knuckle component that will be under bump and brake loading conditions is carried out. The design problem is formulated such that the cross-sectional sizing variables are determined by minimizing the weight of the knuckle component that is subjected to stresses, deformations, and vibration frequency constraints. The techniques used in the comparative study are sequential approximate optimization (SAO), sequential two-point diagonal quadratic approximate optimization (STDQAO), and approximate optimization based on enhanced moving least squares method (MLSM), such as CF (constraint feasible)-MLSM and Post-MLSM. Commercial process integration and design optimization (PIDO) tools are utilized for the application of SAO and STDQAO. The enhanced MLSM-based approximate optimization techniques are newly developed to ensure constraint feasibility. The results of the approximate optimization techniques are compared with those of actual non-approximate optimization to evaluate their numerical performances.

Real-Time Camera Tracking for Virtual Stud (가상스튜디오 구현을 위한 실시간 카메라 추적)

  • Park, Seong-Woo;Seo, Yong-Duek;Hong, Ki-Sang
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.7
    • /
    • pp.90-103
    • /
    • 1999
  • In this paper, we present an overall algorithm for real-time camera parameter extraction which is one of key elements in implementing virtual studio. The prevailing mechanical methode for tracking cameras have several disadvantage such as the price, calibration with the camera and operability. To overcome these disadvantages we calculate camera parameters directly from the input image using computer-vision technique. When using zoom lenses, it requires real time calculation of lens distortion. But in Tsai algorithm, adopted for camera calibration, it can be calculated through nonlinear optimization in triple parameter space, which usually takes long computation time. We proposed a new method, separating lens distortion parameter from the other two parameters, so that it is reduced to nonlinear optimization in one parameter space, which can be computed fast enough for real time application.

  • PDF

Numerical Analysis of a Two-Dimensional N-P-N Bipolar Transistor-BIPOLE (2차원 N-P-N 바이폴라 트랜지스터의 수치해석-BIPOLE)

  • 이종화
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.21 no.2
    • /
    • pp.71-82
    • /
    • 1984
  • A programme, called BIPOLE, for the numerical analysis of twotimensional n-p-n bipolar transistors was developed. It has included the SRH and Auger recolnbination processes, the mobility dependence on the impurity density and the electric field, and the band-gap narrowing effect. The finite difference equations of the fundamental semiconductor equations are formulated using Newton's method for Poisson's equation and the divergence theorem for the hole and electron continuity equations without physical restrictions. The matrix of the linearized equations is sparse, symmetric M-matrix. For the solution of the linearized equations ICCG method and Gummel's algorithm have been employed. The programme BIPOLE has been applied to various kinds of the steady-state problems of n-p-n transistors. For the examples of applications the variations of common emitter current gain, emitter and diffusion capacitances, and input and output characteristics are calculated. Three-dimensional representations of some D.C. physical quantities such as potential and charge carrier distributions were displayed. This programme will be used for the nome,rical analysis of the distortion phenom ana of two-dimensional n-p-n transistors. The BIPOLE programme is available for everyone.

  • PDF

A Study on Legal and Regulatory Improvement of Telemedicine Service (원격의료 서비스의 규제개선에 관한 연구)

  • Kwon, Jun Cheol;Choi, Yong Jeon;Jung, Yong Gyu
    • Journal of Service Research and Studies
    • /
    • v.4 no.1
    • /
    • pp.83-93
    • /
    • 2014
  • Telemedicine is performed at a place far away from medical practice with physicians and patients by the means of communication appropriately. It will be identified in general the remote medical service to deliver the medical information and also defined as any action by interactive information communication technology. Medical services can be said to be fused as television, communication, computer, engineering of various technologies of information and communication applications. If doctors can not be reached due to distances away from the patient, Information technologies could be used to get medical information and to give expert advice provided by the system remotely. And it could be used patient care as well as medical administration, medical education, professional advice and consulting. In this paper, we take a look at the legal requirements of telemedicine for improving regulatory in the current law to investigate the matter.

  • PDF

High Level Object Oriented Real-Time Simulation Programming and TMO Scheme (High Level 객체 지향에서 실시간 시뮬레이션 프로그램과 TMO 설계)

  • Song, Sun-Hee;Ra, Sang-Dong
    • The KIPS Transactions:PartA
    • /
    • v.10A no.3
    • /
    • pp.199-206
    • /
    • 2003
  • The object-oriented (OO) distributed real-time (RT) programming movement started in 1990´s and is growing rapidly at this turn of the century. Distributed real-time simulation is a field in its infancy but it is bounded to receive steadily growing recognition for its importance and wide applicability. The scheme is called the distributed time-triggered simulation scheme which is conceptually simple and easy to use but widely applicable. A new generation object oriented (OO) RT programming scheme is called the time-triggered message triggered object(TMO) programming scheme and it is used to make specific illustrations of the issues. The TMO structuring scheme is a general-style components structuring scheme and supports design of all types of component including hard real time objects and non real time objects within one general structure.

Object Replication Methods for High Availability in DHT based P2P Computing System (분산 해쉬 테이블 기반 피어 투 피어 컴퓨팅 시스템에서 가용성 향상 객체 복제 기법)

  • Son, Young-Sung;Jung, Il-Dong;Kim, Kyong-Sok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1535-1543
    • /
    • 2007
  • Recently, there are many researches for P2P network. P2P network technologies are a good solution about making a wide spread distributed computing in the internet environment. The recent algorithms developed by several research groups for the lookup problem present a simple and general interface, a distributed hash table (DHT). In this paper, we also introduce new schemes that enhance the available rate of an object in the MagicSquare network. Replication scheme is to replicate an object with many replicas and save them to several nodes. Fragmentation scheme is to divide an object into several fragments and save them to several nodes. Replicated Fragmentation scheme is to mix replication scheme and fragmentation scheme. We will show result of simulation for our the proposed scheme.

Efficient Multi-Receiver Certificate-Based Encryption Scheme and Its Application (효율적인 인증서기반 다중수신자 암호 기법 및 응용)

  • Sur, Shul;Jung, Chae-Duk;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2271-2279
    • /
    • 2007
  • In this paper, we introduce the notion of certificate-based encryption in multi-receiver environment, which avoids the inherent key escrow problem while preserving the implicit certification in identity-based encryption. We also construct a highly efficient certificate-based encryption scheme for multi-receiver environment, which eliminates pairing computation to encrypt a message for multiple receivers. Moreover, the proposed scheme only needs one pairing computation for decrypting the ciphertext. We compare our scheme with the most efficient identity-based encryption scheme for multi-receiver environment proposed by Baek et.al.[1] in terms of the computational point of view, and show that our scheme provides better efficiency than Baek's scheme. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme based on subset-cover framework.

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.