• Title/Summary/Keyword: 컴퓨터 코드 최적화

Search Result 75, Processing Time 0.03 seconds

Side-Channel Attack Trends of Code-based PQC Algorithm for Hardware Acceleration of MEDS (코드 기반 양자 내성 암호 MEDS 알고리즘의 하드웨어 가속을 위한 부채널 공격 연구 동향 분석)

  • Yunji Lee;Yongseok Lee;Yunheung Paek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.367-370
    • /
    • 2024
  • 양자컴퓨터 시대가 눈앞에 도래한 지금 차세대 암호로 주목받고 있는 양자 내성 암호는 다양한 수학적 알고리즘에 안전성을 기반하고 있으나 이 안전성을 위협하는 대표적인 공격 기법 중 하나인 부채널 분석 공격에 대응하기 위한 노력들이 계속되어 왔다. 이 논문에서는 코드 기반 양자 내성 암호를 중심으로 알고리즘에 위협적인 부채널 분석 공격에 대한 연구 동향을 분석하였다. 그리고 NIST 에서 PQC 표준화를 위해 Round 를 진행 중인 후보 중 하나인 코드 기반 알고리즘 MEDS 에 대해 소개하고, MEDS 알고리즘의 최적화를 위해 기존에 연구되었던 코드 기반 암호에 대한 부채널 분석 공격 대응 측면에서의 알고리즘의 안전성 확보라는 보안 비용과 하드웨어 가속 등을 통한 성능 향상이 적절한 조화를 이룰 수 있도록 설계하기 위한 방안에 대해 알아보았다.

A Real Code Genetic Algorithm for Optimum Design (실수형 Genetic-Algorithm에 의한 최적 설계)

  • 양영순;김기화
    • Computational Structural Engineering
    • /
    • v.8 no.2
    • /
    • pp.123-132
    • /
    • 1995
  • Genetic Algorithms(GA), which are based on the theory of natural evolution, have been evaluated highly for their robust performances. Traditional GA has mostly used binary code for representing design variable. The binary code GA has many difficulties to solve optimization problems with continuous design variables because of its large computer core memory size, inefficiency of its computing time, and its bad performance on local search. In this paper, a real code GA is proposed for dealing with the above problems. So, new crossover and mutation processes of GA are developed to use continuous design variables directly. The results of read code GA are compared with those of binary code GA for several single and multiple objective optimization problems. As a result of comparisons, it is found that the performance of the real code GA is better than that of the binary code GA, and concluded that the real code GA developed here can be used for the general optimization problem.

  • PDF

Joint Optimization of Source Codebooks and Channel Modulation Signal for AWGN Channels (AWGN 채널에서 VQ 부호책과 직교 진폭변조신호 좌표의 공동 최적화)

  • 한종기;박준현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.580-593
    • /
    • 2003
  • A joint design scheme has been proposed to optimize the source encoder and the modulation signal constellation based on the minimization of the end-to-end distortion including both the quantization error and channel distortion. The proposed scheme first optimizes the VQ codebook for a fixed modulation signal set, and then the modulation signals for the fixed VQ codebook. These two steps are iteratively repeated until they reach a local optimum solution. It has been shown that the performance of the proposed system can be enhanced by employing a new efficient mapping scheme between codevectors and modulation signals. Simulation results show that a jointly optimized system based on the proposed algorithms outperforms the conventional system based on a conventional QAM modulation signal set and the VQ codebook designed for a noiseless channel.

Code Visualization Approach for Low level Power Improvement via Identifying Performance Dissipation (성능 저하 식별을 통한 저전력 개선용 코드 가시화 방법)

  • An, Hyun Sik;Park, Bokyung;Kim, R.Young Chul;Kim, Ki Du
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.10
    • /
    • pp.213-220
    • /
    • 2020
  • The power consumption and performance of hardware-based mobile and IoT embedded systems that require high specifications are one of the important issues of these systems. In particular, the problem of excessive power consumption is because it causes a problem of increasing heat generation and shortening the life of the device. In addition, in the same environment, software also needs to perform stable operation in limited power and memory, thereby increasing power consumption of the device. In order to solve these issues, we propose a Low level power improvement via identifying performance dissipation. The proposed method identifies complex modules (especially Cyclomatic complexity, Coupling & Cohesion) through code visualization, and helps to simplify low power code patterning and performance code. Therefore, through this method, it is possible to optimize the quality of the code by reducing power consumption and improving performance.

Bag-of-Words Scene Classification based on Supervised K-means Clustering (장면 분류를 위한 클래스 기반 클러스터링)

  • Kim, Junhyung;Ryu, Seungchul;Kim, Seungryong;Sohn, Kwanghoon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2013.06a
    • /
    • pp.248-251
    • /
    • 2013
  • 컴퓨터 비전에서 BoW를 이용한 장면 분류 기법에 대한 연구가 활발히 진행되고 있다. BoW 기법의 장면 분류는 K-means 클러스터링을 통하여 코드북을 생성하는 과정에서 트레이닝 이미지의 클래스 정보를 활용하지 않기 때문에 성능이 제한적이라는 문제점을 가지고 있다. 본 논문에서는 BoW를 이용한 장면 분류 과정에서 코드북 생성을 위하여 각각 특징 기술자들의 유클리디안 거리뿐만이 아니라 클래스 확률 밀도 함수들의 히스토그램 교차값을 최소화 하는 최적화 K-means 클러스터링 기법을 제안한다. 장면의 SIFT 특징 기술자 정보뿐만 아니라 장면이 속해있는 클래스 정보를 결합하여 클러스터링을 수행함으로써 장면 분류의 정확도를 높일 수 있다. 장면 분류 정확도 실험에서 제안하는 클러스터링을 사용한 BoW 장면 분류 기법은 기존의 K-means을 사용한 BoW 장면 분류 기법보다 높은 정확도를 보여준다.

  • PDF

Early Null Pointer Check using Predication in Java Just-In-Time Compilation (자바 적시 컴파일에서의 조건 수행을 이용한 비어 있는 포인터의 조기검사)

  • Lee Sanggyu;Choi Hyug-Kyu;Moon Soo-Mook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.7
    • /
    • pp.683-692
    • /
    • 2005
  • Java specification states that all accesses to an object must be checked at runtime if object refers to null. Since Java is an object-oriented language, object accesses are frequent enough to make null pointer checks affect the performance significantly. In order to reduce the performance degradation, there have been attempts to remove redundant null pointer checks. For example, in a Java environment where a just-in-time (JIT) compiler is used, the JIT compiler removes redundant null pointer check code via code analysis. This paper proposes a technique to remove additional null pointer check code that could not be removed by previous JIT compilation techniques, via early null pointer check using an architectural feature called predication. Generally, null point check code consists of two instructions: a compare and a branch. Our idea is moving the compare instruction that is usually located just before an use of an object, to the point right after the object is defined so that the total number of compare instructions is reduced. This results in reduction of dynamic and static compare instructions by 3.21$\%$ and 1.98$\%$. respectively, in SPECjvm98 bechmarks, compared to the code that has already been optimized by previous null pointer check elimination techniques. Its performance impact on an Itanium machine is an improvement of 0.32$\%$.

구조최적화의 과거, 현재, 미래

  • 조효남
    • Computational Structural Engineering
    • /
    • v.7 no.3
    • /
    • pp.4-15
    • /
    • 1994
  • 현재 구조최적화는 아직도 실무설계에서 제 위상을 찾지 못하고 있다. 그 원인은 주로 지금까지의 대부분의 연구가 알고리즘 위주로, 교과서적 예제위주로 치달았기 때문이며 따라서 오늘날과 같은 고도의 전산화시대에도 실무설계자들에게 외면당하고 있는 실정이다. 앞으로 구조최적화 분야의 전문가들이 실무설계문제 응용위주의 연구개발에 주력함으로써 이러한 문제는 쉽게 극복될 것이며, 실무설계자들도 최적설계가 무엇인지 제대로 알지도 못하면서 외면만 하고 매도만 할 것이 아니라, 오늘날 멀티미디어 초고성능 PC시대에 막대한 정보 및 자료의 처리능력을 갖춘 CD롬과 고성능 통신기능, 고도의 음성, 문자, 영상인식 Input Media, 그리고 윈도우, 펜티엄 같은 현재의 OS와 OS/2, 시카고 같은 차세대 OS체계 하에서 고도의 CAD/CAD Expert 시스템이 실용화 되려면 최적설계는 재래적인 설게방법을 대치하는 시스템 내의 핵심설계코드가 되지 않을 수 없다는 점을 인식해야 할 것이다. 어차피 가까운 장래에 현재의 이론과 응용사이의 lAG와 실무설계자들의 오해가 해소되는 날이 오면 최적설계는 지금의 MPC시대는 물론 인공지능형, 사고형 차세대 컴퓨터 시대에 적합한 현대적인 구조설계법이 될 것임을 확신하는 바이다.

  • PDF

Comparative Study of Approximate Optimization Techniques in CAE-Based Structural Design (구조 최적설계를 위한 다양한 근사 최적화기법의 적용 및 비교에 관한 연구)

  • Song, Chang-Yong;Lee, Jong-Soo
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.34 no.11
    • /
    • pp.1603-1611
    • /
    • 2010
  • The comparative study of regression-model-based approximate optimization techniques used in the strength design of an automotive knuckle component that will be under bump and brake loading conditions is carried out. The design problem is formulated such that the cross-sectional sizing variables are determined by minimizing the weight of the knuckle component that is subjected to stresses, deformations, and vibration frequency constraints. The techniques used in the comparative study are sequential approximate optimization (SAO), sequential two-point diagonal quadratic approximate optimization (STDQAO), and approximate optimization based on enhanced moving least squares method (MLSM), such as CF (constraint feasible)-MLSM and Post-MLSM. Commercial process integration and design optimization (PIDO) tools are utilized for the application of SAO and STDQAO. The enhanced MLSM-based approximate optimization techniques are newly developed to ensure constraint feasibility. The results of the approximate optimization techniques are compared with those of actual non-approximate optimization to evaluate their numerical performances.

Performance of Multiuser Detector Based on Radial Basis Function for DS-CDMA Power Line Communication Systems (DS-CDMA 기반 전력선 통신 시스템을 위한 방사형 기저 함수를 이용하는 다중 사용자 검출기의 성능)

  • Hwang, Yu Min;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.1
    • /
    • pp.1-5
    • /
    • 2017
  • In this paper, multiuser detector (MUD) based on radial basis function (RBF) is proposed and simulated for a multicode direct sequence/code division multiple access (DS/CDMA) system in a multipath fading channel. The performance of RBF-based MUD is compared with that of many suboptimal multiuser detectors in terms of bit error probability. From the simulation results, it is confirmed that the RBF-based MUD outperforms decorrelating detector, and achieves near-optimum performance under various environments. The results in this paper can be applied to design of MUD for a multicode DS/CDMA system.

Extracting Scheme of Compiler Information using Convolutional Neural Networks in Stripped Binaries (스트립 바이너리에서 합성곱 신경망을 이용한 컴파일러 정보 추출 기법)

  • Lee, Jungsoo;Choi, Hyunwoong;Heo, Junyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.25-29
    • /
    • 2021
  • The strip binary is a binary from which debug symbol information has been deleted, and therefore it is difficult to analyze the binary through techniques such as reverse engineering. Traditional binary analysis tools rely on debug symbolic information to analyze binaries, making it difficult to detect or analyze malicious code with features of these strip binaries. In order to solve this problem, the need for a technology capable of effectively extracting the information of the strip binary has emerged. In this paper, focusing on the fact that the byte code of the binary file is generated very differently depending on compiler version, optimazer level, etc. For effective compiler version extraction, the entire byte code is read and imaged as the target of the stripped binaries and this is applied to the convolution neural network. Finally, we achieve an accuracy of 93.5%, and we provide an opportunity to analyze stripped binary more effectively than before.