• 제목/요약/키워드: Chaining

검색결과 177건 처리시간 0.025초

정수선형계획법의 반도체 설계자동화에의 응용 (Application of integer linear programming on VLSI design automation)

  • 백영석;이현찬
    • 한국경영과학회:학술대회논문집
    • /
    • 대한산업공학회/한국경영과학회 1992년도 춘계공동학술대회 발표논문 및 초록집; 울산대학교, 울산; 01월 02일 May 1992
    • /
    • pp.415-424
    • /
    • 1992
  • 본 논문에서는 정수선형계획법을 반도체 설계자동화과정에 이용한 예를 보인다. 반도체 설계자동화과정은 매우 여러 단계를 거치게 되는데, 본 논문에서는 상위수준 합성중 스케쥴링(scheduling)문제에 정수선형계획법을 응용하였다. 여기서 스케쥴링 문제는 설계자동화의 초기단계에서 알고리듬으로 주어진 입력을 하드웨어 요소들로 표현하는 과정에서 매 제어단계(control step)에서 수행하여야 할 연산내용을 결정하는 문제이다. 스케쥴링의 목적함수는 주어진 제어단계 갯수내에서 하드웨어 비용의 최소화이다. 이를 위해 우선 ASAP(As Soon As Possible)과 ALAP(As Late As Possible)방법을 이용하여 매 연산의 수행시작이 가능한 가장 빠른 시간과 가장 늦은 시간을 구한다. 이 두 시간 사이가 각 연산의 time frame이 되며 이를 이용하여 스케쥴링 문제를 정수 선형 계획법으로 공식화하여 풀었다. 이 공식화는 chaining, multicycle연산, pipeline data path, pipeline기능 유닛등에도 일반화하여 적용가능함을 보인다. 실험을 통해 본 공식화 방법이 기존 알고리듬에 의한 해보다 우수한 해를 제공함을 보인다. 비교를 위해 잘 알려진 benchmark회로인 bandpass filter를 이용하였는데 이 회로는 8개의 덧셈, 7개의 뺄셈 및 12개의 곱셈연산을 포함하고 있다. 제시된 알고리듬은 이 회로를 8개의 제어단계내에 총비용 675 (연산별 하드웨어 비용은 라이브러리로 주어짐)로 스케쥴링하였는데 이는 기존의 최상의 결과인 685보다 우수한 결과이다.

  • PDF

군집 드론망을 통한 IoT 서비스를 위한 보안 프레임워크 연구 (A Study on the Security Framework in IoT Services for Unmanned Aerial Vehicle Networks)

  • 신민정;김성운
    • 한국멀티미디어학회논문지
    • /
    • 제21권8호
    • /
    • pp.897-908
    • /
    • 2018
  • In this paper, we propose a security framework for a cluster drones network using the MAVLink (Micro Air Vehicle Link) application protocol based on FANET (Flying Ad-hoc Network), which is composed of ad-hoc networks with multiple drones for IoT services such as remote sensing or disaster monitoring. Here, the drones belonging to the cluster construct a FANET network acting as WTRP (Wireless Token Ring Protocol) MAC protocol. Under this network environment, we propose an efficient algorithm applying the Lightweight Encryption Algorithm (LEA) to the CTR (Counter) operation mode of WPA2 (WiFi Protected Access 2) to encrypt the transmitted data through the MAVLink application. And we study how to apply LEA based on CBC (Cipher Block Chaining) operation mode used in WPA2 for message security tag generation. In addition, a modified Diffie-Hellman key exchange method is approached to generate a new key used for encryption and security tag generation. The proposed method and similar methods are compared and analyzed in terms of efficiency.

규칙처리 표현방식을 이용한 이상 보행용 전문가 시스템의 설계 (A Design of the Expert System for Diagnosis of Abnormal Gait by using Rule-Based Representation)

  • 이응상;이주형;이명호
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 1987년도 전기.전자공학 학술대회 논문집(II)
    • /
    • pp.1329-1332
    • /
    • 1987
  • This paper describes a design of the expert system for diagnosis of abnormal gait patients. This system makes the rule-based representation that can easily extend the knowledge-base and naturally represent the uncertainty, and the inference engine that uses forward chaining which covers the reasoning from the first condition to the goal. The results of inferring various maladies using this system are as follows: 1) In cases of progressive muscular dystrophy, cerebral vascular accident, peripheral neuropathic lesion and peroneal nerve injury, the result of inference is the same as that of medical specialists' with 100% accuracy. 2) In cases of Neuritis, Paralysis agitan and Brain tumor, the accuracy of inference is less than 50% compared to that of medical specialists. With above results, we decide that the rule-based representations of some maladies ard accurate relatively, but that the correction and the extention of some rules and some methods of problem solving are required in order to construct the complete expert system for diagnosis of abnormal gait patients.

  • PDF

가중증상모델과 패턴매칭을 이용한 화학공정의 이상진단 (Fault diagnosis for chemical processes using weighted symptom model and pattern matching)

  • 오영석;모경주;윤종한;윤인섭
    • 제어로봇시스템학회논문지
    • /
    • 제3권5호
    • /
    • pp.520-525
    • /
    • 1997
  • This paper presents a fault detection and diagnosis methodology based on weighted symptom model and pattern matching between the coming fault propagation trend and the simulated one. In the first step, backward chaining is used to find the possible cause candidates for the faults. The weighted symptom model is used to generate those candidates. The weight is determined from dynamic simulation. Using WSM, the methodology can generate the cause candidates and rank them according to the probability. Second, the fault propagation trends identified from the partial or complete sequence of measurements are compared with the standard fault propagation trends stored a priori. A pattern matching algorithm based on a number of triangular episodes is used to effectively match those trends. The standard trends have been generated using dynamic simulation and stored a priori. The proposed methodology has been illustrated using two case studies, and the results showed satisfactory diagnostic resolution.

  • PDF

양돈농장 경영관리 프로그램 개발 (Software Development for Pig Production and Management)

  • 최영찬;최상호
    • 농촌지도와개발
    • /
    • 제4권1호
    • /
    • pp.97-120
    • /
    • 1997
  • This study intends to develop a computer software for an efficient swineherd production and management. Current softwares are concerned on the sow management and ignore the actual farm environment. This study focuses on the farm environment in developing the software and covers the production management financial management, marketing management, and business planning for swineherd farm. The FSR(Farming Systems Research) analysis and interview survey aye applied to collect the data for the system planning, farmer's demand and analysis on the system, system design and program development. The systems are designed to meet the needs for the progressive swineherd farmers. Visual FoxPro 5.1 is used to develop the system. The developed system includes pig farm financial records keeping and management, pig farm production management program, pig farm marketing management program, and pig farm business diagnosis and planning program to meet the scope of the study. The weekly maintenance records and financial records are adopted for the input interface since most of farmers use their computer less than 5 hours a week. Pulldown Menu systems are adopted and designed for easy use by structuring to meet the pig farm and system demands. The manu system allocates the input-output screen based on the sectors, scopes, users, frequencies, importances, and the usages of the information. The GUI(Graphic User Interface) method is used to develop input-output screens for easy use. Backward Chaining mechanism fo the Expert System is used in the diagnosis of the pig farm management and the Systems Simulators Approach is used in the pig farm management planning.

  • PDF

SPCBC: A Secure Parallel Cipher Block Chaining Mode of Operation based on logistic Chaotic Map

  • El-Semary, Aly M.;Azim, Mohamed Mostafa A.;Diab, Hossam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권7호
    • /
    • pp.3608-3628
    • /
    • 2017
  • Several block cipher modes of operation have been proposed in the literature to protect sensitive information. However, different security analysis models have been presented for attacking them. The analysis indicated that most of the current modes of operation are vulnerable to several attacks such as known plaintext and chosen plaintext/cipher-text attacks. Therefore, this paper proposes a secure block cipher mode of operation to thwart such attacks. In general, the proposed mode combines one-time chain keys with each plaintext before its encryption. The challenge of the proposed mode is the generation of the chain keys. The proposed mode employs the logistic map together with a nonce to dynamically generate a unique set of chain keys for every plaintext. Utilizing the logistic map assures the dynamic behavior while employing the nonce guarantees the uniqueness of the chain keys even if the same message is encrypted again. In this way, the proposed mode called SPCBC can resist the most powerful attacks including the known plaintext and chosen plaintext/cipher-text attacks. In addition, the SPCBC mode improves encryption time performance through supporting parallelized implementation. Finally, the security analysis and experimental results demonstrate that the proposed mode is robust compared to the current modes of operation.

HIERARCHICAL CLUSTER ANALYSIS by arboART NEURAL NETWORKS and its APPLICATION to KANSEI EVALUATION DATA ANALYSIS

  • Ishihara, Shigekazu;Ishihara, Keiko;Nagamachi, Mitsuo
    • 한국감성과학회:학술대회논문집
    • /
    • 한국감성과학회 2002년도 춘계학술대회 논문집
    • /
    • pp.195-200
    • /
    • 2002
  • ART (Adaptive Resonance Theory [1]) neural network and its variations perform non-hierarchical clustering by unsupervised learning. We propose a scheme "arboART" for hierarchical clustering by using several ART1.5-SSS networks. It classifies multidimensional vectors as a cluster tree, and finds features of clusters. The Basic idea of arboART is to use the prototype formed in an ART network as an input to other ART network that has looser distance criteria (Ishihara, et al., [2,3]). By sending prototype vectors made by ART to one after another, many small categories are combined into larger and more generalized categories. We can draw a dendrogram using classification records of sample and categories. We have confirmed its ability using standard test data commonly used in pattern recognition community. The clustering result is better than traditional computing methods, on separation of outliers, smaller error (diameter) of clusters and causes no chaining. This methodology is applied to Kansei evaluation experiment data analysis.

  • PDF

A Lightweight Integrity Authentication Scheme based on Reversible Watermark for Wireless Body Area Networks

  • Liu, Xiyao;Ge, Yu;Zhu, Yuesheng;Wu, Dajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권12호
    • /
    • pp.4643-4660
    • /
    • 2014
  • Integrity authentication of biometric data in Wireless Body Area Network (WBAN) is a critical issue because the sensitive data transmitted over broadcast wireless channels could be attacked easily. However, traditional cryptograph-based integrity authentication schemes are not suitable for WBAN as they consume much computational resource on the sensor nodes with limited memory, computational capability and power. To address this problem, a novel lightweight integrity authentication scheme based on reversible watermark is proposed for WBAN and implemented on a TinyOS-based WBAN test bed in this paper. In the proposed scheme, the data is divided into groups with a fixed size to improve grouping efficiency; the histogram shifting technique is adopted to avoid possible underflow or overflow; local maps are generated to restore the shifted data; and the watermarks are generated and embedded in a chaining way for integrity authentication. Our analytic and experimental results demonstrate that the integrity of biometric data can be reliably authenticated with low cost, and the data can be entirely recovered for healthcare applications by using our proposed scheme.

시간 제약 조건 하에서의 모듈 선택 재사용을 위한 전력 감소 스케줄링 (Reducing Power Consumption of a Scheduling for Reuse Module Selection under the Time Constraint)

  • 최지영;김희석
    • 한국통신학회논문지
    • /
    • 제29권3A호
    • /
    • pp.318-323
    • /
    • 2004
  • 본 논문은 시간 제약 조건 하에서의 모듈 선택 재사용을 이용한 전력 감소 스케줄링을 제안한다. 일반적인 상위 수준 합성에서의 스케줄링은 실제적인 라이브러리의 복잡한 재사용을 허용하지 않는다. 반면 제안한 전력 감소 스케줄링에서는 주어진 사용자 정의 모듈을 실제적인 RT 라이브러리 모듈 재사용과 공유된 자원에서의 스위치 활동의 자원 공유함으로써 설계의 생산성 및 소비 전력을 줄이는데 효율적으로 접근할 수 있다. 또한 비교 실험에서 스케줄링 기법인 체이닝과 멀티사이클링을 이용해 다양한 상위 레벨 벤치마크의 환경에서 최적의 스케줄링의 결과를 얻는다.

블록 암호 연산 모드 RBF(Random Block Feedback)의 알려진/선택 평문 공격에 대한 안전성 비교 분석 (Safety Comparison Analysis Against Known/Chosen Plaintext Attack of RBF (Random Block Feedback) Mode to Other Block Cipher Modes of Operation)

  • 김윤정;이강
    • 한국통신학회논문지
    • /
    • 제39B권5호
    • /
    • pp.317-322
    • /
    • 2014
  • 데이타 보안과 무결성은 유무선 통신 환경에서 데이터 전송 시에 중요한 요소이다. 대량의 데이터는 전송 전에, 통상 암호 연산 모드를 이용한 블록 암호 알고리즘에 의하여 암호화된다. ECB, CBC 등의 기존 연산 모드 외에 블록 암호 연산 모드로 RBF 모드가 제안된 바 있다. 본 논문에서는, 알려진 평문 공격 (known plaintext attack) 및 선택 평문 공격 (chosen plaintext attack)에 대한, RBF 모드의 안전성을 기존 모드들과 비교 분석한 내용을 소개한다. 분석 결과, 기존의 연산 모드들이 알려진/선택 평문 공격에 취약한데 반하여, RBF 모드는 이들 공격에 안전함을 알 수 있었다.