• 제목/요약/키워드: Computing Power

검색결과 1,378건 처리시간 0.027초

A GPU-based point kernel gamma dose rate computing code for virtual simulation in radiation-controlled area

  • Zhihui Xu;Mengkun Li;Bowen Zou;Ming Yang
    • Nuclear Engineering and Technology
    • /
    • 제55권6호
    • /
    • pp.1966-1973
    • /
    • 2023
  • Virtual reality technology has been widely used in the field of nuclear and radiation safety, dose rate computing in virtual environment is essential for optimizing radiation protection and planning the work in radioactive-controlled area. Because the CPU-based gamma dose rate computing takes up a large amount of time and computing power for voxelization of volumetric radioactive source, it is inefficient and limited in its applied scope. This study is to develop an efficient gamma dose rate computing code and apply into fast virtual simulation. To improve the computing efficiency of the point kernel algorithm in the reference (Li et al., 2020), we design a GPU-based computing framework for taking full advantage of computing power of virtual engine, propose a novel voxelization algorithm of volumetric radioactive source. According to the framework, we develop the GPPK(GPU-based point kernel gamma dose rate computing) code using GPU programming, to realize the fast dose rate computing in virtual world. The test results show that the GPPK code is play and plug for different scenarios of virtual simulation, has a better performance than CPU-based gamma dose rate computing code, especially on the voxelization of three-dimensional (3D) model. The accuracy of dose rates from the proposed method is in the acceptable range.

오픈 소스 엣지 컴퓨팅 플랫폼 분석: 구조, 특징, 비교 (Analysis of Open Source Edge Computing Platforms: Architecture, Features, and Comparison)

  • 임헌국;이희진
    • 한국정보통신학회논문지
    • /
    • 제24권8호
    • /
    • pp.985-992
    • /
    • 2020
  • 엣지 컴퓨팅은 데이터를 처리하고 연산하는 곳이 멀리 떨어진 데이터센터에 있는 게 아니라, 단말 장치 혹은 게이트웨이와 같은 엑세스 포인트에 가까운 엣지 사이드에 컴퓨팅 능력 및 데이터 처리 능력을 부가함으로써 저지연/초고속컴퓨팅의 실현을 가능케 한다. 이러한 엣지 컴퓨팅의 종류로는 Mobile edge computing, Fog computing, Cloudlet computing이 있으며, 본 논문에서는 엣지 컴퓨팅을 실제 구현/구축하기 위해 현존하는 오픈 소스 플랫폼들에 대해 초점을 맞추고 분석한다. 각 오픈 소스 엣지 플랫폼에 대해 구조 및 특징들을 체계적으로 묘사하고 비교 분석함으로써 오픈 소스 엣지 플랫폼을 이용하여 실제 엣지 노드를 구축 하고자 하는 산업계 엔지니어들에게 사용 사례에 부합한 최선의 엣지 플랫폼을 선택 할 수 있도록 하나의 제반 지식을 제공하고자 한다.

Undergraduate Power Electronics Laboratory - Applying TSMST Method

  • Jakopovic, Zeljko;Sunde, Viktor;Benci, Zvonko
    • Journal of Power Electronics
    • /
    • 제10권6호
    • /
    • pp.621-627
    • /
    • 2010
  • This paper presents a TSMST (Theory - Simulation - Measurement - Simulation - Theory) method for power electronics laboratory. The method successfully integrates theory, simulation and measurement, thus enabling better integration of student's knowledge and better usage of inadequate number of laboratory hours. Students are attracted with relatively simple tasks to be solved and modern, but economical laboratory equipment. A significant part of the assignments can be made at home, thus lowering the pressure on students to finish the tasks on time. The proposed method is described on three basic examples explaining characteristic phases of the TSMST method.

커뮤니티 컴퓨팅 환경에서의 멤버 생존시간 최적화 알고리즘 연구 (Study on the Optimization Algorithm for Member Lifetime in Community Computing Environments)

  • 김기영;박혜성;노경우;김석윤
    • 전기학회논문지
    • /
    • 제57권7호
    • /
    • pp.1273-1278
    • /
    • 2008
  • In community computing environments, various members cooperate with each other systematically for attaining each community's goals. Because community computing environments are organized on the basis of PAN (Personal Area Network), each member commonly uses the power of batteries. If one member in community uses up the power of battery and does not operate normally, the community will not be able to provide the ultimate service goals for its users and be terminated finally. Therefore, it is necessary for accurate community operation to prevent a specific member's lifetime from terminating, as checking each member's power consumption in real-time. In this paper, we propose WEL (WEighted Leach) algorithm for optimizing lifetime of the members in community.

Tunneling Field-Effect Transistors for Neuromorphic Applications

  • Lee, Jang Woo;Woo, Jae Seung;Choi, Woo Young
    • Journal of Semiconductor Engineering
    • /
    • 제2권3호
    • /
    • pp.142-153
    • /
    • 2021
  • Recent research on synaptic devices has been reviewed from the perspective of hardware-based neuromorphic computing. In addition, the backgrounds of neuromorphic computing and two training methods for hardware-based neuromorphic computing are described in detail. Moreover, two types of memristor- and CMOS-based synaptic devices were compared in terms of both the required performance metrics and low-power applications. Based on a review of recent studies, additional power-scalable synaptic devices such as tunnel field-effect transistors are suggested for a plausible candidate for neuromorphic applications.

AMI의 보안 취약성 및 기술 현황 (Security Vulnerability and Technology Status of AMI)

  • 조한성;이용구;정상인;최진호
    • KEPCO Journal on Electric Power and Energy
    • /
    • 제3권2호
    • /
    • pp.73-78
    • /
    • 2017
  • 최근 국내의 한전을 비롯한 해외 여러 전력회사에서 스마트 그리드라는 개념의 전력망 구축을 위한 활동이 활발하게 이루어지고 있다. 스마트 그리드는 전력망에 정보통신망을 융합하여 전력의 효율성을 증대시키는 기술로, 전력 사업자와 소비자가 양방향 통신을 통해 에너지 효율을 극대화 시킬 수 있다. 그러나 전력망이 정보통신망과 융합되면서 기존 전력망보다 보안의 위협이 증대되고 있다. 전력망 특성상 보안의 위협으로 인한 피해는 개인의 사생활뿐만 아니라 사회의 경제적 손실까지 이어져 그 피해규모가 크므로, 스마트 그리드는 여러 해커 집단의 공격 대상이 되고 있다. 본 논문에서는 스마트 그리드의 보안 피해를 예방하기 위해, 스마트 그리드 구축의 핵심 기술이라 할 수 있는 Advanced Metering Infrastructure (AMI)의 보안 취약점과 그에 대응하는 보안 기술 현황을 살펴보도록 한다.

양자컴퓨팅 기술 연구개발 동향 (R&D Status of Quantum Computing Technology)

  • 백충헌;황용수;김태완;최병수
    • 전자통신동향분석
    • /
    • 제33권1호
    • /
    • pp.20-33
    • /
    • 2018
  • The calculation speed of quantum computing is expected to outperform that of existing supercomputers with regard to certain problems such as secure computing, optimization problems, searching, and quantum chemistry. Many companies such as Google and IBM have been trying to make 50 superconducting qubits, which is expected to demonstrate quantum supremacy and those quantum computers are more advantageous in computing power than classical computers. However, quantum computers are expected to be applicable to solving real-world problems with superior computing power. This will require large scale quantum computing with many more qubits than the current 50 qubits available. To realize this, first, quantum error correction codes are required to be capable of computing within a sufficient amount of time with tolerable accuracy. Next, a compiler is required for the qubits encoded by quantum error correction codes to perform quantum operations. A large-scale quantum computer is therefore predicted to be composed of three essential components: a programming environment, layout mapping of qubits, and quantum processors. These components analyze how many numbers of qubits are needed, how accurate the qubit operations are, and where they are placed and operated. In this paper, recent progress on large-scale quantum computing and the relation of their components will be introduced.

Joint wireless and computational resource allocation for ultra-dense mobile-edge computing networks

  • Liu, Junyi;Huang, Hongbing;Zhong, Yijun;He, Jiale;Huang, Tiancong;Xiao, Qian;Jiang, Weiheng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.3134-3155
    • /
    • 2020
  • In this paper, we study the joint radio and computational resource allocation in the ultra-dense mobile-edge computing networks. In which, the scenario which including both computation offloading and communication service is discussed. That is, some mobile users ask for computation offloading, while the others ask for communication with the minimum communication rate requirements. We formulate the problem as a joint channel assignment, power control and computational resource allocation to minimize the offloading cost of computing offloading, with the precondition that the transmission rate of communication nodes are satisfied. Since the formulated problem is a mixed-integer nonlinear programming (MINLP), which is NP-hard. By leveraging the particular mathematical structure of the problem, i.e., the computational resource allocation variable is independent with other variables in the objective function and constraints, and then the original problem is decomposed into a computational resource allocation subproblem and a joint channel assignment and power allocation subproblem. Since the former is a convex programming, the KKT (Karush-Kuhn-Tucker) conditions can be used to find the closed optimal solution. For the latter, which is still NP-hard, is further decomposed into two subproblems, i.e., the power allocation and the channel assignment, to optimize alternatively. Finally, two heuristic algorithms are proposed, i.e., the Co-channel Equal Power allocation algorithm (CEP) and the Enhanced CEP (ECEP) algorithm to obtain the suboptimal solutions. Numerical results are presented at last to verify the performance of the proposed algorithms.

Radix-16 Montgomery Modular 곱셈 알고리즘의 FPGA 구현과 전력 소모 비교에 관한 연구 (A Study on FPGA Implementation of Radix-16 Montgomery Modular Multiplication and Comparison of Power Dissipation)

  • 김판기;김기영;김석윤
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.813-816
    • /
    • 2005
  • In last several years, the need for the right of privacy and mobile banking has increased. The RSA system is one of the most widely used public key cryptography systems, and its core arithmetic operation IS modular multiplication. P. L. Montgomery proposed a very efficient modular multiplication technique that is well suited to hardware implementation. In this paper, the montgomery modular multiplication algorithms(CIOS, SOS, FIOS) , developed by Cetin Kaya Koc, is presented and implemented using radix-16 and Altera FPGA. Also, we undertake comparisons of power dissipation using Quatrus II PowerPlay Power Analyzer.

  • PDF

저전력 무선 센서 네트워크를 위한 적응적 MAC 프로토콜 (Adaptive Medium Access Control protocol for low-power wireless sensor network)

  • 강정훈;이민구;윤명현;유준재
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2005년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.209-211
    • /
    • 2005
  • This paper proposes a adaptive medium-access control(MAC) protocol designed for low-power wireless multi-hop sensor networks which is used for connecting physical world and cyber computing space. Wireless multi-hop sensor networks use battery-operated computing and sensing device. We expect sensor networks to be deployed in an ad hoc fashion, with nodes remaining inactive for long time, but becoming suddenly active when specific event is detected. These characteristics of multi-hop sensor networks and applications motivate a MAC that is different from traditional wireless MACs about power conservation scheme, such as IEEE 802.11. Proposed MAC uses a few techniques to reduce energy consumption. Result show that proposed MAC obtains more energy savings.

  • PDF