• 제목/요약/키워드: GPU program

검색결과 53건 처리시간 0.019초

도로교통안전점검차량을 이용한 도로의 자동도면화 생성 연구 (The Study on an Automated Generation Method of Road Drawings using Road Survey Vehicle)

  • 이준석;윤덕근;박재홍
    • 한국도로학회논문집
    • /
    • 제16권5호
    • /
    • pp.91-98
    • /
    • 2014
  • PURPOSES : This study is to develop a automate road mapping system using ARASEO(Automated Road Analysis and Safety Evaluation TOol) for road management. METHODS : The road survey van named ARASEO(Automated Road Analysis and Safety Evaluation TOol) was used to generate highway drawings for Korea National Road number 37 automatically. In order to generate the highway drawings for purpose of road management, it is required to acquired the information for highway alignment, road width and road facilities such as safety barrier and road sign. Therefore the survey van acquired and analyzed the road width, median and guardrail data using rear side laser sensor of ARASEO and recognized the traffic control sign and chevron sign using foreside camera images. Also the highway alignment which is the basic information for highway drawing can be analyzed by acquisition the every 1m positional and attitude data using GPU and IMU sensor and developed algorithm. Finally, in this research the CAD based drawing software was developed to draw highway drawing using the analysis result from ARASEO. RESULTS : This study showed the comparison result of the surveyed road width and drawing data. To make the drawing of the road, we made the Autocad ARX program witch run in CAD menu interface. CONCLUSIONS : Using this program we can create the road center line, every 500m horizontal and vertical ground plan drawing automatically.

GPU-ACCELERATED SPECKLE MASKING RECONSTRUCTION ALGORITHM FOR HIGH-RESOLUTION SOLAR IMAGES

  • Zheng, Yanfang;Li, Xuebao;Tian, Huifeng;Zhang, Qiliang;Su, Chong;Shi, Lingyi;Zhou, Ta
    • 천문학회지
    • /
    • 제51권3호
    • /
    • pp.65-71
    • /
    • 2018
  • The near real-time speckle masking reconstruction technique has been developed to accelerate the processing of solar images to achieve high resolutions for ground-based solar telescopes. However, the reconstruction of solar subimages in such a speckle reconstruction is very time-consuming. We design and implement a new parallel speckle masking reconstruction algorithm based on the Compute Unified Device Architecture (CUDA) on General Purpose Graphics Processing Units (GPGPU). Tests are performed to validate the correctness of our program on NVIDIA GPGPU. Details of several parallel reconstruction steps are presented, and the parallel implementation between various modules shows a significant speed increase compared to the previous serial implementations. In addition, we present a comparison of runtimes across serial programs, the OpenMP-based method, and the new parallel method. The new parallel method shows a clear advantage for large scale data processing, and a speedup of around 9 to 10 is achieved in reconstructing one solar subimage of $256{\times}256pixels$. The speedup performance of the new parallel method exceeds that of OpenMP-based method overall. We conclude that the new parallel method would be of value, and contribute to real-time reconstruction of an entire solar image.

전원선의 전력분석을 이용한 주요정보 유출 가능성에 관한 연구 (A Study on Leakage of Critical Information via the Power Analysis of Power Lines)

  • 한경호;이성호
    • 전기학회논문지
    • /
    • 제63권11호
    • /
    • pp.1571-1574
    • /
    • 2014
  • In this paper, we propose a unidirectional transmission of critical information obtained by keyboard hacking or kernel and keyboard driver hacking even though the computer is not connected to the external network. We show the hacking can be attempted in the proposed method to show the way preventing such attempts in advance. Firewalls and other various methods are used to prevent the hacking from the external network but the hacking is also attempted in various ways to detour the firewall. One of the most effective way preventing from the hacking attack is physically disconnect the internal intranet systems from the external internet and most of the government systems, military systems and big corporate systems are using this way as on one of the protection method. In this paper, we show the feasibility of transmission of security codes, etc via the short message to the external network on the assumption that a hacking program such as Trojan Horse is installed on the computer systems separated from the external network. Previous studies showed that the letters on the monitor can be hijacked by electromagnetic analysis on the computer to obtain the information even though the system is not connected ti the network. Other studies showed that the security code hint can obtained by analyzing the power consumption distribution of CPU. In this paper, the power consumption distribution of externally accessible power line is analyzed to obtain the information and the information can be transmitted to the external network. Software controlling the CPU and GPU usage is designed to control the power supply of computer. The sensors such as the Rogowski coils can be used on the external power line to collect the data of power consumption change rates. To transmit the user password by short message, due to the capacitive components and the obstacle from other power supply, A very slow protocol are used.