• 제목/요약/키워드: Hardware Resources

검색결과 442건 처리시간 0.021초

차량용 임베디드 프로세서에서 저전력 반응적 제어를 위한 이기종 멀티코어 협력적 스트리밍 온-칩 소프트웨어 구조 (Collaborative Streamlined On-Chip Software Architecture on Heterogenous Multi-Cores for Low-Power Reactive Control in Automotive Embedded Processors)

  • 권지수;박대진
    • 대한임베디드공학회논문지
    • /
    • 제17권6호
    • /
    • pp.375-382
    • /
    • 2022
  • This paper proposes a multi-core cooperative computing structure considering the heterogeneous features of automotive embedded on-chip software. The automotive embedded software has the heterogeneous execution flow properties for various hardware drives. Software developed with a homogeneous execution flow without considering these properties will incur inefficient overhead due to core latency and load. The proposed method was evaluated on an target board on which a automotive MCU (micro-controller unit) with built-in multi-cores was mounted. We demonstrate an overhead reduction when software including common embedded system tasks, such as ADC sampling, DSP operations, and communication interfaces, are implemented in a heterogeneous execution flow. When we used the proposed method, embedded software was able to take advantage of idle states that occur between heterogeneous tasks to make efficient use of the resources on the board. As a result of the experiments, the power consumption of the board decreased by 42.11% compared to the baseline. Furthermore, the time required to process the same amount of sampling data was reduced by 27.09%. Experimental results validate the efficiency of the proposed multi-core cooperative heterogeneous embedded software execution technique.

Edge 라우터 기반 네트워크 공격에 대응하는 보안기술 연구 (Research on security technology to respond to edge router-based network attacks)

  • 황성규
    • 한국정보통신학회논문지
    • /
    • 제26권9호
    • /
    • pp.1374-1381
    • /
    • 2022
  • 네트워크 공격 대응에 관한 보안기술의 기존 연구들은 하드웨어적 네트워크 보안 기술을 이용하여 네트워크의 보안성을 높이는 방법이나 바이러스 방역 백신과 바이러스 방역 시스템이 주로 제안 설계되어왔다. 많은 사용자는 라우터의 보안 기능을 충분히 활용하지 못하고 있어 이러한 문제점을 극복하기 위해 네트워크 보안 수준에 따라 분리함으로써 계층화된 보안 관리를 통하여 외부에서의 공격을 차단할 수 있음을 계층별 실험을 통해 분류하였다. 연구의 범위는 Edge 라우터의 보안기술 동향을 살펴봄으로 Edge 라우터 기반의 네트워크 공격에 관한 위협으로부터 보호하는 방법과 구현 사례를 제시한다.

초음파 촉각 구현을 위한 CPLD를 사용한 Shift Register기반 다채널 초음파 집속 지연 제어 방법에 대한 연구 (A Study on the Shift Register-Based Multi Channel Ultrasonic Focusing Delay Control Method using a CPLD for Ultrasonic Tactile Implementation)

  • 신덕식;박준헌;임영철;최준호
    • 센서학회지
    • /
    • 제31권5호
    • /
    • pp.324-329
    • /
    • 2022
  • This paper proposes a shift-register-based multichannel ultrasonic focusing delay control method using a complex programmable logic device (CPLD) for a high resolution of ultrasonic focusing system. The proposed method can achieve the ultrasonic focusing through the delay control of driving signals of each ultrasonic transducer of an ultrasonic array. The delay of the driving signals of all ultrasonic channels can be controlled by setting the shift register in the CPLD. The experiment verified that the frequency of the clock used for the delay control increased, the error of the focusing point decreased, and the diameter of the focusing point decreased as the length of the shift register in the proposed method. The proposed method used only one CPLD for ultrasonic focusing and did not require to use complex hardware circuits. Therefore, the resources required for the design of an ultrasonic focusing system could be reduced. The proposed method can be applied to the fields of human computer interaction (HCI), virtual reality (VR) and augmented reality (AR).

이중 루프 Digital LDO Regulator 용 ADC 설계 (Design of ADC for Dual-loop Digital LDO Regulator)

  • 박상순;전정희;이재형;최중호
    • 전기전자학회논문지
    • /
    • 제27권3호
    • /
    • pp.333-339
    • /
    • 2023
  • 세계적으로 웨어러블 디바이스의 시장이 확장하고 있으며, 이를 위한 효율적인 PMIC의 수요 또한 늘어나고 있다. 웨어러블 디바이스용 PMIC 특성상 높은 에너지 효율과 작은 면적이 필요하다. 프로세스 기술의 발전으로 저전력 설계가 가능하지만, 기존의 아날로그 LDO 레귤레이터는 전원 전압이 낮아짐에 따라 설계의 어려움이 있다. 본 논문에서는 이중 루프 디지털 LDO용 coarse-fine ADC를 제안한다, ADC의 설계는 55 nm CMOS 공정으로 진행하였고 34.78 dB와 5.39 bits의 SNR과 ENOB를 갖는다.

Migration and Energy Aware Network Traffic Prediction Method Based on LSTM in NFV Environment

  • Ying Hu;Liang Zhu;Jianwei Zhang;Zengyu Cai;Jihui Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권3호
    • /
    • pp.896-915
    • /
    • 2023
  • The network function virtualization (NFV) uses virtualization technology to separate software from hardware. One of the most important challenges of NFV is the resource management of virtual network functions (VNFs). According to the dynamic nature of NFV, the resource allocation of VNFs must be changed to adapt to the variations of incoming network traffic. However, the significant delay may be happened because of the reallocation of resources. In order to balance the performance between delay and quality of service, this paper firstly made a compromise between VNF migration and energy consumption. Then, the long short-term memory (LSTM) was utilized to forecast network traffic. Also, the asymmetric loss function for LSTM (LO-LSTM) was proposed to increase the predicted value to a certain extent. Finally, an experiment was conducted to evaluate the performance of LO-LSTM. The results demonstrated that the proposed LO-LSTM can not only reduce migration times, but also make the energy consumption increment within an acceptable range.

Application of Internet of Things Based Monitoring System for indoor Ganoderma Lucidum Cultivation

  • Quoc Cuong Nguyen;Hoang Tan Huynh;Tuong So Dao;HyukDong Kwon
    • International journal of advanced smart convergence
    • /
    • 제12권2호
    • /
    • pp.153-158
    • /
    • 2023
  • Most agriculture plantings are based on traditional farming and demand a lot of human work processes. In order to improve the efficiency as well as the productivity of their farms, modern agricultural technology was proven to be better than traditional practices. Internet of Things (IoT) is usually related in modern agriculture which provides the farmer with a real-time monitoring condition of their farm from anywhere and anytime. Therefore, the application of IoT with a sensor to measure and monitors the humidity and the temperature in the mushroom farm that can overcome this problem. This paper proposes an IoT based monitoring system forindoor Ganoderma lucidum cultivation at a minimal cost in terms of hardware resources and practicality. The results show that the data of temperature and humidity are changing depending on the weather and the preliminary experimental results demonstrated that all parameters of the system were optimized and successful to achieve the objective. In addition, the analysis results show that the quality of Ganoderma lucidum produced on the research method conforms to regulations in Vietnam.

Computer Architecture Execution Time Optimization Using Swarm in Machine Learning

  • Sarah AlBarakati;Sally AlQarni;Rehab K. Qarout;Kaouther Laabidi
    • International Journal of Computer Science & Network Security
    • /
    • 제23권10호
    • /
    • pp.49-56
    • /
    • 2023
  • Computer architecture serves as a link between application requirements and underlying technology capabilities such as technical, mathematical, medical, and business applications' computational and storage demands are constantly increasing. Machine learning these days grown and used in many fields and it performed better than traditional computing in applications that need to be implemented by using mathematical algorithms. A mathematical algorithm requires more extensive and quicker calculations, higher computer architecture specification, and takes longer execution time. Therefore, there is a need to improve the use of computer hardware such as CPU, memory, etc. optimization has a main role to reduce the execution time and improve the utilization of computer recourses. And for the importance of execution time in implementing machine learning supervised module linear regression, in this paper we focus on optimizing machine learning algorithms, for this purpose we write a (Diabetes prediction program) and applying on it a Practical Swarm Optimization (PSO) to reduce the execution time and improve the utilization of computer resources. Finally, a massive improvement in execution time were observed.

Bitcoin Cryptocurrency: Its Cryptographic Weaknesses and Remedies

  • Anindya Kumar Biswas;Mou Dasgupta
    • Asia pacific journal of information systems
    • /
    • 제30권1호
    • /
    • pp.21-30
    • /
    • 2020
  • Bitcoin (BTC) is a type of cryptocurrency that supports transaction/payment of virtual money between BTC users without the presence of a central authority or any third party like bank. It uses some cryptographic techniques namely public- and private-keys, digital signature and cryptographic-hash functions, and they are used for making secure transactions and maintaining distributed public ledger called blockchain. In BTC system, each transaction signed by sender is broadcasted over the P2P (Peer-to-Peer) Bitcoin network and a set of such transactions collected over a period is hashed together with the previous block/other values to form a block known as candidate block, where the first block known as genesis-block was created independently. Before a candidate block to be the part of existing blockchain (chaining of blocks), a computation-intensive hard problem needs to be solved. A number of miners try to solve it and a winner earns some BTCs as inspiration. The miners have high computing and hardware resources, and they play key roles in BTC for blockchain formation. This paper mainly analyses the underlying cryptographic techniques, identifies some weaknesses and proposes their enhancements. For these, two modifications of BTC are suggested ― (i) All BTC users must use digital certificates for their authentication and (ii) Winning miner must give signature on the compressed data of a block for authentication of public blocks/blockchain.

머신러닝 컴파일러와 모듈로 스케쥴러에 관한 연구 (A Study on Machine Learning Compiler and Modulo Scheduler)

  • 조두산
    • 한국산업융합학회 논문집
    • /
    • 제27권1호
    • /
    • pp.87-95
    • /
    • 2024
  • This study is on modulo scheduling algorithms for multicore processor in machine learning applications. Machine learning algorithms are designed to perform a large amount of operations such as vectors and matrices in order to quickly process large amounts of data stream. To support such large amounts of computations, processor architectures to support applications such as artificial intelligence, neural networks, and machine learning are designed in the form of parallel processing such as multicore. To effectively utilize these multi-core hardware resources, various compiler techniques are being used and studied. In this study, among these compiler techniques, we analyzed the modular scheduler, which is especially important in one core's computation pipeline. This paper looked at and compared the iterative modular scheduler and the swing modular scheduler, which are the most widely used and studied. As a result, both schedulers provided similar performance results, and when measuring register pressure as an indicator, it was confirmed that the swing modulo scheduler provided slightly better performance. In this study, a technique that divides recurrence edge is proposed to improve the minimum initiation interval of the modulo schedulers.

격자기반의 개념적 수문모형의 개발 (Development of Grid-Based Conceptual Hydrologic Model)

  • 김병식;윤선규;양동민;권현한
    • 한국수자원학회논문집
    • /
    • 제43권7호
    • /
    • pp.667-679
    • /
    • 2010
  • 분포형 수문모형은 컴퓨터 하드웨어의 급속한 발전과 GIS를 이용한 수문지리공간정보에의 접근성 및 활용성 증가에 따라 근래에 많은 발전을 이루게 되었다. 하지만 물리기반의 분포형 수문모형은 입력자료 구축 및 모형구동에 많은 시간과 노력이 필요하며 수문자료가 불충분한 미계측 유역에서는 모형의 구축이 어렵다는 한계점을 지니고 있다. 이에 본 논문에서는 개념적 격자 물수지 기법을 이용한 개념적 분포형 수문모형 S-RAT을 개발하였다. S-RAT 모형은 집중형 수문모형의 자료구축의 간편성과 분포형 수문모형의 공간적 유출해석 능력을 동시에 만족할 수 있으며 격자기반 레이더강우자료를 활용할 수 있다. 또한 전처리과정 및 유역의 지형자료 추출 기능을 탑재함으로 상용 GIS 분석 도구들에 대한 의존성이 없는 장점을가진다. 본 논문에서는 도시유역인 중랑천 유역과 산지유역인 내린천 유역 적용을 통해 S-RAT 모형의 유출모의능력 및 매개변수의 시공간적 전이성을 확인하였으며 지상강우와 레이더강우의 입력 자료로써의 활용성을 확인하였다.