• Title/Summary/Keyword: O-Algorithm

Search Result 1,526, Processing Time 0.031 seconds

System Development and IC Implementation of High-performance Image Downscaler using Phase-correction Digital Filters (위상 교정 디지털 필터를 이용한 고성능/고화질 이미지 축소기 시스템 개발 및 IC 구현)

  • Lee, Y.;O. Moon;Lee, H.;Lee, B.;B. Kang;C. Hong
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2000.08a
    • /
    • pp.265-268
    • /
    • 2000
  • In this paper, we propose an algorithm, an optimized architecture, and an implementation for an improved performance of image downscaler. The proposed downscaler uses two-dimensional digital filters for horizontal and vertical scalings, respectively. It also improves scaling precisions and decreases the loss of data, compared with the 1/32 scaler 〔1〕. In order to achieve the optimization, the digital filters are implemented by the multiplexer -adder type scheme 〔2〕. The scaler is designed by using the Verilog-HDL. It is synthesized into gates by using the Samsung 0.35 um STD90 TLM library.

  • PDF

Cyber Natural History Museum Contents for Mobile Phones (모바일 폰 기반의 사이버 자연사 박물관)

  • Hong, Sung-Soo;Khan, Irfan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.1422-1425
    • /
    • 2011
  • These days' mobile phones and their improved multimedia limits making it powerful enough to handle complicated tasks. Image processing related support for mobile devices is extremely comprehensive in mobile cyber museum. A key technical challenge is how to achieve the best-perceived image quality and transmitting data between client and server with given the limited screen size and display bit-depth of the mobile devices. This paper targets image processing features such as capturing rendering zooming, panning and image rotation for 360o view and customized algorithm related image processing with variety of search method i.e. alphabetical, visual search.

Optimization for LEA Quantum Circuit for Applying Grover's Algorithm (그루버 알고리즘 적용을 위한 LEA 양자 회로 최적화)

  • Jang, Kyung-Bae;Kim, Hyun-Jun;Park, Jae-Hoon;Seo, Hwa-Jeong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.405-408
    • /
    • 2020
  • 양자 컴퓨터를 활용한 양자 알고리즘은 우리가 현재 사용하고 있는 많은 암호들의 안전성을 깨뜨릴 수 있다. 그루버 알고리즘을 n-bit 보안레벨을 가지는 대칭키 암호에 적용한다면 보안레벨을 O(2n/2)까지 낮출 수 있다. 그루버 알고리즘을 적용하기 위해서는 우선 대상 암호가 양자 회로로 구현되어야 한다. 때문에 대상 블록암호를 양자 회로로 최적화하는 연구들이 최근 활발히 진행되고 있다. 이에 본 논문에서는 국산 경량 블록암호 LEA를 양자 회로에서 최적화 하였다. 기존의 LEA 양자 회로구현과 비교하여 양자 게이트는 더 많이 사용하였지만, 큐빗을 획기적으로 줄일 수 있었으며 이에 대한 성능 평가를 수행하였다. 마지막으로 제안하는 LEA 구현에 그루버 알고리즘을 적용하기 위한 양자 자원을 평가하였다.

A minimum energy control of a load-sensing hydraulic servo system

  • Kim, S.D.;Cho, H.S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1987.10a
    • /
    • pp.747-752
    • /
    • 1987
  • The dynamic characteristics of a load-sensing hydraulic servo system are complex and highly unstable. Another property of the system is that the setting value of pump compensator is closely related to energy efficiency as well as control performance of the system. This necessitates the development of an effective control algorithm which guarantees good control performance, stability and energy efficiency. This paper considers a suboptimal PID control for the velocity control problem of the load-sensing hydraulic servo system. The results of simulations studies and experiments show that the proposed suboptimal controller can produce much better control performance than nonoptimal controllers and give effective energy efficiency.

  • PDF

Verification of Logic Gate Interconnection (논리회로 상호간의 연결도 검증)

  • Jung, Ja Choon;Kyung, Chong Min
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.24 no.2
    • /
    • pp.338-346
    • /
    • 1987
  • This paper describes a method for verifying whether a given geometrical layout correcdtly reflects the original logic level description. The logic description extracted from layout data was directly compadred with the original logic diagram generated at logic level design stage where the logic diagram is represented as a weighted multi-place graph. The comparison is based on graph isomorphism and error messages(error categories and locations)are invoked if any difference is found between the two logic descriptions. An efficient partitioning algorithm which consists of two steps, candidate selection and equal weight partitioning procedure, enables the entire verification process to occur in O(n log n) time.

  • PDF

Neural Network-based Time Series Modeling of Optical Emission Spectroscopy Data for Fault Prediction in Reactive Ion Etching

  • Sang Jeen Hong
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.131-135
    • /
    • 2023
  • Neural network-based time series models called time series neural networks (TSNNs) are trained by the error backpropagation algorithm and used to predict process shifts of parameters such as gas flow, RF power, and chamber pressure in reactive ion etching (RIE). The training data consists of process conditions, as well as principal components (PCs) of optical emission spectroscopy (OES) data collected in-situ. Data are generated during the etching of benzocyclobutene (BCB) in a SF6/O2 plasma. Combinations of baseline and faulty responses for each process parameter are simulated, and a moving average of TSNN predictions successfully identifies process shifts in the recipe parameters for various degrees of faults.

  • PDF

Node Mapping Algorithm Between Transposition and Bubblesort (전위 네트워크와 버블정렬 네트워크의 노드 사상 알고리즘)

  • Hyun, Sim;Lee, Kyu-Su;Ki, Woo-Seo;Lee, Hyeong-Ok;Oh, Jae-Cheol
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.601-604
    • /
    • 2008
  • 전위그래프와 버블정렬그래프는 스타그래프가 갖는 노드대칭성, 재귀적구조, 최대 고장허용도 등 그래프이론 관점에서 좋은 성질을 갖는 상호연결망이다. 본 논문에서는 버블정렬(bubblesort)그래프 $B_n$와 버블정렬-스타(bubblesort star)그래프가 전위(Transposition) 그래프 $T_n$의 서브그래프임을 보인다. 또한, 전위(Transposition)그래프 $T_n$을 버블정렬(Bubblesort)그래프 $B_n$으로 임베딩하는 연장율이 O(n)임을 보인다.

Study on the Design Computing Model for SpO Extraction Algorithm on Pulse Oximetry (펄스 옥시메터의 산소포화도 추출 알고리즘을 위한 계산모델 설계에 관한 연구)

  • Kim, Yun-Yeong;Kim, Do-Cheol;Lee, Yun-Seon
    • Journal of Biomedical Engineering Research
    • /
    • v.19 no.1
    • /
    • pp.25-32
    • /
    • 1998
  • This paper is based on the design and analysis computing model of oxygen saturation with the pulse oximeter using the integral ratio of pulsating components. In our proposed algorithm. we modeled the transmitted optical signal in fingertip or earlobe to DC component $A_{dc}$ pulsating component $A_a\;Sinwt$, noise component $A_{noise}$ and etc.. To separate the pulsating components and DC components efficiently, we defined the signal average to DC components. Also we presented the way to eliminate the noise using integral ratio. To acquire a linearity of correlation graph for pulsating components ratios and non invasive oxygen saturation. we intensively observed on the oxygen saturations in the range of 75-100% in consideration of the error range of simulator. Also, for real time processing we experimented on changing the period of area calculating cycle from 1 to 6. The functional evaluation of the algorithm is compared with the method using the amplitude ratio of pulsating components frequently seen with pulse oximeter. The result was that our algorithm with 4 cycles of area calculating cycle which considered to be best fit by 1% to the existing method. Moreover r , the decision coefficient showing the correlation of regression graph with real data, proved better result of 0.985 than 0.970.

  • PDF

A Study on the Automation Algorithm to Identify the Geological Lineament using Spatial Statistical Analysis (공간통계분석을 이용한 지질구조선 자동화 알고리즘 연구)

  • Kwon, O-Il;Kim, Woo-Seok;Kim, Jin-Hwan;Kim, Gyo-Won
    • The Journal of Engineering Geology
    • /
    • v.27 no.4
    • /
    • pp.367-376
    • /
    • 2017
  • Recently, tunneling under the seabed is becoming increasingly common in many countries. In Korea, there are proposals to tunnel from the mainland to Jeju Island. Safe construction requires geologic structures such as faults to be characterized during the design and construction phase; however, unlike on land, such structures are difficult to survey seabed. This study aims to develop an algorithm that uses geostatistics to automatically derive large-scale geological structures on the seabed. The most important considerations in this method are the optimal size of the moving window, the optimal type of spatial statistics, and determination of the optimal percentile standard. Finally, the optimal analysis algorithm was developed using the R program, which comprehensibly presents variations in spatial statistics. The program allows the type and percentile standard of spatial statistics to be specified by the user, thus enabling an analysis of the geological structure according to variations in spatial statistics. The geotechnical defense-training algorithm shows that a large, linear geological lineament is best visualized using a $3{\times}3$ moving window and a 10% upper standard based on the moving variance value and fractile. In particular, setting the fractile criterion to the upper 0.5% almost entirely eliminates the error values from the contour image.

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.