• Title/Summary/Keyword: SEED 알고리즘

Search Result 190, Processing Time 0.026 seconds

Automatic Generation of Seed Individuals for Efficient Incremental Evolutionary Learning (효율적인 점증적 진화학습을 위한 씨앗개체의 자동생성)

  • 송금범;조성배
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1999.10b
    • /
    • pp.6-8
    • /
    • 1999
  • 시뮬레이션 환경이나 실제 환경에서 이동 로봇 제어기를 진화 알고리즘으로 만들어내는 연구가 최근 활발하다. 이전의 연구에서는 기존의 단순한 진화 알고리즘이 환경에 제한된 제어기를 만들어 내는 문제점을 해결하기 위한 방법으로 셀룰라 오토마타 기반 신경망의 점증적 진화방법을 제시하였다. 점증적 진화 방법은 초기에 간단한 행동으로 해결할 수 있는 환경에 맞도록 제어기를 진화시킨 다음, 점차 복잡한 행동이 요구되는 환경에서 제어기를 점증적으로 진화시킨다. 실험결과, 점증적 진화의 방법이 좀 더 효율적으로 로봇을 진화시키고 환경의 변화에 보다 강한 것을 알 수 있었다. 그러나 이전연구에서의 점증적 진화 방법은 한 단계에서 진화가 끝난 후 다음 단계로 넘어갈 개체를 사람이 선택해야 하는 문제가 있었다. 본 논문에서는 이러한 문제점을 해결하기 위한 다양한 방법을 제시하고 실험을 통해 그 유용성을 보이고자 한다.

  • PDF

An analysis on Object Segmentation Based User Interactive Algorithm (사용자 입력 기반의 전경 추출 영상 분할 알고리즘 분석)

  • Kim, Kyumok;Lee, Jon-Ha;Park, Ji Yeol;Park, Jinwon;Jung, Seung-Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.773-775
    • /
    • 2016
  • 본 논문에서는 컴퓨터 비전 기술에서 중요하게 인식되고 있는 영상 분할 기법에 대해 분석한다. 사용자가 입력하는 표시 (seed) 정보를 이용하여 영상에서 중요한 객체를 추출하는 대표적인 알고리즘의 접근방식 및 차이점을 비교한다.

Implementation of DES Algorithm using CUDA (CUDA를 이용한 DES 구현)

  • Kim, Juho;Park, Neungsoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1086-1087
    • /
    • 2012
  • GPU를 이용하여 병렬 처리 연산을 하는 연구는 활발히 진행되고 있고, 이미 많은 곳에서 사용되고 있다. 본 논문에서는 엔비디아에서 개발한 CUDA를 사용하여 DES 알고리즘을 고속으로 구현하기 위해 CUDA overlapping을 이용했다. 이것은 GPU 에서 연산을 하는 동시에 연산 결과를 바로 Host로 보내어 연산시간과 전송시간을 Overlap 하여 시간을 더 단축 하도록 하는 구현방법이다. 그 결과 Overlap 하기 전보다 약 30%의 성능향상을 확인 할 수 있었다. 향후 DES 뿐만 아니라 3DES, AES, SEED 등 여러 암호화 알고리즘들도 적용할 예정이다.

Stream Cipher ASC (스트림 암호 ASC)

  • Kim, Gil-Ho;Song, Hong-Bok;Kim, Jong-Nam;Cho, Gyeong-Yeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1474-1477
    • /
    • 2009
  • 본 논문에서는 ASR(Arithmetic Shift Register)과 SHA-2로 구성된 32비트 출력의 새로운 스트림 암호 ASC를 제안한다. ASC는 소프트웨어 및 하드웨어 구현이 쉽게 디자인된 스트림 암호 알고리즘이다. 특히 계산능력이 제한된 무선 통신장비에서 빠르게 수행할 수 있도록 개발되었다. ASC는 다양한 길이(8-32바이트)의 키를 지원하고 있으며, 워드 단위로 연산을 수행한다. ASC는 매우 간결한 구조를 가지고 있으며 선형 궤환 순서기(Linear Feedback Sequencer)로 ASR을 적용하였고, 비선형 순서기(Nonlinear sequencer)로 SHA-2를 적용하여 크게 두 부분으로 구성되어 있는 결합 함수(combining function) 스트림 암호이다. 그리고 8비트, 16비트, 32비트 프로세스에서 쉽게 구현이 가능하다. 제안한 스트림 암호 ASC는 최근에 표준 블록 암호로 제정된 AES, ARIA, SEED등의 블록 암호보다는 6-13배 빠른 결과를 보여주고 있으며, 안전성 또한 현대 암호 알고리즘이 필요로 하는 안전성을 만족하고 있다.

A Secure Model for Reading and Writing in Hadoop Distributed File System and its Evaluation (하둡 분산파일시스템에서 안전한 쓰기, 읽기 모델과 평가)

  • Pang, Sechung;Ra, Ilkyeun;Kim, Yangwoo
    • Journal of Internet Computing and Services
    • /
    • v.13 no.5
    • /
    • pp.55-64
    • /
    • 2012
  • Nowadays, as Cloud computing becomes popular, a need for a DFS(distributed file system) is increased. But, in the current Cloud computing environments, there is no DFS framework that is sufficient to protect sensitive private information from attackers. Therefore, we designed and proposed a secure scheme for distributed file systems. The scheme provides confidentiality and availability for a distributed file system using a secret sharing method. In this paper, we measured the speed of encryption and decryption for our proposed method, and compared them with that of SEED algorithm which is the most popular algorithm in this field. This comparison showed the computational efficiency of our method. Moreover, the proposed secure read/write model is independent of Hadoop DFS structure so that our modified algorithm can be easily adapted for use in the HDFS. Finally, the proposed model is evaluated theoretically using performance measurement method for distributed secret sharing model.

Water Region Segmentation Method using Graph Algorithm (그래프 알고리즘을 이용한 강물 영역 분할 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.787-794
    • /
    • 2018
  • The various natural disasters such as floods and localized heavy rains are increasing due to the global warming. If a natural disaster can be detected and analyzed in advance and more effectively, it can prevent enormous damage of natural disasters. Recent development in visual sensor technologies has encouraged various studies on monitoring environments including rivers. In this paper, we propose a method to detect water regions from river images which can be exploited for river surveillance systems using video sensor networks. In the proposed method, we first segment a river image finely using the minimum spanning tree algorithm. Then, the seed regions for the river region and the background region are set by using the preliminary information, and each seed region is expanded by merging similar regions to segment the water region from the image. Experimental results show that the proposed method separates the water region from a river image easier and accurately.

Design and Implementation of the Cdma2000 EV-DO security layer supporting Hardware using FPGA (FPGA를 이용한 Cdma2000 EV-DO 시큐리티 지원 하드웨어 설계 및 구현)

  • Kwon, Hwan-Woo;Lee, Ki-Man;Yang, Jong-Won;Seo, Chang-Ho;Ha, Kyung-Ju
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.2
    • /
    • pp.65-73
    • /
    • 2008
  • Security layer of the Cdma2000 1x EV-DO is currently completing standard (C.S0024-A v2.0). Accordingly, a hardware security devices, that allows to implementation requirement of the security layer described in standard document, is required to apply security function about data transferred between AT and AN of then Cdma2000 1x EV-DO environment. This paper represents design of hardware device providing EV-DO security with simulation of the security layer protocol via the FPGA platform. The SHA-1 hash algorithm for certification and service of packet data, and the AES, SEED, ARIA algorithms for data encryption are equip in this device. And paper represents implementation of hardware that applies optionally certification and encryption function after executing key-switch using key-switching algorithm.

Development of Side Channel Attack Analysis Tool on Smart Card (사이드 채널 공격에 대한 스마트카드 안전성의 실험적 분석)

  • Han Dong-Ho;Park Jea-Hoon;Ha Jae-Cheol;Lee Sung-Jae;Moon Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.59-68
    • /
    • 2006
  • Although the cryptographic algorithms in IC chip such as smart card are secure against mathematical analysis attack, they are susceptible to side channel attacks in real implementation. In this paper, we analyze the security of smart card using a developed experimental tool which can perform power analysis attacks and fault insertion attacks. As a result, raw smart card implemented SEED and ARIA without any countermeasure is vulnerable against differential power analysis(DPA) attack. However, in fault attack about voltage and clock on RSA with CRT, the card is secure due to its physical countermeasures.

A Study on the Validation of Measured Data from the Seismic Accelerometers in the Safety Evaluation System of Public Buildings (공공건축물 안전성 평가를 위한 지진가속도 계측자료의 유효성 검증 방법에 대한 연구)

  • Jang, Won-Seok;Jeong, Seong-Hoon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.24 no.5
    • /
    • pp.150-157
    • /
    • 2020
  • In this study, an algorithm was developed to validate the seismic acceleration measurement data of the seismic acceleration measurement system using measurement data from public buildings currently in operation. Through the results of the study, an algorithm was developed to detect errors and abnormalities in the measurement data itself and the process of generating real-time data (MMA/sec) and event measurement data (MiniSEED), which are the main data generated by the system, and the basic data for determining the direction of inspection through measurement data analysis. It is expected that this will be used as a guideline to determine whether or not the seismic acceleration measurement system, which was managed as receiving/not receiving, is inspected and abnormal types of conditions.

A Hierarchical Semantic Video Object Tracking Algorithm Using Watershed Algorithm (Watershed 알고리즘을 사용한 계층적 이동체 추적 알고리즘)

  • 이재연;박현상;나종범
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10B
    • /
    • pp.1986-1994
    • /
    • 1999
  • In this paper, a semi-automatic approach is adopted to extract a semantic object from real-world video sequences human-aided segmentation for the first frame and automatic tracking for the remaining frames. The proposed algorithm has a hierarchical structure using watershed algorithm. Each hierarchy consists of 3 basic steps: First, seeds are extracted from the simplified current frame. Second, region growing bv a modified watershed algorithm is performed to get over-segmented regions. Finally, the segmented regions are classified into 3 categories, i.e., inside, outside or uncertain regions according to region probability values, which are acquired by the probability map calculated from an estimated motion-vector field. Then, for the remaining uncertain regions, the above 3 steps are repeated at lower hierarchies with less simplified frames until every region is classified into a certain region. The proposed algorithm provides prospective results in studio-quality sequences such as 'Claire', 'Miss America', 'Akiyo', and 'Mother and daughter'.

  • PDF