• Title/Summary/Keyword: a sparse matrix

Search Result 229, Processing Time 0.023 seconds

GPU-based Sparse Matrix-Vector Multiplication Schemes for Random Walk with Restart: A Performance Study (랜덤워크 기법을 위한 GPU 기반 희소행렬 벡터 곱셈 방안에 대한 성능 평가)

  • Yu, Jae-Seo;Bae, Hong-Kyun;Kang, Seokwon;Yu, Yongseung;Park, Yongjun;Kim, Sang-Wook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.11a
    • /
    • pp.96-97
    • /
    • 2020
  • 랜덤워크 기반 노드 랭킹 방식 중 하나인 RWR(Random Walk with Restart) 기법은 희소행렬 벡터 곱셈 연산과 벡터 간의 합 연산을 반복적으로 수행하며, RWR 의 수행 시간은 희소행렬 벡터 곱셈 연산 방법에 큰 영향을 받는다. 본 논문에서는 CSR5(Compressed Sparse Row 5) 기반 희소행렬 벡터 곱셈 방식과 CSR-vector 기반 희소행렬 곱셈 방식을 채택한 GPU 기반 RWR 기법 간의 비교 실험을 수행한다. 실험을 통해 데이터 셋의 특징에 따른 RWR 의 성능 차이를 분석하고, 적합한 희소행렬 벡터 곱셈 방안 선택에 관한 가이드라인을 제안한다.

Design Considerations on Large-scale Parallel Finite Element Code in Shared Memory Architecture with Multi-Core CPU (멀티코어 CPU를 갖는 공유 메모리 구조의 대규모 병렬 유한요소 코드에 대한 설계 고려 사항)

  • Cho, Jeong-Rae;Cho, Keunhee
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.30 no.2
    • /
    • pp.127-135
    • /
    • 2017
  • The computing environment has changed rapidly to enable large-scale finite element models to be analyzed at the PC or workstation level, such as multi-core CPU, optimal math kernel library implementing BLAS and LAPACK, and popularization of direct sparse solvers. In this paper, the design considerations on a parallel finite element code for shared memory based multi-core CPU system are proposed; (1) the use of optimized numerical libraries, (2) the use of latest direct sparse solvers, (3) parallelism using OpenMP for computing element stiffness matrices, and (4) assembly techniques using triplets, which is a type of sparse matrix storage. In addition, the parallelization effect is examined on the time-consuming works through a large scale finite element model.

Implementation of WCDMA Air Protocol Analyzer with An Effective Equalizer Design using Characteristic of Sparse Matrix (희소 행렬의 특성을 이용하여 효율적인 등화기 설계법이 적용된 WCDMA 무선 신호 분석기 구현)

  • Shin, Chang Eui;Choi, Seung Won
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.111-118
    • /
    • 2013
  • This paper presents implementation of Air protocol analyzer and physical layer design algorithm. The analyzer is a measurement system providing real-time analysis of wireless signals between User Equipment (UE) and Node-B. The implemented system proposed in this paper consists of Digital Signal Processors (DSPs) and Field Programmable Gate Arrays (FPGAs). The waveform of Wideband Code Division Multiple Access (WCDMA) has been selected for verification of the proposed system. We designed the analyzer using equalizer algorithm and rake-receiver algorithm. Among various algorithms of designing the equalizer, we have chosen Linear Minimum Mean Square Error (LMMSE) equalizer that uses the inverse of channel matrix. Since the LMMSE equalizer uses the inverse channel matrix, it suffers from a large amount of computational load, while it outperforms most conventional equalizers. In this paper, we introduce an efficient procedure of reducing the computational load required by LMMSE equalizer-based receiver.

Development of executive system in power plant simulator (발전 플랜트 설계용 시뮬레이터에서 Executive system의 개발)

  • 예재만;이동수;권상혁;노태정
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1997.10a
    • /
    • pp.488-491
    • /
    • 1997
  • The PMGS(Plant Model Generating System) was developed based on modular modeling method and fluid network calculation concept. Fluid network calculation is used as a method of real-time computation of fluid network, and the module which has a topology with node and branch is defined to take advantages of modular modeling. Also, the database which have a shared memory as an instance is designed to manage simulation data in real-time. The applicability of the PMGS was examined implementing the HRSG(Heat Recovery Steam Generator) control logic on DCS.

  • PDF

Fast Binary Block Inverse Jacket Transform

  • Lee Moon-Ho;Zhang Xiao-Dong;Pokhrel Subash Shree;Choe Chang-Hui;Hwang Gi-Yean
    • Journal of electromagnetic engineering and science
    • /
    • v.6 no.4
    • /
    • pp.244-252
    • /
    • 2006
  • A block Jacket transform and. its block inverse Jacket transformn have recently been reported in the paper 'Fast block inverse Jacket transform'. But the multiplication of the block Jacket transform and the corresponding block inverse Jacket transform is not equal to the identity transform, which does not conform to the mathematical rule. In this paper, new binary block Jacket transforms and the corresponding binary block inverse Jacket transforms of orders $N=2^k,\;3^k\;and\;5^k$ for integer values k are proposed and the mathematical proofs are also presented. With the aid of the Kronecker product of the lower order Jacket matrix and the identity matrix, the fast algorithms for realizing these transforms are obtained. Due to the simple inverse, fast algorithm and prime based $P^k$ order of proposed binary block inverse Jacket transform, it can be applied in communications such as space time block code design, signal processing, LDPC coding and information theory. Application of circular permutation matrix(CPM) binary low density quasi block Jacket matrix is also introduced in this paper which is useful in coding theory.

Computational aero-acoustics using a hybrid approach combining standard CFD tools with ACTRAN/LA; theory, process and applications

  • Migeot, Jean-Louis
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2008.11a
    • /
    • pp.545-560
    • /
    • 2008
  • O Source import ㅁDirect import form Nastran, ANSYS ㅁDirect import of all the RPM from the files containing the structural results O Solver ㅁDirect computation of all RPM (multiple load case): one matrix resolution with multiple RHS ㅁEfficient solvers (MUMPS, SPARSE, Iterative) ㅁFrequency parallelisms available for very large problems O In practice ㅁSmall problems run on a desktop ㅁLarge problems can exceed 3kHz on a car engine O Easy to mesh ㅁ3D model created in a few minutes thanks to the unequal meshes. O And all Actran standard features

  • PDF

Study on Compressed Sensing of ECG/EMG/EEG Signals for Low Power Wireless Biopotential Signal Monitoring (저전력 무선 생체신호 모니터링을 위한 심전도/근전도/뇌전도의 압축센싱 연구)

  • Lee, Ukjun;Shin, Hyunchol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.89-95
    • /
    • 2015
  • Compresses sensing (CS) technique is beneficial for reducing power consumption of biopotential acquisition circuits in wireless healthcare system. This paper investigates the maximum possible compress ratio for various biopotential signal when the CS technique is applied. By using the CS technique, we perform the compression and reconstruction of typical electrocardiogram(ECG), electromyogram(EMG), electroencephalogram(EEG) signals. By comparing the original signal and reconstructed signal, we determines the validity of the CS-based signal compression. Raw-biopotential signal is compressed by using a psuedo-random matrix, and the compressed signal is reconstructed by using the Block Sparse Bayesian Learning(BSBL) algorithm. EMG signal, which is the most sparse biopotential signal, the maximum compress ratio is found to be 10, and the ECG'sl maximum compress ratio is found to be 5. EEG signal, which is the least sparse bioptential signal, the maximum compress ratio is found to be 4. The results of this work is useful and instrumental for the design of wireless biopotential signal monitoring circuits.

Analysis of Nonlinear Resistive Networks (비선형저항(resistive)회로망의 해석)

  • Kyun Hyon Tchah
    • 전기의세계
    • /
    • v.23 no.3
    • /
    • pp.70-76
    • /
    • 1974
  • Computer is used to analyze nonlinear networks. Integrated circuits and new nonlinear elements have generated much interest in nonlinear circuit theory. A key to the understanding and analysis of nonlinear circuits is the study of characteristics for nonlinear elements and nonlinear resistive networks both in theory and in computation. In this apper, an iteration method using cut set analysis for nonlinear dc analysis based on Branin's method is described. Application of this algorithm to solve two nonlinear problems, is presented and a possible method of improving the basic algorithm by means of a sparse matrix technique is described.

  • PDF

Fast Dynamic Control for a Induction Motors Driven Fed by a Sparse Matrix Converters with a Model Predictive Control (스파스 매트릭스 컨버터로 구동되는 유도전동기를 위한 모델 예측제어 기반의 속응성 향상기법)

  • Kim, Jung-Hyun;Lee, Eunsil;Lee, Kyo-Beum;Ko, Young-Jong
    • Proceedings of the KIPE Conference
    • /
    • 2013.07a
    • /
    • pp.84-85
    • /
    • 2013
  • 본 논문은 스파스 매트릭스 컨버터로 구동되는 유도전동기에 과도응답특성 개선을 위한 모델예측제어 기법을 제안한다. 제안하는 기법은 유도전동기의 파라미터를 이용하여 구한 예측 토크와 자속을 통하여 비용함수를 최소화하는 최적의 스위칭 상태를 결정한다. 시뮬레이션을 통해 제안한 제어 기법의 타당성을 검증한다.

  • PDF

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.