• Title/Summary/Keyword: processing constraints

Search Result 511, Processing Time 0.021 seconds

Horizontal Protocol Processing Architecture for High Performance Parallel Processing (고성능 병렬 처리를 위한 수평적인 프로토콜 처리 구조)

  • Kim, Pyeong-Jung;Park, Chi-Hang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1386-1396
    • /
    • 1996
  • In the distributed multimedia application, high throughput and low delay is one of the most important QoS(Quality of Service) requirement. Emerging high speed communication offers transmission rate above Gbps, but it can not be utilized efficiently by the performance bottlenecks of communication protocols. To overcom the problem, we propose a horizontal processing architecture that processes data as soon as it arrive from the network. Unfortunately, the OSI protocol stack often imposes ordering constraints that prevent concurrent processing of the protocol layers. By using a fixed packet format, the network layer through the presentation layer are processed in parallel. Our prototype shows that the proposed model has performance improvement up to 61% more advantage than the conventional approach.

  • PDF

Energy-Efficiency Power Allocation for Cognitive Radio MIMO-OFDM Systems

  • Zuo, Jiakuo;Dao, Van Phuong;Bao, Yongqiang;Fang, Shiliang;Zhao, Li;Zou, Cairong
    • ETRI Journal
    • /
    • v.36 no.4
    • /
    • pp.686-689
    • /
    • 2014
  • This paper studies energy-efficiency (EE) power allocation for cognitive radio MIMO-OFDM systems. Our aim is to minimize energy efficiency, measured by "Joule per bit" metric, while maintaining the minimal rate requirement of a secondary user under a total power constraint and mutual interference power constraints. However, since the formulated EE problem in this paper is non-convex, it is difficult to solve directly in general. To make it solvable, firstly we transform the original problem into an equivalent convex optimization problem via fractional programming. Then, the equivalent convex optimization problem is solved by a sequential quadratic programming algorithm. Finally, a new iterative energy-efficiency power allocation algorithm is presented. Numerical results show that the proposed method can obtain better EE performance than the maximizing capacity algorithm.

Cycle-accurate NPU Simulator and Performance Evaluation According to Data Access Strategies (Cycle-accurate NPU 시뮬레이터 및 데이터 접근 방식에 따른 NPU 성능평가)

  • Kwon, Guyun;Park, Sangwoo;Suh, Taeweon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.17 no.4
    • /
    • pp.217-228
    • /
    • 2022
  • Currently, there are increasing demands for applying deep neural networks (DNNs) in the embedded domain such as classification and object detection. The DNN processing in embedded domain often requires custom hardware such as NPU for acceleration due to the constraints in power, performance, and area. Processing DNN models requires a large amount of data, and its seamless transfer to NPU is crucial for performance. In this paper, we developed a cycle-accurate NPU simulator to evaluate diverse NPU microarchitectures. In addition, we propose a novel technique for reducing the number of memory accesses when processing convolutional layers in convolutional neural networks (CNNs) on the NPU. The main idea is to reuse data with memory interleaving, which recycles the overlapping data between previous and current input windows. Data memory interleaving makes it possible to quickly read consecutive data in unaligned locations. We implemented the proposed technique to the cycle-accurate NPU simulator and measured the performance with LeNet-5, VGGNet-16, and ResNet-50. The experiment shows up to 2.08x speedup in processing one convolutional layer, compared to the baseline.

Software Design of Stores Management System based on the TMO Model (TMO 모델 기반 무장 관리 시스템 소프트웨어 설계)

  • Park, Hansol
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.13 no.1
    • /
    • pp.1-6
    • /
    • 2017
  • A stores management software which is embedded in the stores management system requires high-level reliability and real-time processing. It also required to implement and verify protocols which requires timing constraints to control various weapons. In this paper, we propose design methodology to design a stores management software and its support middleware based on the TMO (Time-triggered Message-triggered Object) model.

Range Data Sementation and Classification Using Eigenvalues of Surface Function and Neural Network (면방정식의 고유치와 신경회로망을 이용한 거리영상의 분할과 분류)

  • 정인갑;현기호;이진재;하영호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.7
    • /
    • pp.70-78
    • /
    • 1992
  • In this paper, an approach for 3-D object segmentation and classification, which is based on eigen-values of polynomial function as their surface features, using neural network is proposed. The range images of 3-D objects are classified into surface primitives which are homogeneous in their intrinsic eigenvalue properties. The misclassified regions due to noise effect are merged into correct regions satisfying homogeneous constraints of Hopfield neural network. The proposed method has advantage of processing both segmentation and classification simultaneously.

  • PDF

Optimization of H.263 Encoder on a High Performance DSP (고성능 DSP 에서의 H.263 인코더 최적화)

  • 문종려;최수철;정선태
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.99-102
    • /
    • 2003
  • Computing environments of Embedded Systems are different from those of desktop computers so that they have resource constraints such as CPU processing, memory capacity, power, and etc.. Thus, when a desktop S/W is ported into embedded systems, optimization should be seriously considered. In this paper, we investigate several S/W optimization techniques to be considered for porting H.263 encoder into a high performance DSP, TMS320C6711. Through experiments, it is found that optimization techniques employed can make a big performance improvement.

  • PDF

Filtering Techniques for Chaotic Signals

  • Lee, Chung-Yong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.3E
    • /
    • pp.45-59
    • /
    • 1996
  • Generalized iterative methods for reducing noise in contaminated chaotic signals are proposed. These methods minimize a cost function composed of two parts : one containing information that represents how close enhanced signals are to the observed signal and another composed of constraints that fit the dynamics of the system. The convergence conditions and the error systems of the proposed are investigated. As one aspect of noise reduction, the suppression or cancellation of a chaotic interference signal is discussed.

  • PDF

The Design of High Resolution Video Memory using DRAMs (DRAM을 사용한 고해상도 화상 메모리의 설계)

  • Park, Kun-Jahk
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.247-249
    • /
    • 1988
  • The most space-consuming element of digital image processing system is the video memory. Though this problem is solved by DRAMs, timing constraints posed by video data rates. The cycle time of DRAMs can be diminished by serial transferring and reading or writing pixel datas at the same time. This paper resents the design of 1024${\times}$512 video memory using this technique.

  • PDF

A Robust Non-Speech Rejection Algorithm

  • Ahn, Young-Mok
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.1E
    • /
    • pp.10-13
    • /
    • 1998
  • We propose a robust non-speech rejection algorithm using the three types of pitch-related parameters. The robust non-speech rejection algorithm utilizes three kinds of pitch parameters : (1) pitch range, (2) difference of the successive pitch range, and (3) the number of successive pitches satisfying constraints related with the previous two parameters. The acceptance rate of the speech commands was 95% for -2.8dB signal-to-noise ratio (SNR) speech database that consisted of 2440 utterances. The rejection rate of the non-speech sounds was 100% while the acceptance rate of the speech commands was 97% in an office environment.

  • PDF

보안 지식 베이스 관리 시스템에서의 질의 처리

  • 조일래;김원중;심갑식
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.85-94
    • /
    • 1997
  • This paper describes the notion of a Multilevel Secure Knowledge Base Management System(MLS/KBMS). It states a security policy and security constraints. A design for query operation introduced cover story in a MLS/KBMS is discussed. Query processing approach is to provide cover stories that lead to alternative explanations for readily available information. Therefore such cover stories prevent an unauthorized user from inferring high-level information from low-level data.

  • PDF