• 제목/요약/키워드: scalar

Search Result 1,039, Processing Time 0.026 seconds

A Block-Based Volume Rendering Algorithm Using Shear-Warp factorization (쉬어-왑 분해를 이용한 블록 기반의 볼륨 렌더링 기법)

  • 권성민;김진국;박현욱;나종범
    • Journal of Biomedical Engineering Research
    • /
    • v.21 no.4
    • /
    • pp.433-439
    • /
    • 2000
  • Volume rendering is a powerful tool for visualizing sampled scalar values from 3D data without modeling geometric primitives to the data. The volume rendering can describe the surface-detail of a complex object. Owing to this characteristic. volume rendering has been used to visualize medical data. The size of volume data is usually too big to handle in real time. Recently, various volume rendering algorithms have been proposed in order to reduce the rendering time. However, most of the proposed algorithms are not proper for fast rendering of large non-coded volume data. In this paper, we propose a block-based fast volume rendering algorithm using a shear-warp factorization for non-coded volume data. The algorithm performs volume rendering by using the organ segmentation data as well as block-based 3D volume data, and increases the rendering speed for large non-coded volume data. The proposed algorithm is evaluated by rendering 3D X-ray CT body images and MR head images.

  • PDF

Sepculative Updates of a Stride Value Predictor in Wide-Issue Processors (와이드 이슈 프로세서를 위한 스트라이드 값 예측기의 모험적 갱신)

  • Jeon, Byeong-Chan;Lee, Sang-Jeong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.11
    • /
    • pp.601-612
    • /
    • 2001
  • In superscalar processors, value prediction is a technique that breaks true data dependences by predicting the outcome of an instruction in order to exploit instruction level parallelism(ILP). A value predictor looks up the prediction table for the prediction value of an instruction in the instruction fetch stage, and updates with the prediction result and the resolved value after the execution of the instruction for the next prediction. However, as the instruction fetch and issue rates are increased, the same instruction is likely to fetch again before is has been updated in the predictor. Hence, the predictor looks up the stale value in the table and this mostly will cause incorrect value predictions. In this paper, a stride value predictor with the capability of speculative updates, which can update the prediction table speculatively without waiting until the instruction has been completed, is proposed. Also, the performance of the scheme is examined using Simplescalar simulator for SPECint95 benchmarks in which our value predictor is added.

  • PDF

A Fast Processing Algorithm for Lidar Data Compression Using Second Generation Wavelets

  • Pradhan B.;Sandeep K.;Mansor Shattri;Ramli Abdul Rahman;Mohamed Sharif Abdul Rashid B.
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.1
    • /
    • pp.49-61
    • /
    • 2006
  • The lifting scheme has been found to be a flexible method for constructing scalar wavelets with desirable properties. In this paper, it is extended to the UDAR data compression. A newly developed data compression approach to approximate the UDAR surface with a series of non-overlapping triangles has been presented. Generally a Triangulated Irregular Networks (TIN) are the most common form of digital surface model that consists of elevation values with x, y coordinates that make up triangles. But over the years the TIN data representation has become an important research topic for many researchers due its large data size. Compression of TIN is needed for efficient management of large data and good surface visualization. This approach covers following steps: First, by using a Delaunay triangulation, an efficient algorithm is developed to generate TIN, which forms the terrain from an arbitrary set of data. A new interpolation wavelet filter for TIN has been applied in two steps, namely splitting and elevation. In the splitting step, a triangle has been divided into several sub-triangles and the elevation step has been used to 'modify' the point values (point coordinates for geometry) after the splitting. Then, this data set is compressed at the desired locations by using second generation wavelets. The quality of geographical surface representation after using proposed technique is compared with the original UDAR data. The results show that this method can be used for significant reduction of data set.

Permanent Magnet Synchronous Motor Control Algorithm Based on Stability Margin and Lyapunov Stability Analysis

  • Jie, Hongyu;Xu, Hongbing;Zheng, Yanbing;Xin, Xiaoshuai;Zheng, Gang
    • Journal of Power Electronics
    • /
    • v.19 no.6
    • /
    • pp.1505-1514
    • /
    • 2019
  • The permanent magnet synchronous motor (PMSM) is widely used in various fields and the proportional-integral (PI) controller is popular in PMSM control systems. However, the motor parameters are usually unknown, which can lead to a complicated PI controller design and poor performance. In order to design a PI controller with good performance when the motor parameters are unknown, a control algorithm based on stability margin is proposed in this paper. First of all, based on the mathematical model of the PMSM and the least squares (LS) method, motor parameters are estimated offline. Then based on the estimation values of the motor parameters, natural angular frequency and phase margin, a PI controller is designed. Performance indices including the natural angular frequency and the phase margin are used directly to design the PI controller in this paper. Scalar functions of the d-loop and the q-loop are selected. It can be seen that the designed controller parameters satisfy Lyapunov large scale asymptotic stability theory if the natural angular frequencies of the d-loop and the q-loop are large than 0. Experimental results show that the parameter estimation method has good accuracy and the designed PI controller proposed in this paper has good static and dynamic performances.

Particle-based Numerical Simulation of Continuous Ice Breaking Process around Wedge-type Model Ship (쐐기형 모형선 주위 연속 쇄빙과정에 관한 입자 기반 수치 시뮬레이션)

  • Ren, Di;Sin, Woo-Jin;Kim, Dong-Hyun;Park, Jong-Chun;Jeong, Seong-Yeob
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.57 no.1
    • /
    • pp.23-34
    • /
    • 2020
  • This paper covers the development of prediction techniques for ice load on ice-breakers operating in continuous ice-breaking under level ice conditions using particle-based continuum mechanics. Ice is assumed to be a linear elastic material until the fracture occurs. The maximum normal stress theory is used for the criterion of fracture. The location of the crack can be expressed using a local scalar function consisting of the gradient of the first principal stress and the corresponding eigen-vector. This expression is used to determine the relative position of particle pair to the new crack. The Hertz contact model is introduced to consider the collisions between ice fragments and the collisions between hull and ice fragments. In order to verify the developed technique, the simulation results for the three-point bending problems of ice-specimen and the continuous ice-breaking problem around a wedge-type model ship with bow angle of 20° are compared with the experimental results carrying out at Korea Research Institute of Ships and Ocean Engineering (KRISO).

ON ℤpp[u]/k>-CYCLIC CODES AND THEIR WEIGHT ENUMERATORS

  • Bhaintwal, Maheshanand;Biswas, Soumak
    • Journal of the Korean Mathematical Society
    • /
    • v.58 no.3
    • /
    • pp.571-595
    • /
    • 2021
  • In this paper we study the algebraic structure of ℤpp[u]/k>-cyclic codes, where uk = 0 and p is a prime. A ℤpp[u]/k>-linear code of length (r + s) is an Rk-submodule of ℤrp × Rsk with respect to a suitable scalar multiplication, where Rk = ℤp[u]/k>. Such a code can also be viewed as an Rk-submodule of ℤp[x]/r - 1> × Rk[x]/s - 1>. A new Gray map has been defined on ℤp[u]/k>. We have considered two cases for studying the algebraic structure of ℤpp[u]/k>-cyclic codes, and determined the generator polynomials and minimal spanning sets of these codes in both the cases. In the first case, we have considered (r, p) = 1 and (s, p) ≠ 1, and in the second case we consider (r, p) = 1 and (s, p) = 1. We have established the MacWilliams identity for complete weight enumerators of ℤpp[u]/k>-linear codes. Examples have been given to construct ℤpp[u]/k>-cyclic codes, through which we get codes over ℤp using the Gray map. Some optimal p-ary codes have been obtained in this way. An example has also been given to illustrate the use of MacWilliams identity.

Earthquake Response Analysis for Three-Story Building with Reinforced Concrete Shear Walls (3층 철근콘크리트 전단벽 구조물의 지진응답해석)

  • Rhee, Inkyu;Lee, Eun-Haeng;Kim, Jae-Min
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.25 no.3
    • /
    • pp.103-110
    • /
    • 2021
  • A shake table test is conducted for the three-story reinforced concrete building structure using 0.28 g, 0.5 g, 0.75 g, and 1.0 g of seismic input motions based on the Gyeongju earthquake. Computational efforts are made in parallel to explore the mechanical details in the structure. For engineering practice, the elastic modulus of concrete and rebar in the dynamic analysis is reduced to 38% and 50%, respectively, to calibrate the structure's natural frequencies. The engineering approach to the reduced modulus of elasticity is believed to be due to the inability to specify the flexibility of the actual boundary conditions. This aspect may lead to disadvantages of nonlinear dynamic analysis that can distort local stress and strain relationships. The initial elastic modulus can be applied directly without the so-called engineering adjustment with infinite element models with spring and spring-dashpot boundary conditions. This has the advantage of imposing the system flexibility of the structure on the sub-boundary conditions of springs and damping devices to control its sensitivity in a serial arrangement. This can reflect the flexibility of realistic boundary conditions and the effects of system damping (such as the gap between a concrete footing and shake table, loosening of steel anchors, etc.) in scalar quantities. However, these spring and dashpot coefficients can only be coordinated based on experimental results, making it challenging to select the coefficients in-prior to perform an experimental test.

Efficiency Improvement Using Two Balanced Subsets (두 개의 balanced subset을 이용한 효율성 개선)

  • Kim, HongTae
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.13-18
    • /
    • 2018
  • Efficiency is one of the most important factors in cryptographic systems. Cheon et al. proposed a new exponent form for speeding up the exponentiation operation in discrete logarithm based cryptosystems. It is called split exponent with the form $e_1+{\alpha}e_2$ for a fixed element ${\alpha}$ and two elements $e_1$, $e_2$ with low Hamming weight representations. They chose $e_1$, $e_2$ in two unbalanced subsets $S_1$, $S_2$ of $Z_p$, respectively. We achieve efficiency improvement making $S_1$, $S_2$ balanced subsets of $Z_p$. As a result, speedup for exponentiations on binary fields is 9.1% and speedup for scalar multiplications on Koblitz Curves is 12.1%.

  • PDF

A Lightweight Hardware Implementation of ECC Processor Supporting NIST Elliptic Curves over GF(2m) (GF(2m) 상의 NIST 타원곡선을 지원하는 ECC 프로세서의 경량 하드웨어 구현)

  • Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of IKEEE
    • /
    • v.23 no.1
    • /
    • pp.58-67
    • /
    • 2019
  • A design of an elliptic curve cryptography (ECC) processor that supports both pseudo-random curves and Koblitz curves over $GF(2^m)$ defined by the NIST standard is described in this paper. A finite field arithmetic circuit based on a word-based Montgomery multiplier was designed to support five key lengths using a datapath of fixed size, as well as to achieve a lightweight hardware implementation. In addition, Lopez-Dahab's coordinate system was adopted to remove the finite field division operation. The ECC processor was implemented in the FPGA verification platform and the hardware operation was verified by Elliptic Curve Diffie-Hellman (ECDH) key exchange protocol operation. The ECC processor that was synthesized with a 180-nm CMOS cell library occupied 10,674 gate equivalents (GEs) and a dual-port RAM of 9 kbits, and the maximum clock frequency was estimated at 154 MHz. The scalar multiplication operation over the 223-bit pseudo-random elliptic curve takes 1,112,221 clock cycles and has a throughput of 32.3 kbps.

Elliptic Curve Scalar Multiplication Resistant against Side Channel Attacks (부채널 공격에 안전한 타원곡선 스칼라 곱셈 알고리즘)

  • Kim Tae Hyun;Jang Sang-Woon;Kim Woong Hee;Park Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.6
    • /
    • pp.125-134
    • /
    • 2004
  • When cryptosystem designers implement devices that computing power or memory is limited such as smart cards, PDAs and so on, not only he/she has to be careful side channel attacks(SCA) but also the cryptographic algorithms within the device has to be efficient using small memory. For this purpose, countermeasures such as Moiler's method, Okeya-Takagi's one and overlapping window method, based on window method to prevent SCA were proposed. However, Moiler's method and Okeya-Talngi's one require additional cost to prevent other SCA such as DPA, Second-Order DPA, Address-DPA, and so on since they are immune to only SPA. Also, overlapping window method has a drawback that requires big memory. In this paper, we analyze existing countermeasures and propose an efficient and secure countermeasure that is immune to all existing SCA using advantages of each countermeasure. Moreover, the proposed countermeasure can enhance the efficiency using mixed coordinate systems.