• Title/Summary/Keyword: simulation architecture

Search Result 3,024, Processing Time 0.029 seconds

Design of $AB^2 $ Multiplier for Public-key Cryptosystem (공개키 암호 시스템을 위한 $AB^2 $곱셈기 설계)

  • 김현성;유기영
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.93-98
    • /
    • 2003
  • This paper presents two new algorithms and their architectures for $AB^2 $ multiplication over $GF(2^m)$.First, a new architecture with a new algorithm is designed based on LFSR (Linear Feedback Shift Register) architecture. Furthermore, modified $AB^2 $ multiplier is derived from the multiplier. The multipliers and the structure use AOP (All One Polynomial) as a modulus, which hat the properties of ail coefficients with 1. Simulation results thews that proposed architecture has lower hardware complexity than previous architectures. They could be. Therefore it is useful for implementing the exponential ion architecture, which is the tore operation In public-key cryptosystems.

Turbulence-induced noise of a submerged cylinder using a permeable FW-H method

  • Choi, Woen-Sug;Choi, Yoseb;Hong, Suk-Yoon;Song, Jee-Hun;Kwon, Hyun-Wung;Jung, Chul-Min
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.8 no.3
    • /
    • pp.235-242
    • /
    • 2016
  • Among underwater noise sources around submerged bodies, turbulence-induced noise has not been well investigated because of the difficulty of predicting it. In computational aeroacoustics, a number of studies has been conducted using the Ffowcs Williamse-Hawkings (FW-H) acoustic analogy without consideration of quadrupole source term due to the unacceptable calculation cost. In this paper, turbulence-induced noise is predicted, including that due to quadrupole sources, using a large eddy simulation (LES) turbulence model and a developed formulation of permeable FW-H method with an open source computational fluid dynamics (CFD) tool-kit. Noise around a circular cylinder is examined and the results of using the acoustic analogy method with and without quadrupole noise are compared, i.e. the FW-H method without quadrupole noise versus the permeable FW-H method that includes quadrupole sources. The usability of the permeable FW-H method for the prediction of turbulence-noise around submerged bodies is shown.

A Pixel Pipeline Architecture with Effective Visibility Test for 3D Graphics Accelerators (향상된 가시성 검사를 수행하는 3차원 그래픽 가속기의 픽셀 파이프라인 구조)

  • Kim, Il-San;Park, Woo-Chan;Park, Jin-Hong;Han, Tack-Don
    • Journal of Korea Game Society
    • /
    • v.7 no.3
    • /
    • pp.31-38
    • /
    • 2007
  • In this paper, we proposed an effective visibility test architecture with improving the mid-texturing architecture. The proposed architecture uses the property of fragments that the visibility of adjacent fragments is identical, and performs only a single visibility test per fragment. To compare with the mid-texturing architecture, simulation results show that the bandwidth requirements and the cell area of the depth cache in the proposed architecture are reduce by 25% and 34%, respectively, in exchange for less than 5% performance decline.

  • PDF

A Cache Controller to Maximize Effectiveness of Hierarchical Memory Architecture (계층적 메모리 구조의 효과를 극대화하는 캐시 제어기)

  • Uh Bong Yong;Ju Young Kwan;Cheon Joong Nam;Kim Suk Il
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.11_12
    • /
    • pp.608-616
    • /
    • 2005
  • A cache architecture is proposed here which evokes prefetch at level 1 cache miss. Existing structures only prefetch at level 2 cache miss. In the proposed cache architecture, level 1 cache miss would select demand fetch block and prefetch block from the level 2 cache and store to level 1 cache and prefetch cache, respectively. According to an experimental analysis using 11 benchmark programs, the hierarchical cache architecture that employs both a level 1 cache prefetcher and a level 2 cache prefetcher obtained a maximum $19\%$ increased performance when compared to the cache architecture that employs only a level 2 cache prefetcher.

An Asymmetric Key-Based Security Architecture for Wireless Sensor Networks

  • Haque, Md. Mokammel;Pathan, Al-Sakib Khan;Hong, Choong-Seon;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.5
    • /
    • pp.265-277
    • /
    • 2008
  • In spite of previous common assumptions about the incompatibility of public key cryptography (PKC) schemes with wireless sensor networks (WSNs), recent works have shown that they can be utilized for such networks in some manner. The major challenge of employing a PKC-based scheme in a wireless sensor network is posed by the resource limitations of the tiny sensors. Considering this sensor feature, in this paper we propose an efficient PKC-based security architecture with relatively lower resource requirements than those of previously proposed PKC schemes for WSN. In addition, our scheme aims to provide robust security in the network. Our security architecture comprises two basic components; a key handshaking scheme based on simple, linear operations and the derivation of a decryption key by a receiver node. Our architecture enables node-to-base-station and node-to-node secure communications. Analysis and simulation results show that our proposed architecture ensures a good level of security for network communications, and can be effectively implemented with the limited computational, memory, and energy budgets of current-generation sensor nodes.

Lab-scale impact test to investigate the pipe-soil interaction and comparative study to evaluate structural responses

  • Ryu, Dong-Man;Lee, Chi-Seung;Choi, Kwang-Ho;Koo, Bon-Yong;Song, Joon-Kyu;Kim, Myung-Hyun;Lee, Jae-Myung
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • v.7 no.4
    • /
    • pp.720-738
    • /
    • 2015
  • This study examined the dynamic response of a subsea pipeline under an impact load to determine the effect of the seabed soil. A laboratory-scale soil-based pipeline impact test was carried out to investigate the pipeline deformation/strain as well as the interaction with the soil-pipeline. In addition, an impact test was simulated using the finite element technique, and the calculated strain was compared with the experimental results. During the simulation, the pipeline was described based on an elasto-plastic analysis, and the soil was modeled using the Mohr-Coulomb failure criterion. The results obtained were compared with ASME D31.8, and the differences between the analysis results and the rules were specifically investigated. Modified ASME formulae were proposed to calculate the precise structural behavior of a subsea pipeline under an impact load when considering sand- and clay-based seabed soils.

A Study on Telecommunication Network Architecture for Intelligence Transportation System Based on DSRC Technology (DSRC 기술을 활용한 지능형 교통 시스템의 통신망 구조 연구)

  • Yee, Soung-Ryong;Choe, Kyung-Il;Lee, Hee-Sang;Kim, Yun-Bae
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.26 no.4
    • /
    • pp.345-353
    • /
    • 2000
  • ITS(Intelligent Transportation System) is an advanced system which can effectively handle the current transportation and tragic problems. In order to beneficially apply ITS to the current transportation infrastructure we need a telecommunication technology which guarantees high speed data transmission between the road side units and the on-board units in the vehicles. DSRC(Dedicated Short Range Communication) is considered as a promising technology since it has the capability of two-way communication and can serve to implement various ITS services. In this paper, we study an architecture of telecommunication network far ITS based on DSRC. We use the ISCNA(Information Systems and Communication Networks Architecture) framework for the method of approach. We first analyze the requirements for ITS services using DSRC in Korea, and then establish a logical architecture for the network. We also analyze the types of data and process between the network components. Based on these we propose an architecture for the telecommunication network for ITS. We also briefly discuss the simulation which we perform to validate the proposed network architecture.

  • PDF

CNN-based damage identification method of tied-arch bridge using spatial-spectral information

  • Duan, Yuanfeng;Chen, Qianyi;Zhang, Hongmei;Yun, Chung Bang;Wu, Sikai;Zhu, Qi
    • Smart Structures and Systems
    • /
    • v.23 no.5
    • /
    • pp.507-520
    • /
    • 2019
  • In the structural health monitoring field, damage detection has been commonly carried out based on the structural model and the engineering features related to the model. However, the extracted features are often subjected to various errors, which makes the pattern recognition for damage detection still challenging. In this study, an automated damage identification method is presented for hanger cables in a tied-arch bridge using a convolutional neural network (CNN). Raw measurement data for Fourier amplitude spectra (FAS) of acceleration responses are used without a complex data pre-processing for modal identification. A CNN is a kind of deep neural network that typically consists of convolution, pooling, and fully-connected layers. A numerical simulation study was performed for multiple damage detection in the hangers using ambient wind vibration data on the bridge deck. The results show that the current CNN using FAS data performs better under various damage states than the CNN using time-history data and the traditional neural network using FAS. Robustness of the present CNN has been proven under various observational noise levels and wind speeds.

Comparative Study on Similarity Measurement Methods in CBR Cost Estimation

  • Ahn, Joseph;Park, Moonseo;Lee, Hyun-Soo;Ahn, Sung Jin;Ji, Sae-Hyun;Kim, Sooyoung;Song, Kwonsik;Lee, Jeong Hoon
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.597-598
    • /
    • 2015
  • In order to improve the reliability of cost estimation results using CBR, there has been a continuous issue on similarity measurement to accurately compute the distance among attributes and cases to retrieve the most similar singular or plural cases. However, these existing similarity measures have limitations in taking the covariance among attributes into consideration and reflecting the effects of covariance in computation of distances among attributes. To deal with this challenging issue, this research examines the weighted Mahalanobis distance based similarity measure applied to CBR cost estimation and carries out the comparative study on the existing distance measurement methods of CBR. To validate the suggest CBR cost model, leave-one-out cross validation (LOOCV) using two different sets of simulation data are carried out. Consequently, this research is expected to provide an analysis of covariance effects in similarity measurement and a basis for further research on the fundamentals of case retrieval.

  • PDF