• 제목/요약/키워드: standard algorithm

검색결과 2,739건 처리시간 0.03초

Development of a heuristic algorithm for the effective design of military information networks (국방 전산망의 효율적인 설계를 위한 휴리스틱 알고리듬 개발)

  • U, Hun-Sik;Yoon, Dong-Won
    • Journal of National Security and Military Science
    • /
    • 통권1호
    • /
    • pp.345-360
    • /
    • 2003
  • To build an information oriented armed forces, the Korean military telecommunication networks adopt TCP/IP standard communication infrastructures based on ATM packet switched networks. Utilizing this network infrastructure, the Korean armed forces also applies to the areas of battleship management for efficient operation command controls and resource management for efficient resource allocations. In this military communication networks, it is essential to determine the least cost network topology under equal performance and reliability constraints. Basically, this type of communication network design problem is known in the literature as an NP Hard problem. As the number of network node increases, it is very hard to obtain an optimal solution in polynomial time. Therefore, it is reasonable to use a heuristic algorithm which provides a good solution with minimal computational efforts. In this study, we developed a simulated annealing based heuristic algorithm which can be utilized for the design of military communication networks. The developed algorithm provides a good packet switched network topology which satisfies a given set of performance and reliability constraints with reasonable computation times.

  • PDF

Performance Analysis of the UPC/NPC Algorithm for Guaranteed QoS in ATM Networks

  • Kim, Yong-Jin;Kim, Jang-Kyung;Lee, Young-Hee;Park, Chee-Hang
    • ETRI Journal
    • /
    • 제20권3호
    • /
    • pp.251-271
    • /
    • 1998
  • It is well known that if usage parameter control/network parameter control (UPC/NPC) functions are used together with a cell loss priority control scheme in ATM networks, the measurement phasing problem can occur. This makes it difficult for a network provider to define and commit the cell loss ratio as a QoS parameter. To solve the problem, we propose a new UPC/NPC algorithm. By using the proposed UPC/NPC algorithm, we can define the cell loss ratios for CLP = 0 and CLP = 0+1 cell streams without the measurement phasing problem under any conditions. We analyzed the performance of the proposed UPC/NPC algorithm. Using a discrete time model for the UPC/NPC architecture with a discrete-time semi-Markov process (DSMP) input model, we obtained the cell discarding probabilities of CLP = 0 and CLP = 0+1 cells streams and showed that more CLP = 0 cells are accepted compared to what was proposed in ITU-T.

  • PDF

The Analysis of New Video Conference System Based Secure Authentication

  • Jung Yong Deug;Kim Gil Choon;Jun Moon Seog
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2004년도 학술대회지
    • /
    • pp.600-607
    • /
    • 2004
  • The paper describes the implementation of the video conferencing system using public key infrastructure which is used for user authentication and media stream encryption. Using public key infrastructure, we are able to reinforce the authentication for conference participant and block several malicious hacking while protecting conference control information. The paper shows the implementation of the transportation layer secure protocol in conformity with Korea public key authentication algorithm standard and symmetric key encryption algorithm (RC2, SEED, DES and 3DES) for media stream encryption. The feature of the paper is transportation layer secure protocol that is implemented for protection of information on a user authentication and video conference and the media streaming encryption algorithm also can be envisioned with another block encryption algorithm. The key for media streaming encryption may be safely distributed by the transportation layer secure protocol.

  • PDF

The ASIC Design of the Adaptive De-interlacing Algorithm with Improved Horizontal and Vertical Edges (수평 및 수직 윤곽선을 개선한 ADI(Adaptive De-interlacing) 보간 알고리즘의 ASIC 설계)

  • 한병혁;박노경;배준석;박상봉
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2000년도 추계종합학술대회 논문집(4)
    • /
    • pp.139-142
    • /
    • 2000
  • In this paper, the ADI (Adaptive De-interlacing) algorithm is proposed, which improves visually and subjectively horizontal and vertical edges of the image processed by the ELA(Edge Line-based Average) method. This paper also proposes a VLSI architecture for the proposed algorithm and designed the architecture through the full custom CMOS layout process. The proposed algorithm is verified using C and Matlab and implemented using 0.6$\mu\textrm{m}$ 2-poly 3-metal CMOS standard libraries. For the circuit and logic simulation, Cadence tool is used.

  • PDF

A Study on Algorithm and Hardware Structure of the Improved Rate-Distortion Optimization for JPEG2000 (JPEG2000을 위한 개선된 비율-왜곡 최적화 알고리즘 및 하드웨어 구조에 관한 연구)

  • Moon, Hyoung-Jin;Park, Sung-Mo
    • Proceedings of the IEEK Conference
    • /
    • 대한전자공학회 2005년도 추계종합학술대회
    • /
    • pp.999-1002
    • /
    • 2005
  • This paper describes an improved Rate-Distortion Optimization Algorithm for JPEG2000. We proposed a new optimal constant setting method and rate allocation method to reduce execution time of the rate control. And we proposed hardware structure of the improved R-D opti. algorithm. Consequently, improved Rate-Distortion Optimization algorithm is faster than conventional rate control scheme in JPEG2000 standard and have nearly same performance.

  • PDF

Low-Power Encryption Algorithm Block Cipher in JavaScript

  • Seo, Hwajeong;Kim, Howon
    • Journal of information and communication convergence engineering
    • /
    • 제12권4호
    • /
    • pp.252-256
    • /
    • 2014
  • Traditional block cipher Advanced Encryption Standard (AES) is widely used in the field of network security, but it has high overhead on each operation. In the 15th international workshop on information security applications, a novel lightweight and low-power encryption algorithm named low-power encryption algorithm (LEA) was released. This algorithm has certain useful features for hardware and software implementations, that is, simple addition, rotation, exclusive-or (ARX) operations, non-Substitute-BOX architecture, and 32-bit word size. In this study, we further improve the LEA encryptions for cloud computing. The Web-based implementations include JavaScript and assembly codes. Unlike normal implementation, JavaScript does not support unsigned integer and rotation operations; therefore, we present several techniques for resolving this issue. Furthermore, the proposed method yields a speed-optimized result and shows high performance enhancements. Each implementation is tested using various Web browsers, such as Google Chrome, Internet Explorer, and Mozilla Firefox, and on various devices including personal computers and mobile devices. These results extend the use of LEA encryption to any circumstance.

A Novel Detection Algorithm for Instantaneous Voltage Sag Corrector Using Series Compensator

  • Lee, Sang-Hoon;Choi, Jae-Ho
    • Proceedings of the KIPE Conference
    • /
    • 전력전자학회 2001년도 Proceedings ICPE 01 2001 International Conference on Power Electronics
    • /
    • pp.502-507
    • /
    • 2001
  • This paper proposes a novel detection algorithm of faulted voltages under the unbalanced condition. To quantify the standard of unbalance under the faulted conditions, the 3-phase unbalanced voltages are decomposed into two balanced 3-phase symmetrical components of the positive and negative sequence voltages, which is defined by the magnitude factor (MF) and unbalance factor (MF). It is analyzed that MF and UF values are given as the dc constant values even though unbalance condition. This paper also proposes the control scheme of the instantaneous voltage sag corrector based on this detection algorithm. The validity of the proposed algorithm is verified through the EMTDC simulation and experiments.

  • PDF

Numerical Analysis of Solidification and Melting Phase Change Using Modified PISO algorithm (수정된 PISO 알고리즘을 이용한 응고 및 융해 현상의 수치해석)

  • Kang K. G;Ryou H. S;Hur N.
    • Journal of computational fluids engineering
    • /
    • 제8권3호
    • /
    • pp.12-20
    • /
    • 2003
  • A numerical procedure for the calculation of solidification and melting phase change using PISO algorithm is presented. In case of phase change problem, the coupling between velocity/pressure/temperature and liquid fraction is important. The converged temperature and liquid fraction solution which satisfies the energy balance is acquired by applying enthalpy method into inner iteration in matrix solver. And a modified PISO algorithm version is introduced to properly solve the coupling between velocity/pressure/temperature and liquid fraction. A comparison of the proposed procedure with a standard iterative method shows improvement both in terms of computing speed and robustness.

A Self-Organizing Map Based Hough Transform for Detecting Straight Lines (직선 추출을 위한 자기조직화지도 기반의 허프 변환)

  • Lee, Moon-Kyu
    • Journal of Korean Institute of Industrial Engineers
    • /
    • 제28권2호
    • /
    • pp.162-170
    • /
    • 2002
  • Detecting straight lines in an image is frequently required for various machine vision applications such as restoring CAD drawings from scanned images and object recognition. The standard Hough transform has been dominantly used to that purpose. However, massive storage requirement and low precision in estimating line parameters due to the quantization of parameter space are the major drawbacks of the Hough transform technique. In this paper, to overcome the drawbacks, an iterative algorithm based on a self-organizing map is presented. The self-organizing map can be adaptively learned such that image points are clustered by prominent lines. Through the procedure of the algorithm, a set of lines are sequentially detected one at a time. The algorithm can produce highly precised estimates of line parameters using very small amount of storage memory. Computational results for synthetically generated images are given. The promise of the algorithm is also demonstrated with its application to two natural images of inserts.

Unified Design Method for Toroidal Transformer and its Optimal Algorithm (토로이드형 변압기의 일관성있는 설계법과 그 최적화 알고리즘)

  • 김주홍;이광직
    • The Proceedings of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • 제5권3호
    • /
    • pp.78-83
    • /
    • 1991
  • This study proposes a unified method to design toroidal transformer and its optimal design algorithm. This unified design method was derived from the fundamental equation of power on the basis of electromagnetic energy of a core and the definition of three parameters(K1, K2, KW) that influence the form of a core and the ratio of a core and coil. Accordingly this design method condenses the whole data for design of toroidal transformer to a standard variable which is the inner diameter of a core. The minimal cost, weight and volume values of the transformer were computed by means of the algorithm to search the optimal values of the parameters. Furthermore, through the CAD, the efficiency of this unified design method and optimal algorithm proposed in this paper was confirmed.

  • PDF