Search : [ keyword: Lightweight ] (6)

Efficiently Lightweight Korean Language Model with Post-layer Pruning and Multi-stage Fine-tuning

Jae Seong Kim, Suan Lee

http://doi.org/10.5626/JOK.2025.52.3.260

The increasing size of large-scale language models has led to the need for lightweighting for practical applications. This study presents a method to reduce the existing 8B model to 5B by late-layer pruning, while maintaining and improving its performance through two phases of fine-tuning. In the broad fine-tuning phase, we expanded the model's ability to understand and generate Korean by utilizing English-Korean parallel data and a large Korean corpus, and in the refined fine-tuning phase, we enhanced its expressive and inferential capabilities with high-quality datasets. In addition, we integrated the strengths of individual models through model merging techniques. In the LogicKor leaderboard evaluation, the proposed model performed well in the areas of reasoning, writing, and comprehension, with an overall score of 4.36, outperforming the original Llama-3.1-8B-Instruct model (4.35). This demonstrates a 37.5% reduction in model size while still improving performance.

Research for Speed Improvement Method of Lightweight Block Cipher CHAM using NEON SIMD

Sujin Lee, Junyoung Kang, Dowon Hong, Changho Seo

http://doi.org/10.5626/JOK.2019.46.5.485

As embedded devices and IoT devices are being developed, lightweight block ciphers have been proposed to achieve confidentiality on low-end devices. Recently, a lightweight block cipher algorithm, called CHAM, with 4-branch Feistel structure was proposed in Korea. It is consists of CHAM-64/128, CHAM-128/128, and CHAM-128/256 depending on the size of plaintext and secret key. CHAM, which is based on ‘stateless on the fly’ key schedule and ARX operations, is efficient on embedded devices, especially on low-end devices. In this paper, we analyze the lightweight block cipher CHAM and study an optimization method on a high-end IoT device. We implemented a serial code by independently generating round keys and leveraging 4-branch Feistel structure, and optimized CHAM using NEON-SIMD on ARM Cortex-A53.

A Simplified Test Maturity Model (sTMM) for Small and Midsize Test Organization

Bo Kyung Park, Woo Sung Jang, Ki Du Kim, R. Young Chul Kim

http://doi.org/10.5626/JOK.2018.45.6.522

Software development and management system has been needed to systematically. Domestic companies in Korea want to improve their software quality with software certifications such as capability maturity model integration (CMMI) and test maturity model integration (TMMi). But current certification models must perform many activities on their process for software organizations. Even test organization also takes a lot of time, manpower and cost to prepare TMMi. For this reason, there is increasing a demand to make a slim certification model that reflects our domestic software industry environment. TTA in 2015/2016 asks us to develop a new refined model for a slim test organization of Korea’s software industry environment. In this paper, we suggest a light-weighted TMM for a slim test organization based on the original TMM. With this model, TTA can provide a guideline for improving the test maturity level through assessing two domestic test organizations. As a result, we expect to improve software quality with this model focused on a test organization.

LTRE: Lightweight Traffic Redundancy Elimination in Software-Defined Wireless Mesh Networks

Gwangwoo Park, Wontae Kim, Joonwoo Kim, Sangheon Pack

http://doi.org/10.5626/JOK.2017.44.9.976

Wireless mesh network (WMN) is a promising technology for building a cost-effective and easily-deployed wireless networking infrastructure. To efficiently utilize limited radio resources in WMNs, packet transmissions (particularly, redundant packet transmissions) should be carefully managed. We therefore propose a lightweight traffic redundancy elimination (LTRE) scheme to reduce redundant packet transmissions in software-defined wireless mesh networks (SD-WMNs). In LTRE, the controller determines the optimal path of each packet to maximize the amount of traffic reduction. In addition, LTRE employs three novel techniques: 1) machine learning (ML)-based information request, 2) ID-based source routing, and 3) popularity-aware cache update. Simulation results show that LTRE can significantly reduce the traffic overhead by 18.34% to 48.89%.

Analysis of Research Trend and Performance Comparison on Message Authentication Code

Minwoo Kim, Taekyoung Kwon

http://doi.org/

Cryptographic technologies providing confidentiality and integrity such as encryption algorithms and message authentication codes (MACs) are necessary for preventing security threats in the Internet of Things (IoT) where various kinds of devices are interconnected. As a number of encryption schemes that have passed security verification are not necessarily suitable for low-power and low-performance IoT devices, various lightweight cryptographic schemes have been proposed. However, a study of lightweight MACs is not sufficient in comparison to that of lightweight block ciphers. Therefore, in this paper, we reviewed various kinds of MACs for their classification and analysis and then, we presented a new way for future MAC development. We also implemented major MAC algorithms and performed experiments to investigate their performance degradation on low-end micro-controllers.

Geometry Transformation in Spatial Domain Using Coefficient Changes in Frequency Domain toward Lightweight Image Encryption

Jeong Hyun Joo, Kang Yi

http://doi.org/

Image data is mostly stored in compressed form because of its huge size. Therefore, a series of cumbersome procedures is required to apply a transformation to image data: decompression, extraction of spatial data, transformation and recompression. In this paper, we employ DCT(Discrete Cosine Transform) coefficients to change the spatial presentation of images. DCT is commonly used in still image compression standards such as JPEG and moving picture compression standards such as MPEG-2, MPEG-4, and H.264. In this paper, we derived mathematically the relationship between the geometry transformation in the spatial domain and coefficient changes in the DCT domain and verified it with images in the JPEG file format. Because of the efficiency of transformation in the frequency domain, our findings can be utilized for light-weight partial image encryption for privacy data protection or entertainment contents protection.


Search




Journal of KIISE

  • ISSN : 2383-630X(Print)
  • ISSN : 2383-6296(Electronic)
  • KCI Accredited Journal

Editorial Office

  • Tel. +82-2-588-9240
  • Fax. +82-2-521-1352
  • E-mail. chwoo@kiise.or.kr