• Title/Summary/Keyword: 다항식 함수

Search Result 295, Processing Time 0.029 seconds

A Study on a Binary Random Sequence Generator with Two Characteristic Polynomials (두개의 특성 다항식으로 구성된 이진 난수열 발생기에 관한 연구)

  • 김대엽;주학수;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.77-85
    • /
    • 2002
  • A Research of binary random sequence generator that uses a linear shift register had been studied since the 1970s. These generators were used in stream cipher. In general, the binary random sequence generator consists of linear shift registers that generate sequences of maximum period and a nonlinear filter function or a nonlinear combination function to generate a sequence of high linear complexity. Therefore, To generate a sequence that have long period as well as high linear complexity becomes an important factor to estimate safety of stream cipher. Usually, the maximum period of the sequence generated by a linear feedback shift register with L resistors is less than or equal to $2^L$-1. In this paper, we propose new binary random sequence generator that consist of L registers and 2 sub-characteristic polynomials. According to an initial state vector, the least period of the sequence generated by the proposed generator is equal to or ions than it of the sequence created by the general linear feedback shift register, and its linear complexity is increased too.

A Multi-Compartment Secret Sharing Method (다중 컴파트먼트 비밀공유 기법)

  • Cheolhoon Choi;Minsoo Ryu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.13 no.2
    • /
    • pp.34-40
    • /
    • 2024
  • Secret sharing is a cryptographic technique that involves dividing a secret or a piece of sensitive information into multiple shares or parts, which can significantly increase the confidentiality of a secret. There has been a lot of research on secret sharing for different contexts or situations. Tassa's conjunctive secret sharing method employs polynomial derivatives to facilitate hierarchical secret sharing. However, the use of derivatives introduces several limitations in hierarchical secret sharing. Firstly, only a single group of participants can be created at each level due to the shares being generated from a sole derivative. Secondly, the method can only reconstruct a secret through conjunction, thereby restricting the specification of arbitrary secret reconstruction conditions. Thirdly, Birkhoff interpolation is required, adding complexity compared to the more accessible Lagrange interpolation used in polynomial-based secret sharing. This paper introduces the multi-compartment secret sharing method as a generalization of the conjunctive hierarchical secret sharing. Our proposed method first encrypts a secret using external groups' shares and then generates internal shares for each group by embedding the encrypted secret value in a polynomial. While the polynomial can be reconstructed with the internal shares, the polynomial just provides the encrypted secret, requiring external shares for decryption. This approach enables the creation of multiple participant groups at a single level. It supports the implementation of arbitrary secret reconstruction conditions, as well as conjunction. Furthermore, the use of polynomials allows the application of Lagrange interpolation.

A Enhancement Technique for Predistorter based Polynomial Technique (다항식을 이용한 전치 왜곡기의 성능 개선 기법)

  • Kim, Jin-Min;Kim, Geon;Park, So-Ra;Seo, Jae-Hyun;Song, Yun-Jeong;Lee, Yong-Tae
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.29-32
    • /
    • 2009
  • 무선 방송 통신 시스템에서는 높은 전력신호를 송신하기 위하여 고전력 증폭기(HPA)를 사용한다. 그러나 고전력 증폭기는 비선형 왜곡 특성을 가지고 있으며 이는 송신 신호의 품질을 저하하는 요소로 작용한다. 비선형 왜곡특성을 극복하기 위하여 여러 가지 방법이 제안되었으며 이중 LUT를 사용하는 전치 왜곡기법과 다항식을 이용한 전치 왜곡기법이 많이 사용된다. 본 논문에서는 다항식을 이용한 전치 왜곡기에서 기존보다 작은 오차와 안정화된 역함수를 제안하고 모의실험을 통하여 기존 보다 개선된 성능을 얻을 수 있음을 보인다.

  • PDF

Rearrangement of Sequences through the Generation Principle (생성원리를 통한 수열의 재배열)

  • Kwon, Min-Jeong;Cho, Sung-Jin;Kim, Jin-Gyoung;Choi, Un-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.1
    • /
    • pp.133-140
    • /
    • 2018
  • In this paper we discover the generation principle of a sequence when the characteristic polynomial of the sequence is a power of a primitive polynomial. With the generation principle, we can rearrange a sequence. Also we get the linear complexity and the required term of the sequence efficiently.

Optimized Design of Intelligent White LED Dimming System Based on Illumination-Adaptive Algorithm (조도 적응 알고리즘 기반 지능형 White LED Dimming System의 최적화 설계)

  • Lim, Sung-Joon;Jung, Dae-Hyung;Kim, Hyun-Ki;Oh, Sung-Kwun
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.1956-1957
    • /
    • 2011
  • 본 연구는 White LED를 이용하여 주변 밝기 변화에 빠르게 적응하는 퍼지 뉴로 Dimming Control System을 설계한다. 본 논문에서는 방사형기저함수 신경회로망(Radial Basis Function Neural Network: RBFNN)을 설계하여 실제 White LED Dimming Control System에 적용시켜 모델의 근사화 및 일반화 성능을 평가한다. 제안한 모델에서의 은닉층은 방사형기저함수를 사용하여 적합도를 구현하였고, 후반부의 연결가중치는 경사하강법을 사용한다. 이때 멤버쉽 함수의 중심점은 HCM 클러스터링 (Hard C-Means Clustering)을 적용하여 결정한다. 연결가중치는 4가지 형태의 다항식을 대입하여 출력을 평가하였다. 최종 출력의 최적화를 위하여 PSO(Particle Swarm Optimization)을 이용하여 은닉층 노드수 및 다항식 형태를 결정한다. 본 논문에서 제안한 LED Dimming Control System은 Atmega8535를 사용하여 PWM 제어 방식을 사용하고, 조도계(Cds)를 이용하여 LED의 밝기에 따른 주변의 밝기를 감지하여 조명에 적응시키는 방법을 적용하였다.

  • PDF

Characteristics of Gas Furnace Process by Means of Partition of Input Spaces in Trapezoid-type Function (사다리꼴형 함수의 입력 공간분할에 의한 가스로공정의 특성분석)

  • Lee, Dong-Yoon
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.277-283
    • /
    • 2014
  • Fuzzy modeling is generally using the given data and the fuzzy rules are established by the input variables and the space division by selecting the input variable and dividing the input space for each input variables. The premise part of the fuzzy rule is presented by selection of the input variables, the number of space division and membership functions and in this paper the consequent part of the fuzzy rule is identified by polynomial functions in the form of linear inference and modified quadratic. Parameter identification in the premise part devides input space Min-Max method using the minimum and maximum values of input data set and C-Means clustering algorithm forming input data into the hard clusters. The identification of the consequence parameters, namely polynomial coefficients, of each rule are carried out by the standard least square method. In this paper, membership function of the premise part is dividing input space by using trapezoid-type membership function and by using gas furnace process which is widely used in nonlinear process we evaluate the performance.

섀논의 샘플링 정리와 그 확장

  • 김도한;장순영;정재영
    • Communications of the Korean Mathematical Society
    • /
    • v.15 no.3
    • /
    • pp.435-451
    • /
    • 2000
  • 섀논의 샘플링 정리는 여러 방향으로 확장 발전되어왔으나 본 논문에서는 초함수 이론으로 다룰 수 있는 방향, 즉 좀 더 큰 공간에 속하는 함수에 대한 샘플링 정리를 얻는 것이다. 먼저 샘플링이론의 기본정리인 섀논-코텔니코프 공식을 소개하고 그 자연스런 확장인 페일리-위너 공간, 번스타인 공간에서의 샘플링정리 등을 다루었고 번스타인 공간의 자연스런 확장인 유계인 받침을 갖는 초함수의 푸리에변환 즉, 실공간 위에서 다항식정도로 증가하는 전해석함수에 대한 샘플링 정리를 소개한다. 끝으로 우리의 최근 결과인 실공간 위에서 지수적으로 증가하는 전해석 함수에 대한 샘플링 정리와 그 응용, 그리고 오차추정 등을 다룬다.

  • PDF

Fuzzy Fingerprint Vault using Multiple Polynomials (다중 다항식을 이용한 지문 퍼지볼트)

  • Moon, Dae-Sung;Choi, Woo-Yong;Moon, Ki-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.125-133
    • /
    • 2009
  • Security of biometric data is particularly important as the compromise of the data will be permanent. To protect the biometric data, we need to store it in a non.invertible transformed version. Thus, even if the transformed version is compromised, its valid biometric data are securely remained. Fuzzy vault mechanism was proposed to provide cryptographic secure protection of critical data(e.g., encryption key) with the fingerprint data in a way that only the authorized user can access the critical data by providing the valid fingerprint. However, all the previous results cannot operate on the fingerprint image with a few minutiae, because they use fixed degree of the polynomial without considering the number of fingerprint minutiae. To solve this problem, we use adaptive degree of polynomial considering the number of minutiae. Also, we apply multiple polynomials to operate the fingerprint with a few minutiae. Based on the experimental results, we confirm that the proposed approach can enhance the security level and verification accuracy.

Characteristics of Input-Output Spaces of Fuzzy Inference Systems by Means of Membership Functions and Performance Analyses (소속 함수에 의한 퍼지 추론 시스템의 입출력 공간 특성 및 성능 분석)

  • Park, Keon-Jun;Lee, Dong-Yoon
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.4
    • /
    • pp.74-82
    • /
    • 2011
  • To do fuzzy modelling of a nonlinear process needs to analyze the characteristics of input-output of fuzzy inference systems according to the division of entire input spaces and the fuzzy reasoning methods. For this, fuzzy model is expressed by identifying the structure and parameters of the system by means of input variables, fuzzy partition of input spaces, and consequence polynomial functions. In the premise part of the fuzzy rules Min-Max method using the minimum and maximum values of input data set and C-Means clustering algorithm forming input data into the clusters are used for identification of fuzzy model and membership functions are used as a series of triangular, gaussian-like, trapezoid-type membership functions. In the consequence part of the fuzzy rules fuzzy reasoning is conducted by two types of inferences such as simplified and linear inference. The identification of the consequence parameters, namely polynomial coefficients, of each rule are carried out by the standard least square method. And lastly, using gas furnace process which is widely used in nonlinear process we evaluate the performance and the system characteristics.

Approximate Shear Strength Formula Implied in the Generalized Hoek-Brown Failure Criterion (일반화된 Hoek-Brown 파괴조건식에 내포된 전단강도 근사식)

  • Lee, Youn-Kyou
    • Tunnel and Underground Space
    • /
    • v.28 no.5
    • /
    • pp.426-441
    • /
    • 2018
  • Recently, the generalized Hoek-Brown (GHB) failure criterion has been actively employed in various rock engineering calculations, but the analytical form of the corresponding Mohr failure envelope is not available, making it difficult to extend the application of the GHB criterion. In order to overcome this disadvantage, this study proposes a new method to express the tangential friction angle as an explicit function of normal stress by invoking the polynomial best-fitting to the relationship between normal stress and tangent friction angle implied in the GHB failure function. If this normal stress - tangential friction angle relationship is best-fitted with linear or quadratic polynomial function, it is possible to find the analytical root for tangential friction angle. Subsequently, incorporating the root into the relationship between shear stress and tangential friction angle accomplishes the derivation of the approximate Mohr envelope for the GHB criterion. It is demonstrated that the derived approximate Mohr failure envelopes are very accurate in the entire range of GSI value.