• Title/Summary/Keyword: 대칭함수

Search Result 212, Processing Time 0.024 seconds

Efficient Optical Watermark Using Multiple Phase Wrapping and Real-Valued Functions (다중위상래핑과 실수값 함수를 이용한 효율적인 광 워터마킹)

  • Cho, Kyu-Bo;Seo, Dong-Hoan;Lee, Seung-Hee;Hong, Jae-Keun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.3
    • /
    • pp.10-19
    • /
    • 2009
  • In this paper, an efficient optical watermark method using multiple phase wrapping and real-valued decoding key is proposed. In the embedding process, two zero-padded original images placed in two quadrants on input plane are multiplied with two statistically independent random phase patterns and are Fourier transformed, respectively. Two encoded images are obtained by taking the real-valued data from these Fourier transformed images. And then two phase-encoded patterns, used as a hidden image and a decoding key, are generated by the use of multiple phase wrapping from each of the encoded images. A transmitted image is made from the linear superposition of the weighted hidden images and a cover image. In reconstruction process, the mirror reconstructed images can be obtained at all quadrants by the inverse-Fourier transform of the product of the transmitted image and the decoding key. Computer simulation and optical experiment are demonstrated in order to confirm the proposed method.

Design of a Waveguide Broad-wall Longitudinal Slot Array Antenna of X-type Monopulse Axes (X-형 모노펄스 축구조를 가지는 도파관 광벽 종방향 슬롯 배열 안테나의 설계)

  • 나형기;박창현
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.2
    • /
    • pp.208-216
    • /
    • 2002
  • In this paper, the design method of a waveguide broad-wall longitudinal slot array monopulse antenna of X-type monopulse axes is presented, and the method is verified through manufacture and measurement. In the antenna design of this paper, the antenna size is small and the monopulse axes are X-type. Thus, the common continuous aperture distribution fuction is not suitable and the power balance among antenna quadrants should be considered. Also, since the waveguide height is reduced into 0.1 wavelength, the modelling of the slot characteristics is not simple. Thus, in this paper, the aperture distribution is optimized by using random number, and the balance among the quadrants is achieved by applying the quadrant weighting factor during the aperture optimization process. Also, the moment method procedure is accelerated by applying the interpolation technique to some part of the moment matrix, and the moment method procedure is added to the array synthesis program as a subroutine so that the slot characteristics can be calculated directly when it is required. Based on this method, a antenna of 28dBi is designed and manufactured. It is found that the antenna characteristics is similar to design data.

The Analysis of Resonance Characteristics of Asymmetric Dielectric Rod Resonator by Using Eigenfunction Expansion Method (고유함수 전개법을 이용한 비대칭 유전체 원주공진기의 공진특성 해석)

  • Min, Kyung-Ho;Ryu, Won-Yul;Choi, Hyun-Chul
    • Journal of Sensor Science and Technology
    • /
    • v.8 no.5
    • /
    • pp.407-413
    • /
    • 1999
  • The resonant frequency of dielectric rod resonator can be calculated very accurately by means of the concept of electric and magnetic walls from the symmetry. But in a real situation, when the supporter is placed in the cavity, asymmetry appears due to the supporter and its dielectric constant. Then we need research into the resonance characteristic of asymmetric dielectric resonator. In this paper, for the dielectric rod resonator which is placed in the asymmetric position in the conducting cavity, the equation for resonance characteristic was derived and the resonant frequency was calculated with the eigenfunction expansion method. We found that the calculated resonant frequency is very accurate when it was compared with the experimental result and that asymmetry affects the resonant frequency more in TM mode than in TE or in hybrid mode.

  • PDF

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.

Synthesis of Multi-level Reed Muller Circuits using BDDs (BDD를 이용한 다단계 리드뮬러회로의 합성)

  • Jang, Jun-Yeong;Lee, Gwi-Sang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.3
    • /
    • pp.640-654
    • /
    • 1996
  • This paper presents a synthesis method for multi-level Reed-Muller circuits using BDDs(Binary Decision Diagrams). The existing synthesis tool for Reed circuits, FACTOR, is not appropriate to the synthesis of large circuits because it uses matrix (map-type) to represent given logic functions, resulting in the exponential time and space in number of imput to the circuits. For solving this problems, a syntheisis method based on BDD is presented. Using BDDs, logic functions are represented compactly. Therefor storage spaces and computing time for synthesizing logic functions were greatly decreased, and this technique can be easily applied to large circuits. Using BDD representations, the proposed method extract best patterns to minimize multi-level Reed Muller circuits with good performance in area optimization and testability. Experimental results using the proposed method show better performance than those using previous methods〔2〕. For large circuits of considering the best input partition, synthesis results have been improved.

  • PDF

Geopotentinl Field in Nonlinear Balance with the Sectoral Mode of Rossby-Haurwitz Wave on the Inclined Rotation Axis (섹터모드의 로스비하우어비츠 파동과 균형을 이루는 고도장)

  • Cheong, Hyeong-Bin;Park, Ja-Rin
    • Journal of the Korean earth science society
    • /
    • v.28 no.7
    • /
    • pp.936-946
    • /
    • 2007
  • Analytical geopotential field in balance with the sectoral mode (the first symmetric mode with respect to the equator) of the Rossby-Haurwitz wave on the inclined rotation axis was derived in presence of superrotation background flow. The balanced field was obtained by inverting the divergence equation with the time derivative being zero. The inversion consists of two steps, i.e., the evaluation of nonlinear forcing terms and the finding of analytical solutions based on the Poisson's equation. In the second step, the forcing terms in the from of Legendre function were readily inverted due to the fact that Legendre function is the eigenfunction of the spherical Laplacian operator, while other terms were solved either by introducing a trial function or by integrating the Legendre equation. The balanced field was found to be expressed with six zonal wavenumber components, and shown to be of asymmetric structure about the equator. In association with asymmetricity, the advantageous point of the balanced field as a validation method for the numerical model was addressed. In special cases where the strength of the background flow is a half of or exactly the same as the rotation rate of the Earth it was revealed that one of the zonal wavenumber components vanishes. The analytical balanced field was compared with the geopotential field which was obtained using a spherical harmonics spectral model. It was found that the normalized difference lied in the order of machine rounding, indicating the reliability of the analytical results. The stability of the sectoral mode of Rossby-Haurwitz wave and the associated balanced field was discussed, comparing with the flrst antisymmetric mode.

The Comparison of Seakeeping Performance Analysis Methods for a High Speed Catamaran (Strip and 3-D Panel Method) (초고속 쌍동선에 대한 내항성능 해석 방법 비교 (스트립 방법과 3-D Panel 방법))

  • Lee, Ho-Young;Song, Ki-Jong;Yum, Deuk-Joon
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.33 no.2
    • /
    • pp.127-138
    • /
    • 1996
  • The strip method, unified theory and 3-D panel method are commonly used methods for the seakeeping analysis of high-speed vessels. The strip method which is basically 2-dimensional method is known to give incorrect hydrodynamic coefficients and motion responses for the cases of high speed and low frequency region. And the unified theory which uses two dimensional approach in inner domain and slender body theory in outer domain is very complicate in computational modelling. Though the 3-D panel method requires comparatively long computation time, it is believed that the method gives good results without any limitation in ship speed and range of frequency for computation. In the 3-D panel method the source singularity representing translating and pulsating Green function is used and Hoff's method is adopted for the numerical calculation of the Green function. The computation time can be reduced by using the symmetry relationship with respect to longitudinal axis. In this paper the strip method and the 3-D panel method are compared for the seakeeping analysis of a high-speed catamaran. The Compared items are the hydrodynamic coefficients, wave exciting forces, frequency response functions and short-term responses in irregular waves.

  • PDF

A Hardware Design Space Exploration toward Low-Area and High-Performance Architecture for the 128-bit Block Cipher Algorithm SEED (128-비트 블록 암호화 알고리즘 SEED의 저면적 고성능 하드웨어 구조를 위한 하드웨어 설계 공간 탐색)

  • Yi, Kang
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.13 no.4
    • /
    • pp.231-239
    • /
    • 2007
  • This paper presents the trade-off relationship between area and performance in the hardware design space exploration for the Korean national standard 128-bit block cipher algorithm SEED. In this paper, we compare the following four hardware design types of SEED algorithm : (1) Design 1 that is 16 round fully pipelining approach, (2) Design 2 that is a one round looping approach, (3) Design 3 that is a G function sharing and looping approach, and (4) Design 4 that is one round with internal 3 stage pipelining approach. The Design 1, Design 2, and Design 3 are the existing design approaches while the Design 4 is the newly proposed design in this paper. Our new design employs the pipeline between three G-functions and adders consisting of a F function, which results in the less area requirement than Design 2 and achieves the higher performance than Design 2 and Design 3 due to pipelining and module sharing techniques. We design and implement all the comparing four approaches with real hardware targeting FPGA for the purpose of exact performance and area analysis. The experimental results show that Design 4 has the highest performance except Design 1 which pursues very aggressive parallelism at the expanse of area. Our proposed design (Design 4) shows the best throughput/area ratio among all the alternatives by 2.8 times. Therefore, our new design for SEED is the most efficient design comparing with the existing designs.

Optimal Criterion of Classification Accuracy Measures for Normal Mixture (정규혼합에서 분류정확도 측도들의 최적기준)

  • Yoo, Hyun-Sang;Hong, Chong-Sun
    • Communications for Statistical Applications and Methods
    • /
    • v.18 no.3
    • /
    • pp.343-355
    • /
    • 2011
  • For a data with the assumption of the mixture distribution, it is important to find an appropriate threshold and evaluate its performance. The relationship is found of well-known nine classification accuracy measures such as MVD, Youden's index, the closest-to-(0, 1) criterion, the amended closest-to-(0, 1) criterion, SSS, symmetry point, accuracy area, TA, TR. Then some conditions of these measures are categorized into seven groups. Under the normal mixture assumption, we calculate thresholds based on these measures and obtain the corresponding type I and II errors. We could explore that which classification measure has minimum type I and II errors for estimated mixture distribution to understand the strength and weakness of these classification measures.

A study on Public Key Authentication using Polynomial Secret Sharing in WSN (무선센서네트워크에서 다항식 비밀분산을 이용한 공개키 인증방식에 관한 연구)

  • Kim, Il-Do;Kim, Dong-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.11
    • /
    • pp.2479-2487
    • /
    • 2009
  • Earlier researches on Sensor Networks preferred symmetric key-based authentication schemes in consideration of limitations in network resources. However, recent advancements in cryptographic algorithms and sensor-node manufacturing techniques have opened suggestion to public key-based solutions such as Merkle tree-based schemes. This paper proposes a new concept of public key-based authentication using Polynomial Secret Sharing that can be effectively applied to sensor networks and a detection of malicious node using the hash function. This scheme is based on exponential distributed data concept, a derivative from Shamir's (t,n) threshold scheme, in which the authentication of neighbouring nodes are done simultaneously while minimising resources of sensor nodes and providing network scalability.