• Title/Summary/Keyword: 부울

Search Result 111, Processing Time 0.033 seconds

A Study of Function and Analysis of ALU for Graph-based Boolean Functions (그래프 기법을 이용한 부울함수의 ALU 기능 해석에 관한 연구)

  • Woo, Kwang-Bang;Kim, Hyun-Ki;Bahk, In-Gyoo
    • Proceedings of the KIEE Conference
    • /
    • 1987.07a
    • /
    • pp.226-229
    • /
    • 1987
  • This paper was aimed to, using a new data structure, develop a set of algorithms to execute the output function of Digital System. These functions were represented as directed, acyclic graphs. by applying many restrictions on vertices on graph, the efficient manipulation of boolean function was accomplished. The results were as follows; 1. A canonical representation of a boolean function was created by the reduction algorithm. 2. The operation of two functions was accomplished using t he apply algorithm, according to the binary operator. 3. The arguments having 1 as the value nf function were enumerated using the satisfy algorithm. 4. Composing TTL 74181 4-bit ALU and 74182 look-ahead carry generator, the ALU having 4-bit and 16-bit as word size was implemented.

  • PDF

Common Expression Extraction Using Kernel-Kernel pairs (커널-커널 쌍을 이용한 공통 논리식 산출)

  • Kwon, Oh-Hyeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3251-3257
    • /
    • 2011
  • This paper presents a new Boolean extraction technique for logic synthesis. This method extracts kernel-kernel pairs as well as cokernel-kernel pairs. The given logic expressions can be translated into Boolean divisors and quotients with kernel-kernel pairs. Next, kernel intersection method provides the common sub-expressions for several logic expressions. Experimental results show the improvement in literal count over previous other extraction methods.

A Historical Background of Mathematical Logic and $G{\ddot{o}}del$ (수리논리학의 역사적 배경과 괴델)

  • Park, Chang-Kyun
    • Journal for History of Mathematics
    • /
    • v.21 no.1
    • /
    • pp.17-28
    • /
    • 2008
  • This Paper introduces a historical background of mathematical logic. Logic and mathematics were not developed dependently until the mid of the nineteenth century, when two streams of logic and mathematics came to form a river so that brought forth synergy effects. Since the mid-nineteenth century mathematization of logic were proceeded while attempts to reduce mathematics to logic were made. Against this background $G{\ddot{o}}del's$ proof shows the limitation of formalism by proving that there are true arithmetical propositions that are not provable.

  • PDF

Generallization of Semi-bent functions and their Construction Method (Semi-bent 함수의 일반화와 구성 방법)

  • Park, Sang-Woo;Chee, Seong-Taek;Kim, Kwang-Jo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.3
    • /
    • pp.31-40
    • /
    • 1996
  • In [4, 12], Chee et al. proposed a new class of cryptographic primitive, 'semi-bent functions', which exists on only odd dimensional vector spaces [4]. In this paper, we discuss new notion of generalized semi-bent functions which can be defined on any vector spaces. And we suggest systematic methods for constructing generalized semi-bent functions and analyse their cryptographic properties. In addition, we show that SUC fulfilling Boolean functions can be found on any dimensional vector spaces.

On a construction of resilient functions using a hyperelliptic curve with genus 2 (종수 2인 초타원곡선을 이용한 균형상관면역함수의 생성에 관한 연구)

  • 최춘수;이민섭
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.159-168
    • /
    • 2003
  • In [3], J. H. Cheon and S. T Chee proposed a method to generate boolean functions with good properties using a poly-nomials of degree 3 over a finite field $F_{2n}$. In this paper, we propose a method generating resilient functions with high nonlinearity from polynomials of degree 5 over a finite field $F_$2^n$$(n$\leq$14).

Maximal Algebraic Degree of the Inverse of Linearized Polynomial (선형 다항식의 역원의 maximal 대수적 차수)

  • Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.105-110
    • /
    • 2005
  • The linearized polynomial fan be regarded as a generalization of the identity function so that the inverse of the linearized polynomial is a generalization of e inverse function. Since the inverse function has so many good cryptographic properties, the inverse of the linearized polynomial is also a candidate of good Boolean functions. In particular, a construction method of vector resilient functions with high algebraic degree was proposed at Crypto 2001. But the analysis about the algebraic degree of the inverse of the linearized Polynomial. Hence we correct the inexact result and give the exact maximal algebraic degree.

Design of Random Binary Sequence Generator using the Chaotic Map (혼돈맵을 사용한 난수성 2진 순서발생기의 설계)

  • Park, Kwang-Hyeon;Baek, Seung-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.7
    • /
    • pp.53-57
    • /
    • 2008
  • The discretized saw-tooth map with the 16-bit finite precision which is one of the 1-dimensional chaotic maps is designed, and the circuit of chaotic binary sequence generator using the discretized saw-tooth map is presented also in this brief. The real implementation of designed chaotic map is accomplished by connecting the input and output lines exactly according to the simplified Boolean functions of output variables obtained from truth table which is discretized. The random binary output sequences generated by mLFSR generator were used for the inputs of descretized saw-tooth map, and, by the descretized map, chaotic binary sequence which has more long period of 16 times minimally is generated as a results.

Targeting Algorithm for Personalized Message Syndication (개인 맞춤형 메시지 신디케이션을 위한 타겟팅 알고리즘)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.43-49
    • /
    • 2012
  • Personalized message syndication is an important process for maximizing the effect of mobile marketing. This paper proposes an algorithm for determining clients satisfying target conditions in real-time. The proxy server as an intermediate node stores client profiles (gender, age, location, etc) and their respective summaries into a database. When a company syndicates messages at run time, the proxy server maps target conditions expressed by boolean expressions to integer value and determines target clients by comparing target value with profile summary. Thus, this approach provides efficient personalized message syndication in very large systems with millions of clients because it can determine target clients in real-time and work with a traditional database easily.

Design of Discretized Tent Map (이산화된 텐트맵의 설계)

  • Baek, Seung-Jae;Park, Jin-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.86-91
    • /
    • 2008
  • To present the design procedure of discretized 8-bit tent map executing the transformation of tent function which is one of the chaotic functions, first, the truth table of discretized tent map was written, and then according to the simplified Boolean algebra equations obtained from the truth table, the discretized map is implemented with the exclusive logic gate as a real hardware. The discretized tent map circuit which provides the feedback circuit for generating the period-8 states relevant to the 8-bit finite precision is also designed and presented in this paper. Furthermore, it might be used stream cipher system with a new key-stream circuit for generate of chaotic binary sequence.

Boolean Extraction Technique Using Two-cube Divisors and Complements (2-큐브 제수와 보수에 의한 공통 논리식 산출)

  • Kwon, Oh-Hyeong;Oh, Im-Geol
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.9-16
    • /
    • 2008
  • This paper presents a new Boolean extraction technique for logic synthesis. This method extracts two-cube Boolean subexpression pairs from each logic expression. It begins by creating two-cube array, which is extended and compressed with complements of two-cube Boolean subexpressions. Next, the compressed two-cube array is analyzed to extract common subexpressions for several logic expressions. The method is greedy and extracts the best common subexpression. Experimental results show the improvements in the literal counts over well-known logic synthesis tools for some benchmark circuits.