• Title/Summary/Keyword: 셀룰라

Search Result 421, Processing Time 0.024 seconds

Image Pattern Classification and Recognition by Using the Associative Memory with Cellular Neural Networks (셀룰라 신경회로망의 연상메모리를 이용한 영상 패턴의 분류 및 인식방법)

  • Shin, Yoon-Cheol;Park, Yong-Hun;Kang, Hoon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.13 no.2
    • /
    • pp.154-162
    • /
    • 2003
  • In this paper, Associative Memory with Cellular Neural Networks classifies and recognizes image patterns as an operator applied to image process. CNN processes nonlinear data in real-time like neural networks, and made by cell which communicates with each other directly through its neighbor cells as the Cellular Automata does. It is applied to the optimization problem, associative memory, pattern recognition, and computer vision. Image processing with CNN is appropriate to 2-D images, because each cell which corresponds to each pixel in the image is simultaneously processed in parallel. This paper shows the method for designing the structure of associative memory based on CNN and getting output image by choosing the most appropriate weight pattern among the whole learned weight pattern memories. Each template represents weight values between cells and updates them by learning. Hebbian rule is used for learning template weights and LMS algorithm is used for classification.

Analysis of Hybrid Additive Cellular Automata (하이브리드 가산 셀룰라 오토마타의 분석)

  • Cho, Sung-Jin;Choi, Un-Sook;Kim, Han-Doo;Hwang, Yoon-Hee;Kim, Jin-Gyoung;Kim, Bong-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.221-224
    • /
    • 2008
  • Anghelescu et al. proposed a block cryptosystem based on 8-cell hybrid additive cellular automata with cycle length 8 using state transition rules 51, 60 (or 102). All states must divided into the same cycles in the diagram of the cellular automata. But there exist cellular automata which don't satisfy this condition in Anghelescu et al.'s cryptosystem. In this paper we analyze hybrid additive cellular automata and propose an improved method.

  • PDF

Analysis of Shrunken-Interleaved Sequence Based on Cellular Automata (셀룰라 오토마타 기반의 수축-삽입 수열의 분석)

  • Choi, Un-Sook;Cho, Sung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.10
    • /
    • pp.2283-2291
    • /
    • 2010
  • The shrinking generator which is one of clock-controlled generator is a very simple generator with good cryptographic properties. A nonlinear sequence generator based on two 90/150 maximum length cellular automata can generate pseudorandom sequences at each cell of cellular automata whose characteristic polynomials are same. The nonlinear sequence generated by cellular automata has a larger period and a higher linear complexity than shrunken sequence generated by LFSRs. In this paper we analyze shrunken-interleaved sequence based on 90/150 maximum length cellular automata. We show that the sequence generated by nonlinear sequence generator based on cellular automata belongs to the class of interleaved sequence. And we give an effective algorithm for reconstructing unknown bits of output sequence based on intercepted keystream bits.

PHY Frame Structure Design for M2M Direct Communications (M2M 단말간 직접통신을 위한 PHY 프레임구조 설계)

  • Oh, Changyoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.20-26
    • /
    • 2013
  • We propose PHY Frame Structure for M2M direct communications in licensed frequency band. Especially, the proposed PHY Frame Structure coexists in the same licensed frequency band as currently operating cellular systems. Recently, Machine to Machine (M2M) service markets, including SmartGrid, Mobile Health, and Smart Car, are being rapidly expanded. Supporting M2M services in a specific case can waste Radio Resource in cellular systems. For example, when two M2M terminals communicating to each other are closely located, direct communication is radio resource efficient. In this paper, we set the requirement of maintaining the existing PHY frame structure in cellular systems to meet the backward compatibility. Based on this backward compatibility requirement, PHY frame structure for M2M direct communications is developed while satisfying coexistence with current operating cellular system. The proposed PHY frame structure meets backward compatibility. Accordingly, it is expected that the proposed M2M frame structure is useful for its frequency resource efficiency.

Construction of Complemented Hybrid Group Cellular Automata with Maximum Equal Lengths (최대 동일 길이를 갖는 여원 HGCA구성)

  • Cho S.J.;Choi U.S.;Hwang Y.H.;Kim J.G.;Pyo Y.S.;Kim H.D.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1565-1572
    • /
    • 2006
  • Recently with the ever increasing growth of data communication, the need for security and privacy has become a necessity. The advent of wireless communication and other handheld devices like Personal Digital Assistants and smart cards have made the implementation of cryptosystems a major issue. The Cellular Automata(CA) can be programmed to implement hardware sharing between the encryption and decryption. In this paper, we give conditions for a linear hybrid cellular automata with 60, 102 or 204 to be a linear hybrid group cellular automata C. And we present the conditions which the complemented hybrid group cellular automata C' with complement vectors derived from C has maximum equal lengths in the state transition diagram of C' Also we analyze the relationship among cycles of C' These results generalize Mukhopadhyay's results.

One Dimensional Cellular Automata based security scheme providing both authentication and confidentiality (1차원 CA 기반의 인증과 기밀성을 제공하는 보안 기술의 분석)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.7
    • /
    • pp.1597-1602
    • /
    • 2010
  • Sarkar et al. proposed a new Cellular Automata(CA) based security scheme providing both authentication and confidentiality. The application of CA for designing the scheme makes it suitable for hardware implementation. But the proposed method by Sakar dt al. has some problems. In this paper, we analyze CA and give a method for detecting secret key.

A Block Cipher Algorithm based on Cellular Automata (셀룰라 오토마타를 이용한 블록 암호 알고리즘)

  • 이준석;장화식;이경현
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.665-673
    • /
    • 2002
  • In this paper, we introduce cellular automata and propose a new block cipher algorithm based on cellular automata. For the evaluation of performance and security, we compare the results of the proposed algorithm with them of the standard block ciphers such as DES, Rijndael regarding on avalanche effects and processing time, and analyze the differential cryptanalysis for a reduction version of the proposed algorithm. In addition, we perform the statistical tests in FIPS PUB 140-2(Federal Information Processing Standards Publication 140-2) for the output bit sequences of proposed algorithm to guarantee the randomness property.

  • PDF

Collision Attack of a Hash Function based on 2D Cellular Automata (이차원 셀룰라 오토마타 기반 해쉬함수에 대한 충돌쌍 공격)

  • Choi, Joon-Geun;Ryu, Han-Seong;Lee, Je-Sang;Hong, Seok-Hie
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2008.02a
    • /
    • pp.81-84
    • /
    • 2008
  • 김재겸은 2005년 한국 멀티미디어 학회 논문지에 새로운 이차원 셀룰라 오토마타 설계 방법을 소개하고 이 설계 방법으로 구성된 이차원 셀룰라 오토마타를 이용한 해쉬함수를 제안하였다. 본 논문에서는 이 해쉬함수에 대한 첫 번째 분석 결과를 소개한다. 이 해쉬함수는 8 라운드로 구성되고 한 라운드는 두 개의 비선형 연산 부분을 포함하고 있으며, 메시지는 두 비선형 연산 부분에 모두 사용된다. 메시지 차분이 비선형 연산 부분을 거친 뒤 사라질 확률은 $2^{-14}$이다. 따라서 1 라운드 후 약 $2^{-28}$의 확률로 이 해쉬함수의 충돌쌍을 찾을 수 있다. 본 논문의 분석 결과를 통하여 이 해쉬함수는 매우 취약함을 알 수 있다.

  • PDF

A Stream Cipher using A Cellular Automata (셀룰라 오토마타를 이용한 스트림 암호)

  • 이준석;장화식;이경현
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.2
    • /
    • pp.191-197
    • /
    • 2002
  • In this paper, we propose a stream cipher using a cellular automata. For the security evaluation, we use the statistical tests suggested on the report of FIPS PUB 140-2 and additionally, we apply entropy test, linear complexity test and auto-correlation test which are popular statistical tests for the output sequences of stream ciphers.

  • PDF

A Study on Single Attractor Hierarchical Cellular Automata (SAHCA에 관한 연구)

  • Cho, Sung-Jin;Choi, Un-Sook;Hwang, Yoon-Hee;Kim, Han-Doo;Kim, Seok-Tae
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.513-516
    • /
    • 2005
  • 셀룰라 오토마타가 비트단위로 데이터가 처리되는데 비하여 계층적 셀룰라 오토마타는 바이트 단위 또는 그 이상의 단위로 데이터를 처리할 수 있다. 본 논문에서는 GF($2^p$) 위에서의 유한체 성질을 이용하여 한 개의 트리로 구성되는 계층적 비그룹 셀룰라 오토마타인 SAHCA의 성질에 대하여 분석한다. 또한 기본경로를 이용한 선형 SAHCA의 상태전이 그래프를 구성하는 방법과 선형 SAHCA의 상태전이 그래프를 이용하여 비선형인 여원 SAHCA의 상태전이 그래프를 구성하는 알고리즘을 제안한다.

  • PDF