• Title/Summary/Keyword: 차분

Search Result 2,237, Processing Time 0.031 seconds

Analysis of microstrip patch array antenna characteristics using finite difference time domain algorithm (유한차분시간영역 알고리듬을 이용한 마이크로스트립 패치 배열 안테나 특성해석)

  • 홍용인
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.2
    • /
    • pp.197-205
    • /
    • 1998
  • The purpose of this paper is to analyze the electromagnetic field characteristics of array antenna with the finite difference-time domain algorithm. Finite difference equations of Maxwell's equations are defined in cylindrical coordinate systems. To simulate the unbounded problem like a free space, the Mur's absorbing boundary condition is also used. After modeling the array antenna with the grid structure, the transient response of the field distribution is depicted in the time domain.

  • PDF

Viterbi-based Decoding Algorithm for DBO-CSS

  • Yoon, Sang-Hun;Jung, Jun-Mo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.646-649
    • /
    • 2011
  • Differential detection algorithm for DBO-CSS based on maximum signal energy detection (MSED) using viterbi algorithm is proposed. In order to mitigate SNR degradation caused by differential decoding, a modified viterbi algorithm with so called correlation metric (CM) in every state is proposed. It is shown that the performance gain of the proposed algorithm when compared with that of the conventional differential detection with the block decoding algorithm is about 2.5dB at BER = $10^{-5}$.

  • PDF

Application of Discrete-Ordinate Method to the Time Dependent Radiative Heat Transfer Calculations (방향차분법을 적용한 시간종속 복사 열전달 계산)

  • Noh, Tae-Wan
    • Journal of Energy Engineering
    • /
    • v.15 no.4 s.48
    • /
    • pp.250-255
    • /
    • 2006
  • In this study, the discrete ordinates method which has been widely used in the solution of neutron transport equation is applied to the solution of the time dependent radiative transfer equation. The self-adjoint form of the second order radiation intensity equation is used to enhance the stability of the solution, and a new multi-step linearization method is developed to avoid the nonlinearity in the material temperature equation. This new solution method is applied to the well known Marshak wave problem, and the numerical result is compared with that of the conventional Monte-Carlo method.

Numerical Simulation of Axi-Symmetric Supersonic Intake Flow Operating on Design & Off-Design Conditions (축대칭 초음속 공기흡입구의 설계점/비설계점 유동 연구)

  • 김성돈;정인석;최정열
    • Proceedings of the Korean Society of Propulsion Engineers Conference
    • /
    • 2000.11a
    • /
    • pp.20-20
    • /
    • 2000
  • 2개의 경사 충격파와 하나의 수직 충격파로 초음속 유동을 압축하는 초음속 공기 흡입구의 수치적 연구를 수행하였다. 지배방정식으로는 Navier-Stokes방정식을 사용하였고 난류모델로는 SST 모델을 사용하였다. 지배방정식의 점성항 계산에는 중심차분법을 사용하였고 대류항 계산에는 풍상차분법인 Roe의 FDS기법을 MUSCL기법과 결합하여 이용하였다. 유한 체적법을 이용하여 차분된 방정식은 LU분할 기법을 이용한 완전 내재적 방법으로 2차 정확도 시간 적분으로 비정상 과정의 연구를 수행하였다. 흡입구 배압을 정해주어야 하는 어려움을 해결하기 위해 흡입구 후면에 노즐을 달고 노즐의 면적을 조절하여 배압이 형성되도록 하였다.(중략)

  • PDF

Related-Key Differential Attacks on the Block-wise Stream Cipher TWOPRIME (블록 기반 스트림 암호 TWOPRIME에 대한 연관키 차분 공격)

  • Kim, Gu-Il;Sung, Jae-Chul;Hong, Seok-Hie;Lim, Jong-In;Kim, Jong-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.3-10
    • /
    • 2007
  • In this paper we present related-key differential attacks on the block-wise stream cipher TWOPRIME. We construct various related-key differentials of TWOPRIME and use them to show that recovering related keys of TWOPRIME can be performed with a data complexity of $2^{14}$ known plaintext blocks and a time complexity of $2^{38}$ 8-bit table lookups.

A Study on Enhancing Hash Function Security against Collision Search Attack (충돌쌍 탐색 공격에 대한 해쉬 함수 안전성 강화에 관한 연구)

  • Jeong, Eun-Jin;Han, Jeong-Hoon;Kim, Seung-Joo;Won, Dong-Ho
    • Annual Conference of KIPS
    • /
    • 2008.05a
    • /
    • pp.1120-1123
    • /
    • 2008
  • 단방향 암호화 함수인 해쉬 함수는 2005년 Wang의 새로운 공격법이 발표되면서 안전성에 대한 문제점이 조금씩 드러나기 시작하고 있다. Wang의 새로운 차분 공격법은 현재 가장 널리 사용하고 있는 해쉬 알고리즘인 SHA-1을 이론적으로 $2^{69}$의 계산으로 충돌을 찾을 수 있다고 하였다. 본 논문에서는 차분 공격이 이루어지는 방법과 Wang의 차분 공격이 지니는 두 가지 특성에 대해서 연구하였고, MDx계열의 해쉬 함수의 안전성에 대한 기존의 제시된 해결책과 다른, 한 블록의 모든 워드 값을 변형 처리한 방식을 제안한다.

Numerical Analysis of EPB TBM Driving using Coupled DEM-FDM Part I : Modeling (개별요소법과 유한차분법 연계 해석을 이용한 EPB TBM 굴진해석 Part I : 모델링)

  • Choi, Soon-wook;Lee, Hyobum;Choi, Hangseok;Chang, Soo-Ho;Kang, Tae-Ho;Lee, Chulho
    • Tunnel and Underground Space
    • /
    • v.30 no.5
    • /
    • pp.484-495
    • /
    • 2020
  • To numerically simulate the advance of EPB TBM, various type of numerical analysis methods have been adopted including discrete element method (DEM), finite element method (FEM), and finite difference method (FDM). In this paper, an EPB TBM driving model was proposed by using coupled DEM-FDM. In the numerical model, DEM was applied in the TBM excavation area, and contact properties of particles were calibrated by a series of triaxial tests. Since the ground around the excavation area was coupled with FDM, the horizontal stress considering the coefficient of earth pressure at rest could be applied. Also, the number of required particles was reduced and the efficiency of the analysis was increased. The proposed model can control the advance rate and rotational speed of the cutter head and screw conveyor, and derive the torque, thrust force, chamber pressure, and discharging during TBM tunnelling.

Efficient Entropy Coding Method for Scalable Video Coding (스케일러블 비디오 부호화를 위한 효율적인 엔트로피 부호화 방법)

  • Choi, Hyo-Min;Nam, Jung-Hak;Sim, Dong-Gyu;Choi, Byeong-Doo;Cho, Dae-Sung
    • Journal of Broadcast Engineering
    • /
    • v.15 no.5
    • /
    • pp.653-664
    • /
    • 2010
  • Generally existing video codec employs entropy coding to deal with residual signals with considering temporal and spatial properties. Scalable Video Coding(SVC) which is extension of H.264/AVC has three technical concepts for removing redundancies between inter-layers. In spite of using novel prediction method between inter-layers in SVC, it is still using same entropy coding method to residual signals. According to the studies, the residual obtained by inter-layer prediction technique has different features of residual signal acquired by spatial or temporal prediction technique. In this paper, we propose an efficient entropy coding method which codes the residual signal obtained by inter-layer prediction with regarding its features adequately. We re-designed the Coded Block Pattern(CBP) table suitably for inter-layer texture prediction. The experiments show that the proposed method can further reduce the BD-Bitrate up to average 2.20% in 4CIF and 1.14% in CIF resolution compared to the existing JSVM 9.18.

A Study of Rayleigh Damping Effect on Dynamic Crack Propagation Analysis using MLS Difference Method (MLS 차분법을 활용한 동적 균열전파해석의 Rayleigh 감쇠영향 분석)

  • Kim, Kyeong-Hwan;Lee, Sang-Ho;Yoon, Young-Cheol
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.29 no.6
    • /
    • pp.583-590
    • /
    • 2016
  • This paper presents a dynamic crack propagation algorithm with Rayleigh damping effect based on the MLS(Moving Least Squares) Difference Method. Dynamic equilibrium equation and constitutive equation are derived by considering Rayliegh damping and governing equations are discretized by the MLS derivative approximation; the proportional damping, which has not been properly treated in the conventional strong formulations, was implemented in both the equilibrium equation and constitutive equation. Dynamic equilibrium equation including time relevant terms is integrated by the Central Difference Method and the discrete equations are simplified by lagging the velocity one step behind. A geometrical feature of crack is modeled by imposing the traction-free condition onto the nodes placed at crack surfaces and the effect of movement and addition of the nodes at every time step due to crack growth is appropriately reflected on the construction of total system. The robustness of the proposed numerical algorithm was proved by simulating single and multiple crack growth problems and the effect of proportional damping on the dynamic crack propagation analysis was effectively demonstrated.

On Resistance of Bit Permutation Based Block Cipher against Nonlinear Invariant Attack (비트 순열 기반 블록암호의 비선형 불변 공격 저항성 연구)

  • Jeong, Keonsang;Kim, Seonggyeom;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.325-336
    • /
    • 2020
  • Nonlinear Invariant Attack is an attack that should be considered when constructing lightweight block ciphers with relatively simple key schedule. A shortcut to prove a block cipher's resistance against nonlinear invariant attack is checking the smallest dimension of linear layer-invariant linear subspace which contains all known differences between round keys is equal to the block size. In this paper, we presents the following results. We identify the structure and number of optimal bit-permutations which require only one known difference between round keys for a designer to show that the corresponding block cipher is resistant against nonlinear invariant attack. Moreover, we show that PRESENT-like block ciphers need at least two known differences between round keys by checking all PRESENT-like bit-permutations. Additionally, we verify that the variants of PRESENT-like bit-permutations requiring the only two known differences between round keys do not conflict with the resistance against differential attack by comparing the best differential trails. Finally, through the distribution of the invariant factors of all bit-permutations that maintain BOGI logic with GIFT S-box, GIFT-variant block ciphers require at least 8 known differences between round keys for the resistance.