• Title/Summary/Keyword: 차분

Search Result 2,237, Processing Time 0.033 seconds

Analysis of Stress Concentration Problems Using Moving Least Squares Finite Difference Method(I) : Formulation for Solid Mechanics Problem (이동최소제곱 유한차분법을 이용한 응력집중문제 해석(I) : 고체문제의 정식화)

  • Yoon, Young-Cheol;Kim, Hyo-Jin;Kim, Dong-Jo;Liu, Wing Kam;Belytschko, Ted;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.20 no.4
    • /
    • pp.493-499
    • /
    • 2007
  • The Taylor expansion expresses a differentiable function and its coefficients provide good approximations for the given function and its derivatives. In this study, m-th order Taylor Polynomial is constructed and the coefficients are computed by the Moving Least Squares method. The coefficients are applied to the governing partial differential equation for solid problems including crack problems. The discrete system of difference equations are set up based on the concept of point collocation. The developed method effectively overcomes the shortcomings of the finite difference method which is dependent of the grid structure and has no approximation function, and the Galerkin-based meshfree method which involves time-consuming integration of weak form and differentiation of the shape function and cumbersome treatment of essential boundary.

New Pre-processing Method for Second-Order CPA on the IT Convergence Device (IT융합 디바이스에 대한 물리적 2차 CPA 공격을 위한 새로운 전처리 기법)

  • Lee, Chul-Hee;Hwang, Ah-Reum;Lee, Dong-Geon;Kim, Hyoung-Nam;Kim, Ho-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1369-1380
    • /
    • 2010
  • In this paper, we propose the efficient Second-Order Differential Power Analysis attack, which has ability to find significant information such as secret key in the devices consisting IT convergence environment such as Smartgrid, Advanced Metering Infrastructure(AMI) and ZigBee-based home networking service. This method helps to find the secret key easily at a device, even though it uses a countermeasure like masking which makes First-Order DPA attack harder. First, we present the performance results of our implementation which implements practical Second-Order DPA attack using the existing preprocessing function, and analyze it. Then we propose a stronger preprocessing function which overcomes countermeasures like masking. Finally, we analyze the results of the Second-Order CPA attack using proposed preprocessing function and verify that proposed scheme is very threatening to the security fields of IT convergence technology through the experimental results.

Development of Simulation Tool to Support Privacy-Preserving Data Collection (프라이버시 보존 데이터 수집을 지원하기 위한 시뮬레이션 툴 개발)

  • Kim, Dae-Ho;Kim, Jong Wook
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1671-1676
    • /
    • 2017
  • In theses days, data has been explosively generated in diverse industrial areas. Accordingly, many industries want to collect and analyze these data to improve their products or services. However, collecting user data can lead to significant personal information leakage. Local differential privacy (LDP) proposed by Google is the state-of-the-art approach that is used to protect individual privacy in the process of data collection. LDP guarantees that the privacy of the user is protected by perturbing the original data at the user's side, but a data collector is still able to obtain population statistics from collected user data. However, the prevention of leakage of personal information through such data perturbation mechanism may cause the significant reduction in the data utilization. Therefore, the degree of data perturbation in LDP should be set properly depending on the data collection and analysis purposes. Thus, in this paper, we develop the simulation tool which aims to help the data collector to properly chose the degree of data perturbation in LDP by providing her/him visualized simulated results with various parameter configurations.

Real-Time Color Gamut Mapping Method Based on the Three-Dimensional Difference Look-Up Table (3차원 차분 룩업 테이블을 이용한 실시간 색역 사상 기법)

  • Han, Dong-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.111-120
    • /
    • 2005
  • A cost effective three-dimensional color gamut mapping architecture is described. The conventional three-dimensional reduced resolution look-up table is considered and the concept of three-dimensional reduced resolution difference look-up table is introduced for cost effective and real-time color gamut mapping. The overall architecture uses one-dimensional memory decomposition of three-dimensional gamut mapping look-up table, three-dimensional interpolation and simple addition operation for generating the final gamut mapped colors. The required computational cost is greatly reduced by look-up table resolution adjustment and further reduced by the gamut mapping rule modification. The proposed architecture greatly reduces the required memory size and hardware complexity compared to the conventional method and it is suitable for real-time applications. The proposed hardware is suitable for FPGA and ASIC implementation and could be applied to the real-time display quality enhancement purposes.

A study on Improved De-Interlacing Applying Newton Difference Interpolation (Newton 차분법을 이용한 개선된 디인터레이싱 연구)

  • Baek, Kyunghoon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.1
    • /
    • pp.449-454
    • /
    • 2020
  • We propose an improved de-interlacing method that converts the interlaced images into the progressive images by one field. In the first, Inter-pixel values are calculated by applying Newton's forward difference, backward difference interpolation from upper and lower 5 pixel values. Using inter-pixel values obtained from upper and lower 5 pixel values, it makes more accurate a direction estimate by applying the correlation between upper and lower pixel. If an edge direction is determined from the correlation, a missing pixel value is calculated into the average of upper and lower pixel obtained from predicted direction of edge. From simulation results, it is shown that the proposed method improves subjective image quality at edge region and objective image quality at 0.2~0.3dB as quantitative calculation result of PSNR, compared to previous various de-interlacing methods.

Analysis of Dynamic Crack Propagation using MLS Difference Method (MLS 차분법을 이용한 동적균열전파 해석)

  • Yoon, Young-Cheol;Kim, Kyeong-Hwan;Lee, Sang-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.1
    • /
    • pp.17-26
    • /
    • 2014
  • This paper presents a dynamic crack propagation algorithm based on the Moving Least Squares(MLS) difference method. The derivative approximation for the MLS difference method is derived by Taylor expansion and moving least squares procedure. The method can analyze dynamic crack problems using only node model, which is completely free from the constraint of grid or mesh structure. The dynamic equilibrium equation is integrated by the Newmark method. When a crack propagates, the MLS difference method does not need the reconstruction of mode model at every time step, instead, partial revision of nodal arrangement near the new crack tip is carried out. A crack is modeled by the visibility criterion and dynamic energy release rate is evaluated to decide the onset of crack growth together with the corresponding growth angle. Mode I and mixed mode crack propagation problems are numerically simulated and the accuracy and stability of the proposed algorithm are successfully verified through the comparison with the analytical solutions and the Element-Free Galerkin method results.

Performance Comparison of Various Extended Kalman Filter and Cost-Reference Particle Filter for Target Tracking with Unknown Noise (노이즈 불확실성하에서의 확장칼만필터의 변종들과 코스트 레퍼런스 파티클필터를 이용한 표적추적 성능비교)

  • Shin, Myoungin;Hong, Wooyoung
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.3
    • /
    • pp.99-107
    • /
    • 2018
  • In this paper, we study target tracking in two dimensional space using a Extended Kalman filter(EKF), various Extended Kalman Filter and Cost-Reference Particle Filter(CRPF), which can effectively estimate the state values of nonlinear measurement equation. We introduce various Extended Kalman Filter which the Unscented Kalman Filter(UKF), the Central Difference Kalman Filter(CDKF), the Square Root Unscented Kalman Filter(SR-UKF), and the Central Difference Kalman Filter(SR-CDKF). In this study, we calculate Mean Square Error(MSE) of each filters using Monte-Carlo simulation with unknown noise statistics. Simulation results show that among the various of Extended Kalman filter, Square Root Central Difference Kalman Filter has the best results in terms of speed and performance. And, the Cost-Reference Particle Filter has an advantageous feature that it does not need to know the noise distribution differently from Extended Kalman Filter, and the simulation result shows that the excellent in term of processing speed and accuracy.

A Study on Synthetic Data Generation Based Safe Differentially Private GAN (차분 프라이버시를 만족하는 안전한 GAN 기반 재현 데이터 생성 기술 연구)

  • Kang, Junyoung;Jeong, Sooyong;Hong, Dowon;Seo, Changho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.945-956
    • /
    • 2020
  • The publication of data is essential in order to receive high quality services from many applications. However, if the original data is published as it is, there is a risk that sensitive information (political tendency, disease, ets.) may reveal. Therefore, many research have been proposed, not the original data but the synthetic data generating and publishing to privacy preserve. but, there is a risk of privacy leakage still even if simply generate and publish the synthetic data by various attacks (linkage attack, inference attack, etc.). In this paper, we propose a synthetic data generation algorithm in which privacy preserved by applying differential privacy the latest privacy protection technique to GAN, which is drawing attention as a synthetic data generative model in order to prevent the leakage of such sensitive information. The generative model used CGAN for efficient learning of labeled data, and applied Rényi differential privacy, which is relaxation of differential privacy, considering the utility aspects of the data. And validation of the utility of the generated data is conducted and compared through various classifiers.

Background Subtraction based on GMM for Night-time Video Surveillance (야간 영상 감시를 위한 GMM기반의 배경 차분)

  • Yeo, Jung Yeon;Lee, Guee Sang
    • Smart Media Journal
    • /
    • v.4 no.3
    • /
    • pp.50-55
    • /
    • 2015
  • In this paper, we present background modeling method based on Gaussian mixture model to subtract background for night-time video surveillance. In night-time video, it is hard work to distinguish the object from the background because a background pixel is similar to a object pixel. To solve this problem, we change the pixel of input frame to more advantageous value to make the Gaussian mixture model using scaled histogram stretching in preprocessing step. Using scaled pixel value of input frame, we then exploit GMM to find the ideal background pixelwisely. In case that the pixel of next frame is not included in any Gaussian, the matching test in old GMM method ignores the information of stored background by eliminating the Gaussian distribution with low weight. Therefore we consider the stacked data by applying the difference between the old mean and new pixel intensity to new mean instead of removing the Gaussian with low weight. Some experiments demonstrate that the proposed background modeling method shows the superiority of our algorithm effectively.

Calculating the Approximate Probability of Differentials for ARX-Based Cipher Using SAT Solver (SAT 솔버를 이용한 ARX 구조 암호의 디퍼렌셜 확률 근사값 계산)

  • Lee, HoChang;Kim, Seojin;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.15-24
    • /
    • 2018
  • In this paper, we explain a method of appproximating the differentials probability using a SAT solver. It is possible to increase the probability by constructing the differential characteristic which already known to differentials with a SAT solver. We apply our method to SPECK32 and SPECK48. As a result, we introduced a SPECK32's 10-round differentials with a probability of$2^{-30.39}$, and SPECK48's 12-round differentials with probability of $2^{-46.8}$. Both differentials are new and longer round and higher probability than previous ones. Using the differentials presented in this paper, we improved attacks of SPECK32/64 to 15 round, SPECK48/72 to 16 round, SPECK48/96 to 17 round, which attack 1 more rounds of previous works.