• Title/Summary/Keyword: Asymmetric system

Search Result 700, Processing Time 0.025 seconds

Near-BER lossless Asymmetric 2PAM non-SIC NOMA with Low-Complexity and Low-Latency under User-Fairness

  • Chung, Kyuhyuk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2021
  • As the number of mobile devices has been increasing tremendously, system capacity should be enlarged in future next generation communication, such as the fifth-generation (5G) and beyond 5G (B5G) mobile networks. For such future networks, non-orthogonal multiple access (NOMA) has been considered as promising multiple access technology. In this paper, to reduce both latency and complexity in existing NOMA, we propose non-successive interference cancellation (SIC) NOMA with asymmetric binary pulse amplitude modulation (2PAM), nearly without bit-error rate (BER) loss. First, we derive the closed form of BER expressions for non-SIC NOMA with asymmetric 2PAM, especially under Rayleigh fading channels. Then, it is shown that the BER performance of the stronger channel user who is supposed to perform SIC in conventional NOMA can be nearly achieved by the proposed non-SIC NOMA with asymmetric 2PAM, especially without SIC. Furthermore, we also show that the BER performance of the weaker channel user in conventional NOMA can be more closely achieved by the proposed non-SIC NOMA with asymmetric 2PAM. These BERs are shown to be achieved over the part of the power allocation range, which is consistent with the NOMA principle of user fairness. As a result, the non-SIC NOMA scheme with asymmetric 2PAM could be considered as a promising NOMA scheme toward next generation communication.

A Secure and Efficient E-Medical Record System via Searchable Encryption in Public Platform

  • Xu, Lei;Xu, Chungen;Zhang, Xing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4624-4640
    • /
    • 2017
  • This paper mainly presents a secure and efficient e-Medical Record System via searchable encryption scheme from asymmetric pairings, which could provide privacy data search and encrypt function for patients and doctors in public platform. The core technique of this system is an extension public key encryption system with keyword search, which the server could test whether or not the files stored in platform contain the keyword without leaking the information about the encrypted file. Compared with former e-medical record systems, the system proposed here has several superior features: (1)Users could search the data stored in cloud server contains some keywords without leaking anything about the origin data. (2) We apply asymmetric pairings to achieve shorter key size scheme in the standard model, and adopt the dual system encryption technique to reduce the scheme's secure problem to the hard Symmetric External Diffie-Hellman assumption, which could against the variety of attacks in the future complex network environment. (3) In the last of paper, we analyze the scheme's efficiency and point out that our scheme is more efficient and secure than some other classical searchable encryption models.

3D FEM analysis of earthquake induced pounding responses between asymmetric buildings

  • Bi, Kaiming;Hao, Hong;Sun, Zhiguo
    • Earthquakes and Structures
    • /
    • v.13 no.4
    • /
    • pp.377-386
    • /
    • 2017
  • Earthquake-induced pounding damages to building structures were repeatedly observed in many previous major earthquakes. Extensive researches have been carried out in this field. Previous studies mainly focused on the regular shaped buildings and each building was normally simplified as a single-degree-of-freedom (SDOF) system or a multi-degree-of-freedom (MDOF) system by assuming the masses of the building lumped at the floor levels. The researches on the pounding responses between irregular asymmetric buildings are rare. For the asymmetric buildings subjected to earthquake loading, torsional vibration modes of the structures are excited, which in turn may significantly change the structural responses. Moreover, contact element was normally used to consider the pounding phenomenon in previous studies, which may result in inaccurate estimations of the structural responses since this method is based on the point-to-point pounding assumption with the predetermined pounding locations. In reality, poundings may take place between any locations. In other words, the pounding locations cannot be predefined. To more realistically consider the arbitrary poundings between asymmetric structures, detailed three-dimensional (3D) finite element models (FEM) and arbitrary pounding algorithm are necessary. This paper carries out numerical simulations on the pounding responses between a symmetric rectangular-shaped building and an asymmetric L-shaped building by using the explicit finite element code LS-DYNA. The detailed 3D FEMs are developed and arbitrary 3D pounding locations between these two buildings under bi-directional earthquake ground motions are investigated. Special attention is paid to the relative locations of two adjacent buildings. The influences of the left-and-right, fore-and-aft relative locations and separation gap between the two buildings on the pounding responses are systematically investigated.

Analysis of Laser-protection Performance of Asymmetric-phase-mask Wavefront-coding Imaging Systems

  • Yangliang, Li;Qing, Ye;Lei, Wang;Hao, Zhang;Yunlong, Wu;Xian'an, Dou;Xiaoquan, Sun
    • Current Optics and Photonics
    • /
    • v.7 no.1
    • /
    • pp.1-14
    • /
    • 2023
  • Wavefront-coding imaging can achieve high-quality imaging along with a wide range of defocus. In this paper, the anti-laser detection and damage performance of wavefront-coding imaging systems using different asymmetric phase masks are studied, through modeling and simulation. Based on FresnelKirchhoff diffraction theory, the laser-propagation model of the wavefront-coding imaging system is established. The model uses defocus distance rather than wave aberration to characterize the degree of defocus of an imaging system. Then, based on a given defocus range, an optimization method based on Fisher information is used to determine the optimal phase-mask parameters. Finally, the anti-laser detection and damage performance of asymmetric phase masks at different defocus distances and propagation distances are simulated and analyzed. When studying the influence of defocus distance, compared to conventional imaging, the maximum single-pixel receiving power and echo-detection receiving power of asymmetric phase masks are reduced by about one and two orders of magnitude respectively. When exploring the influence of propagation distance, the maximum single-pixel receiving power of asymmetric phase masks decreases by about one order of magnitude and remains stable, and the echodetection receiving power gradually decreases with increasing propagation distance, until it approaches zero.

A Study of Hybrid Cryptosystem Design with the Authentication and Self-Key Generation (인증기능과 자기 키 생성기능을 가진 혼합형 암호시스템 설계에 관한 연구)

  • 이선근;송제호;김태형;김환용
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.9
    • /
    • pp.702-713
    • /
    • 2003
  • The importance of protection for data and information is increasing by the rapid development of information communication and network. And the concern for protecting private information is also growing due to the increasing demand for lots of services by users. Asymmetric cryptosystem is the mainstream in encryption system rather than symmetric cryptosystem by above reasons. But asymmetric cryptosystem is restricted in applying fields by the reason it takes more times to process than symmetric cryptosystem. In this paper, encryption system which executes authentication works of asymmetric cryptosystem by means of symmetric cryptosystem. The proposed cryptosystem uses an algorithms combines that combines block cipherment with stream cipherment and has a high stability in aspect of secret rate by means of transition of key sequence according to the information of plaintext while symmetric/asymmetric cryptosystem conducts encipherment/deciphermeent using a fixed key. Consequently, it is very difficult to crack although unauthenticator acquires the key information. So, the proposed encryption system which has a certification function of asymmetric cryptosystem and a processing time equivalent to symmetric cryptosystems will be highly useful to authorize data or exchange important information.

Intercomparison of Wedge factor for Symmetric field and Asymmetric field used 6MV Linac (6 MV Linac을 이용한 Symmetric field와 Asymmetric field에서 Wedge factor의 비교 고찰)

  • Ji, Youn-Sang;Han, Jae-Jin
    • Journal of radiological science and technology
    • /
    • v.22 no.2
    • /
    • pp.57-60
    • /
    • 1999
  • Therapy equipment have taken progress for Cancer make use of Radiation for the normal tissue system make much of important for shielding. In modern times independent jaw setting to used equipment as possible make use of asymmetric field. Therefore, the asymmetric field be leave out of consideration wedge factor because of with used wedge for the most of part. These experimentation find out have an effect on the dosimetry of out put compared with of the difference between the symmetric field and asymmetic field for the wedge factor.

  • PDF

Asymmetric distribution of PAM signals and blind equalization algorithm using 3rd order statistics (비대칭 분포의 PAM 신호와 3차 통계에 의한 자력 등화 기법)

  • 정교일;임제택
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.65-75
    • /
    • 1996
  • The probability distributio function (pdf) of transmitted symbols should be asymmectric for recovering the received data in the 3rd order blind equalizer system. In this paper, we hav edesigned the blind equalizer using symmetric-asymmetric (SA) and asymmetric-symmetric (AS) transforms for less computational complexities and robustness in the noisy environments. The method of SA and AS transform was peformed using natural logarithmic operation. This paper proves that the proposed in this paper can be performed as real time operation. This paper proves that the compression factor k has no effet on transmitted symbols. Also 3rd order equalization method proposed in this paper can be performed as real time operation. As a result of computer simulatio, the computational complexity of proposed algorithm is reduced to be an half of 4th order method and MSE is enhanced as 10dB at the case of 4-PAM and 15dB at the case of 8-PAM respectivley. Conclusively, we have found that 3rd order blind equalizer can be implemented when the pdf of transmitter is asymmetric.

  • PDF

Complex Modal Testing of Asymmetric Rotors Using Magnetic Exciter Equipped with Hall Sensors

  • Lee, Chong-Won;Kim, Si-Kyoung
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.7
    • /
    • pp.866-875
    • /
    • 2001
  • The complex modal testing methods developed for asymmetric rotors are briefly discussed and their performances are experimentally evaluated. For the experiments, a laboratory test rotor is excited by using a newly developed, cost effective magnetic exciter equipped with Hall sensors, which measure the excitation forces. It is concluded that the exciter system is characterized by a wide bandwidth and a high resolution for both the excitation and force measurement, and that the one-exciter/two-sensor technique for complex modal testing of asymmetric rotors is superior to the standard two-exciter/two-sensor technique in terms of practicality and realization.

  • PDF

Asymmetric Public Key Cryptography by Using Logic-based Optical Processing

  • Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.1
    • /
    • pp.55-63
    • /
    • 2016
  • In this paper, a new asymmetric public key cryptography based on the modified RSA algorithm is proposed by using logic-based optical processing. The proposed asymmetric public key algorithm is realized into an optical schematic, where AND, OR and XOR logic operations are implemented by using free space digital optics architecture. Schematically, the proposed optical configuration has an advantage of generating the public keys simultaneously. Another advantage is that the suggested optical setup can also be used for message encryption and decryption by simply replacing data inputs of SLMs in the optical configuration. The last merit is that the optical configuration has a 2-D array data format which can increase the key length easily. This can provide longer 2-D key length resulting in a higher security cryptosystem than the conventional 1-D key length cryptosystem. Results of numerical simulation and differential cryptanalysis are presented to verify that the proposed method shows the effectiveness in the optical asymmetric cryptographic system.

Mass transfer with Asymmetric Light Curve of Contact and Near-Contact Binaries

  • Rittipruk, Pakakaew;Kang, Young-Woon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.1
    • /
    • pp.50.1-50.1
    • /
    • 2010
  • We have analyzed times of minima for of 6 binary systems. Three binary systems show period decrease at rate $3.19{\times}10-5$ yr -1 for SV Cen, $1.35{\times}10-7$ yr -1 for RT Scl and $1.14{\times}10-7$ yr -1 for AD Phe. Two systems show period increase $5.696{\times}10-8$ yr -1 for SX Aur and $6.93{\times}10-8$ yr -1 for GO Cyg. One system shows cyclic period variation. We estimated the mass transfer rate for 5 binary systems. Four systems show asymmetric light curves. Two asymmetric light curves (SV Cen and RT Scl) are due to hot spot caused by mass transfer. And two asymmetric light curves (AD Phe and TY Boo) are due to cool spot caused by magnetic activities on the cooler component. We also obtain absolute dimensions from photometric solution and spectroscopic solution by analyzing their light curves and radial velocity curves, which are collected from literatures, using 2007 version Wilson and Deviney computer code.

  • PDF