• 제목/요약/키워드: Bit Expansion

검색결과 83건 처리시간 0.023초

효율적인 로그와 지수 연산을 위한 듀얼 페이즈 명령어 설계 (A Design of Dual-Phase Instructions for a effective Logarithm and Exponent Arithmetic)

  • 김치용;이광엽
    • 전기전자학회논문지
    • /
    • 제14권2호
    • /
    • pp.64-68
    • /
    • 2010
  • 본 논문은 작은 사이즈가 요구되는 제한적인 모바일 환경의 프로세서에서 별도의 연산기 없이 제안된 Dual Phase 명령어 구조를 이용해 효율적인 로그와 지수 연산이 가능한 방법을 제안한다. Floating Point 자료형의 지수부와 실수부를 추출하는 명령어 세트와 테일러 급수 전개를 이용해 로그의 근사치를 계산하여 24비트 단정도 부동 소수점을 연산하고, Dual Phase 명령어 구조를 활용해 명령어 실행 사이클을 줄였다. 제안된 구조는 별도의 연산기를 두는 구조보다 작은 사이즈를 유지하면서 성능저하를 33%까지 최소화 할 수 있는 구조이다.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

임베디드 리눅스 기반의 2.4GHz ISM 밴드 무선 통신 플랫폼 개발 (Development of 2.4GHz ISM Band Wireless Communication Platform based on Embedded Linux)

  • 엄우용
    • 전자공학회논문지
    • /
    • 제52권1호
    • /
    • pp.175-181
    • /
    • 2015
  • 본 논문에서는 무선 LAN을 기반으로 u-Hospital 서비스를 지원할 수 있는 임베디드 리눅스 기반의 2.4GHz ISM 대역용 플랫폼 시제품을 개발하였다. 개발된 시스템은 ARM920T 프로세서 보드와 FPGA 보드가 서로 연동되게 설계되었고, 무선 접속을 위해 IEEE 802.11b PHY 보드, AD/DA(10Bit), 그리고 RF(2.4GHz) 보드가 연결되도록 설계하였으며, 임베디드 리눅스를 탑재하여 IEEE 802.11b/g Access Point(Option: IEEE 802.11a/b/g) 시험이 가능하여 임베디드 시스템 설계에 응용될 수 있다. 또한 개발된 시스템은 무선 접속 기술과 Modem(OFDM etc) 및 IP(Intellectual Property) 회로를 시험하고 검증할 수 있으며, 홈&모바일 헬스 케어 및 웰 니스 서비스로의 응용 확장이 가능하다.

그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구 (Securing the Private Key in the Digital Certificate Using a Graphic Password)

  • 강병훈;김범수;김경규
    • 한국전자거래학회지
    • /
    • 제16권4호
    • /
    • pp.1-16
    • /
    • 2011
  • 전자서명법에 근간을 두고 있는 공인인증서는 경제활동 인구의 95%이상이 사용함에 따라 일상생활과 밀접한 관계가 되었고 최근 보안강도 256bit 수준의 암호체계 고도화로 인해 안전성과 신뢰성에 큰 향상이 기대된다. 공개키 기반구조(PKI)를 바탕으로 하는 공인인증서는 보안성에서 큰 문제가 없는 것으로 알려져 왔지만 공인인증서 유출 시 비밀번호 검출 공격에 대한 위협이 존재한다. 기존 연구에서 이러한 취약점을 보완하기 위하여 비밀번호 대체수단 제공, 공인인증서 저장 매체 확대, 복수 인증방식 등과 같은 다양한 해결방안을 제시하였다. 이러한 방법은 공인인증서의 사용에 대한 보완적 기능을 수행하지만, 비밀번호의 안정성을 보장해주지는 못하는 한계점을 가진다. 따라서 본 연구에서는 비밀번호의 안전성을 높이기 위한 방법으로 비밀번호의 보안강도를 증가시키는 방안을 제시한다. 이에 따라 공인인증서의 관리 보안성과 사용 편리성의 향상이 가능하다. 이 연구는 공인인증서의 보안성 향상과 활용에 관한 기술 개발 및 향후 연구에 활용될 수 있다.

Trellis 부호와 L번째 위상차 메트릭(metrics)을 갖는$\pi$/4 shift QPSK ($\pi$/4 shift QPSK with Trellis-Code and Lth Phase Different Metrics)

  • 김종일;강창언
    • 한국통신학회논문지
    • /
    • 제17권10호
    • /
    • pp.1147-1156
    • /
    • 1992
  • 본 논문에서는 $\pi/4$ shift QPSK에 Trellis 부호화된 변조 기법(Trellis-Coded Modulation. TCM)을 적용시키기위하여 $\pi/8$ shift 8PSK를 제안하고 위상차에 의한 신호 집합 확장과 신호 집합 분할을 수행하는 trellis 부호화된 π/8 shift 8PSK를 제안한다. 또한 BER(Bit Error Rate) 성능을 향상시키기위하여 제1차 위상차뿐만아니라 제L차 이상차의 자승 유클리드 거리를 매트릭(Branch Metric)으로 갖는 비터비 디코더(Viterbi decoder)를 설계한다. 그리고 $\pi/4$ shift QPSK, trellis 부호화된 $\pi/8$ shift 8PSK와 제L차 위상차의 자승 유클리드 거리를 메트릭(Branch Metric)으로 갖는 trellis 부호화된 $\pi/8$ shift 8PSK 의 BER 특성을 AWGN에서 Monte Carlo 시뮬레이션을 통해 알아본다. 제안된 알고리즘은 MDPSK에도 적용될 수 있다.

  • PDF

Performance Analysis of Distributed Antenna Systems with Antenna Selection over MIMO Rayleigh Fading Channel

  • Yu, Xiangbin;Tan, Wenting;Wang, Ying;Liu, Xiaoshuai;Rui, Yun;Chen, Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권9호
    • /
    • pp.3016-3033
    • /
    • 2014
  • The downlink performance of distributed antenna systems (DAS) with antennas selection is investigated in Rayleigh fading multicell environment, and the corresponding system capacity and bit error rate (BER) analysis are presented. Based on the moment generating function, the probability density function (PDF) and cumulative distribution function (CDF) of the effective signal to interference plus noise ratio (SINR) of the system are first derived, respectively. Then, with the available CDF and PDF, the accurate closed-form expressions of average channel capacity and average BER are further derived for exact performance evaluation. To simplify the expression, a simple closed-form approximate expression of average channel capacity is obtained by means of Taylor series expansion, with the performance results close to the accurate expression. Besides, the system outage capacity is analyzed, and an accurate closed-form expression of outage capacity probability is derived. These theoretical expressions can provide good performance evaluation for DAS downlink. It can be shown by simulation that the theoretical analysis and simulation are consistent, and DAS with antenna selection outperforms that with conventional blanket transmission. Moreover, the system performance can be effectively improved as the number of receive antennas increases.

The Effect of Increasing The Third Party Liability and Expansion of Mandatory Insurance in South Korea

  • KWAK, Young-Arm
    • 산경연구논집
    • /
    • 제12권11호
    • /
    • pp.33-50
    • /
    • 2021
  • Purpose: In South Korea, two kinds of mandatory insurance, Fierce Liability Insurance and Outdoor Advertising Liability Insurance sells as of February 2021 according to relevant codes. This study analyzed third party liability and personal living liability insurance in terms of various risks not corporation side but personal side arising from normal living and life. Research design, data and methodology: Some cases of drone accident hit man and fierce dog accident were taken into analysis to verify blame ratio and insurance claim money. The former case is that on the way down the elevator, the dog, American pit bull terrier rushed in and bit the lower part of the knee against the visitor. The latter case is that while flying in the sky as usual, the drone suddenly crashed, fell, and hit the head of a young child while walking on the street. Further previous studies such as third party liabilities, liability insurance, mandatory insurance were deeply analyzed. Results: Based on some case studies and previous studies, the author suggested valuable comments in turn realization of insurer as provider, exhaustive creation and operation of mandatory insurance, realization of insured as demanded, and arrangements of laws and systems in special consideration of amendment of companion animal and exhaustive execution of mandatory insurance by the government. Conclusions: This study was about third party liability, personal living liability insurance and expansion of mandatory insurance caused by relevant laws by the government. In this study the author verified what issues were observed from two cases drone accident and fierce dog accident and then suggested some valuable comment as above both systemic plans and practical plans. First of all, the individual should get Comprehensive Property Insurance(CPI) that covers the risks of his/her own property arising from the everyday life. And then the individual should further buy Personal Living Liability Insurance(PLLI) in order to prepare 'accidents that may happen when, where, or how' and overcome the said accidents. Moreover, the individual should take a look every single insurance contract whether he/she has a special terms and conditions of Personal Living Liability Insurance(PLLI) or not.

Review on Application of Biosystem Modeling: Introducing 3 Model-based Approaches in Studying Ca Metabolism

  • Lee, Wang-Hee;Cho, Byoung-Kwan
    • Journal of Biosystems Engineering
    • /
    • 제37권4호
    • /
    • pp.258-264
    • /
    • 2012
  • Purpose: This review aims at introducing 3 modeling approaches classified into 3 categories based on the purpose (estimation or prediction), structure (linear or non-linear) and phase (steady-state or dynamic-state); 1) statistical approaches, 2) kinetic modeling and 3) mechanistic modeling. We hope that this review can be a useful guide in the model-based approach of calcium metabolism as well as illustrates an application of engineering tools in studying biosystems. Background: The meaning of biosystems has been expanded, including agricultural/food system as well as biological systems like genes, cells and metabolisms. This expansion has required a useful tool for assessing the biosystems and modeling has arisen as a method that satisfies the current inquiry. To suit for the flow of the era, examining the system which is a little bit far from the traditional biosystems may be interesting issue, which can enlarge our insights and provide new ideas for prospective biosystem-researches. Herein, calcium metabolic models reviewed as an example of application of modeling approaches into the biosystems. Review: Calcium is an essential nutrient widely involved in animal and human metabolism including bone mineralization and signaling pathways. For this reason, the calcium metabolic system has been studied in various research fields of academia and industries. To study calcium metabolism, model-based system analyses have been utilized according to the purpose, subject characteristics, metabolic sites of interest, and experimental design. Either individual metabolic pathways or a whole homeostasis has been modeled in a number of studies.

FPGA real-time calculator to determine the position of an emitter

  • Tamura, M.;Aoyama, T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.473-478
    • /
    • 2003
  • To detect motions of bodies, we have discussed them with two viewpoints; one is a detection algorithm, and another is the hardware implementation. The former is to find small terms expansions for sine/cosine functions. We researched Maclaurin and optimum expansions, and moreover to reduce hardware amounts, revised the expansions. The expansions don't include divide calculations, and the error is within 0.01%. As for the former problem, there is another approach also; that is the cordic method. The method is based on the rotation of a vector on the complex plain. It is simple iterations and don't require large logic. We examined the precision and convergence of the method on C-simulations, and implemented on HDL. The later problem is to make FPGA within small gates. We considered approaches to eliminate a divider and to reduce the bit number of arithmetic. We researched Newton-Raphson's method to get reciprocal numbers. The higher-order expression shows rapid convergence and doesn't be affected by the initial guess. It is an excellent algorithm. Using them, we wish to design a detector, and are developing it on a FPGA.

  • PDF

Efficient FPGA Implementation of AES-CCM for IEEE 1609.2 Vehicle Communications Security

  • Jeong, Chanbok;Kim, Youngmin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제6권2호
    • /
    • pp.133-139
    • /
    • 2017
  • Vehicles have increasingly evolved and become intelligent with convergence of information and communications technologies (ICT). Vehicle communications (VC) has become one of the major necessities for intelligent vehicles. However, VC suffers from serious security problems that hinder its commercialization. Hence, the IEEE 1609 Wireless Access Vehicular Environment (WAVE) protocol defines a security service for VC. This service includes Advanced Encryption Standard-Counter with CBC-MAC (AES-CCM) for data encryption in VC. A high-speed AES-CCM crypto module is necessary, because VC requires a fast communication rate between vehicles. In this study, we propose and implement an efficient AES-CCM hardware architecture for high-speed VC. First, we propose a 32-bit substitution table (S_Box) to reduce the AES module latency. Second, we employ key box register files to save key expansion results. Third, we save the input and processed data to internal register files for secure encryption and to secure data from external attacks. Finally, we design a parallel architecture for both cipher block chaining message authentication code (CBC-MAC) and the counter module in AES-CCM to improve performance. For implementation of the field programmable gate array (FPGA) hardware, we use a Xilinx Virtex-5 FPGA chip. The entire operation of the AES-CCM module is validated by timing simulations in Xilinx ISE at a speed of 166.2 MHz.