• Title/Summary/Keyword: Bit Expansion

Search Result 83, Processing Time 0.026 seconds

A Design of Dual-Phase Instructions for a effective Logarithm and Exponent Arithmetic (효율적인 로그와 지수 연산을 위한 듀얼 페이즈 명령어 설계)

  • Kim, Chi-Yong;Lee, Kwang-Yeob
    • Journal of IKEEE
    • /
    • v.14 no.2
    • /
    • pp.64-68
    • /
    • 2010
  • This paper proposes efficient log and exponent calculation methods using a dual phase instruction set without additional ALU unit for a mobile enviroment. Using the Dual Phase Instruction set, it extracts exponent and mantissa from expression of floating point and calculates 24bit single precision floating point of log approximation using the Taylor series expansion algorithm. And with dual phase instruction set, it reduces instruction excution cycles. The proposed Dual Phase architecture reduces the performance degradation and maintain smaller size.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

Development of 2.4GHz ISM Band Wireless Communication Platform based on Embedded Linux (임베디드 리눅스 기반의 2.4GHz ISM 밴드 무선 통신 플랫폼 개발)

  • Ohm, Woo-Yong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.175-181
    • /
    • 2015
  • In this paper, we develop a 2.4GHz ISM band wireless communication platform prototype based on embedded linux which support can be u-Hospital service. The developed system is available connecting between ARM920T processor board and FPGA board and linking IEEE 802.11b PHY board, AD/DA(10Bit) and RF(2.4GHz) board for wireless access. It is also can be utilized for the embedded system design with IEEE 802.11b/g Access Point(Option: IEEE 802.11a/b/g) test due to the Embedded Linux. Also, the developed system is possible to test and verify the radio access technology, Modem(OFDM etc) and IP(Intellectual Property) circuit. And make the most use of the system, we search for a expansion to that home and mobile healthcare, wellness service application.

Securing the Private Key in the Digital Certificate Using a Graphic Password (그래픽 비밀번호를 활용한 공인인증서 개인키 보호방법에 관한 연구)

  • Kang, Byung-Hoon;Kim, Beom-Soo;Kim, Kyung-Kyu
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.1-16
    • /
    • 2011
  • A digital certificate mandated by the Electronic Signature Act has become familiar in our daily lives as 95% of the economically active population hold certificates. Due to upgrades to 256 bit level security that have become effective recently, the security and reliability of digital certificates are expected to increase. Digital certificates based on Public Key Infrastructure (PKI) have been known as "no big problem," but the possibility of password exposure in cases of leaked digital certificates still exists. To minimize this vulnerability, various existing studies have introduced alternative password methods, expansion of certificate storage media, and multiple certification methods. These methods perform enhanced functions but also have limitations including the fact that the secureness of passwords is not guaranteed. This study suggests an alternative method for enhancing the level of password secureness as a way to improve password security. This new method improves security management and enhances the convenience of using digital technologies. The results may be used for developing digital certificate related security technologies and research in the future.

$\pi$/4 shift QPSK with Trellis-Code and Lth Phase Different Metrics (Trellis 부호와 L번째 위상차 메트릭(metrics)을 갖는$\pi$/4 shift QPSK)

  • 김종일;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.17 no.10
    • /
    • pp.1147-1156
    • /
    • 1992
  • In this paper, in order to apply the $\pi/4$ shift QPSK to TCM, we propose the $\pi/8$ shift 8PSK modulation technique and the trellis-coded $\pi/8$ shift 8PSK performing signal set expansion and partition by phase difference. In addition, the Viterbi decoder with branch metrics of the squared Euclidean distance of the first phase difference as well as the Lth phase different is introduced in order to improve the bit error rate(BER) performance in differential detection of the trellis-coded $\pi/8$ shift 8PSK. The proposed Viterbi decoder is conceptually the same as the sliding multiple detection by using the branch metric with first and Lth order phase difference. We investigate the performance of the uncoded $\pi/4$ shift QPSK and the trellis-coded $\pi/8$ shift 8PSK with or without the Lth phase difference metric in an additive white Gaussian noise (AWGN) using the Monte Carlo simulation. The study shows that the $\pi/4$ shift QPSK with the Trellis-code i.e. the trellis-coded $\pi/8$ shift 8PSK is an attractive scheme for power and bandlimited systems and especially, the Viterbi decoder with first and Lth phase difference metrics improves BER performance. Also, the nest proposed algorithm can be used in the TC $\pi/8$ shift 8PSK as well as TCMDPSK.

  • PDF

Performance Analysis of Distributed Antenna Systems with Antenna Selection over MIMO Rayleigh Fading Channel

  • Yu, Xiangbin;Tan, Wenting;Wang, Ying;Liu, Xiaoshuai;Rui, Yun;Chen, Ming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3016-3033
    • /
    • 2014
  • The downlink performance of distributed antenna systems (DAS) with antennas selection is investigated in Rayleigh fading multicell environment, and the corresponding system capacity and bit error rate (BER) analysis are presented. Based on the moment generating function, the probability density function (PDF) and cumulative distribution function (CDF) of the effective signal to interference plus noise ratio (SINR) of the system are first derived, respectively. Then, with the available CDF and PDF, the accurate closed-form expressions of average channel capacity and average BER are further derived for exact performance evaluation. To simplify the expression, a simple closed-form approximate expression of average channel capacity is obtained by means of Taylor series expansion, with the performance results close to the accurate expression. Besides, the system outage capacity is analyzed, and an accurate closed-form expression of outage capacity probability is derived. These theoretical expressions can provide good performance evaluation for DAS downlink. It can be shown by simulation that the theoretical analysis and simulation are consistent, and DAS with antenna selection outperforms that with conventional blanket transmission. Moreover, the system performance can be effectively improved as the number of receive antennas increases.

The Effect of Increasing The Third Party Liability and Expansion of Mandatory Insurance in South Korea

  • KWAK, Young-Arm
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.11
    • /
    • pp.33-50
    • /
    • 2021
  • Purpose: In South Korea, two kinds of mandatory insurance, Fierce Liability Insurance and Outdoor Advertising Liability Insurance sells as of February 2021 according to relevant codes. This study analyzed third party liability and personal living liability insurance in terms of various risks not corporation side but personal side arising from normal living and life. Research design, data and methodology: Some cases of drone accident hit man and fierce dog accident were taken into analysis to verify blame ratio and insurance claim money. The former case is that on the way down the elevator, the dog, American pit bull terrier rushed in and bit the lower part of the knee against the visitor. The latter case is that while flying in the sky as usual, the drone suddenly crashed, fell, and hit the head of a young child while walking on the street. Further previous studies such as third party liabilities, liability insurance, mandatory insurance were deeply analyzed. Results: Based on some case studies and previous studies, the author suggested valuable comments in turn realization of insurer as provider, exhaustive creation and operation of mandatory insurance, realization of insured as demanded, and arrangements of laws and systems in special consideration of amendment of companion animal and exhaustive execution of mandatory insurance by the government. Conclusions: This study was about third party liability, personal living liability insurance and expansion of mandatory insurance caused by relevant laws by the government. In this study the author verified what issues were observed from two cases drone accident and fierce dog accident and then suggested some valuable comment as above both systemic plans and practical plans. First of all, the individual should get Comprehensive Property Insurance(CPI) that covers the risks of his/her own property arising from the everyday life. And then the individual should further buy Personal Living Liability Insurance(PLLI) in order to prepare 'accidents that may happen when, where, or how' and overcome the said accidents. Moreover, the individual should take a look every single insurance contract whether he/she has a special terms and conditions of Personal Living Liability Insurance(PLLI) or not.

Review on Application of Biosystem Modeling: Introducing 3 Model-based Approaches in Studying Ca Metabolism

  • Lee, Wang-Hee;Cho, Byoung-Kwan
    • Journal of Biosystems Engineering
    • /
    • v.37 no.4
    • /
    • pp.258-264
    • /
    • 2012
  • Purpose: This review aims at introducing 3 modeling approaches classified into 3 categories based on the purpose (estimation or prediction), structure (linear or non-linear) and phase (steady-state or dynamic-state); 1) statistical approaches, 2) kinetic modeling and 3) mechanistic modeling. We hope that this review can be a useful guide in the model-based approach of calcium metabolism as well as illustrates an application of engineering tools in studying biosystems. Background: The meaning of biosystems has been expanded, including agricultural/food system as well as biological systems like genes, cells and metabolisms. This expansion has required a useful tool for assessing the biosystems and modeling has arisen as a method that satisfies the current inquiry. To suit for the flow of the era, examining the system which is a little bit far from the traditional biosystems may be interesting issue, which can enlarge our insights and provide new ideas for prospective biosystem-researches. Herein, calcium metabolic models reviewed as an example of application of modeling approaches into the biosystems. Review: Calcium is an essential nutrient widely involved in animal and human metabolism including bone mineralization and signaling pathways. For this reason, the calcium metabolic system has been studied in various research fields of academia and industries. To study calcium metabolism, model-based system analyses have been utilized according to the purpose, subject characteristics, metabolic sites of interest, and experimental design. Either individual metabolic pathways or a whole homeostasis has been modeled in a number of studies.

FPGA real-time calculator to determine the position of an emitter

  • Tamura, M.;Aoyama, T.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.473-478
    • /
    • 2003
  • To detect motions of bodies, we have discussed them with two viewpoints; one is a detection algorithm, and another is the hardware implementation. The former is to find small terms expansions for sine/cosine functions. We researched Maclaurin and optimum expansions, and moreover to reduce hardware amounts, revised the expansions. The expansions don't include divide calculations, and the error is within 0.01%. As for the former problem, there is another approach also; that is the cordic method. The method is based on the rotation of a vector on the complex plain. It is simple iterations and don't require large logic. We examined the precision and convergence of the method on C-simulations, and implemented on HDL. The later problem is to make FPGA within small gates. We considered approaches to eliminate a divider and to reduce the bit number of arithmetic. We researched Newton-Raphson's method to get reciprocal numbers. The higher-order expression shows rapid convergence and doesn't be affected by the initial guess. It is an excellent algorithm. Using them, we wish to design a detector, and are developing it on a FPGA.

  • PDF

Efficient FPGA Implementation of AES-CCM for IEEE 1609.2 Vehicle Communications Security

  • Jeong, Chanbok;Kim, Youngmin
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.2
    • /
    • pp.133-139
    • /
    • 2017
  • Vehicles have increasingly evolved and become intelligent with convergence of information and communications technologies (ICT). Vehicle communications (VC) has become one of the major necessities for intelligent vehicles. However, VC suffers from serious security problems that hinder its commercialization. Hence, the IEEE 1609 Wireless Access Vehicular Environment (WAVE) protocol defines a security service for VC. This service includes Advanced Encryption Standard-Counter with CBC-MAC (AES-CCM) for data encryption in VC. A high-speed AES-CCM crypto module is necessary, because VC requires a fast communication rate between vehicles. In this study, we propose and implement an efficient AES-CCM hardware architecture for high-speed VC. First, we propose a 32-bit substitution table (S_Box) to reduce the AES module latency. Second, we employ key box register files to save key expansion results. Third, we save the input and processed data to internal register files for secure encryption and to secure data from external attacks. Finally, we design a parallel architecture for both cipher block chaining message authentication code (CBC-MAC) and the counter module in AES-CCM to improve performance. For implementation of the field programmable gate array (FPGA) hardware, we use a Xilinx Virtex-5 FPGA chip. The entire operation of the AES-CCM module is validated by timing simulations in Xilinx ISE at a speed of 166.2 MHz.