• 제목/요약/키워드: Bit Modification

검색결과 71건 처리시간 0.023초

Structural Design on Joint Component of Composite Wing of WIG Craft

  • Lee, Younggyu;Park, Hyunbum
    • International Journal of Aerospace System Engineering
    • /
    • 제8권2호
    • /
    • pp.1-3
    • /
    • 2021
  • This study proposed a specific preliminary structural design procedure of the main wing for a small scale WIG vehicle to meet the target weight of the system requirement. The high stiffness and strength Carbon-Epoxy material was used for lightness, and the foam sandwich type structure at the upper skin and the spar webs was adopted for improvement of structural stability. After structural design, wing joint part was designed. Through investigation on structural design result, design modification was performed. After design modification, even thought the designed wing weight was a little bit heavier than the target wing weight, the structural safety and stability of the final design feature was confirmed.

해양 센서네트워크에서 Scheduled Interest Table(SIT) 기반 다중경로 설정 기법 (Scheduled Interest Table(SIT) based Multiple Path Configuration Technique in Ocean Sensor Network)

  • 윤남열;남궁정일;박수현
    • 한국시뮬레이션학회논문지
    • /
    • 제18권4호
    • /
    • pp.175-184
    • /
    • 2009
  • 해양센서네트워크에서 센서 노드간의 거리는 네트워크의 성능을 좌우하는 매우 중요한 요소 중 하나이다. 본 논문은 해양환경에 적합한 통신 경로를 설계하기 위하여 효율적인 거리를 설정하고 레벨(Level)을 나누는 기법을 제안한다. 제안한 기법으로 설정된 경로를 유지하고 에너지 효율을 극대화 하여 전체 네트워크의 수명을 연장하는 방안을 연구하는 것에 목적을 두었다. 설정된 경로는 내 외부적인 요소들에 의해 유동적으로 변경될 수 있으며 제안된 경로 강화 기법을 통해 더욱 견고한 해양센서 네트워크를 구축한다.

연산자 조작 공격에 대한 CRT-RSA 알고리듬의 안전성 재분석 (Security Reconsideration on CRT-RSA Algorithm Against Fault Attacks using Opcode Modification)

  • 하재철;백이루;박제훈;문상재
    • 정보보호학회논문지
    • /
    • 제20권4호
    • /
    • pp.155-160
    • /
    • 2010
  • 최근 오류주입 공격은 중국인의 나머지 정리(Chinese Remainder Theorem)를 이용한 RSA 암호 시스템(CRT-RSA)의 안전성에 심각한 위협이 되고 있다. 따라서 오류주입 공격에 강인한 대응 암호 알고리듬들이 개발되었고 다양한 오류 검사 방법이나 오류 확산을 이용한 대응책이 제시된 바 있다. 그러나 최근 Hur 등은 연산자 조작을 이용한 오류주입 공격 시 Kim 등이나 Ha 등이 제안한 알고리듬이 공격될 수 있다고 분석하였다. 본 논문에서는 이 연산자 조작 공격이 다정도(multi-precision) 연산을 하는 CRT-RSA 알고리듬에는 적용할 수 없으며 Kim 등이나 Ha 등이 제안한 알고리듬도 여전히 안전함을 밝히고자 한다.

Edge 정보에 근거한 피라미드 영상부호화 (Pyramidal Image Coding using Edge Information)

  • 김해성;김남철;심영석
    • 한국통신학회:학술대회논문집
    • /
    • 한국통신학회 1987년도 춘계학술발표회 논문집
    • /
    • pp.27-30
    • /
    • 1987
  • Some modification of laplacian pyramidal coding have been done and tested for a test image, From our studies, its apperar that 3-D redictor which exploits inter and intra plane redundancy simultaneously somewhat imporves the image quality, We also have tried to reduce the bit rate by only sending zeroth plane image values that correstpond to estimated dege points which can be obtained from the first plane For both cases the feedback of quantization errof in the previous plane has been in the reconstruction of each plane. Subjective and SNR tests show the better performance of the studied methods oner the conventional one.

  • PDF

터보복호기를 위한 SOVA 복호기의 설계 (VLSI Design of SOVA Decoder for Turbo Decoder)

  • 김기보;김종태
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2000년도 하계학술대회 논문집 D
    • /
    • pp.3157-3159
    • /
    • 2000
  • Soft Output Viterbi Algorithm is modification of Viterbi algorithm to deliver not only the decoded codewords but also a posteriori probability for each bit. This paper presents SOVA decoder which can be used for component decoder of turbo decoder. We used two-step SMU architectures combined with systolic array traceback methods to reduce the complexity of the design. We followed the specification of CDMA2000 system for SOVA decoder design.

  • PDF

A Robust Audio Fingerprinting Method Based on Segmentation Boundaries

  • Seo, Jin-Soo
    • 한국음향학회지
    • /
    • 제31권4호
    • /
    • pp.260-265
    • /
    • 2012
  • A robust audio fingerprinting method is presented based on segmentation boundaries. In order to obtain robustness against linear speed changes, fingerprint extraction and matching are synchronized with the segmentation boundaries. Experimental results show that the proposed method is also robust against other common audio processing steps including low bit-rate compression, equalization, and time-scale modification.

Clipping Prevention Scheme for MPEG Surround

  • Pang, Hee-Suk
    • ETRI Journal
    • /
    • 제30권4호
    • /
    • pp.606-608
    • /
    • 2008
  • MPEG Surround has a potential clipping problem since its encoding is based on downmixing a multichannel signal. We propose a clipping prevention scheme for MPEG Surround, which is composed of modification and recovery processes of a downmix signal with recovery information conveyed in arbitrary downmix gains of an MPEG Surround bitstream. Experiments show that the proposed scheme effectively prevents sound quality degradation caused by clipping problems with negligible additional bit rates.

  • PDF

상관결과의 왜곡 방지를 위한 재양자화 방법에 관한 연구 (A STUDY ON THE RE-QUANTIZATION METHOD FOR PREVENTING DISTORTION OF CORRELATION RESULT)

  • 염재환;오세진;노덕규;오충식;정진승;정동규
    • 천문학논총
    • /
    • 제27권5호
    • /
    • pp.419-429
    • /
    • 2012
  • In this paper, we propose a new re-quantization method after FFT processing to prevent the distortion of correlation result of VCS (VLBI Correlation Subsystem). The re-quantization is used to rearrange the data bit so as to reduce the data rate processed as 16-bit of FFT result of VCS. Having done this procedure, we found that the distorted spectrum of correlation result occurred in the delay tracking experiments by the re-quantization method introduced for initial design of VCS. In order to solve this, two kinds of re-quantization method, that is, the comparison and selection-type, are proposed. The first is to re-quantize the FFT result as a valid-bit by comparing with the input data after determining the adequate threshold. The second is manually to select the valid-bit of FFT result after finding the valid-field of data according to the bit-distribution of input data. We confirmed that the second is more effective compared with the first through the experimental result, and it will be implemented without so much modification of applied method in the condition of the limited resource of FPGA. The re-quantization is, however, carried out with 4-bit in the proposed second method for FFT result, and then the distortion of correlation result is also appeared. To fix this problem, the bit for re-quantization is extended to 8-bit. The proposed 8-bit selection-type is effectively verified so that the distortion of correlation result disappeared by applying to VCS in consequence of the simulation and correlation experiments.

가변 길이의 다중 특성 다항식을 사용하는 LFSR을 이용한 새로운 Reseeding 방법 (A New Reseeding Methodology Using a Variable-Length Multiple-Polynomial LFSR)

  • 양명훈;김유빈;이용;박현태;강성호
    • 대한전자공학회논문지SD
    • /
    • 제42권3호
    • /
    • pp.35-42
    • /
    • 2005
  • 본 논문에서는 가변 길이의 다중 특성 다항식을 사용하는 IFSR (MP-LFSR)을 사용한 새로운 reseeding 방법을 제안한다. 제안된 reseeding 방법에서 많은 수의 specified bits를 가진 test cube는 높은 차수의 다항식으로 인코딩되고 반면에 적은 수의 specified bit를 가진 test cube는 낮은 차수의 다항식으로 인코딩 된다. 따라서 각 test cube에서 specified bit의 숫자에 따라서 인코딩 되는 data의 크기를 최적으로 줄일 수 있다. 가변 길이의 MP-LFSR은 기존의 MP-LFSR를 간단히 수정하여 구현이 가능하고 인코딩 데이터에 1 비트만을 추가하여 여러 개의 특성 다항식을 제어할 수 있다. 면적이 큰 ISCAS'89 벤치 회로에 대한 실험 결과는 제안된 방법이 비교적 작은 크기의 하드웨어 오버헤드로써 이전의 방법들 보다 좋은 인코딩 효율을 보여준다.

ARP Modification for Prevention of IP Spoofing

  • Kang, Jung-Ha;Lee, Yang Sun;Kim, Jae Young;Kim, Eun-Gi
    • Journal of information and communication convergence engineering
    • /
    • 제12권3호
    • /
    • pp.154-160
    • /
    • 2014
  • The address resolution protocol (ARP) provides dynamic mapping between two different forms of addresses: the 32-bit Internet protocol (IP) address of the network layer and the 48-bit medium access control (MAC) address of the data link layer. A host computer finds the MAC address of the default gateway or the other hosts on the same subnet by using ARP and can then send IP packets. However, ARP can be used for network attacks, which are one of the most prevalent types of network attacks today. In this study, a new ARP algorithm that can prevent IP spoofing attacks is proposed. The proposed ARP algorithm is a broadcast ARP reply and an ARP notification. The broadcast ARP reply was used for checking whether the ARP information was forged. The broadcast ARP notification was used for preventing a normal host's ARP table from being poisoned. The proposed algorithm is backward compatible with the current ARP protocol and dynamically prevents any ARP spoofing attacks. In this study, the proposed ARP algorithm was implemented on the Linux operating system; here, we present the test results with respect to the prevention of ARP spoofing attacks.