• Title/Summary/Keyword: Discrete operation

Search Result 310, Processing Time 0.026 seconds

Diffie-Hellman Based Asymmetric Key Exchange Method Using Collision of Exponential Subgroups (지수연산 부분군의 충돌을 이용한 Diffie-Hellman 기반의 비대칭 키 교환 방법)

  • Song, Jun Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.2
    • /
    • pp.39-44
    • /
    • 2020
  • In this paper, we show a modified Diffie-Hellman key exchange protocol that can exchange keys by exposing only minimal information using pre-computable session key pairs. The discrete logarithm problem, which provides the safety of existing Diffie-Hellman and Diffie-Hellman based techniques, is modified to prevent exposure of primitive root. We prove the algorithm's operation by applying the actual value to the proposed scheme and compare the execution time and safety with the existing algorithm, shown that the security of the algorithm is improved more than the product of the time complexity of the two base algorithms while maintaining the computation amount at the time of key exchange. Based on the proposed algorithm, it is expected to provide a key exchange environment with improved security.

Novel Robust High Dynamic Range Image Watermarking Algorithm Against Tone Mapping

  • Bai, Yongqiang;Jiang, Gangyi;Jiang, Hao;Yu, Mei;Chen, Fen;Zhu, Zhongjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4389-4411
    • /
    • 2018
  • High dynamic range (HDR) images are becoming pervasive due to capturing or rendering of a wider range of luminance, but their special display equipment is difficult to be popularized because of high cost and technological problem. Thus, HDR images must be adapted to the conventional display devices by applying tone mapping (TM) operation, which puts forward higher requirements for intellectual property protection of HDR images. As the robustness presents regional diversity in the low dynamic range (LDR) watermarked image after TM, which is different from the traditional watermarking technologies, a concept of watermarking activity is defined and used to distinguish the essential distinction of watermarking between LDR image and HDR image in this paper. Then, a novel robust HDR image watermarking algorithm is proposed against TM operations. Firstly, based on the hybrid processing of redundant discrete wavelet transform and singular value decomposition, the watermark is embedded by modifying the structure information of the HDR image. Distinguished from LDR image watermarking, the high embedding strength can cause more obvious distortion in the high brightness regions of HDR image than the low brightness regions. Thus, a perceptual brightness mask with low complexity is designed to improve the imperceptibility further. Experimental results show that the proposed algorithm is robust to the existing TM operations, with taking into account the imperceptibility and embedded capacity, which is superior to the current state-of-art HDR image watermarking algorithms.

The Clustering Threshold Image Processing Technique in fMRI (핵자기 뇌기능 영상에서 군집경계기법을 이용한 영상처리법)

  • Jeong, Sun-Cheol;No, Yong-Man;Jo, Jang-Hui
    • Journal of Biomedical Engineering Research
    • /
    • v.16 no.4
    • /
    • pp.425-430
    • /
    • 1995
  • The correlation technique has been widely used in ctRl data processing. The proposed CLT (clus- tering threshold) technique is a modified CCT (correlation coefficient threshold) technique and has many advantages compared with the conventional CCT technique. The CLT technique is explained by the following two steps. First, once the correlation coefficient map above the proper TH value is obtained using the CCT technique which is discrete and includes splash noise data, then the spurious pixels are rejected and the real neural activity pixels extracted using an nxn matrix box. Second, a clustering operation is performed by the two correction rules. The real neuronal activated pixels can be clustered and the false spurious pixels can be suppressed by the proposed CLT technique. The proposed CLT technique used in the post processing in ctRl has advantages over other existing techniques. It is especially proved to be robust in noisy environment.

  • PDF

Inference of Context-Free Grammars using Binary Third-order Recurrent Neural Networks with Genetic Algorithm (이진 삼차 재귀 신경망과 유전자 알고리즘을 이용한 문맥-자유 문법의 추론)

  • Jung, Soon-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.11-25
    • /
    • 2012
  • We present the method to infer Context-Free Grammars by applying genetic algorithm to the Binary Third-order Recurrent Neural Networks(BTRNN). BTRNN is a multiple-layered architecture of recurrent neural networks, each of which is corresponding to an input symbol, and is combined with external stack. All parameters of BTRNN are represented as binary numbers and each state transition is performed with any stack operation simultaneously. We apply Genetic Algorithm to BTRNN chromosomes and obtain the optimal BTRNN inferring context-free grammar of positive and negative input patterns. This proposed method infers BTRNN, which includes the number of its states equal to or less than those of existing methods of Discrete Recurrent Neural Networks, with less examples and less learning trials. Also BTRNN is superior to the recent method of chromosomes representing grammars at recognition time complexity because of performing deterministic state transitions and stack operations at parsing process. If the number of non-terminals is p, the number of terminals q, the length of an input string k, and the max number of BTRNN states m, the parallel processing time is O(k) and the sequential processing time is O(km).

Parallel Genetic Algorithm-Tabu Search Using PC Cluster System for Optimal Reconfiguration of Distribution Systems

  • Mun Kyeong-Jun;Lee Hwa-Seok;Park June-Ho
    • KIEE International Transactions on Power Engineering
    • /
    • v.5A no.2
    • /
    • pp.116-124
    • /
    • 2005
  • This paper presents an application of the parallel Genetic Algorithm-Tabu Search (GA- TS) algorithm, and that is to search for an optimal solution of a reconfiguration in distribution systems. The aim of the reconfiguration of distribution systems is to determine the appropriate switch position to be opened for loss minimization in radial distribution systems, which is a discrete optimization problem. This problem has many constraints and it is very difficult to solve the optimal switch position because of its numerous local minima. This paper develops a parallel GA- TS algorithm for the reconfiguration of distribution systems. In parallel GA-TS, GA operators are executed for each processor. To prevent solution of low fitness from appearing in the next generation, strings below the average fitness are saved in the tabu list. If best fitness of the GA is not changed for several generations, TS operators are executed for the upper 10$\%$ of the population to enhance the local searching capabilities. With migration operation, the best string of each node is transferred to the neighboring node after predetermined iterations are executed. For parallel computing, we developed a PC-cluster system consisting of 8 PCs. Each PC employs the 2 GHz Pentium IV CPU and is connected with others through switch based rapid Ethernet. To demonstrate the usefulness of the proposed method, the developed algorithm was tested and is compared to a distribution system in the reference paper From the simulation results, we can find that the proposed algorithm is efficient and robust for the reconfiguration of distribution system in terms of the solution quality, speedup, efficiency, and computation time.

An Efficient Algorithm for Improving Detour in OLED FAB (효율적인 OLED FAB 경유 반송 개선 알고리즘)

  • Kim, Dong So;Choi, Jin Young
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.3
    • /
    • pp.120-128
    • /
    • 2018
  • OLED Display fabrication system is one of the most complicated discrete processing systems in the world. As the glass size grows from $550{\times}650mm$ to $1,500{\times}1,850mm$ in recent years, the efficiency of Automated Material Handling System (AMHS) has become very important and OLED glass manufacturers are trying to improve the overall efficiency of AMHS. Aiming to meet the demand for high efficiency of transportation, various kind of approaches have been applied for improving dispatching rules and facility layout, while simultaneously considering the system parameters such as glass cassettes due date, waiting time, and stocker buffer status. However, these works did not suggest the operational policy and conditions of distribution systems, especially for handling unnecessary material flows such as detour. Based on this motivation, in this paper, we proposed an efficient algorithm for improving detour transportation in OLED FAB. Specifically, we considered an OLED FAB simplifying OLED production environment in a Korean company, where four stockers are constructed for the delivery of Lot in a bay and linked to processing equipments. We developed a simulation model using Automod and performed a numerical experiment using real operational data to test the performance of three operation policies under considerations. We showed that a competitive policy for assigning alternative stocker in case of detour was superior to the current dedicated policy using a specified stocker and other considered policies.

Hardware Implementation of Chaotic System for Security of JPEG2000 (JPEG2000의 보안을 위한 카오스 시스템의 하드웨어 구현)

  • Seo Young-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1193-1200
    • /
    • 2005
  • In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method (Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung $0.35{\mu}m$ Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

Effect of Annealing Temperature on the Operation of Phase-Change Memory (상변화 메모리 소자 동작 특성에 미치는 열처리 온도 효과)

  • Lee, Seung-Yun;Park, Young-Sam
    • Journal of the Korean Vacuum Society
    • /
    • v.19 no.2
    • /
    • pp.155-160
    • /
    • 2010
  • The effect of process temperature of a final annealing step in the fabrication of phase change memory (PCM) devices was investigated. Discrete PCM devices employing $Ge_2Sb_2Te_5$ (GST) films as an active element were made in a pore-style configuration, and they were annealed at various temperatures ranging from 160 to $300^{\circ}C$. The behaviors of cell resistance change from SET resistance to RESET resistance were totally different according to the annealing temperatures. There was a critical annealing temperature for the fabrication of normal PCM devices and abnormal operations were observed in some devices annealed at temperatures lower or higher than the critical temperature. Those influences of annealing temperature seem closely related to the thermal stability of a top electrode/GST/heating layer multilayer structure in the PCM devices.

Electrocardiographic characteristics of significant factors of detected atrial fibrillation using WEMS

  • Kim, Min Soo;Kim, Yoon Nyun;Cho, Young Chang
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.6
    • /
    • pp.37-46
    • /
    • 2015
  • The wireless electrocardiographic monitoring system(WDMS) is designed to be long term monitoring for the early detection of cardiac disorders. The current version of the WDMS can identify two types of cardiac rhythms in real-time, such as atrial fibrillation(AF) and normal sinus rhythm(NSR), which are very important to track cardiac-rhythm disorders. In this study, we proposed the analysis method to discriminate the characteristics statistically evaluated in both time and frequency domains between AF and NSR using various parameters in the heart rate variability(HRV). And we applied various ECG detection methods (e.g., difference operation method) and compared the results with those of the discrete wavelet transform(DWT) method. From the statistically results, we found that the parameters such as STD RR, STD HR, RMSSD, NN50, pNN50, RR Trian, and TNN(p<0.05) are significantly different between the AF and NSR patients in time domain. On the other hand, the frequency domain analysis results showed a significant difference in VLF power($ms^2$), LF power($ms^2$), HF power($ms^2$), VLF(%), LF(%), and HF(%). In particular, the parameters such as STD RR, RMSSD, NN50, pNN50, VLF power, LF power and HF power were considered as the most useful parameters in both AF and NSR patient groups. Our proposed method can be efficiently applied to early detection of abnormal conditions and prevent the such abnormals from becoming serious.

An Enhanced Reverse-link Traffic Control and its Performance Analysis in cdma2000 1xEV-DO Systems (cdma2000 1xEV-DO 시스템에서 개선된 역방향 트래픽 제어와 성능 분석)

  • Yeo, Woon-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9A
    • /
    • pp.891-899
    • /
    • 2008
  • The cdma2000 1xEV-DO system controls the data rates of mobile terminals based on a binary overload indicator from the base station and a simple probabilistic model. However, this traffic control scheme has difficulty in controlling the reverse-link traffic load effectively and in guaranteeing a stable operation of the reverse link because each mobile terminal determines the next data rate autonomously. This paper proposes a new trafRc control scheme to improve the system stability, and analyzes the proposed scheme by modeling it as a discrete-time Markov process. The numerical results show that the maximum data rate of the proposed scheme is much higher than that of the conventional one. Moreover, the proposed scheme does not modify the standard physical channel structure, so it is compatible to the existing 1xEV-DO system.