• Title/Summary/Keyword: Logarithm number system

Search Result 15, Processing Time 0.02 seconds

Design of Intrusion Responsible System For Enterprise Security Management (통합보안 관리를 위한 침입대응 시스템 설계)

  • Lee, Chang-Woo;Sohn, Woo-Yong;Song, Jung-Gil
    • Convergence Security Journal
    • /
    • v.5 no.2
    • /
    • pp.51-56
    • /
    • 2005
  • Service operating management to keep stable and effective environment according as user increase and network environment of the Internet become complex gradually and requirements of offered service and user become various is felt constraint gradually. To solve this problem, invasion confrontation system through proposed this log analysis can be consisted as search of log file that is XML's advantage storing log file by XML form is easy and fast, and can have advantage log files of system analyze unification and manages according to structure anger of data. Also, created log file by Internet Protocol Address sort by do log and by Port number sort do log, invasion type sort log file and comparative analysis created in other invasion feeler system because change sort to various form such as do log by do logarithm, feeler time possible.

  • PDF

On the Performance of Zero-Forcing Beamforming with Semi-orthogonal User Selection in Clustered Cell Coordinated Transmission (제로 포싱 (zero-forcing) 빔 형성과 반직교 기반 사용자 선정을 이용한 클러스터 (cluster) 기반 셀 협력 전송 방식의 성능에 대한 연구)

  • Yang, Jang-Hoon;Jang, Seung-Hun;Kim, Dong-Ku
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.10
    • /
    • pp.1-9
    • /
    • 2008
  • In this paper, a simple and efficient three cell based clustered-cell coordination is proposed with well hewn zero-forcing beamforming (ZF-BF) with a semi-orthogonal user selection (SUS) as transmission and scheduling scheme. For a modified Wyner's channel model with two classes of user groups for a hexagonal cellular system, the upper bound of asymptotic sum rate scaling of ZF-BF in a proposed coordination is shown to be proportional to the number of transmit antennas and double logarithms of the number of users. The numerical results verify the efficiency of the proposed cell coordination. It is also numerically shown that ZF-BF with the SUS in CCCT actually achieves the upper bound of asymptotic sum rate sum rate scaling.

Implementation of LDPC Decoder using High-speed Algorithms in Standard of Wireless LAN (무선 랜 규격에서의 고속 알고리즘을 이용한 LDPC 복호기 구현)

  • Kim, Chul-Seung;Kim, Min-Hyuk;Park, Tae-Doo;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2783-2790
    • /
    • 2010
  • In this paper, we first review LDPC codes in general and a belief propagation algorithm that works in logarithm domain. LDPC codes, which is chosen 802.11n for wireless local access network(WLAN) standard, require a large number of computation due to large size of coded block and iteration. Therefore, we presented three kinds of low computational algorithms for LDPC codes. First, sequential decoding with partial group is proposed. It has the same H/W complexity, and fewer number of iterations are required with the same performance in comparison with conventional decoder algorithm. Secondly, we have apply early stop algorithm. This method reduces number of unnecessary iterations. Third, early detection method for reducing the computational complexity is proposed. Using a confidence criterion, some bit nodes and check node edges are detected early on during decoding. Through the simulation, we knew that the iteration number are reduced by half using subset algorithm and early stop algorithm is reduced more than one iteration and computational complexity of early detected method is about 30% offs in case of check node update, 94% offs in case of check node update compared to conventional scheme. The LDPC decoder have been implemented in Xilinx System Generator and targeted to a Xilinx Virtx5-xc5vlx155t FPGA. When three algorithms are used, amount of device is about 45% off and the decoding speed is about two times faster than convectional scheme.

The Investigation on Thermal Aging Characteristics of Oil-Paper Insulation in Bushing

  • Liao, Rui-jin;Hu, En-de;Yang, Li-jun;Xu, Zuo-ming
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1114-1123
    • /
    • 2015
  • Bushing is the key link to connect outer and inner insulating systems and also the essential electric accessory in electric power system, especially in the high voltage engineering (AC 1000kV, DC 800kV). This paper presented the experimental research of thermal aging characteristic of oil-paper insulation used in bushing. A thermally accelerated aging experiment at 90℃ was performed. The bushing models containing five layers of paper were sealed into the aging vessels and further aged for 250 days. Then several important parameters associated with the aging were observed and evaluated. The results showed that the degree of polymerization (DP) of papers gradually decreased. The DP values of outermost layer and middle layer fit well into the second-order kinematic model and first-order kinematic model, respectively. Less deterioration speed of the inter-layer paper than outer layer was confirmed by the variation of DP. Hydrolysis was considered as the main cause to this phenomenon. In addition, the logarithm of the furfural concentrations in insulation oil was found to have good linear relationship with DP of papers. Interestingly, when the aging time is about 250 days and DP is 419, the aging process reaches an inflection point at which the DP approaches the leveling off degree of polymerization (LODP) value. Both tanδ and acid number of oils increased, while surface and volume resistivity of papers decreased. The obtained results demonstrated that thermal aging and moisture absorbed in papers brought great influence to the degradation of insulating paper, leading to rapid decrease of DP and increase of the tanδ. Thus, the bushing should be avoided from damp and real-time monitoring to the variation of tanδ and DP values of paper is an effective way to evaluate the insulation status of bushing.

Electronic Cash Schemes for EFT Using Smart Card (스마트카드를 이용한 새로운 전자현금 방식)

  • Youm, Heung-Youl;Lee, Seok-Lae;Rhee Man-Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.5 no.1
    • /
    • pp.37-50
    • /
    • 1995
  • The smart card with the cryptography and VLSI technologies makes it possible to implement the electronic cash easily. A number of electronic each schemes have been proposed by many cryptographic researchers. In this paper, we propose a practical electronic cash system, using blind digital signature scheme. Schnorr's authentication scheme based on the discrete logarithm problem, and the hierarchical cash tree based on two one-way hash functions for dividable payment. Thisf electronic cash scheme has such properties as privacy of the payment, off-line payment, non-reuseability of cash, transferability of cash to another customer, and dividable payment of cash. This electronic cash protocol is well suited for implementing in smart card.