• Title/Summary/Keyword: Pseudo random number

Search Result 101, Processing Time 0.031 seconds

Performance of PN Code Based Time Hopping Sequences in M-ary Ultra Wide Band Multiple Access Systems Using Equicorrelated Signal Sets (동일 상관 신호군을 이용하는 M-ary UWB 다원 접속 시스템에서 PN 부호 기반 시간 도약 시퀀스의 성능)

  • 양석철;신요안
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10A
    • /
    • pp.816-829
    • /
    • 2003
  • In this paper, we evaluate the performance of PN (Pseudo Noise) code based time hopping sequences for M-ary UWB (Ultra Wide Band) multiple access systems using the equicorrelated signal sets. In particular, we consider two different types of M-ary UWB systems in UWB indoor wireless multipath channels: The first type of the systems (System #1) has identical symbol transmission rate regardless of the number of symbols M since the length of signal pulse train is fixed while M increases, and the second type of the systems (System #2) has the same bit transmission rate regardless of M since the length of signal pulse train is extended according to the increase of M. We compare the proposed systems with those using the ideal random time hopping sequence in terms of the symbol error rate performance. Simulation results show that the PN code based time hopping sequence achieves quite good performance which is favorably comparable to that of the ideal random sequence. Moreover, as M increases, we observe that System #2 shows better robustness against multiple access interference than System # 1.

Synthesis Of Asymmetric One-Dimensional 5-Neighbor Linear MLCA (비대칭 1차원 5-이웃 선형 MLCA의 합성)

  • Choi, Un-Sook
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.333-342
    • /
    • 2022
  • Cellular Automata (CA) is a discrete and abstract computational model that is being applied in various fields. Applicable as an excellent pseudo-random sequence generator, CA has recently developed into a basic element of cryptographic systems. Several studies on CA-based stream ciphers have been conducted and it has been observed that the encryption strength increases when the radius of a CA's neighbor is increased when appropriate CA rules are used. In this paper, among CAs that can be applied as a one-dimensional pseudo-random number sequence generator (PRNG), one-dimensional 5-neighbor CAs are classified according to the connection state of their neighbors, and the ignition relationship of the characteristic polynomial is obtained. Also this paper propose a synthesis algorithm for an asymmetric 1-D linear 5-neighbor MLCA in which the radius of the neighbor is increased by 2 using the one-dimensional 3-neighbor 90/150 CA state transition matrix.

Enhanced Random Resource Selection Scheme for V2X (V2X를 위한 향상된 랜덤 자원 선택 기술)

  • Yoon, Sung-jun;Choi, Sang Won;Kwon, Ki-bum;Park, Dong-hyun;Li, Jianjun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.5
    • /
    • pp.1058-1068
    • /
    • 2017
  • In V2X communication, a random based resource selection scheme is needed with considerations of cases that support devices without sidelink reception capabilities and require reduction of UE's power consumption. In this paper, as improvement of D2D's resource section scheme that one TRP is repeated to data subframe pool within a PSCCH period, it is proposed that different TRPs is applied for enhanced random resource selection based on pseudo-random sequence having UE-specific seed value. By results of proposed scheme's performance by numerical analysis, it is confirmed that collision probability among resources allocated to each UE for data TB is reduced, and a number of UEs which can avoid resource collision as much as possible and have simultaneous resource allocation is increased.

Analysis of Pseudorandom Sequences Generated by Maximum Length Complemented Cellular Automata (최대길이 여원 CA 기반의 의사랜덤수열 분석)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.1001-1008
    • /
    • 2019
  • A high-quality pseudorandom sequence generation is an important part of many cryptographic applications, including encryption protocols. Therefore, a pseudorandom number generator (PRNG) is an essential element for generating key sequences in a cryptosystem. A PRNG must effectively generate a large, high-quality random data stream. It is well known that the bitstreams output by the CA-based PRNG are more random than the bitstreams output by the LFSR-based PRNG. In this paper, we prove that the complemented CA derived from 90/150 maximum length cellular automata(MLCA) is a MLCA to design a PRNG that can generate more secure bitstreams and extend the key space in a secret key cryptosystem. Also we give a method for calculating the cell positions outputting a nonlinear sequence with maximum period in complemented MLCA derived from a 90/150 MLCA and a complement vector.

Design and Performance evaluation of Fuzzy-based Framed Random Access Controller ($F^2RAC$) for the Integration of Voice ad Data over Wireless Medium Access Control Protocol (프레임 구조를 갖는 무선 매체접속제어 프로토콜 상에서 퍼지 기반의 음성/데이터 통합 임의접속제어기 설계 및 성능 분석)

  • 홍승은;최원석;김응배;강충구;임묘택
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.189-192
    • /
    • 2000
  • This paper proposes a fuzzy-based random access controller with a superimposed frame structure (F$^2$RAC) fur voice/data-integrated wireless networks. F$^2$RAC adopts mini-slot technique for reducing contention cost, and these mini-slots of which number may dynamically vary from one frame to the next as a function of the traffic load are further partitioned into two regions for access requests coming from voice and data traffic with their respective QoS requirements. And F$^2$RAC is designed to properly determine the access regions and permission probabilities for enhancing the data packet delay while ensuring the voice packet dropping probability constraint. It mainly consists of the estimator with Pseudo-Bayesian algorithm and fuzzy logic controller with Sugeno-type of fuzzy rules. Simulation results prove that F$^2$RAC can guarantee QoS requirement of voice and provide the highest throughput efficiency and the smallest data packet delay amongst the different alternatives including PRMA[1], IPRMA[2], and SIR[3].

  • PDF

Identification of Volterra Kernels of Nonlinear Van do Vusse Reactor

  • Kashiwagi, Hiroshi;Rong, Li
    • Transactions on Control, Automation and Systems Engineering
    • /
    • v.4 no.2
    • /
    • pp.109-113
    • /
    • 2002
  • Van de Vusse reactor is known as a highly nonlinear chemical process and has been considered by a number of researchers as a benchmark problem for nonlinear chemical process. Various identification methods for nonlinear system are also verified by applying these methods to Van de Vusse reactor. From the point of view of identification, only the Volterra kernel of second order has been obtained until now. In this paper, the authors show that Volterra kernels of nonlinear Van de Vusse reactor of up to 3rd order are obtained by use of M-sequence correlation method. A pseudo-random M-sequence is applied to Van de Vusse reactor as an input and its output is measured. Taking the crosscorrelation function between the input and the output, we obtain up to 3rd order Volterra kernels, which is the highest order Volterra kernel obtained until now for Van de Vusse reactor. Computer simulations show that when Van de Vusse chemical process is identified by use of up to 3rd order Volterra kernels, a good agreement is observed between the calculated output and the actual output.

PCAIW A VELET BASED WATERMARKING OF MULTISPECTRAL IMAGE

  • RANGSANSERI Y.;PANYAVARAPORN J.;THITIMAJSHIMA P.
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.138-141
    • /
    • 2005
  • In this paper, we propose a watermarking technique of multispectral images. In our method, the Principal Component Analysis (PCA) is preliminarily applied on the multispectral image. The most principal component image is used for embedding with a watermark, which is a pseudo-random number sequence generated with a secret key. The embedding process is performed in the wavelet domain. The resulting image is then reinserted into the principal component images, and the final multispectral image containing the watermark can be produced by the inverse PCA. Experimental results are provided to illustrate the performance of the algorithm against various kinds of attacks.

  • PDF

Identification of Volterra Kernels of Nonlinear Van de Vusse Reactor

  • Kashiwagi, Hiroshi;Rong, Li
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.26.3-26
    • /
    • 2001
  • Van de Vusse reactor is known as a highly nonlinear chemical process and has been considered by a number of researchers as a benchmark problem for nonlinear chemical process. Various identification methods for nonlinear system are also verified by applying these methods to Van de Vusse reactor. From the point of view of identification, only the Volterra kernel of second order has been obtained until now. In this paper, the authors show that Volterra kernels of nonlinear Van de Vusse reactor of up to 3rd order are obtained by use of M-sequence correlation method. A pseudo-random M-sequence is applied to Van de Vusse reactor as an input and its output is measured. Taking the cross correlation function between the input and the output, we obtain up to 3rd order Volterra kernels, which is ...

  • PDF

Quasi-static cyclic displacement pattern for seismic evaluation of reinforced concrete columns

  • Yuksel, E.;Surmeli, M.
    • Structural Engineering and Mechanics
    • /
    • v.37 no.3
    • /
    • pp.267-283
    • /
    • 2011
  • Although earthquakes generate random cyclic lateral loading on structures, a quasi-static cyclic loading pattern with gradually increasing amplitude has been commonly used in the laboratory tests because of its relatively low cost and simplicity compared with pseudo-dynamic and shake table tests. The number, amplitudes and sequence of cycles must be chosen appropriately as important parameters of a quasi-static cyclic loading pattern in order to account for cumulative damage matter. This paper aims to reach a new cyclic displacement pattern to be used in quasi-static tests of well-confined, flexure-dominated reinforced concrete (RC) columns. The main parameters of the study are sectional dimensions, percentage of longitudinal reinforcement, axial force intensity and earthquake types, namely, far-fault and near-fault.

Digital Authentication Technique using Content-based Watermarking in DCT Domain

  • Hyun Lim;Lee, Myung-Eun;Park, Soon-Young;Cho, Wan-Hyun
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.319-322
    • /
    • 2002
  • In this paper, we present a digital authentication technique using content-based watermarking in digital images. To digest the image contents, Hopfield network is employed on the block-based edge image. The Hopfield function extracts the same tit fur similarly looking blocks so that the values are unlikely to change to the innocuous manipulations while being changed far malicious manipulations. By inputting the extracted bit sequence with secret key to the cryptographic hash function, we generate a watermark for each block by seeding a pseudo random number generator with a hash output Therefore, the proposed authentication technique can distinguish between malicious attacks and innocuous attacks. Watermark embedding is based on the block-based spread spectrum method in DCT domain and the strength of watermark is adjusted according to the local statistics of DCT coefficients in a zig-zag scan line in AC subband. The numerical experiments show that the proposed technique is very efficient in the performance of robust authentication.

  • PDF