• 제목/요약/키워드: Randomness

검색결과 448건 처리시간 0.028초

페이지 쉬프터를 갖는 LFSR기반의 PRPG (LFSR-based PRPG with phase shifters)

  • 조성진;최언숙;황윤희;권민정;김진경;임지미;허성훈
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2009년도 추계학술대회
    • /
    • pp.343-346
    • /
    • 2009
  • 패턴생성기로 LFSR은 기계 자체에 고유의 선형의존성이 있어 패턴을 생성할 때 bit의 위치를 이동시켜 수열을 생성하기 때문에 생성되는 패턴들의 상관관계가 높고 따라서 오류 검출률이 낮아지게 된다. 이런 문제점을 해소하기 위하여 LFSR은 scan chain 사이에 XOR 게이트의 조합으로 구성된 페이지 쉬프터를 장착하여 출력 테스트 패턴의 난수성을 높임으로써 LFSR 고유의 선형의존성을 줄이고 오류검출률을 높이는 연구가 활발히 진행되어 왔다. 본 논문에서는 PRPG로서 LFSR의 난수성을 높이기 위하여 LFSR에 장착할 수 있는 새롭고 효과적인 페이지 쉬프터를 구성하는 방법을 제안한다.

  • PDF

Improved marine predators algorithm for feature selection and SVM optimization

  • Jia, Heming;Sun, Kangjian;Li, Yao;Cao, Ning
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권4호
    • /
    • pp.1128-1145
    • /
    • 2022
  • Owing to the rapid development of information science, data analysis based on machine learning has become an interdisciplinary and strategic area. Marine predators algorithm (MPA) is a novel metaheuristic algorithm inspired by the foraging strategies of marine organisms. Considering the randomness of these strategies, an improved algorithm called co-evolutionary cultural mechanism-based marine predators algorithm (CECMPA) is proposed. Through this mechanism, search agents in different spaces can share knowledge and experience to improve the performance of the native algorithm. More specifically, CECMPA has a higher probability of avoiding local optimum and can search the global optimum quickly. In this paper, it is the first to use CECMPA to perform feature subset selection and optimize hyperparameters in support vector machine (SVM) simultaneously. For performance evaluation the proposed method, it is tested on twelve datasets from the university of California Irvine (UCI) repository. Moreover, the coronavirus disease 2019 (COVID-19) can be a real-world application and is spreading in many countries. CECMPA is also applied to a COVID-19 dataset. The experimental results and statistical analysis demonstrate that CECMPA is superior to other compared methods in the literature in terms of several evaluation metrics. The proposed method has strong competitive abilities and promising prospects.

합성난류경계층이 벽면에서의 변동압력에 미치는 영향 (Effects of Synthetic Turbulent Boundary Layer on Fluctuating Pressure on the Wall)

  • 이영우;이동섭;신구균;홍진숙;임희창
    • 한국가시화정보학회지
    • /
    • 제19권3호
    • /
    • pp.92-98
    • /
    • 2021
  • Large Eddy Simulation (LES) has been popularly applied and used in the last several decades to simulate turbulent boundary layer in the numerical domain. A fully developed turbulent boundary layer has also been applied to predict the complicated wake flow behind bluff bodies. In this study we aimed to generate an artificial turbulent boundary layer, which is based on an exponential correlation function, and generates a series of realistic three-dimensional velocity data in two-dimensional inlet section which are correlated both in space and in time. The results suggest its excellent capability for high Reynolds number flows. To make an effective generation, a hexahedral mesh has been used and Cholesky decomposition was applied to possess suitable turbulent statistics such as the randomness and correlation of turbulent flow. As a result, the flow characteristics in the domain and fluctuating pressure near the wall are very close to those of fully developed turbulent boundary layers.

Research of popular success factors of game content

  • Liu, Miaoyihai;Chung, Jeanhun
    • International journal of advanced smart convergence
    • /
    • 제11권2호
    • /
    • pp.83-87
    • /
    • 2022
  • Genshin Impact is an open-world action role-playing game launched by miHoYo in 2020 and has been released on multiple platforms. Due to the excellent character design, it has received widespread attention once it was released, and it has been ranked in the top 10 best-selling lists in several countries after a few weeks of launch. This article will first analyze the map design of the game's open world, and what elements are used on the game map to allow players to immerse themselves in it. Then, in the gameplay of the game, a rich and varied combat system is formed by using the relationship between the elements to restrain each other.There is also a card drawing system added to it, which makes the acquisition of characters full of randomness and allows more players to participate in it. It is concluded that the novel design and rich and varied play methods have made the game Genshin Impact high in popularity, occupying the forefront of the app download list for a long time.

Community Detection using Closeness Similarity based on Common Neighbor Node Clustering Entropy

  • Jiang, Wanchang;Zhang, Xiaoxi;Zhu, Weihua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권8호
    • /
    • pp.2587-2605
    • /
    • 2022
  • In order to efficiently detect community structure in complex networks, community detection algorithms can be designed from the perspective of node similarity. However, the appropriate parameters should be chosen to achieve community division, furthermore, these existing algorithms based on the similarity of common neighbors have low discrimination between node pairs. To solve the above problems, a noval community detection algorithm using closeness similarity based on common neighbor node clustering entropy is proposed, shorted as CSCDA. Firstly, to improve detection accuracy, common neighbors and clustering coefficient are combined in the form of entropy, then a new closeness similarity measure is proposed. Through the designed similarity measure, the closeness similar node set of each node can be further accurately identified. Secondly, to reduce the randomness of the community detection result, based on the closeness similar node set, the node leadership is used to determine the most closeness similar first-order neighbor node for merging to create the initial communities. Thirdly, for the difficult problem of parameter selection in existing algorithms, the merging of two levels is used to iteratively detect the final communities with the idea of modularity optimization. Finally, experiments show that the normalized mutual information values are increased by an average of 8.06% and 5.94% on two scales of synthetic networks and real-world networks with real communities, and modularity is increased by an average of 0.80% on the real-world networks without real communities.

Numerical simulation on the cyclic behavior of ultra-high performance concrete filled steel tubular column

  • Heng Cai;Fangqian Deng
    • Structural Engineering and Mechanics
    • /
    • 제85권5호
    • /
    • pp.693-707
    • /
    • 2023
  • In order to deeply reveal the working mechanism of ultra-high performance concrete (UHPC) filled steel tubular columns (UHPCFSTs) under cyclic loading, a three-dimension (3D) macro-mesoscale finite element (FE) model was established considering the randomness of steel fibers and the damage of UHPC. Model correctness and reliability were verified based on the experimental results. Next, the whole failure process of UHPC reinforced with steel fibers, passive confinement effect and internal force distribution laws were comprehensively analyzed and discussed. Finally, a simplified and practical method was proposed for predicting the ultimate bending strengths of UHPCFSTs. It was found that the non-uniform confinement effect of steel tube occurred when the drift ratio exceeded 0.5%, while the confining stress increased then decreased afterwards. There was preferable synergy between the steel tube and UHPC until failure. Compared with experimental results, the ultimate bending strengths of UHPCFSTs were undervalued by the current code provisions such as AISC360-10, EC4 and GB50936 with computed mean values (MVs) of 0.855, 0.880 and 0.836, respectively. The proposed practical method was highly accurate, as evidenced by a mean value of 1.058.

Dynamic ID randomization for user privacy in mobile network

  • Arijet Sarker;SangHyun Byun;Manohar Raavi;Jinoh Kim;Jonghyun Kim;Sang-Yoon Chang
    • ETRI Journal
    • /
    • 제44권6호
    • /
    • pp.903-914
    • /
    • 2022
  • Mobile and telecommunication networking uses temporary and random identifiers (IDs) to protect user privacy. For greater intelligence and security o the communications between the core network and the mobile user, we design and build a dynamic randomization scheme for the temporary IDs for mobile networking, including 5G and 6G. Our work for ID randomization (ID-RZ) advances the existing state-of-the-art ID re-allocation approach in 5G in the following ways. First, ID-RZ for ID updates is based on computing, as opposed to incurring networking for the re-allocation-based updates, and is designed for lightweight and low-latency mobile systems. Second, ID-RZ changes IDs proactively (as opposed to updating based on explicit networking event triggers) and provides stronger security (by increasing the randomness and frequency of ID updates). We build on the standard cryptographic primitives for security (e.g., hash) and implement our dynamic randomization scheme in the 5G networking protocol to validate its design purposes, which include time efficiency (two to four orders of magnitude quicker than the re-allocation approach) and appropriateness for mobile applications.

Implementation and characterization of flash-based hardware security primitives for cryptographic key generation

  • Mi-Kyung Oh;Sangjae Lee;Yousung Kang;Dooho Choi
    • ETRI Journal
    • /
    • 제45권2호
    • /
    • pp.346-357
    • /
    • 2023
  • Hardware security primitives, also known as physical unclonable functions (PUFs), perform innovative roles to extract the randomness unique to specific hardware. This paper proposes a novel hardware security primitive using a commercial off-the-shelf flash memory chip that is an intrinsic part of most commercial Internet of Things (IoT) devices. First, we define a hardware security source model to describe a hardware-based fixed random bit generator for use in security applications, such as cryptographic key generation. Then, we propose a hardware security primitive with flash memory by exploiting the variability of tunneling electrons in the floating gate. In accordance with the requirements for robustness against the environment, timing variations, and random errors, we developed an adaptive extraction algorithm for the flash PUF. Experimental results show that the proposed flash PUF successfully generates a fixed random response, where the uniqueness is 49.1%, steadiness is 3.8%, uniformity is 50.2%, and min-entropy per bit is 0.87. Thus, our approach can be applied to security applications with reliability and satisfy high-entropy requirements, such as cryptographic key generation for IoT devices.

Nonlinear finite element based parametric and stochastic analysis of prestressed concrete haunched beams

  • Ozogul, Ismail;Gulsan, Mehmet E.
    • Structural Engineering and Mechanics
    • /
    • 제84권2호
    • /
    • pp.207-224
    • /
    • 2022
  • The mechanical behavior of prestressed concrete haunched beams (PSHBs) was investigated in depth using a finite element modeling technique in this study. The efficiency of finite element modeling was investigated in the first stage by taking into account a previous study from the literature. The first stage's findings suggested that finite element modeling might be preferable for modeling PSHBs. In the second stage of the research, a comprehensive parametric study was carried out to determine the effect of each parameter on PSHB load capacity, including haunch angle, prestress level, compressive strength, tensile reinforcement ratio, and shear span to depth ratio. PSHBs and prestressed concrete rectangular beams (PSRBs) were also compared in terms of capacity. Stochastic analysis was used in the third stage to define the uncertainty in PSHB capacity by taking into account uncertainty in geometric and material parameters. Standard deviation, coefficient of variation, and the most appropriate probability density function (PDF) were proposed as a result of the analysis to define the randomness of capacity of PSHBs. In the study's final section, a new equation was proposed for using symbolic regression to predict the load capacity of PSHBs and PSRBs. The equation's statistical results show that it can be used to calculate the capacity of PSHBs and PSRBs.

A new conjugate gradient method for dynamic load identification of airfoil structure with randomness

  • Lin J. Wang;Jia H. Li;You X. Xie
    • Structural Engineering and Mechanics
    • /
    • 제88권4호
    • /
    • pp.301-309
    • /
    • 2023
  • In this paper, a new modified conjugate gradient (MCG) method is presented which is based on a new gradient regularizer, and this method is used to identify the dynamic load on airfoil structure without and with considering random structure parameters. First of all, the newly proposed algorithm is proved to be efficient and convergent through the rigorous mathematics theory and the numerical results of determinate dynamic load identification. Secondly, using the perturbation method, we transform uncertain inverse problem about force reconstruction into determinate load identification problem. Lastly, the statistical characteristics of identified load are evaluated by statistical methods. Especially, this newly proposed approach has successfully solved determinate and uncertain inverse problems about dynamic load identification. Numerical simulations validate that the newly developed method in this paper is feasible and stable in solving load identification problems without and with considering random structure parameters. Additionally, it also shows that most of the observation error of the proposed algorithm in solving dynamic load identification of deterministic and random structure is respectively within 11.13%, 20%.