• Title/Summary/Keyword: Source of Random

Search Result 354, Processing Time 0.029 seconds

Source Identification in an Interior Sound Field (실내 공간에서의 음원 탐지 방법)

  • 김양한;최영철
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.12 no.7
    • /
    • pp.520-526
    • /
    • 2002
  • Identification of noose sources, their locations and strengths, has been taken great attention. The methods that can identify noise sources normally assume that noise sources are located in a free field. However, the sound in a reverberant field consists of that coming directly from the source plus sound reflected or scattered by the walls or objects in the field. In contrast to the exterior sound field. reflections are added to sound field. Therefore, we haute to consider the reverberation effect on the source identification method. The main objective of this paper is to identify noise source in the reverberant field. At fist, we try to identify noise sources in a rigid wall emc;psire using the beamforming method. In many cases of practical interest, the wall has admittance so that random reflections occur in an enclosure. In this paper, we assumed the complex reverberant field in the enclosure to be the sum of plane caves with random Incidence and magnitude. Then we try to explain effects of reverberant field at interior source identification.

Secure Transmission for Two-Way Vehicle-to-Vehicle Networks with an Untrusted Relay

  • Gao, Zhenzhen
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.6
    • /
    • pp.443-449
    • /
    • 2015
  • This paper considers the physical layer security problem for a two-way vehicle-to-vehicle network, where the two source vehicles can only exchange information through an untrusted relay vehicle. The relay vehicle helps the two-way transmission but also acts as a potential eavesdropper. Each vehicle has a random velocity. By exploiting the random carrier frequency offsets (CFOs) caused by random motions, a secure double-differential two-way relay scheme is proposed. While achieving successful two-way transmission for the source vehicles, the proposed scheme guarantees a high decoding error floor at the untrusted relay vehicle. Average symbol error rate (SER) performance for the source vehicles and the untrusted relay vehicle is analyzed. Simulation results are provided to verify the proposed scheme.

Finite Source Queueing Models for Analysis of Complex Communication Systems (복잡한 통신 시스템의 성능분석을 위한 유한소스 대기 모형)

  • Che-Soong Kim
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.26 no.2
    • /
    • pp.62-67
    • /
    • 2003
  • This paper deals with a First-Come, First-Served queueing model to analyze the behavior of heterogeneous finite source system with a single server Each sources and the processor are assumed to operate in independently Markovian environments, respectively. Each request is characterized by its own exponentially distributed source and service time with parameter depending on the state of the corresponding environment, that is, the arrival and service rates are subject to random fluctuations. Our aim is to get the usual stationary performance measures of the system, such as, utilizations, mean number of requests staying at the server, mean queue lengths, average waiting and sojourn times. In the case of fast arrivals or fast service asymptotic methods can be applied. In the intermediate situations stochastic simulation Is used. As applications of this model some problems in the field of telecommunications are treated.

Efficiency of Photovoltaic Cell with Random Textured Anti Glare (RTAG) Glass

  • Kim, Geon Ho;Jeon, Bup Ju
    • Applied Science and Convergence Technology
    • /
    • v.25 no.6
    • /
    • pp.133-137
    • /
    • 2016
  • The surface treatment of cover glass for conversion efficiency of photovoltaic cell is important to reduce reflectivity and to increase the incident light. In this work, random textured anti glare (RTAG) glass was prepared by wet surface coating method. Optical properties due to the changes of surface morphology of RTAG glass were compared and conversion efficiency of photovoltaic cell was researched. Grain size and changes of surface morphologies formed with surface etching time greatly affected optical transmittance and transmission haze. Current density (Jsc) were high at the condition when surface morphologies reflection haze were low and transmission haze were high. Jsc was $40.0mA/cm^2$ at glancing angle of $90^{\circ}$. Incidence light source was strongly influenced by surface treatment of cover glass at high incidence angle but was hardly affected light source at the low angle of incidence.

Analysis of Discrete Noise Characteristics for the Cross Flow Fan with Uniform/Random hitch Blades (횡류홴 등/부등피치 블레이드의 이산소음 특성 분석)

  • Cho Yong;Kim Jong-Jin;Moon Young J.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2000.10a
    • /
    • pp.141-148
    • /
    • 2000
  • The discrete noise of the cross-flow fan with uniform/random pitch blades is predicted by computational methods. With the time dependent surface pressure data obtained by solving the Wavier-Stokes equation, the acoustic pressure is calculated by the Ffowcs Williams-Hawkings equation. The positions of the blade noise source are identified through investigation of the acoustic pressure history induced by one blade, and it is confirmed that the dominant noise source is near the stabilizer. Since the acoustic pressure of the random pitch fan fluctuates according to blade passing, the dominant BPF noise for the uniform pitch fan is modified into some reduced discrete noises which have a 50Hz difference from BPF.

  • PDF

Utilisation of IoT Systems as Entropy Source for Random Number Generation

  • Oguzhan ARSLAN;Ismail KIRBAS
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.77-86
    • /
    • 2024
  • Using random numbers to represent uncertainty and unpredictability is essential in many industries. This is crucial in disciplines like computer science, cryptography, and statistics where the use of randomness helps to guarantee the security and dependability of systems and procedures. In computer science, random number generation is used to generate passwords, keys, and other security tokens as well as to add randomness to algorithms and simulations. According to recent research, the hardware random number generators used in billions of Internet of Things devices do not produce enough entropy. This article describes how raw data gathered by IoT system sensors can be used to generate random numbers for cryptography systems and also examines the results of these random numbers. The results obtained have been validated by successfully passing the FIPS 140-1 and NIST 800-22 test suites.

An analysis of the gyro random process (자이로 랜덤 프로세스의 분석)

  • 고영웅;김경주;이재철;권태무
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1996.10b
    • /
    • pp.210-212
    • /
    • 1996
  • Random drift rate (i.e., random drift in angle rate) of a gyro represents the major error source of inertial navigation systems that are required to operate over long time intervals. It is uncorrectable and leads to an increase in the error with the passage of time. In this paper a technique is presented for analyzing random process from experimental data and the results are presented. The problem of estimating the a priori statistics of a random process is considered using time averages of experimental data. Time averages are calculated and used in the optimal data-processing techniques to determine the statistics of the random process. Therefore the contribution each component to the gyro drift process can be quantitatively measured by its statistics. The above techniques will be applied to actual gyro drift rate data with satisfactory results.

  • PDF

On Sensor Network Routing for Cloaking Source Location Against Packet-Tracing

  • Tscha, Yeong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.3B
    • /
    • pp.213-224
    • /
    • 2009
  • Most of existing routing methods in wireless sensor networks to counter the local eavesdropping-based packet-tracing deal with a single asset and suffer from the packet-delivery latency as they prefer to take a separate path of many hops for each packet being sent. Recently, the author proposed a routing method, GSLP-w(GPSR-based Source-Location Privacy with crew size w), that enhances location privacy of the packet-originating node(i.e., active source) in the presence of multiple assets, yet taking a path of not too long. In this paper, we present a refined routing(i.e., next-hop selection) procedure of it and empirically study privacy strength and delivery latency with varying the crew size w(i.e., the number of packets being sent per path). It turns out that GSLP-w offers the best privacy strength when the number of packets being sent per path is randomly chosen from the range [$1,h_{s-b}/4$] and that further improvements on the privacy are achieved by increasing the random walk length TTLrw or the probability prw that goes into random walk(where, $h_{s-b}$ is the number of hops of the shortest path between packet-originating node s and sink b).

Sensitivity improvement of fiber-optic gyroscope with erbium-doped fiber source by source excess noise subtraction (Erbium 첨가 광섬유 광원을 사용하는 자이로스코프에서 광원 과잉잡음 소거에 의한 측정감도 개선)

  • 진영준
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 1999.08a
    • /
    • pp.226-227
    • /
    • 1999
  • In the fiber-optic gyroscope employing the erbium-doped fiber source, the source excess noise was subtracted through a signal processing to improve the gyroscope sensitivity . As the result, we obtained the improvement of 14 dB(electrical) at the proper frequency, which was measured from the noise floor spectrum . In addition the random walk coefficient in the gyro output was reduced by about factor of three.

  • PDF

An Approach to Constructing an Efficient Entropy Source on Multicore Processor (멀티코어 환경에서 효율적인 엔트로피 원의 설계 기법)

  • Kim, SeongGyeom;Lee, SeungJoon;Kang, HyungChul;Hong, Deukjo;Sung, Jaechul;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.61-71
    • /
    • 2018
  • In the Internet of Things, in which plenty of devices have connection to each other, cryptographically secure Random Number Generators (RNGs) are essential. Particularly, entropy source, which is the only one non-deterministic part in generating random numbers, has to equip with an unpredictable noise source(or more) for the required security strength. This might cause an requirement of additional hardware extracting noise source. Although additional hardware resources has better performance, it is needed to make the best use of existing resources in order to avoid extra costs, such as area, power consumption. In this paper, we suggest an entropy source which uses a multi-threaded program without any additional hardware. As a result, it reduces the difficulty when implementing on lightweight, low-power devices. Additionally, according to NIST's entropy estimation test suite, the suggested entropy source is tested to be secure enough for source of entropy input.