• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.026 seconds

Topological Interference Cancellation Using 5 Prime Substances (오행(五行)을 이용한 위상 간섭 제거)

  • Park, Ju-Youg;Kim, Jeoug-Su;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.83-89
    • /
    • 2016
  • In this paper, we apply the complementation principle of five prime substances to reduce the phase interference. The transmitter and receiver match the concepts of co-operative and conflict to the direct and indirect signals. The result shows we investigate the proposed network topology such as 5 prime substances (5 user networks). The key observation is that optimal symmetric degree of freedom (DoF) can be achieved for 5 user network with different channel coherence times by adaptively selecting the interference alignment scheme via controlling the alignment feasibility of the transmitted signals. Theoretical results demonstrate the effectiveness of the proposed 5 user networks are well matched to the wireless mobile channel environment to achieve the symmetric DoF for different channel coherence times which ensures that the proposed networks are applicable for dense wireless network applications. Modulo 3 functionality in 5 user network topology makes it easier for the transmitter cooperation to achieve the DoF of 2/3 with the help of the interference alignment schemes.

Acceleration of LU-SGS Code on Latest Microprocessors Considering the Increase of Level 2 Cache Hit-Rate (최신 마이크로프로세서에서 2차 캐쉬 적중률 증가를 고려한 LU-SGS 코드의 가속)

  • Choi, J.Y.;Oh, Se-Jong
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.7
    • /
    • pp.68-80
    • /
    • 2002
  • An approach for composing a performance optimized computational code is suggested for latest microprocessors. The concept of the code optimization, called here as localization, is maximizing the utilization of the second level cache that is common to all the latest computer system, and minimizing the access to system main memory. In this study, the localized optimization of LU-SGS (Lower-Upper Symmetric Gauss-Seidel) code for the solution of fluid dynamic equations was carried out in three different levels and tested for several different microprocessor architectures most widely used in these days. The test results of localized optimization showed a remarkable performance gain up to 7.35 times faster solution, depending on the system, than the baseline algorithm for producing exactly the same solution on the same computer system.

Basic Study on Diffusion Branch of Tribrachial Flame with the Variation of Flammability Limits and Heat Loss Under Small Fuel Concentration Gradient (미소 농도구배 조건에서 열손실 및 가연한계가 삼지화염의 확산화염에 미치는 영향에 대한 기초 연구)

  • Cho, Sang-Moon;Lee, Min-Jung;Kim, Nam-Il
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.34 no.5
    • /
    • pp.505-513
    • /
    • 2010
  • The tribrachial flame has attracted interest as a basic structure of the flame edge. This flame structure helps understand stabilization of laminar flames and re-ignition of turbulent flames. A number of analytical and experimental studies have been carried out on the tribrachial flame. However, the effect of the variation of the flammability limits on the structure of the tribrachial flame has not been studied in detail. In this study, the effect of non-symmetric flammability limits on the flame structure was investigated by adopting a simple numerical scheme based on several laminar flame theories. A fixed velocity field was considered and boundary matching algorithm was used on the premixed branch. The variation of the diffusion branches under the non-symmetric flammability limits and heat loss was investigated. The formation and extinction of the diffusion branch behind the premixed branch were successfully described. This basic study can help understand the fundamental structure of the flame and can form the basis of subsequent detailed studies.

Hybrid Dimensional Approach to the Unsteady Compressible Flowfield Analysis around a High-speed Train Passing through a Tunnel (혼합차원기법을 이용한 고속열차의 터널 통과 시 발생하는 비정상 압축성 유동장의 수치해석)

  • Kim, Tae-Yoon;Kwon, Hyeok-Bin;Lee, Dong-Ho;Kim, Moon-Sang
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.30 no.6
    • /
    • pp.78-83
    • /
    • 2002
  • A modified patched grid scheme has been developed and employed for and axi-symmetric unsteady Euler solver based on Roe's FDS to analyze the unsteady flow fields induced by a train and a tunnel. On this paper, the innovative zonal method, named hybrid dimensional approach, was proposed and applied to the train-tunnel interaction problems. The basic idea of this method is to maximize the efficiency of numerical calculations by minimal assumption of spatial dimensions. The hybrid dimensional approach, embedded in the present modified patched grid method, yielded high numerical accuracy as much as the fully axe-symmetric method. The hybrid dimensional approach is expected to reduce the huge computation time of the train-tunnel interaction problems especially in the cases of solving a long tunnel.

Analysis of Effects of Nonideal Channels on the Throughput of CR Systems (인지 무선 시스템에서 전송 오류가 전송 용량에 미치는 영향에 대한 분석)

  • Lee, Sang-Wook;Lim, Chang-Heon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9A
    • /
    • pp.719-726
    • /
    • 2009
  • CR systems performs spectrum sensing operation to detect the appearance of primary users. However, since it is not feasible to do spectrum sensing and data transmission simultaneously, they typically operate alternatively in a time domain. There have been an effort(8) to investigate the optimal spectrum sensing duration for maximum throughput for the scheme with cooperative spectrum sensing. This is based on an assumption that the communication channels between each secondary user and the fusion center are ideal and does not consider the effects of transmission error. Motivated by this, we here model the channels as binary symmetric channels and examined its effect on the maximum throughput and the associated optimal sensing duration. Analysis shows that the performance degradation due to the transmission error is smaller for the case of using the AND fusion rule than for the OR fusion rule.

Conference Key Agrement Protocol for Multilateral Remote Conference Employing a SBIBD Network (SBIBD 네트워크에서 다자간 원격회의를 위한 회의용 키 생성 프로토콜)

  • Kim, Seong-Yeol;Kim, Dong-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.4
    • /
    • pp.265-269
    • /
    • 2009
  • A conference key agreement system is a scheme to generate a session key in a contributory manner in order to communicate with each other securely among participants. In this paper an efficient conference key agreement system is proposed by employing symmetric balanced incomplete block design(SBIBD), one class of block designs. The protocol presented not only minimizes the message overhead and message exchanging rounds but also makes every participant contribute evenly for generating a conference key. Our protocol constructs a conference key which takes modified Diffe-Helman form of ${\prod}_{i=0}^{v-1}R_i$, where v is the number of participants and $R_i$ is a random number generated from member i. In a special class of SBIBD, it takes only 3 rounds message exchange and message overhead is $O(v{\sqrt{v}})$. Our protocol can be proved as computationally difficult to calculate as discrete logarithms.

  • PDF

A Study on AES-based Mutual Authentication Protocol for IoT Devices (사물인터넷 디바이스를 위한 AES 기반 상호인증 프로토콜)

  • Oh, Se-Jin;Lee, Seung-Woo
    • Journal of Industrial Convergence
    • /
    • v.18 no.5
    • /
    • pp.23-29
    • /
    • 2020
  • The Internet of things (IoT) is the extension of Internet connectivity into various devices and everyday objects. Embedded with electronics, Internet connectivity and other forms of hardware. The IoT poses significant risk to the entire digital ecosystem. This is because so many of these devices are designed without a built-in security system to keep them from being hijacked by hackers. This paper proposed a mutual authentication protocol for IoT Devices using symmetric-key algorithm. The proposed protocol use symmetric key cryptographic algorithm to securely encrypt data on radio channel. In addition, the secret key used for encryption is random number of devices that improves security by using variable secret keys. The proposed protocol blocked attacker and enabled legal deives to communicate because only authenticated devices transmit data by a mutual authentication protocol. Finally, our scheme is safe for attacks such as eavesdropping attack, location tracking, replay attack, spoofing attack and denial of service attack and we confirmed the safety by attack scenario.

Dragon-MAC: Securing Wireless Sensor Network with Authenticated Encryption (Dragon-MAC: 인증 암호를 이용한 효율적인 무선센서네크워크 보안)

  • Lim, Shu-Yun;Pu, Chuan-Chin;Lim, Hyo-Taek;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1519-1527
    • /
    • 2007
  • In order to combat the security threats that sensor networks are exposed to, a cryptography protocol is implemented at sensor nodes for point-to-point encryption between nodes. Given that nodes have limited resources, symmetric cryptography that is proven to be efficient for low power devices is implemented. Data protection is integrated into a sensor's packet by the means of symmetric encryption with the Dragon stream cipher and incorporating the newly designed Dragon-MAC Message Authentication Code. The proposed algorithm was designed to employ some of the data already computed by the underlying Dragon stream cipher for the purpose of minimizing the computational cost of the operations required by the MAC algorithm. In view that Dragon is a word based stream cipher with a fast key stream generation, it is very suitable for a constrained environment. Our protocol regarded the entity authentication and message authentication through the implementation of authenticated encryption scheme in wireless sensor nodes.

Software development for the visualization of brain fiber tract by using 24-bit color coding in diffusion tensor image

  • Oh, Jung-Su;Song, In-Chan;Ik hwan Cho;Kim, Jong-Hyo;Chang, Kee-Hyun;Park, Kwang-Suk
    • Proceedings of the KSMRM Conference
    • /
    • 2002.11a
    • /
    • pp.133-133
    • /
    • 2002
  • Purpose: The purpose of paper is to implement software to visualize brain fiber tract using a 24-bit color coding scheme and to test its feasibility. Materials and Methods: MR imaging was performed on GE 1.5 T Signa scanner. For diffusion tensor image, we used a single shot spin-echo EPI sequence with 7 non-colinear pulsed-field gradient directions: (x, y, z):(1,1,0),(-1,1,0),(1,0,1),(-1,0,1),(0,1,1),(0,1,-1) and without diffusion gradient. B-factor was 500 sec/$\textrm{mm}^2$. Acquisition parameters are as follows: TUTE=10000ms/99ms, FOV=240mm, matrix=128${\times}$128, slice thickness/gap=6mm/0mm, total slice number=30. Subjects consisted of 10 normal young volunteers (age:21∼26 yrs, 5 men, 5 women). All DTI images were smoothed with Gaussian kernel with the FWHM of 2 pixels. Color coding schemes for visualization of directional information was as follows. HSV(Hue, Saturation, Value) color system is appropriate for assigning RGB(Red, Green, and Blue) value for every different directions because of its volumetric directional expression. Each of HSV are assigned due to (r,$\theta$,${\Phi}$) in spherical coordinate. HSV calculated by this way can be transformed into RGB color system by general HSV to RGB conversion formula. Symmetry schemes: It is natural to code the antipodal direction to be same color(antipodal symmetry). So even with no symmetry scheme, the antipodal symmetry must be included. With no symmetry scheme, we can assign every different colors for every different orientation.(H =${\Phi}$, S=2$\theta$/$\pi$, V=λw, where λw is anisotropy). But that may assign very discontinuous color even between adjacent yokels. On the other hand, Full symmetry or absolute value scheme includes symmetry for 180$^{\circ}$ rotation about xy-plane of color coordinate (rotational symmetry) and for both hemisphere (mirror symmetry). In absolute value scheme, each of RGB value can be expressed as follows. R=λw|Vx|, G=λw|Vy|, B=λw|Vz|, where (Vx, Vy, Vz) is eigenvector corresponding to the largest eigenvalue of diffusion tensor. With applying full symmetry or absolute value scheme, we can get more continuous color coding at the expense of coding same color for symmetric direction. For better visualization of fiber tract directions, Gamma and brightness correction had done. All of these implementations were done on the IDL 5.4 platform.

  • PDF

Password-Based Authenticated Tripartite Key Exchange Protocol (패스워드 기반 인증된 3자 키 교환 프로토콜)

  • Lee, Sang-Gon;Lee, Hoon-Jae;Park, Jong-Wook;Yoon, Jang-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.4
    • /
    • pp.525-535
    • /
    • 2005
  • A password-based authenticated tripartite key exchange protocol based on A. Joux's protocol was proposed. By using encryption scheme with shared password, we can resolve man-in-the-middle attack and lack of authentication problems. We also suggested a scheme to avoid the offline dictionary attack to which symmetric encryption schemes are vulnerable. The proposed protocol does not require a trusted party which is required in certificate or identity based authentication schemes. Therefore in a ad hoc network which is difficult to install network infrastructure, the proposed protocol would be very useful. The proposed protocol is more efficient in computation aspect than any existing password-based authenticated tripartite key exchange protocols. When it is used as a base line protocol of tree based group key exchange protocol, the computational weak points of the proposed protocol are compensated.

  • PDF