• Title/Summary/Keyword: Symmetric Scheme

Search Result 235, Processing Time 0.024 seconds

A Slot Concession Scheme for Fairness Control of DQDB in Web Environment (웹 환경에서 분산-큐 이중-버스의 공정성 제어를 위한 슬롯양보 방식)

  • 김재수;김정홍;황하응
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.133-140
    • /
    • 2002
  • Distributed-queue Dual-Bus (DQDB) shows an unfair behavior in bandwidth allocation due to the nature of unidirectional bus architecture. The study on fairness control method for DQDB has been performed under specific load types such as equal Probability load. symmetric load and asymmetric load type. A client-server load type is more practical traffic pattern than specific load type in Web environments. In this paper, we propose an effective fairness control method to distribute DQDB network bandwidth fairly to all stations under Web environments. The proposed method directly calculates an access limit from the bandwidth demand pattern. Based on an access limit, it controls the allocation of bandwidth by yielding empty slots in clients to servers. And we were certain that it outperforms other mechanisms from simulation results.

  • PDF

Build-in Wiretap Channel I with Feedback and LDPC Codes

  • Wen, Hong;Gong, Guang;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • v.11 no.6
    • /
    • pp.538-543
    • /
    • 2009
  • A wiretap channel I is one of the channel models that was proved to achieve unconditional security. However, it has been an open problem in realizing such a channel model in a practical network environment. The paper is committed to solve the open problem by introducing a novel approach for building wiretap channel I in which the eavesdropper sees a binary symmetric channel (BSC) with error probability p while themain channel is error free. By taking advantage of the feedback and low density parity check (LDPC) codes, our scheme adds randomness to the feedback signals from the destination for keeping an eavesdropper ignorant; on the other hand, redundancy is added and encoded by the LDPC codes such that a legitimate receiver can correctly receive and decode the signals. With the proposed approach, unconditionallysecure communication can be achieved through interactive communications, in which the legitimate partner can realize the secret information transmission without a pre-shared secret key even if the eavesdropper has better channel from the beginning.

A Study of the Impulse Wave Discharged from the Exit of Two Parallel Tubes (두 평행한 관의 출구로부터 방출되는 펄스파에 관한 연구)

  • Kweon Yong-Hun;Kim Heuy-Dong;Lee Dong-Hun
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.151-154
    • /
    • 2002
  • The twin impulse wave leads to very complicated flow fields, such as Mach stem, spherical waves, and vortex ring. The twin impulse wave discharged from the exits of the two tubes placed in parallel is investigated to understand detailed flow physics associated with the twin impulse wave, compared with those in a single impulse wave. In the current study, the merging phenomena and propagation characteristics of the impulse waves are investigated using a shock tube experiment and by numerical computations. The Harten-Yee's total variation diminishing (TVD) scheme is used to solve the unsteady, two-dimensional, compressible, Euler equations. The Mach number $M_{s}$, of incident shock wave is changed below 1.5 and the distance between two-parallel tubes, L/d, is changed from 1.2 to 4.0. In the shock tube experiment, the twin impulse waves are visualized by a Schlieren optical system for the purpose of validation of computational work. The results obtained show that on the symmetric axis between two parallel tubes, the peak pressure produced by the twin-impulse waves and its location strongly depend upon the distance between two parallel tubes, L/d and the incident shock Mach number, $M_{s}$. The predicted Schlieren images represent the measured twin-impulse wave with a good accuracy.

  • PDF

Water impact of three dimensional wedges using CFD

  • Nair, Vinod V.;Bhattacharyya, S.K.
    • Ocean Systems Engineering
    • /
    • v.8 no.2
    • /
    • pp.223-246
    • /
    • 2018
  • In this paper the results of CFD simulations, that were carried out to study the impact pressures acting on a symmetric wedge during water entry under the influence of gravity, are presented. The simulations were done using a solver implementing finite volume discretization and using the VOF scheme to keep track of the free surface during water entry. The parameters such as pressure on impact, displacement, velocity, acceleration and net hydrodynamic forces, etc., which govern the water entry process are monitored during the initial stage of water entry. In addition, the results of the complete water entry process of wedges covering the initial stage where the impact pressure reaches its maximum as well as the late stage that covers the rebound process of the buoyant wedge are presented. The study was conducted for a few touchdown velocities to understand its influence on the water entry phenomenon. The simulation results are compared with the experimental measurements available in the literature with good accuracy. The various computational parameters (e.g., mesh size, time step, solver, etc.) that are necessary for accurate prediction of impact pressures, as well as the entry-exit trajectory, are discussed.

Analysis on the Power Spectral Density of Ultra Wideband(UWB) Communication System (초광대역 통신 시스템의 전력 스펙트럼 밀도 분석)

  • Lee, Jung-Suk;Kim, Jong-Han;Kim, Yoo-Chang;Kim, Jung-Sun;Kim, Won-Hoo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.10
    • /
    • pp.34-40
    • /
    • 2001
  • Ultra Wide Band (UWB) system uses wide band signal, which power spectral density is over all band, It likes as a noise floor, so UWB system can be used without interfering with other communication system. For the first time, we adopted Rayleigh mono pulse antipodal signal which had symmetric characteristic and zero mean. With the power spectral density using stochastic process, we knew that the antipodal signaling scheme removed discrete spectrum and concluded that this had much better spectral suppression, probability of error and data rate than PPM (Pulse Positioning Modulation).

  • PDF

The Numerical Simulation of the Pressure wave for G7 Test Train in the Tunnel (G7 시제 차량의 터널내부 압력파에 대한 수치 해석)

  • 권혁빈;김태윤;권재현;이동호;김문상
    • Journal of the Korean Society for Railway
    • /
    • v.5 no.4
    • /
    • pp.260-266
    • /
    • 2002
  • A numerical simulation has been performed to estimate the transient pressure variation in the tunnel when G7 test train passes through the test tunnel in the Kyoeng-Bu high-speed railway. A modified patched grid scheme is developed to handle the relative motion between a train and a tunnel. Also, a hybrid dimensional approach is proposed to calculate the train-tunnel interaction problem efficiently. An axi-symmetric unsteady Euler solve using the Roe's FDS is used for analyzing a complicated pressure field in tunnel during the test train is passing through the tunnel. Usually, this complex phenomenon depends ell the train speed, train length, tunnel length, blockage ratio between train and tunnel cross-sectional area, relative position between train and tunnel, etc. Therefore, numerical simulation should be done carefully in consideration of these factors. Numerical results in this study would be good guidance to make test plans, test equipments selection and to decide their measuring locations. They will also supply important information to the pressurization equipment for high-speed train.

An Improvement of BER Performance for Coded 16-QAM over Mobile Communication Channel by Asymmetric Signal Constellation (비대칭 신호점에 의한 부호화된 16-QAM의 이동 무선 채널에서의 BER 성능 개선에 관한 연구)

  • 김태헌;하덕호
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.8 no.2
    • /
    • pp.197-206
    • /
    • 1997
  • The purpose of this paper is to propose an improvement method of BER for coded 16QAM over Rayleigh fading channel. To overcome the BER degradation due to the fading under mobile communication, we apply trellis coded modulation technique which is efficient to get a coding gain without the expansion of bandwidth. Especially, to minimize the burst error which are the main factor of the BER degradation for mobile communication systems, we apply interleaving/deinterleaving method to the studying system. Also we apply asymmetric signal mapping methods to this TCM scheme. From the computer simulation, BER performance of asymmetric case has achieved about 1 dB improvement of about $10^{-4}$, compared to the traditional symmetric case.

  • PDF

Numerical Analysis for Supersonic Off-Design Turbulent Jet Flow (초음속 불완전 팽창 난류 제트 유동에 관한 수치적 연구)

  • Kim Jae-Soo
    • Journal of computational fluids engineering
    • /
    • v.4 no.2
    • /
    • pp.57-66
    • /
    • 1999
  • Numerical Analysis has been done for the supersonic off-design jet flow due to the pressure difference between the jet and the ambient fluid. The difference of pressure generates an oblique shock or an expansion wave at the nozzle exit. The waves reflect repeatedly on the center axis and the sonic surface in the shear layer. The pressure difference is resolved across these reflected waves. In this paper, the axi-symmetric Navier-Stokes equation has been used with the κ-ε turbulence model. The second order TVD scheme with flux limiters, based on the flux vector split with the smooth eigenvalue split, has been used to capture internal shocks and other discontinuities. Numerical calculations have been done to analyze the off-design jet flow due to the pressure difference. The variation of pressure along the flow axis is compared with an experimental result and other numerical result. The characteristics of the interaction between the shock cell and the turbulence mixing layer have been analyzed.

  • PDF

Research on the Issuing and Management Model of Certificates based on Clustering Using Threshold Cryptography in Mobile Ad Hoc Networking (이동 Ad Hoc 네트워킹에서 Threshold Cryptography를 적용한 클러스터 기반의 인증서 생성 및 관리 모델연구)

  • Park, Bae-Hyo;Lee, Jae-Il;Hahn, Gene-Beck;Nyang, Dae-Hun
    • Journal of Information Technology Services
    • /
    • v.3 no.2
    • /
    • pp.119-127
    • /
    • 2004
  • A mobile ad hoc network(MANET) is a network where a set of mobile devices communicate among themselves using wireless transmission without the support of a fixed network infrastructure. The use of wireless links makes MANET susceptible to attack. Eavesdroppers can access secret information, violating network confidentiality, and compromised nodes can launch attack from within a network. Therefore, the security for MANET depends on using the cryptographic key, which can make the network reliable. In addition, because MANET has a lot of mobile devices, the authentication scheme utilizing only the symmetric key cryptography can not support a wide range of device authentication. Thereby, PKI based device authentication technique in the Ad Hoc network is essential and the paper will utilize the concept of PKI. Especially, this paper is focused on the key management technique of PKI technologies that can offer the advantage of the key distribution, authentication, and non-reputation, and the issuing and managing technique of certificates based on clustering using Threshold Cryptography for secure communication in MANET.

The Implementation of the Index Search System in a Encrypted Data-base (암호화된 데이터베이스에서 인덱스 검색 시스템 구현)

  • Shin, Seung-Soo;Han, Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.5
    • /
    • pp.1653-1660
    • /
    • 2010
  • The user information stored in database have been leaked frequently. To protect information against malevolent manager on the inside or outside aggressor, it is one of the most efficient way to encrypt information and store to database. It is better to destruct information than not to use encrypted information stored in database. The encrypted database search system is developed variously, and used widely in many fields. In this paper, we implemented the scheme that can search encrypted document without exposing user's information to the untrusted server in mobile device. We compared and analyzed the result embodied with DES, AES, and ARIA based on symmetric key by searching time.