• 제목/요약/키워드: Symmetric Scheme

검색결과 235건 처리시간 0.02초

An Adaptive Mesh-Independent Numerical Integration for Meshless Local Petrov-Galerkin Method

  • Cho, Jin-Yeon;Jee, Young-Burm
    • Journal of Mechanical Science and Technology
    • /
    • 제17권7호
    • /
    • pp.986-998
    • /
    • 2003
  • In this paper, an adaptive numerical integration scheme, which does not need non-overlapping and contiguous integration meshes, is proposed for the MLPG (Meshless Local Petrov-Galerkin) method. In the proposed algorithm, the integration points are located between the neighboring nodes to properly consider the irregular nodal distribution, and the nodal points are also included as integration points. For numerical integration without well-defined meshes, the Shepard shape function is adopted to approximate the integrand in the local symmetric weak form, by the values of the integrand at the integration points. This procedure makes it possible to integrate the local symmetric weak form without any integration meshes (non-overlapping and contiguous integration domains). The convergence tests are performed, to investigate the present scheme and several numerical examples are analyzed by using the proposed scheme.

Fabrication and Characterization of Self-Aligned Recessed Channel SOI NMOSFEGs

  • Lee, Jong-Ho
    • Journal of Electrical Engineering and information Science
    • /
    • 제2권4호
    • /
    • pp.106-110
    • /
    • 1997
  • A new SOI NMOSFET with a 'LOCOS-like' shape self-aligned polysilicon gate formed on the recessed channel region has been fabricated by a mix-and-match technology. For the first time, a new scheme for implementing self-alignment in both source/drain and gate structure in recessed channel device fabrication was tried. Symmetric source/drain doping profile was obtained and highly symmetric electrical characteristics were observed. Drain current measured from 0.3${\mu}{\textrm}{m}$ SOI devices with V\ulcorner of 0.77V and Tox=7.6nm is 360$mutextrm{A}$/${\mu}{\textrm}{m}$ at V\ulcorner\ulcorner=3.5V and V\ulcorner=2.5V. Improved breakdown characteristics were obtained and the BV\ulcorner\ulcorner\ulcorner(the drain voltage for 1 nA/${\mu}{\textrm}{m}$ of I\ulcorner at V=\ulcorner\ulcorner=0V) of the device with L\ulcorner\ulcorner=0.3${\mu}{\textrm}{m}$ under the floating body condition was as high as 3.7 V. Problems for the new scheme are also addressed and more advanced device structure based on the proposed scheme is proposed to solve the problems.

  • PDF

비정규 잡음 환경에서 협력 무선인지 네트워크를 위한 순서 기반 스펙트럼 센싱 기법 (An Order Statistic-Based Spectrum Sensing Scheme for Cooperative Cognitive Radio Networks in Non-Gaussian Noise Environments)

  • 조형원;이영포;윤석호;배석능;이광억
    • 한국통신학회논문지
    • /
    • 제37A권11호
    • /
    • pp.943-951
    • /
    • 2012
  • 본 논문에서는 비정규 충격성 잡음 환경에서 협력 무선인지 네트워크를 위한 순서 기반 스펙트럼 센싱 기법을 제안한다. 구체적으로는 잡음을 이변수 등방형 대칭 알파 안정 (bivariate isotropic symmetric ${\alpha}$-stable) 분포를 따르는 것으로 모형화하고, 그에 알맞은 관측 샘플의 순서와 일반화된 우도비 검정 기반 협력 스펙트럼 센싱 기법을 제안한다. 모의실험을 통해 비정규 잡음 환경에서 제안한 기법이 기존의 기법에 비해 더 좋은 스펙트럼 센싱성능을 가짐을 보인다.

모바일 환경에서의 콘텐츠 보호를 위한 핑거프린팅 기법 (Fingerprinting Scheme for Contents Protection in Mobile Environment)

  • 용승림;이상호
    • 정보처리학회논문지C
    • /
    • 제15C권3호
    • /
    • pp.167-172
    • /
    • 2008
  • 핑거프린팅 기법은 암호학적인 기법들을 이용하여 디지털 데이터를 불법적으로 재배포한 사용자를 찾아냄으로써 디지털 데이터의 저작권을 보호하기 위해 사용된다. 핑거프린팅 기법은 구매자의 프라이버시 보호를 위하여 익명성과 비대칭성을 보장할 수 있어야 하므로, 이산대수 문제나 그래프 동형 문제와 같은 어려운 문제들에 기반하거나 공개키 암호 시스템을 이용한다. 그러나 이러한 기법들은 많은 계산량을 필요로 하기 때문에 계산능력이 낮은 모바일 환경에 적합하지 않다. 본 논문에서는 구매자의 익명성과 비대칭성을 만족하면서 모바일 환경에서 콘텐츠를 보호하기 위한 효율적인 핑거프린팅 기법을 제안한다. 제안한 기법에서는 에이전트의 개념을 이용하고, 콘텐츠 암호화를 위하여 대칭키 암호 시스템을 이용함으로써 효율성을 향상시켰다.

Localization of Subsurface Targets Based on Symmetric Sub-array MIMO Radar

  • Liu, Qinghua;He, Yuanxin;Jiang, Chang
    • Journal of Information Processing Systems
    • /
    • 제16권4호
    • /
    • pp.774-783
    • /
    • 2020
  • For the issue of subsurface target localization by reverse projection, a new approach of target localization with different distances based on symmetric sub-array multiple-input multiple-output (MIMO) radar is proposed in this paper. By utilizing the particularity of structure of the two symmetric sub-arrays, the received signals are jointly reconstructed to eliminate the distance information from the steering vectors. The distance-independent direction of arrival (DOA) estimates are acquired, and the localizations of subsurface targets with different distances are realized by reverse projection. According to the localization mechanism and application characteristics of the proposed algorithm, the grid zooming method based on spatial segmentation is used to optimize the locaiton efficiency. Simulation results demonstrate the effectiveness of the proposed localization method and optimization scheme.

BDSS: Blockchain-based Data Sharing Scheme With Fine-grained Access Control And Permission Revocation In Medical Environment

  • Zhang, Lejun;Zou, Yanfei;Yousuf, Muhammad Hassam;Wang, Weizheng;Jin, Zilong;Su, Yansen;Kim, Seokhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권5호
    • /
    • pp.1634-1652
    • /
    • 2022
  • Due to the increasing need for data sharing in the age of big data, how to achieve data access control and implement user permission revocation in the blockchain environment becomes an urgent problem. To solve the above problems, we propose a novel blockchain-based data sharing scheme (BDSS) with fine-grained access control and permission revocation in this paper, which regards the medical environment as the application scenario. In this scheme, we separate the public part and private part of the electronic medical record (EMR). Then, we use symmetric searchable encryption (SSE) technology to encrypt these two parts separately, and use attribute-based encryption (ABE) technology to encrypt symmetric keys which used in SSE technology separately. This guarantees better fine-grained access control and makes patients to share data at ease. In addition, we design a mechanism for EMR permission grant and revocation so that hospital can verify attribute set to determine whether to grant and revoke access permission through blockchain, so it is no longer necessary for ciphertext re-encryption and key update. Finally, security analysis, security proof and performance evaluation demonstrate that the proposed scheme is safe and effective in practical applications.

이상유동에 대한 ALE Godunov법을 이용한 구대칭 수중폭발 해석 (NUMERICAL ANALYSIS ON A SPHERICALLY SYMMETRIC UNDERWATER EXPLOSION USING THE ALE GODUNOV SCHEME FOR TWO-PHASE FLOW)

  • 신상묵;김인철;김용직
    • 한국전산유체공학회지
    • /
    • 제11권1호
    • /
    • pp.29-35
    • /
    • 2006
  • A code is developed to analyze a spherically symmetric underwater explosion. The arbitrary Lagrangian-Eulerian(ALE) Godunov scheme for two-phase flow is used to calculate numerical fluxes through moving control surfaces. For detonation gas of TNT and liquid water, the Jones-Wilkins-Lee(JWL) equation of states and the isentropic Tait relation are used respectively. It is suggested to use the Godunov variable to estimate the velocity of a material interface. The code is validated through comparisons with other results on the gas-water shock tube problem. It is shown that the code can handle generation of discontinuity and recovering of continuity in the normal velocity near the material interface during shock waves interact with the material interface. The developed code is applied to analyze a spherically symmetric underwater explosion. Repeated transmissions of shock waves are clearly captured. The calculated period and maximum radius of detonation gas bubble show good agreements with experimental and other numerical results.

Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring

  • Tang, Wan;Yi, Bo;Yang, Ximi;Li, Jingcong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권5호
    • /
    • pp.1606-1623
    • /
    • 2015
  • Optical switching will be applied in datacenter networks because electronic switching is costly and power-consuming. In this paper, considering the ring-based interconnection using optical switching in the core of a datacenter, we study the home circuit (HC) construction for the labeled optical burst switching with home circuit (LOBS-HC), a new paradigm trying to share wavelengths among the HCs from the same source. In particular, aiming to construct HCs dynamically and properly, a scheme named optimal path matching and symmetric HC matching (OPM-SHM) is proposed. The main idea of OPM-SHM is to dynamically construct HCs by sharing wavelength(s) not only among the same-source HCs but also with symmetric HCs which have different sources other than the original LOBS-HC features. The simulation results demonstrate that OPM-SHM achieves better performance than some other methods in terms of burst loss rate and wavelength utilization of physical links. More specially, it maintains good load balancing for the datacenter network using an LOBS-HC ring. In addition, due to the symmetric feature of SHM, the proposed scheme can decrease the upper bound of the average hop count of the routing paths to half of the ring size.

A Deflation-Preconditioned Conjugate Gradient Method for Symmetric Eigenproblems

  • Jang, Ho-Jong
    • Journal of applied mathematics & informatics
    • /
    • 제9권1호
    • /
    • pp.331-339
    • /
    • 2002
  • A preconditioned conjugate gradient(PCG) scheme with the aid of deflation for computing a few of the smallest eigenvalues arid their corresponding eigenvectors of the large generalized eigenproblems is considered. Topically there are two types of deflation techniques, the deflation with partial shifts and an arthogonal deflation. The efficient way of determining partial shifts is suggested and the deflation-PCG schemes with various partial shifts are investigated. Comparisons of theme schemes are made with orthogonal deflation-PCG, and their asymptotic behaviors with restart operation are also discussed.

A FAST ASYMMETRIC KEY ENCRYPTION ALGORITHM FOR BULK DATA

  • Shin, Sang-Uk;Rhee, Kyung-Hyune
    • Journal of applied mathematics & informatics
    • /
    • 제8권3호
    • /
    • pp.943-957
    • /
    • 2001
  • In this paper, we propose an efficient encryption algorithm, without exchanging session keys of a symmetric cryptosystem. The proposed scheme, called as the FAKE(Fast Asymmetric Key Encryption), first scrambles an entire input message and then encrypts small parts of the scrambled message using an asymmetric key encryption scheme. We use the all-or-nothing transform based on the hash function as a scrambling function, which was proposed by Shin, et al. Furthermore, the proposed scheme can additionally provide a digital signature service with only small overhead.