• Title/Summary/Keyword: chaotic

Search Result 904, Processing Time 0.029 seconds

The Communication Security Improvement Technology Using Chaos Modulation and Retrodirective Array Antenna (카오스 변조와 역지향성 안테나를 이용한 통신 보안 향상 기법)

  • Bok, Junyeong;Kim, Gi-Young;Ryu, Heung-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.4
    • /
    • pp.410-416
    • /
    • 2013
  • In this paper, we propose a chaotic correlation delay shift keying(CDSK) using digital retrodirective array antenna (RDA) for improving security and receive performance. Chaotic signals provide improved security due to non-periodic and non-predictable performance of chaotic signals. However, the receive performance of these chaotic signals is degraded due to self-interference and interference signals. Therefore, this paper, we analyze the receive BER performance of chaos communication system which has digital RDA based on CDSK modulation schemes for improving security without receive performance degradation. Simulation results show that the proposed system can get the same receiving performance compared to BPSK modulation schemes when array elements of RDA are 5.

Chaotic particle swarm optimization in optimal active control of shear buildings

  • Gharebaghi, Saeed Asil;Zangooeia, Ehsan
    • Structural Engineering and Mechanics
    • /
    • v.61 no.3
    • /
    • pp.347-357
    • /
    • 2017
  • The applications of active control is being more popular nowadays. Several control algorithms have been developed to determine optimum control force. In this paper, a Chaotic Particle Swarm Optimization (CPSO) technique, based on Logistic map, is used to compute the optimum control force of active tendon system. A chaotic exploration is used to search the solution space for optimum control force. The response control of Multi-Degree of Freedom (MDOF) shear buildings, equipped with active tendons, is introduced as an optimization problem, based on Instantaneous Optimal Active Control algorithm. Three MDOFs are simulated in this paper. Two examples out of three, which have been previously controlled using Lattice type Probabilistic Neural Network (LPNN) and Block Pulse Functions (BPFs), are taken from prior works in order to compare the efficiency of the current method. In the present study, a maximum allowable value of control force is added to the original problem. Later, a twenty-story shear building, as the third and more realistic example, is considered and controlled. Besides, the required Central Processing Unit (CPU) time of CPSO control algorithm is investigated. Although the CPU time of LPNN and BPFs methods of prior works is not available, the results show that a full state measurement is necessary, especially when there are more than three control devices. The results show that CPSO algorithm has a good performance, especially in the presence of the cut-off limit of tendon force; therefore, can widely be used in the field of optimum active control of actual buildings.

Synchronization of T-S Fuzzy Chaotic System with Time-Delay and Input Saturation (시간지연과 입력포화를 갖는 T-S 퍼지 카오스 시스템의 동기화)

  • Kim Jae-Hun;Shin Hyunseok;Kim Euntai;Park Mignon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.1
    • /
    • pp.13-21
    • /
    • 2005
  • This paper presents a fuzzy model-based approach for synchronization of time-delay chaotic system with input saturation. Time-delay chaotic drive and response system is respectively represented by Takagi-Sugeno (T-S) fuzzy model. Specially, the response system contains input saturation. Using the unidirectional linear error feedback and the parallel distributed compensation (PDC) scheme, we design fuzzy chaotic synchronization system and analyze local stability for synchronization error dynamics. Since time-delay in the transmission channel always exists, we also take it into consideration. The sufficient condition for the local stability of the fuzzy synchronization system with input saturation and time-delay is derived by applying Lyapunov-Krasovskii theory and solving linear matrix inequalities (LMI's) problem. A numerical example is given to demonstrate the validity of the proposed approach.

Design of USN Communication Protocol Using Individual Chaotic Systems (개별 혼돈 시스템을 이용한 USN 통신 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.8 no.6
    • /
    • pp.528-533
    • /
    • 2015
  • In the construction of USN environment, the implementation of a safe sensor network using wireless communications can be said to be the most important factor in the entire system. Although USN communication uses wireless communications to enhance accessability and non-contact capability, this results in the security vulnerability, thus endangering the system. In this regard, we propose a security protocol that can be effectively applied to USN, a multi-sensor network. The proposed protocol is a method using an individual chaotic system, and it is a security protocol to synchronize the main chaotic system mounted on each sensor and prepared key values into the initial values, and to communicate with the use of the synchronized values as symmetric keys. The communication protocol proposed in this paper is expected to yield good results as a new method to resolve security problems of USN and program capacity limitations of sensor nodes if subsequent studies continue to be carried out.

Hardware Implementation of Chaotic System for Security of JPEG2000 (JPEG2000의 보안을 위한 카오스 시스템의 하드웨어 구현)

  • Seo Young-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1193-1200
    • /
    • 2005
  • In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method (Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung $0.35{\mu}m$ Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

Synchronization of the pehlivan chaos system using GA-based sliding mode control (GA기반의 슬라이딩 모드 제어를 이용한 Pehlivan 카오스 시스템의 동기화)

  • Lee, Yun-Hyung;Jin, Gang-Gyoo;Jung, Byung-Gun;Oh, Sea-June;So, Myung-Ok
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.38 no.4
    • /
    • pp.424-429
    • /
    • 2014
  • This paper investigates the problem of synchronization of the Pehlivan chaotic system based on sliding mode control and GA. For this, a brief overview of the Pehlivan chaotic system is given. Then, the conventional sliding mode control technique is described and a synchronization method using GA strategy is proposed. The proposed method is that the GA searched the parameters including sliding plane and control gains) selected by the designer in the sliding mode control are searched optimally through the GA. The GA in the MATLAB Toolbox was used and simulation work is shown to illustrate the effectiveness of the synchronization schemes for the chaotic system.

Recognition of Unconstrained Handwritten Numerals using Modified Chaotic Neural Networks (수정된 카오스 신경망을 이용한 무제약 서체 숫자 인식)

  • 최한고;김상희;이상재
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.1
    • /
    • pp.44-52
    • /
    • 2001
  • This paper describes an off-line method for recognizing totally unconstrained handwritten digits using modified chaotic neural networks(MCNN). The chaotic neural networks(CNN) is modified to be a useful network for solving complex pattern problems by enforcing dynamic characteristics and learning process. Since the MCNN has the characteristics of highly nonlinear dynamics in structure and neuron itself, it can be an appropriate network for the robust classification of complex handwritten digits. Digit identification starts with extraction of features from the raw digit images and then recognizes digits using the MCNN based classifier. The performance of the MCNN classifier is evaluated on the numeral database of Concordia University, Montreal, Canada. For the relative comparison of recognition performance, the MCNN classifier is compared with the recurrent neural networks(RNN) classifier. Experimental results show that the classification rate is 98.0%. It indicates that the MCNN classifier outperforms the RNN classifier as well as other classifiers that have been reported on the same database.

  • PDF

IoT MQTT Security Protocol Design Using Chaotic Signals (혼돈신호를 이용한 IoT의 MQTT 보안 프로토콜 설계)

  • Yim, Geo-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.6
    • /
    • pp.778-783
    • /
    • 2018
  • With the rapid advancement of information and communication technology and industrial technologies, a hyper-connected society is being realized to connect human beings, all programs and things via the Internet. IoT (Internet of Thing), which connects a thing and another thing, and things and human beings, gathers information to realize the hyper-connected society. MQTT (Message Queuing Telemetry Transport) is a push-technology-based light message transmission protocol that was developed to be optimized to the limited communication environment such as IoT. In pursuing the hyper-connected society, IoT's sensor environment information is now being used as a wide range of information on people's diseases and health management. Thus, security problems of such MQTT include not only the leak of environmental information but also the personal information infringement. To resolve such MQTT security problems, we have designed a new security MQTT communication by applying the initial-value sensitivity and pseudorandomness of the chaotic system to the integrity and confidentiality. The encryption method using our proposed chaotic system offers a simple structure and a small amount of calculation, and it is deemed to be suitable to the limited communication environment such as IoT.

A high reliable optical image encryption system which combined discrete chaos function with permutation algorithm (이산 카오스 함수와 Permutation Algorithm을 결합한 고신뢰도 광영상 암호시스템)

  • 박종호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.37-48
    • /
    • 1999
  • Current encryption methods have been applied to secure communication using discrete chaotic system whose output is a noise-like signal which differs from the conventional encryption methods that employ algebra and number theory[1-2] We propose an optical encryption method that transforms the primary pattern into the image pattern of discrete chaotic function first a primary pattern is encoded using permutation algorithm, In the proposed system we suggest the permutation algorithm using the output of key steam generator and its security level is analyzed. In this paper we worked out problem of the application about few discrete chaos function through a permutation algorithm and enhanced the security level. Experimental results with image signal demonstrate the proper of the implemented optical encryption system.

Image Encryption using Shrinking Generator based on CA (CA기반의 수축생성기를 이용한 영상 암호)

  • Choi, Un-Sook;Cho, Sung-Jin;Kim, Han-Doo;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.179-184
    • /
    • 2020
  • Cellular automata (CA), which is known as a pseudo random number generator due to its excellent randomness, has various applications. Cho et al. designed a CA-based shrinking generator to generate a long period of nonlinear sequence. In addition, chaotic cat maps have been studied by many researchers as the complex nonlinear dynamics systems with sensitivity in initial conditions and unpredictable characteristics. In this paper, we propose a new image encryption method using nonlinear sequence generated by CA-based shrinking generator with maximum period and 3D chaotic cat map for high security.