• Title/Summary/Keyword: chaotic

Search Result 905, Processing Time 0.022 seconds

Assessment of Chaotic-Threshold Model on Integral Pulse Frequency Modulation for HRV Analysis (심박변이도 해석을 위한 가상 심장박동 발진기의 카오스-임계치 모델 성능 평가)

  • Jeung, Gyeo-Wun;Kim, Jeong-Hwan;Lee, Jeong-Whan;Kim, Kyeong-Seop
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.3
    • /
    • pp.581-586
    • /
    • 2017
  • The well-known Integral Pulse Frequency Modulation (IPFM) cardiac oscillator has been used to generate the heart beat fluctuations as a representation of the modulatory autonomic nervous activity in terms of sympathetic and parasympathetic state. The IPFM model produces heartbeats by integrating the modulated sinusoid signals and applying the threshold of unity or chaotic threshold levels. This study aims at evaluating the performance of IPFM model by analyzing the influence of the threshold level with comparatively applying preset threshold of unity and Logistic-map and Henon-map chaotic-threshold. Based on our simulated results with interpreting the spectral features of Heart Rate Variability (HRV), we can conclude that the IPFM model with preset threshold level of unity can generate the optimal heartbeat variations int the sense of clinically valid heartbeats.

3-D Imaging in a Chaotic Micromixer Using Confocal Laser Scanning Microscopy (CLSM) (공초점 현미경을 이용한 마이크로믹서 내부의 3차원 이미지화)

  • Kim, Hyun-Dong;Kim, Kyung-Chun
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2006.12a
    • /
    • pp.96-101
    • /
    • 2006
  • 3-D visualization using confocal laser scanning microscopy (CLSM) in a chaotic micromixer was performed as a reproduction experiment and the feasibility of 3-0 imaging technique in the microscale was confirmed. For diagonal micromixer (DM) and two types of staggered herringbone micromixers (SHM) designed by Whitesides et al., to verify the evolution of mixing, cross sectional images are reconstructed at the end of every cycle. In a DM, clockwise rotational flow motion generated by diagonal ridges placed on the floor of micromixer is observed and this motion makes the fluid commingle. On the contrary, there are two rotational flow structures in the SHM and the centers of rotation exchange their position each other every half cycle because of the V shape of ridges varying their orientation every half cycle. Local rotational flow and local extensional flow generated by the complicate ridge pattern make the flow be chaotic and accelerate the mixing of fluid. The dominant parameter that influences on the mixing characteristic of SHM is not the length of micromixer but the number of ridges under the same flow configurations.

  • PDF

On the Subharmonic Melnikov Analysis and Chaotic Behaviors in a 2-DOF Hamiltonian System (2자유도 Hamiltonian계의 Subharmonic Melnikov 해석과 혼돈양상에 대한 연구)

  • 박철희;이근수
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 1993.10a
    • /
    • pp.77-83
    • /
    • 1993
  • In this paper, the dynamics of a 2-DOF not 1:1 resonant Hamiltonian system are studied. In the first part of the work, the behaviors of special periodic orbits called normal modes are examined by means of the harmonic balance method and their approximate stability ar analyzed by using the Synge's concept named stability in the kinematico-statical sense. Secondly, the global dynamics of the system for low and high energy are studied in terms of a perturbation analysis and Poincare' maps. In this part, one can see that the unstable normal mode generates chaotic motions resulting from the transverse intersections of the stable and unstable manifolds. Although there exist analytic methods for proving the existence of infinitely many periodic orbits, chaos, they cannot be applied in our case and thus, the Poincare' maps constructed by direct numerical integrations are utilized fot detecting chaotic motions. In the last part of the work, the existence of arbitrarily many periodic orbits of the system are proved by using a subharmonic Melnikov's method. We also study the possibility of the breakdown of invariant KAM tori only when h>h$_{0}$ (h$_{0}$:bifurcating energy) and investigate the generality of the destruction phenomena of the rational tori in the systems perturbed by stiffness and inertial coupling.

  • PDF

Machine Learning-Based Reversible Chaotic Masking Method for User Privacy Protection in CCTV Environment

  • Jimin Ha;Jungho Kang;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.767-777
    • /
    • 2023
  • In modern society, user privacy is emerging as an important issue as closed-circuit television (CCTV) systems increase rapidly in various public and private spaces. If CCTV cameras monitor sensitive areas or personal spaces, they can infringe on personal privacy. Someone's behavior patterns, sensitive information, residence, etc. can be exposed, and if the image data collected from CCTV is not properly protected, there can be a risk of data leakage by hackers or illegal accessors. This paper presents an innovative approach to "machine learning based reversible chaotic masking method for user privacy protection in CCTV environment." The proposed method was developed to protect an individual's identity within CCTV images while maintaining the usefulness of the data for surveillance and analysis purposes. This method utilizes a two-step process for user privacy. First, machine learning models are trained to accurately detect and locate human subjects within the CCTV frame. This model is designed to identify individuals accurately and robustly by leveraging state-of-the-art object detection techniques. When an individual is detected, reversible chaos masking technology is applied. This masking technique uses chaos maps to create complex patterns to hide individual facial features and identifiable characteristics. Above all, the generated mask can be reversibly applied and removed, allowing authorized users to access the original unmasking image.

IoT Security Channel Design Using a Chaotic System Synchronized by Key Value (키값 동기된 혼돈계를 이용한 IoT의 보안채널 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.981-986
    • /
    • 2020
  • The Internet of Things refers to a space-of-things connection network configured to allow things with built-in sensors and communication functions to interact with people and other things, regardless of the restriction of place or time.IoT is a network developed for the purpose of services for human convenience, but the scope of its use is expanding across industries such as power transmission, energy management, and factory automation. However, the communication protocol of IoT, MQTT, is a lightweight message transmission protocol based on the push technology and has a security vulnerability, and this suggests that there are risks such as personal information infringement or industrial information leakage. To solve this problem, we designed a synchronous MQTT security channel that creates a secure channel by using the characteristic that different chaotic dynamical systems are synchronized with arbitrary values in the lightweight message transmission MQTT protocol. The communication channel we designed is a method of transmitting information to the noise channel by using characteristics such as random number similarity of chaotic signals, sensitivity to initial value, and reproducibility of signals. The encryption method synchronized with the proposed key value is a method optimized for the lightweight message transmission protocol, and if applied to the MQTT of IoT, it is believed to be effective in creating a secure channel.

A study of mitigated interference Chaotic-OOK system in IEEE802.15.4a (IEEE 802.15.4a 채널환경하에서의 저간섭 Chaotic OOK 무선통신기술의 BER 성능분석에 관한 연구)

  • Jeong, Jae-Ho;Park, Goo-Man;Jeon, Tae-Hyun;Seo, Bo-Seok;Kwak, Kyung-Sup;Jang, Yeong-Min;Choi, Sang-Yule;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.2
    • /
    • pp.148-158
    • /
    • 2007
  • Recently, IEEE 802.15.4a(low-rate UWB) technique has been paid much attention to the LR-UWB communication system for WPAN. However, there are various interferences such as MPI(Multi Path Interference) or IPI(Inter Piconet Interference) in IEEE 802.15.4a wireless channel. In order to cancel various interferences occurred to WPAN environment, in this paper, we propose a UWB wireless communication system with high QoS(Quality of Service) which is a chaotic-OOK(On-Off Keying) system using unipolar ZCD(Zero Correlation Duration) spreading code in physical layer level. Furthermore, we analyze its performance via simulations and verify the availability of proposed system with prototype implementation.

Design of RFID Authentication Protocol Using 2D Tent-map (2차원 Tent-map을 이용한 RFID 인증 프로토콜 설계)

  • Yim, Geo-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.5
    • /
    • pp.425-431
    • /
    • 2020
  • Recent advancements in industries and technologies have resulted in an increase in the volume of transportation, management, and distribution of logistics. Radio-frequency identification (RFID) technologies have been developed to efficiently manage such a large amount of logistics information. The use of RFID for management is being applied not only to the logistics industry, but also to the power transmission and energy management field. However, due to the limitation of program development capacity, the RFID device is limited in development, and this limitation is vulnerable to security because the existing strong encryption method cannot be used. For this reason, we designed a chaotic system for security with simple operations that are easy to apply to such a restricted environment of RFID. The designed system is a two-dimensional tent map chaotic system. In order to solve the problem of a biased distribution of signals according to the parameters of the chaotic dynamical system, the system has a cryptographic parameter(𝜇1), a distribution parameter(𝜇2), and a parameter(𝜃), which is the constant point, ID value, that can be used as a key value. The designed RFID authentication system is similar to random numbers, and it has the characteristics of chaotic signals that can be reproduced with initial values. It can also solve the problem of a biased distribution of parameters, so it is deemed to be more effective than the existing encryption method using the chaotic system.