• 제목/요약/키워드: randomizing

검색결과 32건 처리시간 0.023초

Distribution of Path Loss for Wireless Personal Networks Operating in a Square Region

  • Yang, Rumin;Shen, Bin;Kwak, Kyung-Sup
    • ETRI Journal
    • /
    • 제33권2호
    • /
    • pp.283-286
    • /
    • 2011
  • Path loss plays fundamental roles in system design, spectrum management, and performance evaluation. The traditional path loss model has a slight inconvenience; it depends on the unknown distance. In this letter, we explore the probability distribution function (PDF) of path loss in an indoor office environment by randomizing out the distance variable. It is shown that the resulting PDF is not Gaussian-like but is skewed to the right, and both the PDF and the moments are related to the size of the office instead of the unknown distance. To be specific, we incorporate the IEEE 802.15.4a channel parameters into our model and tabulate the cumulative distribution function with respect to different room sizes. Through a simple example, we show how our model helps a cognitive spectrum user to infer path loss information of primary users without necessarily knowing their transmitter-receiver distance.

영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹 (User Key-based Fragile Watermarking for Detecting Image Modification)

  • 임재현;심혁재;전병우
    • 대한전자공학회논문지SP
    • /
    • 제38권5호
    • /
    • pp.474-485
    • /
    • 2001
  • 본 논문은 영상변형 검출을 목적으로 한 사용자 Key기반 Fragile 워터마크 삽입방법을 제안한다. 원 영상은 8×8 DCT를 거쳐 DCT 계수값으로 변환된 뒤, 사용자가 미리 준비한 워터마크 (Embedding 또는 Authentication Data) 이진 영상이 삽입된다. 이때, 삽입여부 및 삽입위치의 노출을 최소화시키기 위해, 사용자의 Key를 이용한 랜덤화 방법을 사용하도록 제안하였다. 각 DCT 블록에는 한 비트의 데이터가 감추어지게 되며, 각 블록에 삽입된 한 비트 데이터들은 전체적으로 저작권자 고유의 이진영상을 나타나게 된다. 5개의 실제 영상으로 실험한 결과, 제안한 방법은 영상변형 여부뿐만 아니라 그 위치도 알 수 있음을 실험적으로 확인하였다. 그러나, 50%이상의 압축이 가해지는 경우, 삽입된 워터마크가 많이 소실되어, 향후 압축공격에 대한 성능 개선이 필요한 것으로 나타났다.

  • PDF

BNP 멱승 알고리듬에 대한 물리적인 조합 공격 및 대응책 (A Physical Combined Attack and its Countermeasure on BNP Exponentiation Algorithm)

  • 김형동;하재철
    • 정보보호학회논문지
    • /
    • 제23권4호
    • /
    • pp.585-591
    • /
    • 2013
  • 최근 정보보호 장치를 이용하여 암호 알고리듬을 수행할 경우 부채널 공격과 오류 주입 공격을 결합한 물리적 조합 공격에 의해 비밀 키가 노출될 수 있음이 밝혀졌다. 특히, RSA 암호 시스템에서 수행하는 멱승 연산에 대해 한 번의 오류 주입과 전력 분석을 통해 조합 공격이 가능하다. 본 논문에서는 SPA(Simple Power Analysis)와 FA(Fault Attack)을 방어하기 위해 제안되었던 BNP(Boscher, Naciri, and Prouff) 멱승 알고리듬이 조합 공격에 취약함을 보이고자 한다. 또한, 오류 확산 기법에 기반하여 개인 키를 랜덤화시키는 대응 방안을 제안한다.

A Query Randomizing Technique for breaking 'Filter Bubble'

  • Joo, Sangdon;Seo, Sukyung;Yoon, Youngmi
    • 한국컴퓨터정보학회논문지
    • /
    • 제22권12호
    • /
    • pp.117-123
    • /
    • 2017
  • The personalized search algorithm is a search system that analyzes the user's IP, cookies, log data, and search history to recommend the desired information. As a result, users are isolated in the information frame recommended by the algorithm. This is called 'Filter bubble' phenomenon. Most of the personalized data can be deleted or changed by the user, but data stored in the service provider's server is difficult to access. This study suggests a way to neutralize personalization by keeping on sending random query words. This is to confuse the data accumulated in the server while performing search activities with words that are not related to the user. We have analyzed the rank change of the URL while conducting the search activity with 500 random query words once using the personalized account as the experimental group. To prove the effect, we set up a new account and set it as a control. We then searched the same set of queries with these two accounts, stored the URL data, and scored the rank variation. The URLs ranked on the upper page are weighted more than the lower-ranked URLs. At the beginning of the experiment, the difference between the scores of the two accounts was insignificant. As experiments continue, the number of random query words accumulated in the server increases and results show meaningful difference.

EFFECTS OF RANDOMIZING PATTERNS AND TRAINING UNEQUALLY REPRESENTED CLASSES FOR ARTIFICIAL NEURAL NETWORKS

  • Kim, Young-Sup;Coleman Tommy L.
    • 한국공간정보시스템학회:학술대회논문집
    • /
    • 한국공간정보시스템학회 2002년도 춘계학술대회 논문집
    • /
    • pp.45-52
    • /
    • 2002
  • Artificial neural networks (ANN) have been successfully used for classifying remotely sensed imagery. However, ANN still is not the preferable choice for classification over the conventional classification methodology such as the maximum likelihood classifier commonly used in the industry production environment. This can be attributed to the ANN characteristic built-in stochastic process that creates difficulties in dealing with unequally represented training classes, and its training performance speed. In this paper we examined some practical aspects of training classes when using a back propagation neural network model for remotely sensed imagery. During the classification process of remotely sensed imagery, representative training patterns for each class are collected by polygons or by using a region-growing methodology over the imagery. The number of collected training patterns for each class may vary from several pixels to thousands. This unequally populated training data may cause the significant problems some neural network empirical models such as back-propagation have experienced. We investigate the effects of training over- or under- represented training patterns in classes and propose the pattern repopulation algorithm, and an adaptive alpha adjustment (AAA) algorithm to handle unequally represented classes. We also show the performance improvement when input patterns are presented in random fashion during the back-propagation training.

  • PDF

2단계 창의 확률화응답기법 (Two stage Chang's randomized response technique)

  • 최경호
    • Journal of the Korean Data and Information Science Society
    • /
    • 제21권2호
    • /
    • pp.271-277
    • /
    • 2010
  • 확률화응답기법은 조사과정에서 응답자의 신분보호를 위하여 확률장치가 도입되는 간접질문방식이기 때문에 직접질문에 비하여 정보의 손실이 있게 된다. 그래서 확률장치에 기인한 이러한 손실을 줄여서 추정의 효율을 높이고 얻어진 정보를 좀 더 효율적으로 이용할 수 있는 새로운 기법의 개발에 관한 연구가 지속되어 온 바, 2단계 확률화응답기법은 이에 대한 일환으로 고려할 수 있는 방법이다. 한편 Chang 등 (2004) 또한 개선된 강요형기법을 제안하고 Warner (1965)에 비하여 효율적인 조건을 찾았다. 이에 본 연구에서는 Chang 등 (2004)의 기법을 2단계로 확장한 모형을 제안하고, Chang 등 (2004) 및 Mangat와 Singh (1990) 등의 2단계기법에 비하여 효율적인 조건을 찾아보았다.

A Double-Hybrid Spread-Spectrum Technique for EMI Mitigation in DC-DC Switching Regulators

  • Dousoky, Gamal M.;Shoyama, Masahito;Ninomiya, Tamotsu
    • Journal of Power Electronics
    • /
    • 제10권4호
    • /
    • pp.342-350
    • /
    • 2010
  • Randomizing the switching frequency (RSF) to reduce the electromagnetic interference (EMI) of switching power converters is a well-known technique that has been previously discussed. The randomized pulse position (RPP) technique, in which the switching frequency is kept fixed while the pulse position (the delay from the starting of the switching cycle to the turn-on instant within the cycle) is randomized, has been previously addressed in the literature for the same purpose. This paper presents a double-hybrid technique (DHB) for EMI reduction in dc-dc switching regulators. The proposed technique employed both the RSF and the RPP techniques. To effectively spread the conducted-noise frequency spectrum and at the same time attain a satisfactory output voltage quality, two parameters (switching frequency and pulse position) were randomized, and a third parameter (the duty ratio) was controlled by a digital compensator. Implementation was achieved using field programmable gate array (FPGA) technology, which is increasingly being adopted in industrial electronic applications. To evaluate the contribution of the proposed DHB technique, investigations were carried out for each basic PWM, RPP, RSF, and DHB technique. Then a comparison was made of the performances achieved. The experimentally investigated features include the effect of each technique on the common-mode, differential-mode, and total conducted-noise characteristics, and their influence on the converter’s output ripple voltage.

The Ground Interface Concept of the KOMPSAT-II DLS

  • Lee, Sang-Taek;Lee, Sang-Gyu;Lee, Jong-Tae;Youn, Heong-Sik
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2002년도 Proceedings of International Symposium on Remote Sensing
    • /
    • pp.228-228
    • /
    • 2002
  • The DLS(Data Link System) is located in the PDTS(Payload Data Transmission Subsystem) of KOMPSAT-II, and its main function is to provide communication link with Ground Segment as a space segment. DLS receive the data of MSC, OBC from DCSU(Data Compression Storage Unit) and transmit to the Ground Station by X-Band RF link. DLS is consist of CCU(Channel Coding Unit), QTX(QPSK Transmitter, ASU(Antenna Switch Unit) CCU makes a packet for communication after several kind of data processing such like Ciphering, RS Coding. QTX transmit PDTS data by OQPSK. Modulation. ASU is the unit for reliability of antenna switching. So, DLS's function is consists of ciphering, RS coding, CCSDS packetizing, randomizing, modulation and switching to antenna. These DLS's functions are controlled by PMU(Payload Management Unit). All commands to DLS are sent by PMU and all telemetries of DLS are sent to the PMU. The PMU receives commands from OBC and sends telemetries to the OBC. The OBC communicates with Ground Station by S-Band RF link. This paper presents the on-orbit DLS operation concept through the ground segment.

  • PDF

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.

An Ensemble Cascading Extremely Randomized Trees Framework for Short-Term Traffic Flow Prediction

  • Zhang, Fan;Bai, Jing;Li, Xiaoyu;Pei, Changxing;Havyarimana, Vincent
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권4호
    • /
    • pp.1975-1988
    • /
    • 2019
  • Short-term traffic flow prediction plays an important role in intelligent transportation systems (ITS) in areas such as transportation management, traffic control and guidance. For short-term traffic flow regression predictions, the main challenge stems from the non-stationary property of traffic flow data. In this paper, we design an ensemble cascading prediction framework based on extremely randomized trees (extra-trees) using a boosting technique called EET to predict the short-term traffic flow under non-stationary environments. Extra-trees is a tree-based ensemble method. It essentially consists of strongly randomizing both the attribute and cut-point choices while splitting a tree node. This mechanism reduces the variance of the model and is, therefore, more suitable for traffic flow regression prediction in non-stationary environments. Moreover, the extra-trees algorithm uses boosting ensemble technique averaging to improve the predictive accuracy and control overfitting. To the best of our knowledge, this is the first time that extra-trees have been used as fundamental building blocks in boosting committee machines. The proposed approach involves predicting 5 min in advance using real-time traffic flow data in the context of inherently considering temporal and spatial correlations. Experiments demonstrate that the proposed method achieves higher accuracy and lower variance and computational complexity when compared to the existing methods.