• Title/Summary/Keyword: soft bit

Search Result 140, Processing Time 0.034 seconds

Study on Structure and Principle of Linear Block Error Correction Code (선형 블록 오류정정코드의 구조와 원리에 대한 연구)

  • Moon, Hyun-Chan;Kal, Hong-Ju;Lee, Won-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.721-728
    • /
    • 2018
  • This paper introduces various linear block error correction code and compares performances of the correction circuits. As the risk of errors due to power noise has increased, ECC(: Error Correction Code) has been introduced to prevent the bit error. There are two representatives of ECC structures which are SEC-DED(: Single Error Correction Double Error Detection) and SEC-DED-DAEC(: Double Adjacent Error Correction). According to simulation results, the SEC-DED circuit has advantages of small area and short delay time compared to SEC-DED-DAEC circuits. In case of SED-DED-DAEC, there is no big difference between Dutta's and Pedro's from performance point of view. Therefore, Pedro's code is more efficient than Dutta' code since the correction rate of Pedro's code is higher than that of Dutta's code.

VLIS Design of OCB-AES Cryptographic Processor (OCB-AES 암호 프로세서의 VLSI 설계)

  • Choi Byeong-Yoon;Lee Jong-Hyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1741-1748
    • /
    • 2005
  • In this paper, we describe VLSI design and performance evaluation of OCB-AES crytographic algorithm that simulataneously provides privacy and authenticity. The OCB-AES crytographic algorithm sovles the problems such as long operation time and large hardware of conventional crytographic system, because the conventional system must implement the privancy and authenticity sequentially with seqarated algorithms and hardware. The OCB-AES processor with area-efficient modular offset generator and tag generator is designed using IDEC Samsung 0.35um standard cell library and consists of about 55,700 gates. Its cipher rate is about 930Mbps and the number of clock cycles needed to generate the 128-bit tags for authenticity and integrity is (m+2)${\times}$(Nr+1), where m and Nr represent the number of block for message and number of rounds for AES encryption, respectively. The OCB-AES processor can be applicable to soft cryptographic IP of IEEE 802.11i wireless LAN and Mobile SoC.

Columellar Lengthening Using V-Y Advancement Flap or Central Lip Flap in Secondary Correction of Bilateral Cleft Lip Nose Deformity (양측 구순비변형 환자의 이차성 교정에 있어서 V-Y 전진 피판술 또는 정중 구순 비판술을 이용한 비주 연장술)

  • Bae, Yong Chan;Moon, Jae Sul;Kim, Sang Ho;Nam, Su Bong;Kang, Young Seok
    • Archives of Plastic Surgery
    • /
    • v.32 no.5
    • /
    • pp.561-566
    • /
    • 2005
  • Even though it is generalized to perform synchronous lip and nasal correction, there are some cases in need of secondary correction of cleft lip nose deformity. In these procedures, the lengthening of columella plays an important role. We performed eighteen cases of the secondary cleft lip nose deformity correction using two different methods from 1997 to 2003. The central lip flap was used in eight patients and V-Y advancement flap in ten patients. Additional procedures including reverse U-incision, interdomal fixation sutures and suspension sutures were used for correction of combined deformity. Silastic nasal retainers were kept in all patients for 6 months. Both of central lip flap and V-Y advancement flap seems to be a good technique for lengthening columellar soft tissue. But new columella after V-Y advancement flap appeared to be too narrow and a bit unnatural looking and central lip flap left additional scar on the upper lip although it was conspicuous. We think that central lip flap is a better technique in a case with wide philtrum and narrow columella and V-Y advancement flap can be another choice in a columella with sufficient width.

A Study on the Efficient Concatenated Code on the Diffusion-based Molecular Communication Channel (확산기반 분자통신 채널에 효율적인 직렬 연결 부호에 관한 연구)

  • Cheong, Ho-Young
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.4
    • /
    • pp.230-236
    • /
    • 2022
  • In this paper, we propose an efficient concatenated code for both random and ISI errors on diffusion-based molecular communication channels. The proposed concatenated code was constructed by combining the ISI-mitigating code designed for ISI mitigation and the ISI-Hamming code strong against random errors, and the BER(bit error rate) performance was analyzed through simulation. In the case of the above M=1,200 channel environment, it was found that the error rate performance of the concatenated code follows the error rate performance of the ISI-mitigating code, which is strong against ISI, and follows the error rate performance of the ISI-Hamming code, which is strong against random errors, in the channel environment below M=600. In M=600~1,200, the concatenated code shows the best error rate performance among those of three codes, which is analyzed because it can correct both random errors and errors caused by ISI. In the following cases of below M=800, it can be seen that the error rate of the concatenated code and the ISI-mitigating code shows an error rate difference of about 1.0×10-1 on average.

A Hardware Design of Ultra-Lightweight Block Cipher Algorithm PRESENT for IoT Applications (IoT 응용을 위한 초경량 블록 암호 알고리듬 PRESENT의 하드웨어 설계)

  • Cho, Wook-Lae;Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1296-1302
    • /
    • 2016
  • A hardware implementation of ultra-lightweight block cipher algorithm PRESENT that was specified as a block cipher standard for lightweight cryptography ISO/IEC 29192-2 is described in this paper. Two types of crypto-core that support master key size of 80-bit are designed, one is for encryption-only function, and the other is for encryption and decryption functions. The designed PR80 crypto-cores implement the basic cipher mode of operation ECB (electronic code book), and it can process consecutive blocks of plaintext/ciphertext without reloading master key. The PR80 crypto-cores were designed in soft IP with Verilog HDL, and they were verified using Virtex5 FPGA device. The synthesis results using $0.18{\mu}m$ CMOS cell library show that the encryption-only core has 2,990 GE and the encryption/decryption core has 3,687 GE, so they are very suitable for IoT security applications requiring small gate count. The estimated maximum clock frequency is 500 MHz for the encryption-only core and 444 MHz for the encryption/decryption core.

In Vitro Screening of Antibacterial Agents for Suppression of Fire Blight Disease in Korea (기내 검정법을 이용한 국내 과수 화상병 방제제 선발)

  • Lee, Min Su;Lee, Ingyeong;Kim, Sam Kyu;Oh, Chang-Sik;Park, Duck Hwan
    • Research in Plant Disease
    • /
    • v.24 no.1
    • /
    • pp.41-51
    • /
    • 2018
  • Since fire blight disease on apple and pear was produced in Korea in 2015, there were no registered chemicals to control against this disease. Instead, several antibacterial chemicals that were registered for other bacterial diseases such as soft rot and bacterial spot have been authorized by Rural Development Administration (RDA). However, these chemicals are not tested efficacy for fire blight disease except damage by those treatments on apple and pear in Korea. Thus, we evaluated efficiency using in vitro and in planta assays of antibacterial chemicals such as antibiotics and copper compounds including kasugamycin, oxytetracycline, oxolinic acid and streptomycin, and copper hydroxide, copper sulfate, oxine copper and tribasic copper sulfate, respectively. We also tested two kinds of biological agents. As expected, significant antibacterial effect was observed in vitro test of both antibiotics and copper-based chemicals. In planta test based on disease severity including ooze and water-soaked formation on immature pears, bacterial populations on blooms, and blight lesion formation in artificially inoculated shoots, kasugamycin, oxytetracycline and streptomycin have been shown the most efficiency among tested antibiotics. Four copper-based chemicals tested in this study, control effects are little bit lower than agricultural antibiotics but they seem to be available to use in terms of winter season. Biocontrol agents were also shown possibility to treat in eco-friendly farms. In addition, there are no antibiotic resistance genes in Korean isolates against antibiotics, which were selected for suppression of fire blight in this study.

90/150 RCA Corresponding to Maximum Weight Polynomial with degree 2n (2n 차 최대무게 다항식에 대응하는 90/150 RCA)

  • Choi, Un-Sook;Cho, Sung-Jin
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.819-826
    • /
    • 2018
  • The generalized Hamming weight is one of the important parameters of the linear code. It determines the performance of the code when the linear codes are applied to a cryptographic system. In addition, when the block code is decoded by soft decision using the lattice diagram, it becomes a measure for evaluating the state complexity required for the implementation. In particular, a bit-parallel multiplier on finite fields based on trinomials have been studied. Cellular automata(CA) has superior randomness over LFSR due to its ability to update its state simultaneously by local interaction. In this paper, we deal with the efficient synthesis of the pseudo random number generator, which is one of the important factors in the design of effective cryptosystem. We analyze the property of the characteristic polynomial of the simple 90/150 transition rule block, and propose a synthesis algorithm of the reversible 90/150 CA corresponding to the trinomials $x^2^n+x^{2^n-1}+1$($n{\geq}2$) and the 90/150 reversible CA(RCA) corresponding to the maximum weight polynomial with $2^n$ degree by using this rule block.

Experimental Performance Analysis of BCJR-Based Turbo Equalizer in Underwater Acoustic Communication (수중음향통신에서 BCJR 기반의 터보 등화기 실험 성능 분석)

  • Ahn, Tae-Seok;Jung, Ji-Won
    • Journal of Navigation and Port Research
    • /
    • v.39 no.4
    • /
    • pp.293-297
    • /
    • 2015
  • Underwater acoustic communications has been limited use for military purposes in the past. However, the fields of underwater applications expend to detection, submarine and communication in recent. The excessive multipath encountered in underwater acoustic communication channel is creating inter symbol interference, which is limiting factor to achieve a high data rate and bit error rate performance. To improve the performance of a received signal in underwater communication, many researchers have been studied for channel coding scheme with excellent performance at low SNR. In this paper, we applied BCJR decoder based ( 2,1,7 ) convolution codes and to compensate for the distorted data induced by the multipath, we applying the turbo equalization method. Through the underwater experiment on the Gyeungcheun lake located in Mungyeng city, we confirmed that turbo equalization structure of BCJR has better performance than hard decision and soft decision of Viterbi decoding. We also confirmed that the error rate of decoder input is less than error rate of $10^{-1}$, all the data is decoded. We achieved sucess rate of 83% through the experiment.

Performance Analysis of MAP Algorithm by Robust Equalization Techniques in Nongaussian Noise Channel (비가우시안 잡음 채널에서 Robust 등화기법을 이용한 터보 부호의 MAP 알고리즘 성능분석)

  • 소성열
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1290-1298
    • /
    • 2000
  • Turbo Code decoder is an iterate decoding technology, which extracts extrinsic information from the bit to be decoded by calculating both forward and backward metrics, and uses the information to the next decoding step Turbo Code shows excellent performance, approaching Shannon Limit at the view of BER, when the size of Interleaver is big and iterate decoding is run enough. But it has the problems which are increased complexity and delay and difficulty of real-time processing due to Interleaver and iterate decoding. In this paper, it is analyzed that MAP(maximum a posteriori) algorithm which is used as one of Turbo Code decoding, and the factor which determines its performance. MAP algorithm proceeds iterate decoding by determining soft decision value through the environment and transition probability between all adjacent bits and received symbols. Therefore, to improve the performance of MAP algorithm, the trust between adjacent received symbols must be ensured. However, MAP algorithm itself, can not do any action for ensuring so the conclusion is that it is needed more algorithm, so to decrease iterate decoding. Consequently, MAP algorithm and Turbo Code performance are analyzed in the nongaussian channel applying Robust equalization technique in order to input more trusted information into MAP algorithm for the received symbols.

  • PDF

Characteristic and Application Under the Sericulture of Subtropical Zones Mulberry Adapted Itself to the Field Cultivation (노지재배(露地栽培)에 적응(適應)한 아열대산(亞熱帶産) 뽕나무의 특성(特性)과 양잠(養蠶)에서의 응용(應用))

  • Seok Young-Seek;Park Sang-Jo;An Sin-Hun;Han Sang-Mi;Yeo Joo-Hong;Han Myung-Sae
    • Journal of Sericultural and Entomological Science
    • /
    • v.47 no.2
    • /
    • pp.68-77
    • /
    • 2005
  • A characteristic of subtropical zones region MK-T2 compares with an gaeryangppong, and the 9-10 schedule the times when a leaf blooms to are fast, and ratio that a branch edge by the colds becomes lean showed 5.7%, and a growth of the new branch which went out delivers 67.2 cm, mulberry loaves of the new branch which went out, and 18.6, a form of a leaf is the 1.10 that length of a leaf grew more a bit than width of a leaf up. Thickness of a leaf is $228.2{\mu}m$, and an area is more similar than gaeryangppong as $225.6cm^2$. in plant taxonomy, the hair whom the style exists short with 0.7 mm, and go to the pistil head inside so as to be rare is distributed, and belong to Dolichostylae Pubescentes. The new branch cutting which executed without remedy processes was independent of a thickness of a case branch, and the form and 100% root was said, and an gaeryangppong compared with the fact that 10% root went out of 15 mm ideal, and was excellent very, and looked, a root went out a root the soil and water, all showed a characteristic to go out at central of a branch bases at 45% ratio. Length was 24.6 mm, and were water rate 78.8%, and mulberry of MK-T2 was carrying together sweetness and acidity to pH 4.7 while, besides, arrival was 19.21 Brix%. A larva period and pupa ratio, cocoon thickness ratio are almost similar to gaeryangppong, or weight of one cocoon, cocoon thickness, 20,002 cocoon quantity shows some results to drop, and be soft of a leaf, and feed value certifications are comparatively top-ranking. As a result of having analyzed amino acid of the 3rd day of 5th silkworm larva which bred to MK-T2, a collation absorbing an gaeryangppong went, and looked, but compared with a collation in case of tests to eat MK-T2, and looked, and the lie collations were not detected a difference at Leu, but MK-T2 tests were detected mutual almost similar amino acid creation. medical efficacy of the 3rd day of 5th silkworm larva ethanol extract which bred to MK-T2 and black results, histologic a case did not appear at HE dyeing about the kidney organization which extracted form the rats which ate a silkworm ethanol extract and dyeing all chemical organization immunity, and one step protein revelation became lower with almost unidentified levels.