• Title/Summary/Keyword: 랜덤 방식

Search Result 313, Processing Time 0.032 seconds

Distributed Translator Part 2: Laboratory Test Results (분산 중계기 Part 2: 실험실 테스트 결과)

  • Park, Sung-Ik;Eum, Ho-Min;Seo, Jae-Hyun;Kim, Heung-Mook;Lee, Soo-In
    • Journal of Broadcast Engineering
    • /
    • v.15 no.1
    • /
    • pp.29-39
    • /
    • 2010
  • This paper presents and analyzes laboratory test results of distributed translator (DTxR) for distributed frequency network (DFN) in the ATSC (Advanced Television Systems Committee) terrestrial digital TV broadcasting system. The DTxR laboratory test is classified to receiving part test and transmitting part test. The receiving part test includes dynamic range, random noise, single echo, and adjacent channel interference. The transmitting part test includes quality of output signal (out-of channel emission, quality of transmitting signal, and phase noise), frequency synchronization among output signals, and TxID (Transmitter Identification) signal's affect to the legacy receiver. By the laboratory test results, the receiving part of DTxR eliminates average -2.5 dB of single echo and has average 17.5 dB at TOV (Threshold of Visibility) under random noise environment. In addition, the transmitting part of DTxR satisfies the specification of US FCC (Federal Communications Commission), and frequency difference among DTxR output signals is less than 0.001 Hz.

Enhanced and Practical Alignment Method for Differential Power Analysis (차분 전력 분석 공격을 위한 향상되고 실제적인 신호 정렬 방법)

  • Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.93-101
    • /
    • 2008
  • Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.

Evaluation of Set-up Accuracy for Frame-based and Frameless Lung Stereotactic Body Radiation Therapy (폐암 정위체부방사선치료 시 고정기구(frame) 사용 유무에 따른 셋업 정확성 평가)

  • Ji, Yunseo;Chang, Kyung Hwan;Cho, Byungchul;Kwak, Jungwon;Song, Si Yeol;Choi, Eun Kyung;Lee, Sang-wook
    • Progress in Medical Physics
    • /
    • v.26 no.4
    • /
    • pp.286-293
    • /
    • 2015
  • The purpose of this study was to evaluate the set up accuracy using stereotactic body frame and frameless immobilizer for lung stereotactic body radiation therapy (SBRT). For total 40 lung cancer patients treated by SBRT, 20 patients using stereotactic body frame and other 20 patients using frameless immobilizer were separately enrolled in each group. The setup errors of each group depending on the immobilization methods were compared and analyzed. All patients received the dose of 48~60 Gy for 4 or 5 fractions. Before each treatment, a patient was first localized to the treatment isocenter using room lasers, and further aligned with a series of image guidance procedures; orthogonal kV radiographs, cone-beam CT, orthogonal fluoroscopy. The couch shifts during these procedures were recorded and analyzed for systematic and random errors of each group. Student t-test was performed to evaluate significant difference depending on the immobilization methods. The setup reproducibility was further analyzed using F-test with the random errors excluding the systematic setup errors. In addition, the ITV-PTV margin for each group was calculated. The setup errors for SBF were $0.05{\pm}0.25cm$ in vertical direction, $0.20{\pm}0.38cm$ in longitudinal direction, and $0.02{\pm}0.30cm$ in lateral direction, respectively. However the setup errors for frameless immobilizer showed a significant increase of $-0.24{\pm}0.25cm$ in vertical direction while similar results of $0.06{\pm}0.34cm$, $-0.02{\pm}0.25cm$ in longitudinal and lateral directions. ITV-PTV margins for SBF were 0.67 cm (vertical), 0.99 cm (longitudinal), and 0.83 cm (lateral), respectively. On the other hand, ITV-PTV margins for Frameless immobilizer were 0.75 cm (vertical), 0.96 cm (longitudinal), and 0.72 cm (lateral), indicating less than 1 mm difference for all directions. In conclusion, stereotactic body frame improves reproducibility of patient setup, resulted in 0.1~0.2 cm in both vertical and longitudinal directions. However the improvements are not substantial in clinic considering the effort and time consumption required for SBF setup.

An Adaptive Information Hiding Technique of JPEG2000-based Image using Chaotic System (카오스 시스템을 이용한 JPEG2000-기반 영상의 적응적 정보 은닉 기술)

  • 김수민;서영호;김동욱
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.9-21
    • /
    • 2004
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method and the random changing method using the chaotic system. For ciphering the quantization index we use a novel image encryption algerian of cyclically shifted in the right or left direction and encrypts two quantization assignment method (Top-down/Reflection code), made change of data less. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the proposed methods implemented in software for about 500 images. consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

Ranging Performance Enhancement by Successive Interference Cancellation in Multiuser M-WiMAX System (다중 사용자 M-WiMAX 시스템에서 직렬 간섭 제거를 이용한 레인징 성능 향상 기법)

  • Kim, Jong-Hun;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.998-1005
    • /
    • 2009
  • In the uplink of OFDMA (Orthogonal Frequency Division Multiple Access) based M-WiMAX(Mobile-Worldwide Interoperability for Microwave Access) system, linear phase shift is caused by signals transmitted from multiuser with different delay time and thus, MAI (Multiple Access Interference) occurs. MAI degrades the performance of ranging code detection and delay time estimation in the uplink. Therefore, in this paper, we propose ranging algorithm, applying SIC (Successive Interference Cancellation) to the conventional ranging algorithm, to minimize MAI and to improve ranging performance. The proposed ranging algorithm is verified through the Monte Carlo simulation, which shows the improved performance of ranging code detection and delay time estimation compared to the conventional algorithms. Through compared with random access of the 3GPP LTE, we can know limit of ranging performance.

Website Homepage Design and Service Design of USATODAY.com Analysis (유에스에이투데이닷컴의 웹사이트 홈페이지디자인과 서비스디자인 분석)

  • Han, Qing-Bo;Kim, Eun-Ju;Lee, Ji-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.423-430
    • /
    • 2016
  • The purpose of this paper is to explore and analyze design of USATODAY.COM aimed at being helpful for Chinese online news industry to search for the way forward. USATODAY.COM which converges print and online newsrooms is regarded as a pioneer in the online communication media. It engages interaction with users and their demand, and provides the best level of website and service design. This paper conducted through both theoretical works and design analyses by randomly visiting USATODAY.COM from May 23 to June 5, 2016. USATODAY.COM maintains consistent and high quality of a visual identity system on its homepage, and it is strongly linked to that of USA TODAY. Also, USATODAY.COM provides unique content provision methods, interactive features, advertisement and payment functions through service design considering the user experiences and needs. Based on its results, it is expected to contribute to Chinese online newspaper market which has an astonishing chance to grow.

Development of Response Time Measuring Apparatus for Fencing (펜싱 훈련용 반응시간 측정장치 개발)

  • Gil, Se-gi;Lee, Sang Cheol;Hwang, Jong-Hak;Kim, Tae-Wan;Jung, Jin-Uk;Lee, Hyo-Geun;Han, Yeong-Hwan
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.10 no.4
    • /
    • pp.315-320
    • /
    • 2016
  • In this study, we developed a response time measuring apparatus for fencing which can use fencing athlete's own electric sword and connectors. The measuring apparatus designed to be connected to upper back of dummy body and it's position can be changed by spinning itself. And it operates like a closed circuit composed of dummy helmet, the apparatus, reel signal connection, connector and electric sword of athlete. This measuring apparatus can provide response time to athlete immediately which response time is measured from the time of indicating random signal of light and sound to the time of attacking dummy by athlete. we carried out pilot test for couch and athlete of national fencing team and could validate availability of this system.

Design of Crooked Wire Antennas for UHF Band RFID Reader (UHF 대역 RFID 리더용 Crooked Wire 안테나 설계)

  • Choo Jae-Yul;Choo Ho-Sung;Park Ik-Mo;Oh Yi-Sok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.5 s.96
    • /
    • pp.472-481
    • /
    • 2005
  • This paper reports the design of RFID reader antennas working in UHF band. The reader antennas were designed using a Pareto Genetic Algorithm(Pareto GA). Antennas were optimized to have circular polarization(CP) with less than 3 dB axial ratio, impedance matching with less than VSWR=2 within the frequency range of UHF, an adequate readable range, a restricted size(kr<2.22) considering the practical condition. After Pareto GA optimization, we selected and built the most suitable antenna design and compared the measured results to the simulations. Operating principle of the antenna was explained by investigating the amplitude and the phase of the induced current on the antenna body. We also researched the stability of the antenna with respect to the manufacturing error and studied the critical design parameters by applying the random error method on the antenna bent points.

Design of Radio Interface Protocols for Broadband CDMA Wireless Local Loop and Access Channel Performance Analysis (광대역 CDMA WLL 무선 프로토콜 설계 및 액세스채널의 성능분석)

  • 김영태;박기식;조정호;김광현;이태훈
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.47-58
    • /
    • 1999
  • In this paper, we design the radio interface protocols of wideband Wireless Local Loop(WLL) that uses wideband Code Division Multiple Access(CDMA), and propose the random access procedures on access channel and analyze the performance of the channel. The structure of radio interface protocols are designed by three modular parts to meet the requirements of IMT-2000 : radio resource controlling part that depends on the radio resources, connection controlling part that is independent of the radio resources, and application part that supports the interface between different parts and user terminals. In addition, we propose the random access procedures on access channel and analyze the performance of the channel. We assume that both near-far effect and shadow fading can be compensated by open loop power control. We observe that the number of access probes(delay) depend on the initial mobile transmission power and power increment, and the poor estimation of initial mobile transmission power might increase the average number of access probes.

  • PDF

A Session Key Exchange Scheme for Secure Vehicle Communication in V2I-based VANET Environments (V2I 기반의 VANET 환경에서 안전한 차량 통신을 위한 세션 키 교환 기법)

  • Ryu, Seung-Ho;Jung, Sou-Hwan
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.311-317
    • /
    • 2008
  • This paper proposes a session key exchange scheme for providing secure communication between Vehicles and Infrastructure in VANET. In the current VANET environment, IEEE 802.11i or PKI based mechanism is used to provide secure communication between V2I. However, since the vehicles and the frequent changes of network topology, VANET nodes have some difficulties to exchange the session key using IEEE 802.11i or PKI method. In the proposed scheme, Local Router is newly defined for exchanging the session key between moving vehicles and infrastructure. A session key is generated by XOR operation based on the random values between Local Router and OBU. As a result, the proposed scheme has a noticeable advantage on the fastness of key exchange by exchanging session keys between LR and OBU.