• Title/Summary/Keyword: C-MAC

Search Result 265, Processing Time 0.03 seconds

A Performance Evaluation of a RISC-Based Digital Signal Processor Architecture (RISC 기반 DSP 프로세서 아키텍쳐의 성능 평가)

  • Kang, Ji-Yang;Lee, Jong-Bok;Sung, Won-Yong
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.2
    • /
    • pp.1-13
    • /
    • 1999
  • As the complexity of DSP (Digital Signal Processing) applications increases, the need for new architectures supporting efficient high-level language compilers also grows. By combining several DSP processor specific features, such as single cycle MAC (Multiply-and-ACcumulate), direct memory access, automatic address generation, and hardware looping, with a RISC core having many general purpose registers and orthogonal instructions, a high-performance and compiler-friendly RISC-based DSP processors can be designed. In this study, we develop a code-converter that can exploit these DSP architectural features by post-processing compiler-generated assembly code, and evaluate the performance effects of each feature using seven DSP-kernel benchmarks and a QCELP vocoder program. Finally, we also compare the performances with several existing DSP processors, such as TMS320C3x, TMS320C54x, and TMS320C5x.

  • PDF

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

A Study on Optimization Design of MPEG Layer 2 Audio Decoder for Digital Broadcasting (디지털 방송용 MPEG Layer 2 오디오 복호기의 최적화 설계에 관한 연구)

  • 박종진;조원경
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.5
    • /
    • pp.48-55
    • /
    • 2000
  • Recently due to rapid improvement of integrated circuit design environment, size of IC design is to become large to possible design System on Chip(SoC) that one chip with multi function enclosed. Also cause to this rapid change, consumption market is require to spend smallest time for new product development. In this paper to propose a methodology can design a large size IC for save time and applied to design of MPEG Layer 2 decoder to can use audio receiver in digital broadcast system. The digital broadcast audio decoder in this paper is pointed to save hardware size as optimizing algorithm. MPEG Layer 2 decoder algorithm is include MAC to can have an effect on hardware size. So coefficients are using sign digit expression. It is for hardware optimization. If using this method can design MAC without multiplier. The designed audio decoder is using 14,000 gates hardware size and save 22% (4000 gates) hardware usage than using multiplier. Also can design MPEG Layer 2 decoder usable digital broadcast receiver for short time.

  • PDF

A Design of AES-based CCMP core for IEEE 802.11i Wireless LAN Security (IEEE 802.11i 무선 랜 보안을 위한 AES 기반 CCMP 코어 설계)

  • Hwang Seok-Ki;Kim Jong-Whan;Shin Kyung-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.6A
    • /
    • pp.640-647
    • /
    • 2006
  • This paper describes a design of AES-based CCMP(Counter mode with CBC-MAC Protocol) core for IEEE 802.11i wireless LAN security. To maximize the performance of CCMP core, two AES cores are used, one is the counter mode for data confidentiality and the other is the CBC node for authentication and data integrity. The S-box that requires the largest hardware in ARS core is implemented using composite field arithmetic, and the gate count is reduced by about 27% compared with conventional LUT(Lookup Table)-based design. The CCMP core was verified using Excalibur SoC kit, and a MPW chip is fabricated using a 0.35-um CMOS standard cell technology. The test results show that all the function of the fabricated chip works correctly. The CCMP processor has 17,000 gates, and the estimated throughput is about 353-Mbps at 116-MHz@3.3V, satisfying 54-Mbps data rate of the IEEE 802.11a and 802.11g specifications.

Determination of X-ray and gamma-ray shielding capabilities of recycled glass derived from deteriorated silica gel

  • P. Sopapan;O. Jaiboon;R. Laopaiboon;C. Yenchai;C. Sriwunkum;S. Issarapanacheewin;T. Akharawutchayanon;K. Yubonmhat
    • Nuclear Engineering and Technology
    • /
    • v.55 no.9
    • /
    • pp.3441-3449
    • /
    • 2023
  • We determined the radiation shielding properties for 10CaO-xPbO-(90-x) deteriorated silica gel (DSG) glass system (x = 20, 25, 30, 35, 40, and 45 mol.%). The mass attenuation coefficient (MAC) has been estimated at photon energies of 74.23, 97.12, 122, 662, 1173, and 1332 keV using a narrow beam X-ray attenuation and transmission experiment, the XCOM program, and a PHITS simulation. The obtained MAC values were applied to estimate the half value layer (HVL), mean free path (MFP), effective atomic number, and effective electron density. Results show that the MAC value of the studied glasses ranges between 0.0549 and 1.4415 cm2/g, increases with the amount of PbO, and decreases with increasing photon energy. The HVL and MFP values decrease with increasing PbO content and increase with increasing photon energy. The recycled glass, with the addition of PbO content (20-45 mol.%), exhibited excellent radiation shielding capabilities compared to standard barite and ferrite concretes and some glass systems. Moreover, the experimental radiation shielding parameters agree with the XCOM and PHITS values. This study suggests that this new waste-recycled glass is an effective and cost-saving candidate for X-ray and gamma-ray shielding applications.

Real-time Implementation or AMR-WB Speech Coder Using TMS320C5509 DSP (TMS320C5509 DSP를 이용한 AMR-WB 음성부호화기의 실시간 구현)

  • Choi Song-ln;Jee Deock-Gu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.52-57
    • /
    • 2005
  • The adaptive multirate wideband (AMR-WB) speech coder has an extended audio bandwidth from 50 Hz to 7 kBz and operates on nine speech coding bit-rates from 6.6 to 23.85 kbit/s. In this Paper, we present the real-time implementation of AMR-WB speech coder using 16bit fixed-point TMS320C5509 that has dual MAC units. Firstly, We implemented AMR-WB speech coder in C 1anguage level using intrinsics, and then performed optimization in assembly language. The computational complexity of the implemented AMR-WB coder at 23.85 kbit/s is 42.9 Mclocks. And this coder needs the program memory of 15.1 kwords, data ROM of 9.2 kwords and data RAM of 13.9 kwords.

Experimental Murine Fascioliasis Derives Early Immune Suppression with Increased Levels of TGF-${\beta}$ and IL-4

  • Chung, Joon-Yong;Bae, Young-An;Yun, Doo-Hee;Yang, Hyun-Jong;Kong, Yoon
    • Parasites, Hosts and Diseases
    • /
    • v.50 no.4
    • /
    • pp.301-308
    • /
    • 2012
  • In fascioliasis, T-helper 2 (Th2) responses predominate, while little is known regarding early immune phenomenon. We herein analyzed early immunophenotype changes of BALB/c, C57BL/6, and C3H/He mice experimentally infected with 5 Fasciola hepatica metacercariae. A remarkable expansion of $CD19^+$ B cells was observed as early as week 1 post-infection while $CD4^+/CD8^+$ T cells were down-regulated. Accumulation of $Mac1^+$ cells with time after infection correlated well with splenomegaly of all mice strains tested. The expression of tumor necrosis factor (TNF)-${\alpha}$ mRNA in splenocytes significantly decreased while that of IL-4 up-regulated. IL-$1{\beta}$ expression was down-modulated in BALB/c and C57BL/6 mice, but not in C3H/He. Serum levels of transforming growth factor (TGF)-${\beta}$ were considerably elevated in all mice during 3 weeks of infection period. These collective results suggest that experimental murine fascioliasis might derive immune suppression with elevated levels of TGF-${\beta}$ and IL-4 during the early stages of infection.

The Concept of Toxicants Rating in China

  • Zhau, Jiang-Liang
    • Toxicological Research
    • /
    • v.17
    • /
    • pp.37-39
    • /
    • 2001
  • As the preliminary data collection for further chemical risk assessment. toxicants rating works is now rather extensively implemented in China. It consists of two parts, ie., rating of the hazard level of the exposed toxicant and that of the toxicant's profession. In the first part, the rating are based on six criteria, ie., acute toxicity, incidence of acute poisoning, prevalence of chronic poisoning, consequence of chronic poisoning, carcinogenecity and MAC level. Four hazardous levels are to be classified as extreme, high, medium, mild. In the second part. three determinants as weighted coefficients are taken into account, ie., toxicant's hazard level. exposure time and folds of MAC surpassing. Eventually, the index of classification C by which the work with toxic hazard can be classified is able to be calculated and assessed. Several comments were discussed and new recommendations were demonstrated.

  • PDF

The Relationship Between Attachment Behaviors and Narrative Representations about Mothers by 3 and 4 year-old Children (3-4세 유아의 애착 행동과 어머니에 대한 표상 간의 관계)

  • Shin, Hyewon;Lee, Young
    • Korean Journal of Child Studies
    • /
    • v.26 no.6
    • /
    • pp.89-110
    • /
    • 2005
  • Subjects were 66 3- to 4-year-old-Children of unemployed mothers from upper middle class families. Attachment behaviors were measured with the Preschool Strange Situation(Cassidy and Marvin, 1992) and classified as secure, avoidant, dependent, or disorganized. Narrative representations of mothers by Children were obtained by video taped interviews using the MacArthur Story-Stem Battery and coded by the MacArthur Narrative Working Group(1997) system. Data were analyzed with descriptive statistics and t test. Results were that children in the secure group showed more positive representations of their mothers, more prosocial story themes, had higher scores in theme coherence and showed more positive emotional expression than those in the insecure group. The attachment behaviors of the 4 groups(A, B, C, D) were closely correlated with the attachment representations shown in MSSB.

  • PDF

Variations and Series Expansions of the Symbolic Multiple-Valued Logic functions (기호 다치 논리함수와 그 변화 및 전개)

  • 이성우;정환묵
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.20 no.5
    • /
    • pp.1-7
    • /
    • 1983
  • Generally, multiple-valued logic algebra is based on the number system of modulo-M. In this paper, characters a, b, c‥… each of them represents the independent state, are regarded as the elements of the symbolic multiple-valued logic. By using the set theory, the symbolic multiple - valued logic and their functions are defined. And Varation for the symbolic logic function due to the variation of a variable and their properties are suggested and analized. With these variations, the MacLaurin's and Taylor's Series expansions of the symbolic logic functions are proposed and proved.

  • PDF