• Title/Summary/Keyword: Random Binary

Search Result 281, Processing Time 0.024 seconds

A Single-ended Simultaneous Bidirectional Transceiver in 65-nm CMOS Technology

  • Jeon, Min-Ki;Yoo, Changsik
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.16 no.6
    • /
    • pp.817-824
    • /
    • 2016
  • A simultaneous bidirectional transceiver over a single wire has been developed in a 65 nm CMOS technology for a command and control bus. The echo signals of the simultaneous bidirectional link are cancelled by controlling the decision level of receiver comparators without power-hungry operational amplifier (op-amp) based circuits. With the clock information embedded in the rising edges of the signals sent from the source side to the sink side, the data is recovered by an open-loop digital circuit with 20 times blind oversampling. The data rate of the simultaneous bidirectional transceiver in each direction is 75 Mbps and therefore the overall signaling bandwidth is 150 Mbps. The measured energy efficiency of the transceiver is 56.7 pJ/b and the bit-error-rate (BER) is less than $10^{-12}$ with $2^7-1$ pseudo-random binary sequence (PRBS) pattern for both signaling directions.

ALGORITHMS FOR GENERATING NONLINEAR COMBINERS WITH GIVEN CONDITIONS

  • Rhee, Min-Surp;Shin, Hyun-Yong;Jun, Youn-Bae
    • Journal of applied mathematics & informatics
    • /
    • v.7 no.1
    • /
    • pp.269-278
    • /
    • 2000
  • A Boolean function generates a binary sequence which is frequently used in a stream cipher. There are number of critical concepts which a Boolean function, as a key stream generator in a stream cipher, satisfies. These are nonlinearity, correlation immunity, balancedness, SAC(strictly avalanche criterion), PC(propagation criterion) and so on. In this paper, we present the algorithms for generating random nonlinear combining functions satisfying given correlation immune order and nonlinearity. These constructions can be applied for designing the key stream generators. We use Microsoft Visual C++6.0 for our program.

Interferometric Image Encryption and Decryption using Binary Phase Hologram (이진 위상 홀로그램을 이용한 간섭성 영상 암호화 및 복원)

  • 김종윤;김정우
    • The Journal of the Korea Contents Association
    • /
    • v.2 no.3
    • /
    • pp.80-86
    • /
    • 2002
  • In this paper, we propose the new optical security technique using two phase holograms based on interferometer. The encoded random phase image does not have any information on the original image. Without Hewing the key mask, one cannot decode the encrypted image and regenerate the original image. And the use of two phase only images in the proposed security system leads to maximum optical efficiency (100% in theory). Also they cannot be detected by an intensity detector such as a CCD camera. Computer simulations and optical experiments show performance of the proposed methods.

  • PDF

Evolution of Spin and Superorbital Modulation in 4U 0114+650

  • Hu, Chin-Ping;Ng, Chi-Yung;Chou, Yi
    • Journal of Astronomy and Space Sciences
    • /
    • v.33 no.3
    • /
    • pp.173-176
    • /
    • 2016
  • We report on a systematic analysis of the spin and superorbital modulations of the high-mass X-ray binary 4U 0114+650, which consists of the slowest spinning neutron star known. Utilizing dynamic power spectra, we found that the spin period varied dramatically during the RXTE ASM and Swift BAT observations. This variation consists of a long-term spin-up trend, and two ~1,000 day and one ~600 day random walk epochs previously, MJD 51,000, ~MJD 51,400-52,000, and ~MJD 55,100-56,100. We further found that the events appear together with depressions of superorbital modulation amplitude. This provides evidence of the existence of an accretion disk, although the physical mechanism of superorbital modulation remains unclear. Furthermore, the decrease of the superorbital modulation amplitude may be associated with the decrease of mass accretion rate from the disk, and may distribute the accretion torque of the neutron star randomly in time.

Channel Equalization using Fuzzy-ARTMAP Neural Network

  • Lee, Jung-Sik;Kim, Jin-Hee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.7C
    • /
    • pp.705-711
    • /
    • 2003
  • This paper studies the application of a fuzzy-ARTMAP neural network to digital communications channel equalization. This approach provides new solutions for solving the problems, such as complexity and long training, which found when implementing the previously developed neural-basis equalizers. The proposed fuzzy-ARTMAP equalizer is fast and easy to train and includes capabilities not found in other neural network approaches; a small number of parameters, no requirements for the choice of initial weights, automatic increase of hidden units, no risk of getting trapped in local minima, and the capability of adding new data without retraining previously trained data. In simulation studies, binary signals were generated at random in a linear channel with Gaussian noise. The performance of the proposed equalizer is compared with other neural net basis equalizers, specifically MLP and RBF equalizers.

A Study of Parameter Estimation for First Order System with Dead Time (지연요소를 수반하는 일차계통의 패러미터 추정에 관한 연구)

  • Joo Shik Ha
    • 전기의세계
    • /
    • v.18 no.1
    • /
    • pp.15-23
    • /
    • 1969
  • A lot of recent researches have shown that a Pseudo Random Binary Signal is a quite effective test signal to measure the impulse response of a plant. Generally speaking, however, such a response itself is not satisfactory to determine the appropriate control parameters or control inputs. Here, the author intends to estimate the unknown parameters of the First Order Plant with Dead Time by means of correlation method using M-sequence signal. The time constant T and the dead time L of the plant are eatimated with one tracking loop by automatically adjusting delay time .tau. of M-sequence signal according to variations of T and L. In this paper, a three level M-sequence signal is used as a test signal in order to avoid troublesome operations to calculate partial derivatives of a given performance index with respect to the parameters which are usually required in the Model Method. Several experiments with analogue computer using low pass filters as averaging circuits showed good results as expected.

  • PDF

A Method Enabling Exploitation of Spatial Diversity and Physical Layer Security in an Extreme Case of Source-Wiretapping without a Jamming Beamformer

  • Tran, Truc Thanh;Kong, Hyung Yun
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.482-490
    • /
    • 2015
  • This article exploits spatial diversity for jamming to prevent wiretapping in the extreme case in which an eavesdropper is located near the source and a common jamming signal is unavailable. To address this challenge, the jamming signal is allowed to carry a random binary message. Then, it is proposed that the active intermediate node transmits this jamming signal and the decoding of this signal at both source and destination is physically secured as result of using the physical-layer security method. If the source and the destination securely and correctly decode this jamming message, the source transmits another message which is created from combining its information message and the decoded message using the network-coding method. Therefore, this method prevents the transmissions from being eavesdropped upon by the source-wiretapping.

Effect of Capacitance Error on the A/D conversion Accuracy (커패시턴스 오차가 아날로그 디지털 변환의 정확도에 미치는 영향)

  • Lee, Yun-Tae;Kim, Chung-Gi;Gyeong, Jong-Min
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.5
    • /
    • pp.57-61
    • /
    • 1985
  • The e(lect of capacitance error on the A/D conversion accuracy in the A/D converter using binary-weighted capacitor array was scruntized. Besides the Monte-Carlo method considering the inter-capacitance ratios as random variables, " correlation approach" con-sidering the correlation coefficient between capacitances is proposed in this paper. Bt was observed by the measurement of capacitances of monolithic MO5 capacitors that the correla-tion coefficient between capacitors decreases as the capacitor size incrrases. It was also verified that the parallel connection of unit capacitors and the common centroid layout scheme signi(icantly increase the inter-capacitance correlation coefficients.

  • PDF

Stereo Matching Using Analog Neural Network (아날로그 신경 회로망을 이용한 스테레오 정합)

  • 도경훈;이준재;조석제;이왕국;하영호
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.6
    • /
    • pp.59-66
    • /
    • 1993
  • Stereo vision is useful in obtaining three dimensional depth information from two images taken from different view points. Neural network modeling for stereo matching, the key step in stereo vision, is defined by an energy function satisfying with three constraints proposed by Marr and Poggio. Stereo matching is then carried out through the network to find minimum energy corresponding to the optimized solution of the problem. An algorithm for stereo matching using an analog neural network is presented here. The network can reduce errors in initial state an early iteration steps by adoption of continuous sigmoid function in stead of binary state. The experimental results show good matching performance for sparse random dot stereogram and real image.

  • PDF

A New Backoff algorithm considering Hop Count for the IEEE 802.11 Distributed Coordination Function

  • Nam, Jae-Hyun
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.3
    • /
    • pp.205-208
    • /
    • 2007
  • The IEEE 802.11 is a MAC protocol which has been standardized by IEEE for Wireless Local Area Networks (WLANs). In the IEEE 802.11 WLANs, network nodes experiencing collisions on the shared channel need to backoff for a random period of time, which is uniformly selected from the Contention Window (CW). This contention window is dynamically controlled by the Binary Exponential Backoff (BEB) algorithm. However, the BEB scheme suffers from a fairness problem; some nodes can achieve significantly larger throughput than others. This paper proposes a new backoff algorithm for the IEEE 802.11 DCF scheme. This algorithm uses the hop count for considering fairness. It causes flows with high hop count to generate short backoff interval than those with low hop count, thus getting high priority. Therefore, when a collision occurs, the modified IEEE 802.11 DCF assigns higher priority to flow to be close to a destination.