• Title/Summary/Keyword: binary power control

Search Result 76, Processing Time 0.025 seconds

Secure sharing method for a secret binary image and its reconstruction system

  • Lee, Sang-Su;Han, Jong-Wook
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1240-1243
    • /
    • 2003
  • In this paper, an encryption method to share a secret binary image is proposed. It divides the image to be encrypted into an arbitrary number of images and encrypts them using XOR process with different binary random images which was prepared by the means of the XOR process, too. Each encrypted slice image can be distributed to the authenticated ones. However, we transfer the encrypted images to the binary phase masks to strengthen the security power, that means phase masks can not be copied with general light-intensity sensitive tools such as CCDs or cameras. For decryption, we used the Mach-Zehnder interferometer in which linearly polarized two light beams in orthogonal direction, respectively. The experimental result proved the efficiency of the proposed method.

  • PDF

Goodness of Link Tests for Binary Response Data

  • Yeo, In-Kwon
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.2
    • /
    • pp.357-366
    • /
    • 2001
  • The present paper develops a method to check the propriety of link functions for binary data. In order to parameterize a certain type of goodness of the link, a family of link functions indexed by a shape parameter is proposed. I first investigate the maximum likelihood estimation of the shape parameter as well as regression parameters and then derive their large sample behaviors of the estimators. A score test is considered to evaluate the goodness of the current link function. For illustration, I employ two families of power transformations, the modulus transformation by John and Draper (1980) and the extended power transformation by Yeo and Johnson (2000), which are appropriate to detect symmetric and asymmetric inadequacy of the selected link function. respectively.

  • PDF

TPC-BS: Transmission Power Control based on Binary Search in the Wireless Sensor Networks (TPC-BS: 센서 네트워크에서 이진검색 방법을 이용한 빠른 전송전력 결정 방법)

  • Oh, Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.11
    • /
    • pp.1420-1430
    • /
    • 2011
  • This paper proposes a new method to optimize energy consumption in a wireless modem by setting up a transmission power value according to the distance between nodes and circumstance in the MAC layer of IEEE 802.15.4. The proposed method can dynamically find an optimal transmission power range using the binary search scheme and minimize overhead caused by multiple message transmissions when determining the optimal transmission power. The determined transmission power is used for transmitting data packets and can be modified dynamically depending on the changes in a network environment when exchanging data packets and acknowledgement signals. The results of the simulations show 30% reduction in energy consumption while 2.5 times increase in data transmission rate per unit of energy comparing with IEEE 802.15.4 standard.

Fault Analysis Attacks on Control Statement of RSA Exponentiation Algorithm (RSA 멱승 알고리즘의 제어문에 대한 오류 주입 공격)

  • Gil, Kwang-Eun;Baek, Yi-Roo;Kim, Hwan-Koo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.63-70
    • /
    • 2009
  • Many research results show that RSA system mounted using conventional binary exponentiation algorithm is vulnerable to some physical attacks. Recently, Schmidt and Hurbst demonstrated experimentally that an attacker can exploit secret key using faulty signatures which are obtained by skipping the squaring operations. Based on similar assumption of Schmidt and Hurbst's fault attack, we proposed new fault analysis attacks which can be made by skipping the multiplication operations or computations in looping control statement. Furthermore, we applied our attack to Montgomery ladder exponentiation algorithm which was proposed to defeat simple power attack. As a result, our fault attack can extract secret key used in Montgomery ladder exponentiation.

Generalized Joint Channel-Network Coding in Asymmetric Two-Way Relay Channels

  • Shen, Shengqiang;Li, Shiyin;Li, Zongyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5361-5374
    • /
    • 2016
  • Combining channel coding and network coding in a physical layer in a fading channel, generalized joint channel-network coding (G-JCNC) is proved to highly perform in a two-way relay channel (TWRC). However, most relevant discussions are restricted to symmetric networks. This paper investigates the G-JCNC protocols in an asymmetric TWRC (A-TWRC). A newly designed encoder used by source nodes that is dedicated to correlate codewords with different orders is presented. Moreover, the capability of a simple common non-binary decoder at a relay node is verified. The effects of a power match under various numbers of iteration and code lengths are also analyzed. The simulation results give the optimum power match ratio and demonstrate that the designed scheme based on G-JCNC in an A-TWRC has excellent bit error rate performance under an appropriate power match ratio.

A Low Poorer Resource Allocation Algorithm Based on Minimizing Switching Activity (스위칭 동작 최소화를 통한 저 전력 자원할당 알고리즘)

  • 신무경;인치호;김희석
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.121-124
    • /
    • 2001
  • This paper proposed resource allocation algorithm for the minimum switching activity of functional unit in high level synthesis process as like DSP which is circuit to give many functional unit. The resource allocation method after scheduling use the power function calculating average hamming distance and switching activity of the between two input. First of all, the switching activity is calculated by the input value after calculating the average hamming distance between operation. In this paper, the proposed method though high If level simulation find switching activity in circuit each functional unit exchange for binary sequence length and value bit are logic one value. To use the switching activity find the allocation with minimal power consumption, the proposed method visits all control steps one by one and determines the allocation with minimal power consumption at each control step. As the existing method, the execution time can be fast according to use the number of operator and max control step. And it is the reduction effect from 6% to 8%.

  • PDF

Lane Following Control of Vision Based Mobile Robot Using Neural Network (신경회로망을 이용한 비전기반 이동로봇의 경로추적제어)

  • Yang Seng-Ho;Shin Suk-Hun;Jang Young-Hak;Ryoo Young-Jae
    • Proceedings of the KIPE Conference
    • /
    • 2004.07a
    • /
    • pp.155-158
    • /
    • 2004
  • This paper describes a lane following control of vision based mobile robot that follows guidline. Summation of binarization conversion and image data of vertical axis was used in image processing. As an extraction of specific parameters of lane image, the raw image was converted to the binary data, and the binary data was summerized to the specific data vertically. The specific parameters were made to the inputs of neural network. Summation of image data was used for input of the net, and optimized value of turn angles of learned mobile robot was output. By using neural network algorithm, possibility of mobile robot moving to the target point and following the guidlines quickly and effectively was proved.

  • PDF

Application of IMCS MBC Logic for Thermal Power Plant (발전소 통합감시제어시스템의 MBC 개발 로직 실계통 적용)

  • Shin, Man-Su;Yoo, Kwang-Myeng;Byun, Seung-Hyun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.62 no.6
    • /
    • pp.845-851
    • /
    • 2013
  • Because the existing control system has been operating for about 20 years, it is necessary to upgrade the system for stable and efficient operation. But, there is a difficulty in maintenance by difference of manufacturer of each main control systems for boiler, turbine and generator. This developed IMCS(Integrated Monitoring and Control System) consists of more than 10,000 inputs and outputs for large scale thermal power plant. This paper consists of the development journey of IMCS MBC(mill and burner control) ; core binary protection & monitoring logic including prevention circuit of boiler explosion & implosion. In this project, the IMCS for boiler, turbine and generator was developed on basis of one communications platform. In this paper, the whole journey of development of IMCS MBC is dealt with designing software and hardware, coding application software, and validating software and hardware.

EMI reduction of PWM converter By Binary Switching Frequency Modulation (2진 스위칭 주파수 변조에 의한 PWM 컨버터의 EMI 저감)

  • Jin, In-Su;Park, Seok-Ha;Yang, Kyeong-Rok;Kim, Yang-Mo
    • Proceedings of the KIEE Conference
    • /
    • 1999.07f
    • /
    • pp.2650-2652
    • /
    • 1999
  • To satisfy the demand for small size, light weight. high density power supply, the switching frequency of DC/DC converters has been increased. The PWM control of the conventional SMPS have a switching frequency that a level of the conducted noise spectra contribute to switching frequency band. So the electronic equipment is not only affected from that but is restricted to internal regulation like CISPR, FCC, and VDE. In this paper, we analyzed Bi-FM. Bi-FM is two fixed switching frequency with a modulation frequency. So emission spectrum of Bi-FM control signal is spreaded and spectral power level is reduced. In this paper, we analyze the spectral analysis of Bi-FM control signal and the spectral comparison between the PWM control and Bi-FM control. And we confirm that reduced the spectrum power level through simulation using Pspice and experiment.

  • PDF

Identification of the Mechanical Resonances of Electrical Drives for Automatic Commissioning

  • Pacas Mario;Villwock Sebastian;Eutebach Thomas
    • Journal of Power Electronics
    • /
    • v.5 no.3
    • /
    • pp.198-205
    • /
    • 2005
  • The mechanical system of a drive can often be modeled as a two- or three-mass-system. The load is coupled to the driving motor by a shaft able to perform torsion oscillations. For the automatic tuning of the control, it is necessary to know the mathematical description of the system and the corresponding parameters. As the manpower and setup-time necessary during the commissioning of electrical drives are major cost factors, the development of self-operating identification strategies is a task worth pursuing. This paper presents an identification method which can be utilized for the assisted commissioning of electrical drives. The shaft assembly can be approximated as a two-mass non-rigid mechanical system with four parameters that have to be identified. The mathematical background for an identification procedure is developed and some important implementation issues are addressed. In order to avoid the excitation of the system with its natural resonance frequency, the frequency response can be obtained by exciting the system with a Pseudo Random Binary Signal (PRBS) and using the cross correlation function (CCF) and the auto correlation function (ACF). The reference torque is used as stimulation and the response is the mechanical speed. To determine the parameters, especially in advanced control schemes, a numerical algorithm with excellent convergence characteristics has also been used that can be implemented together with the proposed measurement procedure in order to assist the drive commissioning or to achieve an automatic setting of the control parameters. Simulations and experiments validate the efficiency and reliability of the identification procedure.