• Title/Summary/Keyword: improved scheme

Search Result 2,129, Processing Time 0.027 seconds

ID-based signcryption with improved security (안전성을 보완한 ID기반 signcryption 기법)

  • Kwak Byeong-Ok;Jeong Yoon-Su;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.239-251
    • /
    • 2006
  • Zheng's signcryption scheme is a new encryptical scheme of which can save more expense than those of the current signature encryption by using digital signature and symmetric key encryption logically. The current signcryption schemes have a problem that is to be exposed the secret key of the receiver in the case of checking repudiation of origin by the third party. To solve this problem, a solution suggested in this paper is to use multi-purpose ID-based signcryption scheme with anonymity and unlinkability. This solution is safe and more efficient than current signcryption schemes because the suggested scheme keeps the security of the random oracle model as using Weil-pairing in encryption. and follows a formal proof of semantic security of the decisional Diffie-Hellman problem.

  • PDF

Dynamic On-Chip Network based on Clustering for MPSoC (동적 라우팅을 사용하는 클러스터 기반 MPSoC 구조)

  • Kim, Jang-Eok;Kim, Jae-Hwan;Ahn, Byung-Gyu;Sin, Bong-Sik;Chong, Jong-Wha
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.991-992
    • /
    • 2006
  • Multiprocessor system is efficient and high performance architecture to overcome a limitation of single core SoC. In this paper, we propose a multiprocessor SoC (MPSoC) architecture which provides the low complexity and the high performance. The dynamic routing scheme has a serious problem in which the complexity of routing increases exponentially. We solve this problem by making a cluster with several PEs (Processing Element). In inter-cluster network, we use deterministic routing scheme and in intra-cluster network, we use dynamic routing scheme. In order to control the hierarchical network, we propose efficient router architecture by using smart crossbar switch. We modeled 2-D mesh topology and used simulator based on C/C++. The results of this routing scheme show that our approach has less complexity and improved throughput as compared with the pure deterministic routing architecture and the pure dynamic routing architecture.

  • PDF

Efficient Interference Cancellation Scheme for Wireless Body Area Network

  • Bae, Jung-Nam;Choi, Young-Hoon;Kim, Jin-Young;Kwon, Jang-Woo;Kim, Dong-In
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.167-174
    • /
    • 2011
  • In this paper, we propose and simulate an efficient interference cancellation scheme with an optimal ordering successive interference cancellation (SIC) algorithm for ultra wideband (UWB)/multiple-input-multiple-output (MIMO) systems in a wireless body area network (WBAN). When there are several wireless communication devices on a human body, multiple access interference (MAI) usually occurs. To mitigate the effect of MAI and achieve additional diversity gain, we utilize SIC with an optimal ordering algorithm. A zero correlation duration (ZCD) code with robust MAI capability is employed as a spread code for UWB systems in a multi-device WBAN environment. The performance of the proposed scheme is evaluated in terms of the bit error rate (BER). Simulation results confirm that the BER performance can be improved significantly if the proposed interference cancellation scheme and the ZCD code are jointly employed.

Adaptive mesh generation for plane stress problems using error based on element′s representative strain value (요소의 대표 변형률 값에 근거한 에러평가를 이용한 평면응력문제의 적응적 요소망 형성)

  • 정요찬;윤종열;홍승표
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2003.10a
    • /
    • pp.403-409
    • /
    • 2003
  • The finite element method is one of the most widely used method of structural analysis that has wide applications in diverse fields of engineering and science. The method has been proven effective and reliable in many practical problems. One of the reasons for the methods' popularity is its ease of use, but still the user has to input the finite element mesh which affects the accuracy of the results. The knowledge required to form an effective mesh for a given problem is somewhat complex and for sometime there has been research effort to automate the generation of the mesh and this is called the adaptive mesh generation scheme. A good adaptive mesh scheme seemed to require an accurate assessment of error and generally this requires some additional computation. This paper looks into the possibility of generating adaptive meshes based on representative strain values in each finite element method. The proposed adaptive scheme does not require additional computations other that looking up the data values already computed as finite element analysis results and simple manipulations of these data. Two plane stress problems, a plate with a hole and a deep beam with a concentrated load at the end are considered to show the progress of the improved generation of adaptive meshes using the scheme.

  • PDF

A New Route Optimization Scheme for Network Mobility: Combining ORC Protocol with RRH and Using Quota Mechanism

  • Kong, Ruoshan;Feng, Jing;Gao, Ren;Zhou, Huaibei
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.91-103
    • /
    • 2012
  • Network mobility (NEMO) based on mobile IP version 6 has been proposed for networks that move as a whole. Route optimization is one of the most important topics in the field of NEMO. The current NEMO basic support protocol defines only the basic working mode for NEMO, and the route optimization problem is not mentioned. Some optimization schemes have been proposed in recent years, but they have limitations. A new NEMO route optimization scheme-involving a combination of the optimized route cache protocol (ORC) and reverse routing header (RRH) and the use of a quota mechanism for optimized sessions (OwR)-is proposed. This scheme focuses on balanced performance in different aspects. It combines the ORC and RRH schemes, and some improvements are made in the session selection mechanism to avoid blindness during route optimization. Simulation results for OwR show great similarity with those for ORC and RRH. Generally speaking, the OwR's performance is at least as good as that of the RRH, and besides, the OwR scheme is capable of setting up optimal routing for a certain number of sessions, so the performance can be improved and the cost of optimal routing in nested NEMO can be decreased.

A Study on Frequency Control and Active Power Control of Wind Turbine Generation System for PMSG (PMSG 풍력발전 시스템의 출력 제어 및 주파수 제어 연구)

  • Lee, Kwang-Soo;Kim, Mun-Kyeom
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.63 no.5
    • /
    • pp.597-607
    • /
    • 2014
  • This paper proposes active power control and frequency support control schemes of wind turbine generation system by using modified Maximum Power Point Tracking(MPPT) of Permanent Magnet Synchronous Generator(PMSG). Most wind turbine generation system is completely decoupled from the power system and power output control with pitch control. According to the frequency deviation, however, MPPT control can not contribute to the frequency change of the power system due to its active power output control. For solving this, the de-loaded(DL) control scheme is constructed for the frequency support control, which is based on applying the active power output control in the rotor speed control of PMSG. The rotor speed by used in the proposed DL control scheme is increased more than the optimal rotor speed of MPPT, and then this speed improvement increases the saved kinetic energy(KE). In order to show the effectiveness of the proposed control scheme, the case studies have been performed using the PSCAD/EMTDC. The results show that the proposed active power output control scheme(DL control and KE discharge control) works properly and the frequency response ability of the power system can be also improved with the frequency support of wind farm.

Fault Detection and Compensation Scheme of Switch Open-fault in VSI for Two-phase Excitation Drive (2상 여자 구동용 전압형 인버터의 스위치 개방고장 검출 및 보상 기법)

  • Lee, Kui-Jun;Park, Nam-Ju;Hyun, Dong-Seok
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.12 no.1
    • /
    • pp.74-80
    • /
    • 2007
  • This paper proposes the novel open-fault detection/isolation scheme of inverter switch in two-phase excited VSI. This scheme identify open-fault using voltage sensor at lower switches of each phase according to the operating mode. It has benefit of simple implementation, fast detection and robustness in the load so that stab of the system is improved. Also, at faulty mode, it minimizes faulty effect and makes possible continuous operation through the reconfiguration procedure applying four-switch operation. The validity of proposed fault detection scheme is verified by experimental results.

A Stabilization of MC-BCS-SPL Scheme for Distributed Compressed Video Sensing (분산 압축 비디오 센싱을 위한 MC-BCS-SPL 기법의 안정화 알고리즘)

  • Ryu, Joong-seon;Kim, Jin-soo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.5
    • /
    • pp.731-739
    • /
    • 2017
  • Distributed compressed video sensing (DCVS) is a framework that integrates both compressed sensing and distributed video coding characteristics to achieve a low complexity video sampling. In DCVS schemes, motion estimation & motion compensation is employed at the decoder side, similarly to distributed video coding (DVC), for a low-complex encoder. However, since a simple BCS-SPL algorithm is applied to a residual arising from motion estimation and compensation in conventional MC-BCS-SPL (motion compensated block compressed sensing with smoothed projected Landweber) scheme, the reconstructed visual qualities are severly degraded in Wyner-Ziv (WZ) frames. Furthermore, the scheme takes lots of iteration to reconstruct WZ frames. In this paper, the conventional MC-BCS-SPL algorithm is improved to be operated in more effective way in WZ frames. That is, first, the proposed algorithm calculates a correlation coefficient between two reference key frames and, then, by selecting adaptively the reference frame, the residual reconstruction in pixel domain is performed to the conventional BCS-SPL scheme. Experimental results show that the proposed algorithm achieves significantly better visual qualities than conventional MC-BCS-SPL algorithm, while resulting in the significant reduction of the decoding time.

Secure and Efficient Privacy-Preserving Identity-Based Batch Public Auditing with Proxy Processing

  • Zhao, Jining;Xu, Chunxiang;Chen, Kefei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1043-1063
    • /
    • 2019
  • With delegating proxy to process data before outsourcing, data owners in restricted access could enjoy flexible and powerful cloud storage service for productivity, but still confront with data integrity breach. Identity-based data auditing as a critical technology, could address this security concern efficiently and eliminate complicated owners' public key certificates management issue. Recently, Yu et al. proposed an Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy Processing (https://doi.org/10.3837/tiis.2017.10.019). It aims to offer identity-based, privacy-preserving and batch auditing for multiple owners' data on different clouds, while allowing proxy processing. In this article, we first demonstrate this scheme is insecure in the sense that malicious cloud could pass integrity auditing without original data. Additionally, clouds and owners are able to recover proxy's private key and thus impersonate it to forge tags for any data. Secondly, we propose an improved scheme with provable security in the random oracle model, to achieve desirable secure identity based privacy-preserving batch public auditing with proxy processing. Thirdly, based on theoretical analysis and performance simulation, our scheme shows better efficiency over existing identity-based auditing scheme with proxy processing on single owner and single cloud effort, which will benefit secure big data storage if extrapolating in real application.

Group Key Management Scheme for Batch Operation (효율적인 Batch 처리를 위한 그룹키 관리 기술)

  • Kim, Dae-Youb;Huh, Mi-Suk;Ju, Hak-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.189-193
    • /
    • 2008
  • Digital Contents Services based on Internet are developing into an ubiquitous television that allows subscribers to be able to enjoy digital contents anytime and anywhere However, illegal copies and distributions of digital contents are also increasing proportionally. To guarantee the stability of contents service, many technologies are being developed and installed. The efficient scheme to manage content encryption keys is one of them. In this paper, we propose an improved key management scheme to manage the members of groups. The proposed scheme has a minimized transmission overhead for batch operation to renew content encryption keys.