• Title/Summary/Keyword: random algorithm

Search Result 1,806, Processing Time 0.025 seconds

Integer Ambiguity Search Technique Using SeparatedGaussian Variables

  • Kim, Do-Yoon;Jang, Jae-Gyu;Kee, Chang-Don
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.5 no.2
    • /
    • pp.1-8
    • /
    • 2004
  • Real-Time Kinematic GPS positioning is widely used for many applications.Resolving ambiguities is the key to precise positioning. Integer ambiguity resolution isthe process of resolving the unknown cycle ambiguities of double difference carrierphase data as integers. Two important issues of resolving are efficiency andreliability. In the conventional search techniques, we generally used chi-squarerandom variables for decision variables. Mathematically, a chi-square random variableis the sum of mutually independent, squared zero-mean unit-variance normal(Gaussian) random variables. With this base knowledge, we can separate decisionvariables to several normal random variables. We showed it with related equationsand conceptual diagrams. With this separation, we can improve the computationalefficiency of the process without losing the needed performance. If we averageseparated normal random variables sequentially, averaged values are also normalrandom variables. So we can use them as decision variables, which prevent from asudden increase of some decision variable. With the method using averaged decisionvalues, we can get the solution more quicklv and more reliably.To verify the performance of our proposed algorithm, we conducted simulations.We used some visual diagrams that are useful for intuitional approach. We analyzedthe performance of the proposed algorithm and compared it to the conventionalmethods.

Performance Improvement of WTCP by Differentiated Handling of Congestion and Random Loss (혼잡 및 무선 구간 손실의 차별적 처리를 통한 WTCP 성능 개선)

  • Cho, Nam-Jin;Lee, Sung-Chang
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.9
    • /
    • pp.30-38
    • /
    • 2008
  • The traditional TCP was designed assuming wired networks. Thus, if it is used networks consisting of both wired and wireless networks, all packet losses including random losses in wireless links are regarded as network congestion losses. Misclassification of packet losses causes unnecessary reduction of transmission rate, and results in waste of bandwidth. In this paper, we present WTCP(wireless TCP) congestion control algorithm that differentiates the random losses more accurately, and adopts improved congestion control which results in better network throughput. To evaluate the performance of proposed scheme, we compared the proposed algorithm with TCP Westwood and TCP Veno via simulations.

The Presentation of Semi-Random Interleaver Algorithm for Turbo Code (터보코드에 적용을 위한 세미 랜덤 인터리버 알고리즘의 제안)

  • Hong, Sung-Won;Park, Jin-Soo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2
    • /
    • pp.536-541
    • /
    • 2000
  • Turbo code has excellent decoding performance but had limitations for real time communications because of the system complexity and time delay in decoding procedure. To overcome this problem, a new SRI(Semi-Random Interleaver) algorithm which realize the reduction of the interleaver size is proposed for reducing the time delay during the decoding prodedure. SRI compose the interleaver 0.5 size from the input data sequence. In writing the interleaver, data is recorded by row such as block interleaver. But, in reading, data is read by randomly and the text data is located by the just address simultaneously. Therefore, the processing time of with the preexisting method such as block, helical random interleaver.

  • PDF

Transient Coordinator: a Collision Resolution Algorithm for Asynchronous MAC Protocols in Wireless Sensor Networks

  • Lee, Sang Hoon;Park, Byung Joon;Choi, Lynn
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.12
    • /
    • pp.3152-3165
    • /
    • 2012
  • Wireless sensor networks (WSN) often employ asynchronous MAC scheduling, which allows each sensor node to wake up independently without synchronizing with its neighbor nodes. However, this asynchronous scheduling may not deal with collisions due to hidden terminals effectively. Although most of the existing asynchronous protocols exploit a random back-off technique to resolve collisions, the random back-off cannot secure a receiver from potentially repetitive collisions and may lead to a substantial increase in the packet latency. In this paper, we propose a new collision resolution algorithm called Transient Coordinator (TC) for asynchronous WSN MAC protocols. TC resolves a collision on demand by ordering senders' transmissions when a receiver detects a collision. To coordinate the transmission sequence both the receiver and the collided senders perform handshaking to collect the information and to derive a collision-free transmission sequence, which enables each sender to exclusively access the channel. According to the simulation results, our scheme can improve the average per-node throughput by up to 19.4% while it also reduces unnecessary energy consumption due to repetitive collisions by as much as 91.1% compared to the conventional asynchronous MAC protocols. This demonstrates that TC is more efficient in terms of performance, resource utilization, and energy compared to the random back-off scheme in dealing with collisions for asynchronous WSN MAC scheduling.

Image Authentication Using Only Partial Phase Information from a Double-Random-Phase-Encrypted Image in the Fresnel Domain

  • Zheng, Jiecai;Li, Xueqing
    • Journal of the Optical Society of Korea
    • /
    • v.19 no.3
    • /
    • pp.241-247
    • /
    • 2015
  • The double-random phase encryption (DRPE) algorithm is a robust technique for image encryption, due to its high speed and encoding a primary image to stationary white noise. Recently it was reported that DRPE in the Fresnel domain can achieve a better avalanche effect than that in Fourier domain, which means DRPE in the Fresnel domain is much safer, to some extent. Consequently, a method based on DRPE in the Fresnel domain would be a good choice. In this paper we present an image-authentication method which uses only partial phase information from a double-random-phase-encrypted image in the Fresnel domain. In this method, only part of the phase information of an image encrypted with DRPE in the Fresnel domain needs to be kept, while other information like amplitude values can be eliminated. Then, with the correct phase keys (we do not consider wavelength and distance as keys here) and a nonlinear correlation algorithm, the encrypted image can be authenticated. Experimental results demonstrate that the encrypted images can be successfully authenticated with this partial phase plus nonlinear correlation technique.

A Random M-ary Method-Based Countermeasure against Power Analysis Attacks on ECC (타원곡선 암호시스템에서 랜덤 m-ary 방법을 사용한 전력분석 공격의 대응방법)

  • 안만기;하재철;이훈재;문상재
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.3
    • /
    • pp.35-43
    • /
    • 2003
  • The randomization of scalar multiplication in ECC is one of the fundamental concepts in defense methods against side-channel attacks. This paper proposes a countermeasure against simple and differential power analysis attacks through randomizing the transformed m-ary method based on a random m-ary receding algorithm. The proposed method requires an additional computational load compared to the standard m-ary method, yet the power consumption is independent of the secret key. Accordingly, since computational tracks using random window width can resist against SPA and DPA, the proposed countermeasure can improve the security for smart cards.

Structural Optimization Using Tabu Search in Discrete Design Space (타부탐색을 이용한 이산설계공간에서의 구조물의 최적설계)

  • Lee, Kwon-Hee;Joo, Won-Sik
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.5
    • /
    • pp.798-806
    • /
    • 2003
  • Structural optimization has been carried out in continuous or discrete design space. Methods for continuous design have been well developed though they are finding the local optima. On the contrary, the existing methods for discrete design are extremely expensive in computational cost or not robust. In this research, an algorithm using tabu search is developed fur the discrete structural designs. The tabu list and the neighbor function of the Tabu concepts are introduced to the algorithm. It defines the number of steps, the maximum number for random searches and the stop criteria. A tabu search is known as the heuristic approach while genetic algorithm and simulated annealing algorithm are attributed to the stochastic approach. It is shown that an algorithm using the tabu search with random moves has an advantage of discrete design. Furthermore, the suggested method finds the reliable optimum for the discrete design problems. The existing tabu search methods are reviewed. Subsequently, the suggested method is explained. The mathematical problems and structural design problems are investigated to show the validity of the proposed method. The results of the structural designs are compared with those from a genetic algorithm and an orthogonal array design.

Modified AntNet Algorithm for Network Routing (네트워크 라우팅을 위한 개선된 AntNet 알고리즘)

  • Kang, Duk-Hee;Lee, Mal-Rey
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.5
    • /
    • pp.396-400
    • /
    • 2009
  • During periods of large data transmission, routing selection methods are used to efficiently manage data traffic and improve the speed of transmission. One approach in routing selection is AntNet that applies the Ant algorithm in transmissions with uniform probability. However, this approach uses random selection, which can cause excessive data transmission rates and fail to optimize data This paper presents the use of the Genetic Algorithm (GA) to efficiently route and disperse data transmissions, during periods with "unnecessary weight increases for random selection". This new algorithm for improved performance provides highly accurate estimates of the transmission time and the transmission error rate.

A Cost-Aware RRT Planning Algorithm (비용 인지 RRT 경로 계획 알고리즘)

  • Suh, Jung-Hun;Oh, Song-Hwai
    • The Journal of Korea Robotics Society
    • /
    • v.7 no.2
    • /
    • pp.150-159
    • /
    • 2012
  • In this paper, we propose a cost-aware Rapidly-exploring Random Tree (RRT) path planning algorithm for mobile robots. A mobile robot is presented with a cost map of the field of interest and assigned to move from one location to another. As a robot moves, the robot is penalized by the cost at its current location according to the cost map. The overall cost of the robot is determined by the trajectory of the robot. The goal of the proposed cost-aware RRT algorithm is to find a trajectory with the minimal cost. The cost map of the field can represent environmental parameters, such as temperature, humidity, chemical concentration, wireless signal strength, and stealthiness. For example, if the cost map represents packet drop rates at different locations, the minimum cost path between two locations is the path with the best possible communication, which is desirable when a robot operates under the environment with weak wireless signals. The proposed cost-aware RRT algorithm extends the basic RRT algorithm by considering the cost map when extending a motion segment. We show that the proposed algorithm gives an outstanding performance compared to the basic RRT method. We also demonstrate that the use of rejection sampling can give better results through extensive simulation.

A Packet Loss Concealment Algorithm Robust to Burst Packet Losses for G.729 (연속적인 프레임 손실에 강인한 G.729 프레임 손실 은닉 알고리즘)

  • Cho, Choong-Sang;Lee, Young-Han;Kim, Hong-Kook
    • Proceedings of the KSPS conference
    • /
    • 2007.05a
    • /
    • pp.307-310
    • /
    • 2007
  • In this paper, a packet loss concealment (PLC) algorithm for CELP-type speech coders is proposed to improve the quality of decoded speech under a burst packet loss condition. The proposed algorithm is based on the recovery of voiced excitation using an estimate of the voicing probability and the generation of random excitation by permutating the previously decoded excitation. The voicing probability is estimated from the correlation using the previous correctly decoded excitation and pitch. The proposed algorithm is implemented as a PLC algorithm for G.729 and its performance is compared with PLC employed in G.729 by means of perceptual evaluation of speech quality (PESQ) and an A-B preference test under the random and burst packet losses with rates of 3% and 5%. It is shown that the proposed algorithm provides better speech quality than the PLC of G.729, especially under burst pack losses.

  • PDF