39 research outputs found

    A New Technology on Embedded Systems: Renesas Processor

    Get PDF
    In this work, Renesas processor which is developed by Hitachi, Mitsubishi, andNEC corporations is inspected. In the last decade, Renesas processor has the biggestmarket share in the world. The processor's process time is high and efficient for high levelstatements. Because of its high performance and low price, the processor is most popularbetween developers in electronic area. In this paper, first it is mentioned about Renesasdetails and then HEW (High-Performance Embedded Workshop) which is based on IARkernel a platform for command is introduced. Lastly, it is mentioned about debug processfor written code

    A new three-dimensional chaotic system without equilibrium points, its dynamical analyses and electronic circuit application

    Get PDF
    U radu se predstavlja i analizira novi trodimenzionalni kaotični sustav bez točaka ekvilibrija. Osnovna dinamička analiza tog novog kaotičnog sustava bez točaka ekvilibrija izvodi se pomoću sustava ekvilibrija, faznih slika (portreta), osjetljivosti na početne uvjete, fraktalne dimenzije i kaotičnog ponašanja. Uz to je izvedena analiza spektra Lyapunovljevih eksponenata i bifurkacijska analiza predloženog kaotičnog sustava primjenom izabranih parametara. Kaotični sustav bez točaka ekvilibrija dobiven je detaljnom teorijskom analizom kao i simulacijama s dizajniranim elektroničkim krugom. Sustav kaosa bez točaka ekvilibrija također je poznat kao sustav kaosa sa skrivenim atraktorom i o tome postoji mali broj istraživanja. Budući da ne postoje homokliničke i heterokliničke orbite, Schilnikova metoda se ne može primijeniti kako bi se ustanovilo je li sustav kaotičan ili nije kaotičan. Stoga kaotični sustav bez točaka ekvilibrija može biti od koristi u mnogim tehničkim primjenama, naročito u kriptologiji i kodiranju zasnovanom na kaosu. Nadalje, ovaj predloženi kaotični sustav bez točaka ekvilibrija može se ponašati na mnogo dinamički nepoznatih načina. Takve vrste ponašanja nepoznatih kaotičnih atraktora zahtijevaju dodatna istraživanja.In this paper, a new three-dimensional chaotic system without equilibrium points is introduced and analysed. Basic dynamical analysis of this new chaotic system without equilibrium points is carried out by means of system equilibria, phase portraits, sensitivity to initial conditions, fractal dimension and chaotic behaviours. In addition, in this paper Lyapunov exponents spectrum and bifurcation analysis of the proposed chaotic system have been executed by means of selected parameters. The chaotic system without equilibrium points has been executed by detailed theoretical analysis as well as simulations with designed electronical circuit. A chaotic system without equilibrium points is also known as chaotic system with hidden attractor and there are very few researches in the literature. Since they cannot have homoclinic and heteroclinic orbits, Shilnikov method cannot be applied to find whether the system is chaotic or not. Therefore, it can be useful in many engineering applications, especially in chaos based cryptology and coding information. Furthermore, introduced chaotic system without equilibrium points in this paper can have many unknown dynamical behaviours. These behaviours of the strange chaotic attractors deserve further investigation

    Fractional-Order Analysis of Modified Chua’s Circuit System with the Smooth Degree of 3 and Its Microcontroller-Based Implementation with Analog Circuit Design

    Get PDF
    In the paper, we futher consider a fractional-order system from a modified Chua’s circuit system with the smooth degree of 3 proposed by Fu et al. Bifurcation analysis, multistability and coexisting attractors in the the fractional-order modified Chua’s circuit are studied. In addition, microcontroller-based circuit was implemented in real digital engineering applications by using the fractional-order Chua’s circuit with the piecewise-smooth continuous system

    A Novel Security Methodology for Smart Grids: A Case Study of Microcomputer-Based Encryption for PMU Devices

    Get PDF
    Coordination of a power system with the phasor measurement devices (PMUs) in real time on the load and generation sides is carried out within the context of smart grid studies. Power systems equipped with information systems in a smart grid pace with external security threats. Developing a smart grid which can resist against cyber threats is considered indispensable for the uninterrupted operation. In this study, a two-way secure communication methodology underpinned by a chaos-based encryption algorithm for PMU devices is proposed. (e proposed system uses the IEEE-14 busbar system on which the optimum PMU placement has been installed. (e proposed hyperchaotic system-based encryption method is applied as a new security methodology among PMU devices. (e success of results is evaluated by the completeness of data exchange, durations, the complexity of encryption-decryption processes, and strength of cryptography using a microcomputer-based implementation. (e results show that the proposed microcomputer-based encryption algorithms can be directly embedded as encryption hardware units into PMU and PDC devices which have very fast signal processing capabilities taking into considerations the acceptable delay time for power system protection and measuring applications and quality metering applications which is 2 ms and 10 ms, respectively. While proposed algorithms can be used in TCP or UDP over IP-based IEEE C37.118, IEC 61850, and IEC 61850-90-5 communication frameworks, they can also be embedded into electronic cards, smartcards, or smart tokens which are utilized for authentication among smart grid components.Türkiye Bilimsel ve Teknolojik Araştirma Kurum

    A New Chaotic System with Multiple Attractors: Dynamic Analysis, Circuit Realization and S-Box Design

    Get PDF
    This paper reports about a novel three-dimensional chaotic system with three nonlinearities. The system has one stable equilibrium, two stable equilibria and one saddle node, two saddle foci and one saddle node for different parameters. One salient feature of this novel system is its multiple attractors caused by different initial values. With the change of parameters, the system experiences mono-stability, bi-stability, mono-periodicity, bi-periodicity, one strange attractor, and two coexisting strange attractors. The complex dynamic behaviors of the system are revealed by analyzing the corresponding equilibria and using the numerical simulation method. In addition, an electronic circuit is given for implementing the chaotic attractors of the system. Using the new chaotic system, an S-Box is developed for cryptographic operations. Moreover, we test the performance of this produced S-Box and compare it to the existing S-Box studies

    Fungal trunk pathogens of Sultana Seedless vineyards in Aegean region of Turkey

    Get PDF
    In recent years, grapevine trunk diseases have become a problem in Sultana Seedless vineyards of Manisa and Izmir provinces (Aegean Region, Turkey). A field survey was conducted in 2013 in these provinces (in 8 cities and 80 vineyards) to determine disease incidence, fungal species associated with grapevine trunk diseases and pathogenicity.  Symptomatic vines were grouped by two different grapevine trunk disease symptoms: (1) typical tiger-striped leaves, (2) dead arm, shoot decline or apoplexy. Over 80% of vineyards in these areas were positive for at least one characteristic trunk disease symptom. Incidence of tiger-stripe symptom ranged from 2.9-15% and incidence of apoplexy ranged from 0–4.2%. Eight fungal species in five fungal families were identified from declining grapevines based on morphological and molecular (ITS, β-tubulin and EF1-α) studies including, Botryosphaeria dothidea, Diplodia seriata, Lasiodiplodia theobromae, Neofusicoccum parvum, Diaporthe ampelina, Phaeomoniella chlamydospora, Togninia minima and Fomitiporia mediterranea. Overall, D. ampelina was the most frequently recovered fungus from symptomatic grapevine tissues followed by botryosphaeriaceous fungi, P. chlamydospora, F. mediterranea and T. minima. Pathogenicity tests confirmed all eight fungi as pathogens of grapevine in these regions with N. parvum being the most virulent among the fungi tested

    An Efficient Lightweight Image Encryption Scheme Using Multichaos

    Get PDF
    With an immense increase in Internet multimedia applications over the past few years, digital content such as digital images are stored and shared over global networks, the probability for information leakage and illegal modifications to the digital content is at high risk. These digital images are transferred using the network bandwidth; therefore, secure encryption schemes facilitate both information security and bandwidth issues. Hence, a state-of-the-art lightweight information security methodology is required to address this challenge. The main objective of this work is to develop a lightweight nonlinear mechanism for digital image security using chaos theory. The proposed scheme starts by changing a plain image into an encrypted image to improve its security. A block cipher, using lightweight chaos, has been added to achieve this objective for digital image security. We utilized multiple chaotic maps to generate random keys for each channel. Also, Arnold cat map and chaotic gingerbread map are used to add confusion and diffusion. During the permutation stage, image pixels are permuted, while in diffusion stage, pixels are distorted utilizing gingerbread map to add more security. The proposed scheme has been validated using different security parameter tests such as correlation coefficient tests (CC), whose results have been observed closer to zero and information entropy (IE) value is 7.99, respectively, which is almost equal to the ideal value of 8. Moreover, number of pixels changing rate (NPCR) obtained value is higher than 99.50%, while the unified average changing intensity (UACI) is 33.33. Other parameters such as mean absolute error (MAE), mean square error (MSE), lower value of peak to signal noise ratio (PSNR), structural content (SC), maximum difference (MD), average difference (AD), normalized cross-correlation (NCC), and histogram analysis (HA) is tested. The computed values of the proposed scheme are better. The achieved results after comparison with existing schemes highlight that the proposed scheme is highly secure, lightweight, and feasible for real-time communications

    Prognostic Factors in Operated Early Stage Lung Cancer Patients- Retrospective Single Center Data

    Get PDF
    Aim: Non-small cell lung cancer (NSCLC) accounts for 85% of all lung cancers. Although curative treatment is surgery in the early stages, disease relapse is common. In this study, we retrospectively evaluated the prognostic factors and outcomes of operated NSCLC cases.Materials and Methods: Retrospective analysis of data from 166 patients with early stage NSCLC who presented after surgery and treated and followed in our clinic between 2006-2018 was performed. Histopathologic features and clinical findings were investigated as prognostic factors.The findings were analyzed using SPSS.Results: At the time of diagnosis, median age was 61 (39-82) and 84% of the patients were male. Most common pathologic subtype was adenocarcinoma. Median disease free survival (DFS) and overall survival (OS) were 76 months (%95CI:32.1-110.0) and 87 months (95%CI:59.8-114.1). ). In multivariate analysis, presence of vascular invasion was found to be independent prognostic factors for both DFS and OS (HR:2.5 and 2.3, respectively). Adenocarcinoma solid pattern was only associated with worse disease-free survival (HR: 1.7).Conclusion: In our study, we showed that the presence of vascular invasion and solid-type adenocarcinoma is associated with poor survival

    Multimedia Security Application of a Ten-Term Chaotic System without Equilibrium

    No full text
    A system without equilibrium has been proposed in this work. Although there is an absence of equilibrium points, the system displays chaos, which has been confirmed by phase portraits and Lyapunov exponents. The system is realized on an electronic card, which exhibits chaotic signals. Furthermore, chaotic property of the system is applied in multimedia security such as image encryption and sound steganography
    corecore