• Title/Summary/Keyword: 이진 코드 분석

Search Result 72, Processing Time 0.021 seconds

Optimal Gas Detection System in Cargo Compressor Room of Gas Fueled LNG Carrier (가스추진 LNG 운반선의 가스 압축기실에 설치된 가스검출장치의 최적 배치에 관한 연구)

  • Lee, Sang-Won;Shao, Yude;Lee, Seung-Hun;Lee, Jin-Uk;Jeong, Eun-Seok;Kang, Ho-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.617-626
    • /
    • 2019
  • This study analyzes the optimal location of gas detectors through the gas dispersion in a cargo compressor room of a 174K LNG carrier equipped with high-pressure cargo handling equipment; in addition, we propose a reasonable method for determining the safety regulations specified in the new International Code of the Construction and Equipment of Ships Carrying Liquefied Gases in Bulk (IGC). To conduct an LNG gas dispersion simulation in the cargo compressor room-equipped with an ME-GI engine-of a 174 K LNG carrier, the geometry of the room as well as the equipment and piping, are designed using the same 3D size at a 1-to-1 scale. Scenarios for a gas leak were examined under high pressure of 305 bar and low pressure of 1 bar. The pinhole sizes for high pressure are 4.5, 5.0, and 5.6mm, and for low pressure are 100 and 140 mm. The results demonstrate that the cargo compressor room will not pose a serious risk with respect to the flammable gas concentration as verified by a ventilation assessment for a 5.6 mm pinhole for a high-pressure leak under gas rupture conditions, and a low-pressure leak of 100 and 140 mm with different pinhole sizes. However, it was confirmed that the actual location of the gas detection sensors in a cargo compressor room, according to the new IGC code, should be moved to other points, and an analysis of the virtual monitor points through a computational fluid dynamics (CFD) simulation.

Research of Semantic Considered Tree Mining Method for an Intelligent Knowledge-Services Platform

  • Paik, Juryon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.27-36
    • /
    • 2020
  • In this paper, we propose a method to derive valuable but hidden infromation from the data which is the core foundation in the 4th Industrial Revolution to pursue knowledge-based service fusion. The hyper-connected societies characterized by IoT inevitably produce big data, and with the data in order to derive optimal services for trouble situations it is first processed by discovering valuable information. A data-centric IoT platform is a platform to collect, store, manage, and integrate the data from variable devices, which is actually a type of middleware platforms. Its purpose is to provide suitable solutions for challenged problems after processing and analyzing the data, that depends on efficient and accurate algorithms performing the work of data analysis. To this end, we propose specially designed structures to store IoT data without losing the semantics and provide algorithms to discover the useful information with several definitions and proofs to show the soundness.

An Efficient Decoy File Placement Method for Detecting Ransomware (랜섬웨어 탐지를 위한 효율적인 미끼 파일 배치 방법)

  • Lee, Jinwoo;Kim, Yongmin;Lee, Jeonghwan;Hong, Jiman
    • Smart Media Journal
    • /
    • v.8 no.1
    • /
    • pp.27-34
    • /
    • 2019
  • Ransomware is a malicious program code evolved into various forms of attack. Unlike traditional Ransomware that is being spread out using email attachments or infected websites, a new type of Ransomware, such as WannaCryptor, may corrupt files just for being connected to the Internet. Due to global Ransomware damage, there are many studies conducted to detect and defense Ransomware. However, existing research on Ransomware detection only uses Ransomware signature database or monitors specific behavior of process. Additionally, existing Ransomware detection methods hardly detect and defense a new Ransomware that behaves differently from the traditional ones. In this paper, we propose a method to detect Ransomware by arranging decoy files and analyzing the method how Ransomware accesses and operates files in the file system. Also, we conduct experiments using proposed method and provide the results of detection and defense of Ransomware in this paper.

Studies on the Nest site Selection and Characteristics of Habitat use of Long-tailed Tits Aegithalos caudatus in Korea (한국에서 번식하는 오목눈이의 둥지장소 선택과 서식지 이용 특성)

  • Baek, Chung-yeol;Lee, Jin-hee;No, Sun-ho;Jang, Kyung-Hee;Cho, Sam-rae
    • Korean Journal of Environment and Ecology
    • /
    • v.30 no.5
    • /
    • pp.829-836
    • /
    • 2016
  • This study was carried out on Kongju National University and its neighboring area, Mt. Gyeryong national park and Mt. Worak national park in the breeding season of long-tailed tits Aegithalos caudaatus from 2008 to 2012. The result of the inquiry, the nests were found in 15 species of trees, and this result shows me it's not choosy about them. But after having classified them according to the features and analyzed them, long-tailed tits preferred evergreen needleleaf tree and deciduous broad-leaf tree and deciduous bush, especially evergreen needleleaf tree. The concealment rate of long-tailed tits' nests was $11.61{\pm}4.79%]\;4.38{\pm}2.19%$(n=29) in Kongju National University and it's neighboring area, $6.06{\pm}2.31%$(n=43) in Mt. Gyeryong national park and $4.38{\pm}2.19%$(n=32) in Mt. Worak national park. By regional groups, the concealment rates of neighboring nests were almost same, but there are no differences among the areas. The average of the color codes was $26.52{\pm}16.14$(n=32) that those of the nest subtract from those of surroundings of the nest. The nests were procryptic according to their surroundings, and if their nest in a tree were evergreen needleleaf trees, they were made of moss. while if the trees of nest in a tree were yellow because of fungus, made of dried moss, they were yellow, too.

Blade Shape Optimization of Wind Turbines Using Genetic Algorithms and Pattern Search Method (유전자 알고리즘 및 패턴 서치 방법을 이용한 풍력 터빈 블레이드의 형상 최적화)

  • Yi, Jin-Hak;Sale, Danny
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.32 no.6A
    • /
    • pp.369-378
    • /
    • 2012
  • In this study, direct-search based optimization methods are applied for blade shape optimization of wind turbines and the optimization performances of several methods including conventional genetic algorithm, micro genetic algorithm and pattern search method are compared to propose a more efficient method. For this purpose, the currently available version of HARP_Opt (Horizontal Axis Rotor Performance Optimizer) code is enhanced to rationally evaluate the annual energy production value according to control strategies and to optimize the blade shape using pattern search method as well as genetic algorithm. The enhanced HARP_Opt code is applied to obtain the optimal turbine blade shape for 1MW class wind turbines. The results from pattern search method are compared with the results from conventional genetic algorithm and also micro genetic algorithm and it is found that the pattern search method has a better performance in achieving higher annual energy production and consistent optimal shapes and the micro genetic algorithm is better for reducing the calculation time.

Effect of Processing Gain on the Iterative Decoding for a Recursive Single Parity Check Product Code (재귀적 SPCPC에 반복적 복호법을 적용할 때 처리 이득이 성능에 미치는 영향)

  • Chon, Su-Won;Kim, Yong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9C
    • /
    • pp.721-728
    • /
    • 2010
  • CAMC (constant amplitude multi-code) has a better performance of error correction in iterative decoding than SPCPC (single parity check product code). CAMC benefits from a processing gain since it belongs to a spread spectrum signal. We show that the processing gain enhances the performance of CAMC. Additional correction of bit errors is achieved in the de-spreading of iteratively decoded signal. If the number of errors which survived the iterative decoding is less than or equal to ($\sqrt{N}/2-1$), all of the bit errors are removed after the de-spreading. We also propose a stopping criterion in the iterative decoding, which is based on the histogram of EI (extrinsic information). The initial values of EI are randomly distributed, and then they converge to ($-E_{max}$) or ($+E_{max}$) over the iterations. The strength of the convergence reflects how successfully error correction process is performed. Experimental results show that the proposed method achieves a gain of 0.2 dB in Eb/No.

A study on the fading compensation scheme for wireless ATM systems (무선 ATM 시스템을 위한 페이딩 보상기법에 관한 연구)

  • Chung, Boo-Young;Kang, Young-Heung;Cho, Sung-Jun;Lee, Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2727-2735
    • /
    • 1997
  • This paper describes a new fading compensation scheme for Wireless ATM(WATM) sytem using pilot symbols. We have carried out a simulation for bit error rate(BER) and cell loss probability(CLP) to analyze the performance of a new scheme. As the resutls, BER performance we improved by means of HEC only above 3 dB of $E_{b}/N_{0}$ in AWGN, but not at all in fading environment. However, by using a new fading compenstion scheme with HEC, BER performance degraded below to 1 dB of $E_{b}/N_{0}$ in AWGN, but BER and CLP performances in WATM system were improved remarkably, and meeted at CLP performance criterion for K=10 dB rician fading. Also, code rate will be high and harware size of codec will be small by using this new scheme with HEC OR FEC.

  • PDF

Evaluation of Micro-defects and Air Tightness of Al Die-casting by Impregnation of Organic Solvent (유기용제 함침법을 통한 알루미늄 다이캐스팅의 미세결함 및 기밀성 평가)

  • Lee, Jin-Wook;Cho, Chang-hyun;Kim, Sung-Gye;Ko, Young-Gun;Kim, Dong-Ju
    • Journal of Korea Foundry Society
    • /
    • v.42 no.4
    • /
    • pp.218-225
    • /
    • 2022
  • For hydrogen-vehicle applications (air pressure control valve housing, APCVH), an investigation was conducted to determine how micro-defects in a high- pressure die-casted Al alloy (industrial code: ALDC12) could be controlled by means of a post-treatment using an organic-based impregnation solution in order to improve the air- tightness of the die-casted Al sample. Two different impregnation solutions were proposed and its test results were compared to a imported product from Japan with respect to the processing variables used. A structural investigation of the components under study was conducted by means of computer tomography and 3D X-ray micro-CT. These observations revealed that the use of the impregnation treatment to seal micro-defects led to highly significant and beneficial changes which were attributed mainly to interconnections among inherent micro-pores. A leak test after impregnation revealed that the performance improvement rate of the die-casted Al sample was ~70% for INNO-01. Therefore, the developed impregnation solutions offer an effective strategy to control the micro-defects found in various vehicle parts via die-casting.

Computationally Efficient ion-Splitting Method for Monte Carlo ion Implantation Simulation for the Analysis of ULSI CMOS Characteristics (ULSI급 CMOS 소자 특성 분석을 위한 몬테 카를로 이온 주입 공정 시뮬레이션시의 효율적인 가상 이온 발생법)

  • Son, Myeong-Sik;Lee, Jin-Gu
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.11
    • /
    • pp.771-780
    • /
    • 2001
  • It is indispensable to use the process and device simulation tool in order to analyze accurately the electrical characteristics of ULSI CMOS devices, in addition to developing and manufacturing those devices. The 3D Monte Carlo (MC) simulation result is not efficient for large-area application because of the lack of simulation particles. In this paper is reported a new efficient simulation strategy for 3D MC ion implantation into large-area application using the 3D MC code of TRICSI(TRansport Ions into Crystal Silicon). The strategy is related to our newly proposed split-trajectory method and ion-splitting method(ion-shadowing approach) for 3D large-area application in order to increase the simulation ions, not to sacrifice the simulation accuracy for defects and implanted ions. In addition to our proposed methods, we have developed the cell based 3D interpolation algorithm to feed the 3D MC simulation result into the device simulator and not to diverge the solution of continuous diffusion equations for diffusion and RTA(rapid thermal annealing) after ion implantation. We found that our proposed simulation strategy is very computationally efficient. The increased number of simulation ions is about more than 10 times and the increase of simulation time is not twice compared to the split-trajectory method only.

  • PDF

Capacity Comparison of Two Uplink OFDMA Systems Considering Synchronization Error among Multiple Users and Nonlinear Distortion of Amplifiers (사용자간 동기오차와 증폭기의 비선형 왜곡을 동시에 고려한 두 상향링크 OFDMA 기법의 채널용량 비교 분석)

  • Lee, Jin-Hui;Kim, Bong-Seok;Choi, Kwonhue
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.5
    • /
    • pp.258-270
    • /
    • 2014
  • In this paper, we investigate channel capacity of two kinds of uplink OFDMA (Orthogonal Frequency Division Multiple Access) schemes, i.e. ZCZ (Zero Correlation Zone) code time-spread OFDMA and sparse SC-FDMA (Single Carrier Frequency Division Mmultiple Access) robust to access timing offset (TO) among multiple users. In order to reflect the practical condition, we consider not only access TO among multiple users but also peak to average power ratio (PAPR) which is one of hot issues of uplink OFDMA. In the case with access TO among multiple users, the amplified signal of users by power control might affect a severe interference to signals of other users. Meanwhile, amplified signal by considering distance between user and base station might be distorted due to the limit of amplifier and thus the performance might degrade. In order to achieve the maximum channel capacity, we investigate the combinations of transmit power so called ASF (adaptive scaling factor) by numerical simulations. We check that the channel capacity of the case with ASF increases compared to the case with considering only distance i.e. ASF=1. From the simulation results, In the case of high signal to noise ratio (SNR), ZCZ code time-spread OFDMA achieves higher channel capacity compared to sparse block SC-FDMA. On the other hand, in the case of low SNR, the sparse block SC-FDMA achieves better performance compared to ZCZ time-spread OFDMA.