• Title/Summary/Keyword: 2진코드

Search Result 99, Processing Time 0.029 seconds

Research and development of 2P Tetris game (2인 테트리스 코드)

  • Kim, Dong Sub;Kim, Seong Min;Kim, TaeHong;Lee, SangJin;Yu, JinSu;Han, Seok Whan;Gang, Yun-Jeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2017.07a
    • /
    • pp.307-308
    • /
    • 2017
  • 본 논문에서는 Facebook 테트리스 게임에서 착안하여 모바일로도 실행시키고자 하였다. Facebook 테트리스와 같이 Hold, 미리보기, 줄 넘기기공격 등 세부 기능을 모두 구현하였다.Hold를 하면 다음에 나올 블록을 저장하여 필요할때 꺼내쓸수 있도록 한다. 미리보기를 하여 블록이 바닥에 도달했을시 예상위치를 나타내준다. 한 줄을 clear하였을 시 상대방바닥에 한줄이 올라오도록 한다. 안드로이드 프로그래밍으로 응용시 모바일 앱환경에서도 활용할수 있다.

  • PDF

A Study on the Implementation of Frequency Hopping Binary Noncohrent FSK Tranceiver (주파수 도약2진 비코히어런트 FSK송수신기 실현에 관한 연구)

  • 박영철;김재형;차균현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.3
    • /
    • pp.260-268
    • /
    • 1990
  • This paper investigates the design of a frequency hopping FSK tranceiver system, where the system enhancements are made in the following three aspects: dual frequency synthesiszation for the increased hopping rate, linearization of VCO gain in PLL to improve BFSK modulation characteristics, and fast code synchronization by the matched filter method.

  • PDF

A Sparse-ON Pixel Two-Dimensional 4-Level 4/6 Balanced-Modulation Code in Holographic Data Storage Systems (홀로그래픽 데이터 저장장치를 위한 저밀도 ON 픽셀 2차원 4-레벨 4/6 균형 변조부호)

  • Park, Keunhwan;Lee, Jaejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.11
    • /
    • pp.9-14
    • /
    • 2016
  • In the holographic data storage system, the data can be stored more than one bit per pixel and the storage capacity and transmission rate can be increased. In this paper, we proposed a sparse-ON pixel 4/6 balanced-modulation code that the code rate is 1.33 (bit/pixel) with uniform page density. Even though the performance of the proposed sparse-ON pixel 4/6 balanced-code is similar to 2/3 and 6/9 modulation codes, it can increase the storage capacity more than these modulation codes and also store more pages in a volume by reducing the rate of ON pixels to mitigate IPI (inter-page interference).

Design of Binary Constant Envelope System using the Pre-Coding Scheme in the Multi-User CDMA Communication System (다중 사용자 CDMA 통신 시스템에서 프리코딩 기법을 사용한 2진 정진폭 시스템 설계)

  • 김상우;유흥균;정순기;이상태
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.5
    • /
    • pp.486-492
    • /
    • 2004
  • In this paper, we newly propose the binary CA-CDMA(constant amplitude CDMA) system using pre-coding method to solve the high PAPR problem caused by multi-user signal transmission in the CDMA system. 4-user CA-CDMA, the basis of proposed binary CA-CDMA system, makes binary output signal for 4 input users. It produces the output of binary(${\pm}$2) amplitude by using a parity signal resulting from the XOR operation of 4 users data. Another sub-channel or more bandwidth is not necessary because it is transmitted together with user data and can be easily recovered in the receiver. The extension of the number of users can be possible by the simple repetition of the basic binary 4-user CA-CDMA. For example, binary 16-user CA-CDMA is made easily by allocating the four 4-user CA-CDMA systems in parallel and leading the four outputs to the fifth 4-user CA-CDMA system as input, because the output signal of each 4-user CA-CDMA is also binary. By the same extension procedure, binary 64 and 256-user CA-CDMA systems can be made with the constant amplitude. As a result, the code rate of this proposed CA-CDMA system is just 1 and binary CA-CDMA does not change the transmission rate with the constant output signal(PAPR = 0 ㏈). Therefore, the power efficiency of the HPA can be maximized without the nonlinear distortion. From the simulation results, it is verified that the conventional CDMA system has multi-level output signal, but the proposed binary CA-CDMA system always produces binary output. And it is also found that the BER of conventional CDMA system is increased by nonlinear HPA, but the BER of proposed binary CA-CDMA system is not changed.

Optimization of Process Parameters of Die Slide Injection by Using Taguchi Method (다구치 법을 통한 다이슬라이드식 사출성형의 공정파라미터 최적화)

  • Jeong, Soo-Jin;Moon, Seong-Joon;Jeoung, Sun-Kyoung;Lee, Pyoung-Chan;Moon, Ju-Ho
    • Korean Chemical Engineering Research
    • /
    • v.50 no.2
    • /
    • pp.264-269
    • /
    • 2012
  • Die slide injection marvelously reduces the cost and time in processing plastic products because they can simplify the conventional process through eliminating additional process. However, this process must resolve some defects like whitening, resin infiltration, blowhole, resin overflow, etc. In this study, the process parameters of the injection molding are optimized by using the finite element method and Taguchi method. The injection molding analysis is simulated by employing the Moldflow insight 2010 code and the 2nd injection is by adopting the Multi-stage injection code. The process parameters are optimized by using the $L_{16}$ orthogonal array and smaller-the-better characteristics of the Taguchi method that was used to produce an airtight container (coolant reservoir tank) from polypropylene (PP) plastic material.rodanwhile, the optimum values are confirmed to be similar in 95% confidence and 5% significance level through analysis of variance (ANOVA). rooreover, new products and old products were compared by mdasuring the dimensional accuracy, resulting in the improvement of dimensional stability more than 5%.

A Study on Graph-Based Heterogeneous Threat Intelligence Analysis Technology (그래프 기반 이기종 위협정보 분석기술 연구)

  • Ye-eun Lee;Tae-jin Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.417-430
    • /
    • 2024
  • As modern technology advances and the proliferation of the internet continues, cyber threats are also on the rise. To effectively counter these threats, the importance of utilizing Cyber Threat Intelligence (CTI) is becoming increasingly prominent. CTI provides information on new threats based on data from past cyber incidents, but the complexity of data and changing attack patterns present significant analytical challenges. To address these issues, this study aims to utilize graph data that can comprehensively represent multidimensional relationships. Specifically, the study constructs a heterogeneous graph based on malware data, and uses the metapath2vec node embedding technique to more effectively identify cyber attack groups. By analyzing the impact of incorporating topology information into traditional malware data, this research suggests new practical applications in the field of cyber security and contributes to overcoming the limitations of CTI analysis.

Preliminary Estimation of Activation Products Inventory in Reactor Components for Kori unit 1 decommissioning (고리1호기 해체시의 원자로 구조물에서의 방사회 생성물 재고량 예비평가)

  • Lee, Kyung-Jin;Kim, Hak-Soo;Sin, Sang-Woon;Song, Myung-Jae;Lee, Youn-Keun
    • Journal of Radiation Protection and Research
    • /
    • v.28 no.2
    • /
    • pp.109-116
    • /
    • 2003
  • Based on the necessity to evaluate the activation products inventory during decommissioning lot domestic nuclear power plants, a preliminary estimation of the activation products inventory for Kori unit 1, which is getting close to the end of lifetime, was carried out with ANISN and ORIGEN2 code. In order to calculate neutron nux using ANISN code, the reactor was divided into 9 zones from core to bioshield concrete for radial direction. Also :he cross-section of main nuclides were calibrated with neutron flux in the reactor pressure vessel(RPV) region. The results showed that 95 % of tile total radioactivity in RPV from reactor shutdown to 10 years came from the nuclides of $^{55}Fe,\;^{59}Ni,\;^{63}Ni\;and\;^{60}Co$. And the total radioactivity with cooling of more than 50 years after decommissioning was no more than 0.2 % of at the time of shutdown. Considering the weight of RPV is 210 tons, the total radioactivity of RPV reached to $5.25{\times}10^{6}GBq$ at shutdown time. As compared with the total radioactivity of bioshield concrete at reactor shutdown time, the radioactivity after tooling more than 10 years was below 1 %.

Review Methods of Pumping Effciency using the Concrete flow Table Test (콘크리트 플로 테이블 테스트를 활용한 압송성 검토 방법)

  • Kwon, Hae-Won;Gong, Min-Ho;Kim, Bong-Sup;Yu, Jong-Jin
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2016.05a
    • /
    • pp.9-10
    • /
    • 2016
  • This study is purposed to review the confirm method of pumping efficiency using the concrete flow table test in Korea environment. This test method is registered as the "EN 12350-5, Testing fresh concrete. Flow table test" in Eurocode. When applying this test in the Korea construction environment, we reviewed that reasonably apply on the Korean construction Environment. As a result, test results analysis showed that the reality looks a big difference. Its cause is believed to be due to the shape of coarse & fine aggregate. But it will be better predict method, through the correlation analysis of construction data and the standard(Placing Concrete by pumping Methods(ACI Manual of concrete Practice 304.2R-96)).

  • PDF

Design of three stage decimation filter using CSD code (CSD 코드를 사용한 3단 Decimation Filter 설계)

  • Byun, San-Ho;Ryu, Seong-Young;Choi, Young-Kil;Roh, Hyung-Dong;Lee, Hyun-Tae;Kang, Kyoung-Sik;Roh, Jeong-Jin
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.511-512
    • /
    • 2006
  • Three stage(CIC-FIR-FIR) decimation filter in delta-sigma A/D converter for audio is designed. A canonical signed digit(CSD) code method is used to minimize area of multipliers. This filter is designed in 0.25um CMOS process and incorporates $1.36\;mm^2$ of active area. Measured results show that this decimation filter is suitable for digital audio A/D converters.

  • PDF

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.