• Title/Summary/Keyword: 2차원 코드

Search Result 318, Processing Time 0.033 seconds

Two-Dimensional Hybrid Codes using Identity Matrix and Symmetric Balance Incomplete Block Design Codes for Optical CDMA (광 코드분할다중접속을 위한 단위행렬과 Symmetric Balance Incomplete Block Design 부호를 사용한 2차원 하이브리드 부호)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.4
    • /
    • pp.27-32
    • /
    • 2014
  • Two-dimensional hybrid codewords are generated by using each row of identity matrix for spatial encoding and nonideal symmetric balance incomplete block design(BIBD) code for spectral encoding. This spatial/spectral optical code-division multiple-access (OCDMA) network uses single-balanced detectors to abstract the desired information bits and to eliminate the multiple-access interference(MAI). Analytical results show that the number of simultaneous users increases significantly by using the proposed hybrid codes.

Detection of GPS Multipath Errors Using 4-Receivers (4 수신기를 이용한 GPS 다중경로의 검출과 축소)

  • 박운용;정창식;김진수;곽두호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.235-242
    • /
    • 1998
  • This study aims to detect and to reduce the multipath errors which are main errors source in high precious surveying such as GPS-aided aerial triangulation and Car Navigation. which reference receivers being fixed, when kinematic receivers move continuously, multipath is performed using smoothed code measurement and pure code measurement in the network. Through this methods, 3D RMS errors are reduced into about 30% in the single differential code solution to the kinematic receiver. This is based on the fact that the network adjustment are performed at multiple reference receivers, but positioning is carried out by the single differential methods between a reference receiver and a kinematic receiver. So it was supposed that this methods reduced the correlation errors including the atmospheric errors using the nearest receivers and can be mixed with another methods.

  • PDF

A Study on Treatment Way of a Malicious Code to injected in Windows System File (Windows 시스템 파일에 기생하는 악성코드의 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.255-262
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs. or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe. csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment way that experimented on at these papers and a plan to solve will become a researcher or the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

피동형 격납건물 냉각계통 내 돔 효과의 수치적 해석에 관한 연구

  • 전지한;박홍준;이은철
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.05a
    • /
    • pp.298-303
    • /
    • 1997
  • 실제의 격납건물의 구조는 하부 원통형의 구조를 가지는 영역과 상부 돔 형태와 굴뚝 형태의 구조를 가지는 영역으로 나눌 수 있다. 하부 원통형의 구조만을 고려한다면, 고온의 철제 벽면과 콘크리트 벽면 사이의 gap 크기에 비해서 원통의 반지름이 상대적으로 매우 큰 값을 가지기 때문에 2차원 무한평판으로 가정하는 것이 가능하다. 그러나 돔 및 굴뚝 영역에서는 높이가 높아질수록 돔 단면직경이 감소하고 굴뚝 영역도 유동단면적이 작은 원통의 구조를 가져 2차원 무한평판의 가정에 많은 무리가 따른다. 앞에서 명시한 세 가지의 격납건물 형태에 있어서 ASPWR의 경우는 굴뚝을 포함한 영역까지도 무한평판으로 가정하는 것이 가능하나(돔에서의 열전달 단면적이 하부의 열전달 단면적에 비해 매우 작다는 가정을 한다면) 나머지 AP600과 HWRF의 격납건물에 있어서는 상부까지도 무한평판 가정을 사용하는 것에는 무리가 있다. 본 연구에서는 일반적인 유체해석 코드인 FLUENT V4.3을 이용하여 실제 격납건물 구조에 대한 분석을 시도하여 무한평판 구조에 대한 가정이 과도한 열전달량을 예측하고 있음을 확인하였다.

  • PDF

제내지 침수해석을 위한 병렬연산기법의 비교

  • Park, Jae-Hong
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2017.05a
    • /
    • pp.296-296
    • /
    • 2017
  • 본 연구에서는 대규모 유역에서 발생하는 침수 현상을 모의하기 위한 강력하고 정확하며 연산효율이 뛰어난 수치해석 모형을 개발하는 데 있다. 개발된 모형은 확산파 모형을 기본으로 하였고 다수의 코어를 동시적으로 해석하는 병렬연산 기법을 부가하였다. 홍수로 인한 대규모 유역에서의 침수해석은 오랜 시간의 연산 비용을 필요로 한다. 특히 수치화된 지형정보의 이용이나 고정밀 사진 측량 등의 방법을 이용하여 정밀하고 넓은 유역의 디지털 지형자료를 이용한 2 차원 침수해석은 연산 연산의 문제를 더욱 어렵게 할 수 있다. 그러므로 본 연구에서는 제내지나 하류 유역에 발생하는 홍수로 발생된 빠른 침수모의를 위해 병렬화된 침수 해석 모형을 이용하여 병렬 해석 모형의 적용성을 검토하고자 하였다. 연구를 위해 MPI 및 OpenMP 기법을 이용하여 2 차원 침수해석 프로그램의 원시코드를 개선하고 실제 제내지 및 실제 댐 하류유역에 적용하였다. 개발된 모형은 실제 제내지에 적용한 결과를 MPI, OpenMP 병렬해석 기법과 기존의 순차적 모형의 결과를 비교하였다. 모형들의 결과를 제내지의 침수양상, 침수 속도벡터의 방향 및 크기 등의 계산 결과 순차적 모형, MPI 및 OpenMP 모형과의 비교하여 연산 시간은 병렬 해석 모형이 우월함을 보였다.

  • PDF

Development of Two Dimensional Blade Section with High Efficiency for Marine Propeller (선박 프로펠러용 고효율 2차원 날개단면 개발)

  • Na, Yun-Cheol;Song, In-Haeng;Ahn, Jong-Woo
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.34 no.1
    • /
    • pp.11-23
    • /
    • 1997
  • This paper contains a new approach to blade section design method for marine propellers. The hydrodynamic characteristics of 2-D section are highly influenced by its geometrical parameters i.e., thickness and camber distributions and leading edge radius etc. To consider fully turbulent flow field near 2-D section. the finite volume method with k-${\varepsilon}$ turbulent model which solve Reynolds time averaged Navier-Stokes(RANS) equation is applied. In this study, O-type grid system that can provide many calculation points on blade surface is used. The results were compared with those of the experiment of NACA0012 to confirm the accuracy of the developed codes. The goal of this study is the development of a blade section with high efficiency and low drag. To achieve this, we carried out the tests of lift, drag and cavitation characteristics in cavitation tunnel. The results of experiment were compared with numerical results in order to validate the proposed blades design method. By comparing the numerical results with the experiments, we found that the new blade section, KH28 allows superior performance in efficiency and cavitation avoidance characteristics. We further investigated the blade section design method and an application study of this section, KH28 to apply to the marine propeller. In order to improve the accuracy of numerical results on prediction of lift and drag, we conclude here that the 2-layer boundary model must be used.

  • PDF

Implementation of Information Access Embedded System for the Blind People (시각 장애인을 위한 정보접근 임베디드 시스템의 구현)

  • Kim, Si-Woo;Lee, Jae-Kyun;Lee, Chae-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.2C
    • /
    • pp.167-172
    • /
    • 2008
  • Since a 2-dimensional (2D) bar code can retrieve data and information quickly, it is widely used and recognized as a useful tool for many industrial applications. However, the information capacity of the 2D bar code is still limited. Recently the analog-digital code (AD code), which has the largest storage capacity yet contained in a code, has been developed, thereby expanding the bar code's application range because it overcomes the limitation of data capacity. In this paper, we present the AD code and implement an effective embedded system which can transform text information into voice using the 2D AD code and Text To Speech (TTS). This voice information can also be transmitted to blind people as well as the old by capturing the AD code on paper or in books.

Host based Feature Description Method for Detecting APT Attack (APT 공격 탐지를 위한 호스트 기반 특징 표현 방법)

  • Moon, Daesung;Lee, Hansung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.839-850
    • /
    • 2014
  • As the social and financial damages caused by APT attack such as 3.20 cyber terror are increased, the technical solution against APT attack is required. It is, however, difficult to protect APT attack with existing security equipments because the attack use a zero-day malware persistingly. In this paper, we propose a host based anomaly detection method to overcome the limitation of the conventional signature-based intrusion detection system. First, we defined 39 features to identify between normal and abnormal behavior, and then collected 8.7 million feature data set that are occurred during running both malware and normal executable file. Further, each process is represented as 83-dimensional vector that profiles the frequency of appearance of features. the vector also includes the frequency of features generated in the child processes of each process. Therefore, it is possible to represent the whole behavior information of the process while the process is running. In the experimental results which is applying C4.5 decision tree algorithm, we have confirmed 2.0% and 5.8% for the false positive and the false negative, respectively.

A Study on Digital Watermarking on the Wavelet Transform Domain (웨이브릿 변환 영역에서의 디지털 워터마킹에 관한 연구)

  • 한상엽;선영범;김진태
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2001.06a
    • /
    • pp.146-149
    • /
    • 2001
  • 디지털 워터마킹은 멀티미디어 데이터의 저작권 보호 목적으로 최근에 제안되었다. 본 논문에서는 디지털 영상에 저작권 정보를 은닉하는 디지털 워터마킹 방법을 제안한다. 제안한 방법은 2차원 이산 웨이블릿 변환과 영상의 대역 특성에 기반한다. 워터마크로 PN 코드와 이진 영상들 웨이블릿 영역에서 중간 대역의 큰 계수에 삽입한다. 실험 결과 삽입된 워터마크는 잡음, JPEG 압축과 같은 일반적인 영상 왜곡에 대해 매우 강함이 입증되었다.

  • PDF

Code Development for Two-Dimensional Flow Visualization (객체지향형 2차원 유동 가시화 코드 개발)

  • Sah Jong-Youb;Huh Jun-Sung
    • Journal of computational fluids engineering
    • /
    • v.8 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • The post-processor for two-dimensional flow visualization has been developed by using OOP(object-oriented programming) of Visual C++. User-friendly GUI(graphic user interface) has been built on the base of MFC(Microsoft Foundation Class). The number and order of variables can be specified by user because the input style is the free-format. The new variable can be defined and added to the variable list by using the various operators and functions.