• Title/Summary/Keyword: ASCII Code

Search Result 39, Processing Time 0.025 seconds

Study on the ASCII Code in the side of the Transmission Efficiency in Data Communications (데이터통신 전송효율과 ASCII 부호체계 고찰)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.657-664
    • /
    • 2011
  • This paper proposes the revised ASCII code. The study started with consideration whether the ASCII code is proper or not in the side of the transmission efficiency in data communications. In data communications, when the consecutive "0" bits from the information devices input into the line coder, its consecutive "0" bits are scrambled to the predetermined patterns not to the consecutive "0" signal. The paper used to study with the statistical data for the frequency of the letters of the alphabets and the proposed rule of characters coding in reference. As a result of the study, when the proposed ASCII code is applied, the operation efficiency of the scrambler in the line coder is improved upto average 30%.

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.457-461
    • /
    • 2017
  • Barcode is widely being used in many places such as supermarket, cafeteria, library, etc. ISBN, Code 128, Code 39 are mainly used in barcode. Among them, Code 128 which is based on ASCII Code can transfer control letters that range from ASCII Code 0 to ASCII 32. Control letters intrinsically imply letters that are used to deliver information to peripheral devices such as a printer or communication joint, however, they play quite different roles if they are inputted on Windows. Generally, barcode devices doesn't verify input data, thus it enables people to tag any barcode that has specific control letters and execute the commands. Besides, most barcode recognition programs are using a database and they have more security weakness compared to other programs. On the basis of those reasons, I give an opinion that SQL Injection can attack barcode recognition programs through this study.

  • PDF

P-HDNS : A New Scheme to Support Multilingual Domain Names (한글도메인이름을 지원하기 위한 Proxy HDNS 구현)

  • Kim, Weon;Chin, Yong-Ohk
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.1-10
    • /
    • 1999
  • Given a domain, client applications over the Internet are in support of the DNS (Domain Name System) to get its corresponding IP address. Currently, only domain names expressed by ASCII code are recognized over the Internet. This enforces the usage of ASCII domain names even in countries which use languages based on multilingual code other than ASCII code. In this paper, we present a methodology to support multilingual domain names on top of the existing DNS. The methodology is based on code translation of domain names in multilingual code into ASCII code via UTF5. We implement a gateway, called Proxy Hangul DNS (P-HDNS) based on the proposed methodology. This paper presents the principles of the methodology and the implementation details of P-HDNS.

  • PDF

Design and Implementation of Conversion System Between ISO/IEC 10646 and Multi-Byte Code Set (ISO/IEC 10646과 멀티바이트 코드 세트간의 변환시스템의 설계 및 구현)

  • Kim, Chul
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.319-324
    • /
    • 2018
  • In this paper, we designed and implemented a code conversion method between ISO/IEC 10646 and the multi-byte code set. The Universal Multiple-Octet Coded Character Set(UCS) provides codes for more than 65,000 characters, huge increase over ASCII's code capacity of 128 characters. It is applicable to the representation, transmission, interchange, processing, storage, input and presentation of the written form of the language throughout the world. Therefore, it is so important to guide on code conversion methods to their customers during customer systems are migrated to the environment which the UCS code system is used and/or the current code systems, i.e., ASCII PC code and EBCDIC host code, are used with the UCS together. Code conversion utility including the mapping table between the UCS and IBM new host code is shown for the purpose of the explanation of code conversion algorithm and its implementation in the system. The programs are successfully executed in the real system environments and so can be delivered to the customer during its migration stage from the UCS to the current IBM code system and vice versa.

Study on the coding rule of Characters by 1 byte of 3×4 bits with consideration for the transmission efficiency of data communications (데이터 전송 효율을 고려한 3×4비트 1 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.499-504
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of one byte of 3bits column ${\times}$ 4bits rows. ASCII code is one of the representative code for the codes of one byte of 3bits column ${\times}$ 4bits rows. Therefore, this paper applied ASCII code to study the coding rule of the characters and symbols, etc.

Study on Security Weakness of Barcode Devices (바코드를 이용하는 기기에서의 보안적 취약점 탐구)

  • Park, Beom-Joon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.189-192
    • /
    • 2017
  • 마트, 식당, 도서관 등 우리 주변 많은 곳에서 바코드가 사용되고 있다. 바코드는 주로 ISBN, Code128, Code39 등의 형식이 쓰이는데 그중 Code 128은 ASCII Code를 기반으로 하기 때문에 ASCII Code 0번부터 32번까지의 제어 문자를 바코드에 담을 수 있다. 제어 문자는 본래 프린터 또는 통신 접속구 등 주변 장치에 정보를 전달하기 위하여 사용되는 문자를 뜻하지만 Windows상에서 입력될 시 전혀 다른 역할을 한다. 주로 바코드 기기에서 입력 값을 검증하지 않으므로 이를 이용해 제어 문자를 담은 바코드를 태깅해 명령 프롬포트를 열고 명령을 실행할 수 있다. 또한 대부분의 바코드 인식 프로그램이 DB를 사용하고, 보안이 다른 프로그램들에 비해 취약하다는 점에서 SQL Injection 공격 가능성을 제시한다.

Implementation of Portable Visible Light Receiver using USB OTG (USB OTG를 활용한 휴대용 가시광 수신기 구현)

  • Lee, Dae-Hee;Lee, Jong-Sung;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.741-743
    • /
    • 2017
  • The visible light communication is a communication method of outputting binary data based on the illumination threshold value at the light receiving diode of the receiving unit, when the LED of the transmitting unit transmits light. However, separate receiver is necessary to receive the optical signal, there is a problem that a device not equipped with such a receiver can not utilize visible light communication. To solve this problem, this paper proposes a portable visible light receiver applicable to devices using USB OTG. Implemented portable visible light receiver converts the binary data received from the LED into a character string of ASCII code and transmits it to another device. Through data transmission experiments using smart phone confirmed that it is possible to transmit ASCII codes in the proposed method.

  • PDF

Programming based on ASCII Code using BMP File Format (BMP 파일 형식을 활용한 ASCII 코드 기반 프로그래밍)

  • Choi, Hyo-Kyung;Choi, Eun-Jung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.169-171
    • /
    • 2018
  • 정보를 조작하고 은닉하는 기술은 꾸준히 발전하고 있으며 그 가짓수가 매우 다양하다. 이러한 기술들이 성장함에 따라 이에 맞서 조작된 정보를 알아채고 예방 및 방어를 하는 보안 기술들이 함께 진보된다. 본 논문에서는 정보 보안 기술의 발전을 위한 새로운 정보 은닉 기술의 필요성을 근거로 다양한 데이터 표현 방법을 보안 관점에서 이해하고자 한다. 이에 디지털 이미지를 저장하는 데 쓰이는 BMP 파일 포맷 구성이 RGB 3채널임을 이용하여 ASCII 코드값을 채널에 주입해 프로그래밍을 구현하는 기법에 대해 연구하였다. 이 기법은 향후 여러 프로그래밍 언어로 확장됨에 따라 멀티미디어를 활용한 정보보안 분야에서 크게 활용될 것으로 기대하는 바이다.

A Study on Noise Automatic Inspection System for Washing Machine Auto-Transmission (세탁기용 자동변속기 (Auto-Transmission)의 이상음 검사자동화 시스템에 관한 연구)

  • 김재열
    • Proceedings of the Korean Society of Machine Tool Engineers Conference
    • /
    • 1998.03a
    • /
    • pp.310-315
    • /
    • 1998
  • This study includes noise automatic inspection system for washing machine auto-transmission one of modern home necessary. We effort to find and certificate sound noisesource by sound power and sound intensity, and apply to frequency analysis in vibration related sound noise. Still more we have been studying to data acquisition and programming for MS VisualBasic version 5.0. System component is below. 1) Pentium PC for data acquisition. 2) DSO for noise acquisition. 3) S/W for comparison and decision. 4) I/F Board for data communication. Wave form data through the DSO are converting to ASCII code data. The ASCII code through binary converting S/W are to be decision fitness or the badness comparison S/W. Finally, we will making noise monitoring system and automatic inspection system.

  • PDF

Development of Automatic Program for Noise Inspection of Auto-transmission (자동변속기(Auto-Transmission)의 이상음 검사자동화 시스템개발)

  • 김재열
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.9 no.6
    • /
    • pp.9-18
    • /
    • 2000
  • This study includes noise automatic inspection system for washing machine auto-transmission one of modern home necessary. We effort to find and certificate sound noise source by sound power and sound intensity, and apply to frequency analysis in vibration related sound noise. still more we have been studying to data acquisition and programming for MS VisualBasic version 5.0. System component is below. 1) Pentium PC or data acquisition. 2) DSO for noise acquisition. 3)S/W for comparison and decision. 4) I/F Board for data communication. Wave form data through the DSO are converting to ASCII code data. The ASCII code through binary converting S/W. Finally we will making noise monitoring system and automatic inspection system.

  • PDF