• Title/Summary/Keyword: BINARY CODE

Search Result 511, Processing Time 0.023 seconds

A Study on the Design of D/A Converter based on Data Weighted Average Technique for enhancement of reliability (혼합형 전류 구동 D/A 컨버터 설계 제작에 있어서 데이터 가중평균기법을)

  • Kim, S.D.;Woo, Y.S.;Kim, D.G.;Sung, M.Y.
    • Proceedings of the KIEE Conference
    • /
    • 1999.07g
    • /
    • pp.3215-3217
    • /
    • 1999
  • In this paper, a new structure of realizing switching control logic for Data Weighted Average Technique is suggested. It uses memory and adder for summing past binary input and this summed data is used to select one switch in control logic. This control logic acts in parallel regardless of resolution so increasing resolution don't affect on converting speed. In this reason, high speed and high resolution D/A converter based on Data Weighted Average Technique could be made. In this paper, 4 bits current mode thermometer code D/A converter is degined and simulated by using HSPICE. Simulated results show that new structure of D/A converter has more than 250MHz converting speed and less than 0.0003[LSB] INL error. It is very useful in low power circuit because of using 3.3 V supply voltage.

  • PDF

Turbo Trellis Coded Modulation with Multiple Symbol Detection (다중심벌 검파를 사용한 터보 트렐리스 부호화 변조)

  • Kim Chong Il
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.1 no.2
    • /
    • pp.105-114
    • /
    • 2000
  • In this paper, we propose a bandwidth-efficient channel coding scheme using the turbo trellis-coded modulation with multiple symbol detection. The turbo code can achieve good bit error rates (BER) at low SNR. That comprises two binary component codes and an interleaver. TCM codes combine modulation and coding by optimizing the euclidean distance between codewords. This can be decoded with the Viterbi or the symbol-by- symbol MAP algorithm. But we present the MAP algorithm with branch metrics of the Euclidean distance of the first phase difference as well as the Lth phase difference. The study shows that the turbo trellis-coded modulation with multiple symbol detection can improve the BER performance at the same SNR.

  • PDF

Expression of Dengue virus EIII domain-coding gene in maize as an edible vaccine candidate

  • Kim, Hyun A;Kwon, Suk Yoon;Yang, Moon Sik;Choi, Pil Son
    • Journal of Plant Biotechnology
    • /
    • v.41 no.1
    • /
    • pp.50-55
    • /
    • 2014
  • Plant-based vaccines possess some advantages over other types of vaccine biotechnology such as safety, low cost of mass vaccination programs, and wider use of vaccines for medicine. This study was undertaken to develop the transgenic maize as edible vaccine candidates for humans. The immature embryos of HiII genotype were inoculated with A. tumefaciens strain C58C1 containing the binary vectors (V662 or V663). The vectors carrying nptII gene as selection marker and scEDIII (V662) or wCTB-scEDIII (V663) target gene, which code EIII proteins inhibite viral adsorption by cells. In total, 721 maize immature embryos were transformed and twenty-two putative transgenic plants were regenerated after 12 weeks selection regime. Of them, two- and six-plants were proved to be integrated with scEDIII and wCTB-scEDIII genes, respectively, by Southern blot analysis. However, only one plant (V662-29-3864) can express the gene of interest confirmed by Northern blot analysis. These results demonstrated that this plant could be used as a candidated source of the vaccine production.

Voice Recognition Sensor Driven Elevator for High-rise Vertical Shift (동굴관광용 고층수직이동 승강기의 긴급 음성구동 제어)

  • Choi, Byong-Seob;Kang, Tae-Hyun;Yun, Yeo-Hoon;Jang, Hoon-Gyou;Soh, Dea-Wha
    • Journal of the Speleological Society of Korea
    • /
    • no.88
    • /
    • pp.1-7
    • /
    • 2008
  • Recently, it is one of very interest technology of Human Computer Interaction(HCI). Nowadays, it is easy to find out that, for example, inside SF movies people has talking to computer. However, there are difference between CPU language and ours. So, we focus on connecting to CPU. For 30 years many scientists experienced in that technology. But it is really difficult. Our project goal is making that CPU could understand human voice. First of all the signal through a voice sensor will move to BCD (binary code). That elevator helps out people who wants to move up and down. This product's point is related with people's safety. Using a PWM for motor control by ATmega16, we choose a DC motor to drive it because of making a regular speed elevator. Furthermore, using a voice identification module the elevator driven by voice sensor could operate well up and down perfectly from 1st to 10th floor by PWM control with ATmega16. And, it will be clearly useful for high-rise vertical shift with voice recognition sensor driven.

A Cross-Platform Malware Variant Classification based on Image Representation

  • Naeem, Hamad;Guo, Bing;Ullah, Farhan;Naeem, Muhammad Rashid
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3756-3777
    • /
    • 2019
  • Recent internet development is helping malware researchers to generate malicious code variants through automated tools. Due to this reason, the number of malicious variants is increasing day by day. Consequently, the performance improvement in malware analysis is the critical requirement to stop the rapid expansion of malware. The existing research proved that the similarities among malware variants could be used for detection and family classification. In this paper, a Cross-Platform Malware Variant Classification System (CP-MVCS) proposed that converted malware binary into a grayscale image. Further, malicious features extracted from the grayscale image through Combined SIFT-GIST Malware (CSGM) description. Later, these features used to identify the relevant family of malware variant. CP-MVCS reduced computational time and improved classification accuracy by using CSGM feature description along machine learning classification. The experiment performed on four publically available datasets of Windows OS and Android OS. The experimental results showed that the computation time and malware classification accuracy of CP-MVCS was higher than traditional methods. The evaluation also showed that CP-MVCS was not only differentiated families of malware variants but also identified both malware and benign samples in mix fashion efficiently.

Stochastic Non-linear Hashing for Near-Duplicate Video Retrieval using Deep Feature applicable to Large-scale Datasets

  • Byun, Sung-Woo;Lee, Seok-Pil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4300-4314
    • /
    • 2019
  • With the development of video-related applications, media content has increased dramatically through applications. There is a substantial amount of near-duplicate videos (NDVs) among Internet videos, thus NDVR is important for eliminating near-duplicates from web video searches. This paper proposes a novel NDVR system that supports large-scale retrieval and contributes to the efficient and accurate retrieval performance. For this, we extracted keyframes from each video at regular intervals and then extracted both commonly used features (LBP and HSV) and new image features from each keyframe. A recent study introduced a new image feature that can provide more robust information than existing features even if there are geometric changes to and complex editing of images. We convert a vector set that consists of the extracted features to binary code through a set of hash functions so that the similarity comparison can be more efficient as similar videos are more likely to map into the same buckets. Lastly, we calculate similarity to search for NDVs; we examine the effectiveness of the NDVR system and compare this against previous NDVR systems using the public video collections CC_WEB_VIDEO. The proposed NDVR system's performance is very promising compared to previous NDVR systems.

Deep Learning in Drebin: Android malware Image Texture Median Filter Analysis and Detection

  • Luo, Shi-qi;Ni, Bo;Jiang, Ping;Tian, Sheng-wei;Yu, Long;Wang, Rui-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.7
    • /
    • pp.3654-3670
    • /
    • 2019
  • This paper proposes an Image Texture Median Filter (ITMF) to analyze and detect Android malware on Drebin datasets. We design a model of "ITMF" combined with Image Processing of Median Filter (MF) to reflect the similarity of the malware binary file block. At the same time, using the MAEVS (Malware Activity Embedding in Vector Space) to reflect the potential dynamic activity of malware. In order to ensure the improvement of the classification accuracy, the above-mentioned features(ITMF feature and MAEVS feature)are studied to train Restricted Boltzmann Machine (RBM) and Back Propagation (BP). The experimental results show that the model has an average accuracy rate of 95.43% with few false alarms. to Android malicious code, which is significantly higher than 95.2% of without ITMF, 93.8% of shallow machine learning model SVM, 94.8% of KNN, 94.6% of ANN.

Interference Analysis Among Waveforms and Modulation Methods of Concurrently Operated Pulse Doppler Radars (단일 플랫폼에서 동시 운용되는 펄스 도플러 레이다의 파형 및 변조 방식간의 간섭 분석)

  • Kim, Eun Hee;Ryu, Seong Hyun;Kim, Han Saeng;Lee, Ki Won
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.1
    • /
    • pp.23-29
    • /
    • 2022
  • As the application field of radar is expanded and the bandwidth increases, the number of radar sensors operating at the same frequency is continuously increasing. In this paper, we propose a method of analyzing interference when two pulse doppler radars are operated at the same frequency with different waveform which are designed independently. In addition, we show that even for a previously designed LFM waveforms, the interference can be suppressed without affecting the performance by changing the sign of the frequency slope by increasing/decreasing, or by modulating the pulses by the different codes. The interference suppression by different slopes is more effective for similar waveform and the suppression by the codes increases as the number of pulses increases. We expect this result can be extended to the cases where multiple radars are operated at the same frequency.

Detection of systems infected with C&C Zeus through technique of Windows API hooking (Windows API 후킹 기법을 통한 C&C Zeus에 감염된 시스템의 탐지)

  • Park, Chul-Woo;Son, Ji-Woong;Hwang, Hyun-Ki;Kim, Ki-Chang
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.5 no.2
    • /
    • pp.297-304
    • /
    • 2015
  • Zeus is one of the will-published malwares. Generally, it infects PC by executing a specific binary file downloaded on the internet. When infected, try to hook a particular Windows API of the currently running processes. If process runs hooked API, this API executes a particular code of Zeus and your private information is leaked. This paper describes techniques to detect and hook Windows API. We believe the technique should be able to detect modern P2P Zeus.

Development of multigroup cross section library generation system TPAMS

  • Lili Wen;Haicheng Wu;Ying Chen;Xiaoming Chai;Xiaofei Wu;Xiaolan Tu;Yuan Liu
    • Nuclear Engineering and Technology
    • /
    • v.56 no.6
    • /
    • pp.2208-2219
    • /
    • 2024
  • Kylin-2 is an advanced neutronics lattice code, developed by Nuclear Power Institute of China. High-precision multigroup cross section library is need for KYLIN-2 to carry out simulation of current pressurized water reactor (PWR) and advanced reactor. In this paper a multigroup cross section library generation system named TPAMS was developed, the methods in TPAMS dealing with resonance data such as subgroup parameters, lambda factor, resonance integral were discussed. Moreover, the depletion chain simplification method was studied. TPAMS can produce multigroup library in binary and ASIIC formats, including detailed data contents for resonance, transport and depletion calculations. A multigroup cross section library has been generated for KYLIN-2 based on TPAMS system. The multigroup cross section library was verified through the analysis of various criticality and burnup benchmarks, the values of multiplication factor and isotope density were compared with the experiment data. Numerical results demonstrate the accuracy of the multigroup cross section library and the reliability of the multigroup cross section library generation system TPAMS.