• Title/Summary/Keyword: Binary code

Search Result 509, Processing Time 0.025 seconds

UY Ursae Majoris: An A-Subtype W UMa System with a Very Large Fill-Out Factor and an Extreme Mass Ratio

  • Kim, Chun-Hwey;Song, Mi-Hwa;Park, Jang-Ho;Jeong, Min-Ji;Kim, Hye-Young;Han, Cheongho
    • Journal of Astronomy and Space Sciences
    • /
    • v.36 no.4
    • /
    • pp.265-281
    • /
    • 2019
  • We present new BVRI light curves of UY UMa with no O'Connell effect and a flat bottom secondary eclipse. Light curve synthesis with the Wilson-Devinney code gives a new solution, which is quite different from the previous study: UY UMa is an A-subtype over-contact binary with a small mass ratio of q = 0.21, a high inclination of 81°.4, a small temperature difference of ΔT=18°, a large fill-out factor of f = 0.61, and a third light of approximately 10% of the total systemic light. The absolute dimensions were newly determined. Seventeen new times of minimum light have been calculated from our observations. The period study indicates that the orbital period has intricately varied in a secular period increase in which two cyclical terms with periods of 12y.0 and 46y.3 are superposed. The secular period increase was interpreted to be due to a conservative mass transfer of 2.68 × 10-8 M/yr from the less massive to the more massive star. The cyclical components are discussed in terms of double-light time contributions from two additional bound stars. The statistical relations of Yang & Qian (2015) among the physical parameters of 45 deep, low mass ratio contact binaries were revisited by using the physical parameters of UY UMa and 25 Kepler contact binaries provided by Şenavci et al. (2016).

Design of digital communication systems using DCSK chaotic modulation (DCSK 카오스 변조를 이용한 디지털 통신 시스템의 설계)

  • Jang, Eun-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.5
    • /
    • pp.565-570
    • /
    • 2015
  • Spread spectrum communications have increased interest due to their immunity to channel fading and low probability of intercept. One of the limitations of the traditional digital spread spectrum systems is the need for spreading code synchronization. Chaotic communication is the analogue alternative of digital spread spectrum systems beside some extra features like simple transceiver structures. In this paper, This paper was used instead of the digital modulation and demodulation carriers for use in the chaotic signal in a digital communication system among the chaotic modulation schemes, the Differential Chaos Shift Keying(DCSK) is the most efficient one because its demodulator detects the data without the need to chaotic signal phase recovery. Also Implementation of Differential Chaos Shift Keying Communication System Using Matlab/Simulink and the receiver con decode the binary information sent by the transmitter, performance curves of DCSK are given in terms of bit-error probability versus signal to noise ratio with spreading factor as a parameter and we compare it to BPSK modulation.

Compiler Analysis Framework Using SVM-Based Genetic Algorithm : Feature and Model Selection Sensitivity (SVM 기반 유전 알고리즘을 이용한 컴파일러 분석 프레임워크 : 특징 및 모델 선택 민감성)

  • Hwang, Cheol-Hun;Shin, Gun-Yoon;Kim, Dong-Wook;Han, Myung-Mook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.537-544
    • /
    • 2020
  • Advances in detection techniques, such as mutation and obfuscation, are being advanced with the development of malware technology. In the malware detection technology, unknown malware detection technology is important, and a method for Malware Authorship Attribution that detects an unknown malicious code by identifying the author through distributed malware is being studied. In this paper, we try to extract the compiler information affecting the binary-based author identification method and to investigate the sensitivity of feature selection, probability and non-probability models, and optimization to classification efficiency between studies. In the experiment, the feature selection method through information gain and the support vector machine, which is a non-probability model, showed high efficiency. Among the optimization studies, high classification accuracy was obtained through feature selection and model optimization through the proposed framework, and resulted in 48% feature reduction and 53 faster execution speed. Through this study, we can confirm the sensitivity of feature selection, model, and optimization methods to classification efficiency.

Design and Implementation of Component Adaptation Supporting Tool (컴포넌트 개조 지원 도구의 설계 및 구현)

  • Kim, Jeong-Ah;Kwon, Oh-Cheon;Choi, Yoo-Hee;Shin, Gyu-Sang;Yoon, Shim
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.903-914
    • /
    • 2002
  • In this research, the technique and tool for the adaptation of components are suggested. While reusing a component or assembling components, component adaptation should be required since the interfaces of component to be assembled might not be exactly matched. Sometimes, other attributes are needed for new business features or even the same business concept. So, in reusing or assembling a component, component adaptation techniques are essentially required. In this research, we proposed the following Component Adaptation by Binary Component Adaptation Techniques : and Component Adaptation by Adaptation Components. Also, we constructed a component adaptation supporting tool. As the results, we can adapt the existing components without source code and can reuse the existing components when the components do not meet new requirements or can not be directly connected with other components to be integrated.

A Study on a Low Power Underwater Communication Modem for Implementation of Underwater Sensor Networks (수중 센서 네트워크를 위한 저전력 수중 통신 모뎀 연구)

  • Choi, Yong-Woo;Hwang, Jun Hyeok;Park, Dong Chan;Kim, Suk Chan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.3
    • /
    • pp.268-273
    • /
    • 2015
  • Recently many countries are researching actively underwater sensor networks for securing ocean resources and changes of ocean environment in all over the world. Current the commercial modem are not suitable because it has characteristics of long distance, higher price, larger power consumption with the special object mainly. In this paper, a low power and compact underwater communication modem which is suitable for underwater sensor networks is implemented. It is comprised by using a simple analog circuit for non-coherent BFSK modulation method, ultra low power MCU and orthogonal codes with a less operation and a simple implementation. It was experimented an underwater communication using our modem in a water tank and open sea farms. It communicates fewer than $10^{-4}$ bit error rate.

A Techniques for Information Hiding in the Steganography using LSB and Genetic Algorithm (유전적 알고리즘과 LSB를 이용한 스테가노그래피의 정보은닉 기법)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.3
    • /
    • pp.277-282
    • /
    • 2018
  • The goal of the secret message communication on the internet is to maintain invisibility and confidentiality. Digital steganography is a technique in which a secret message is inserted in a cover medium and transmitted to a destination so that a third party can not perceive the existence of the message itself. Steganography is an efficient method for ensuring confidentiality and integrity together with encryption techniques. In order to insert a secret (Hangul) message, I propose a image steganography method that the secret character is separated and converted into binary code with reference to the encryption table, the cover image is divided into two areas, and the secret message and the right l-LSB information of the second area are encrypted and crossed, concealing the k-LSB of the first region. The experimental results of the proposed method show that the PSNR value is 52.62 and the acceptable image quality level.

Optimal sensor placement under uncertainties using a nondirective movement glowworm swarm optimization algorithm

  • Zhou, Guang-Dong;Yi, Ting-Hua;Zhang, Huan;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • v.16 no.2
    • /
    • pp.243-262
    • /
    • 2015
  • Optimal sensor placement (OSP) is a critical issue in construction and implementation of a sophisticated structural health monitoring (SHM) system. The uncertainties in the identified structural parameters based on the measured data may dramatically reduce the reliability of the condition evaluation results. In this paper, the information entropy, which provides an uncertainty metric for the identified structural parameters, is adopted as the performance measure for a sensor configuration, and the OSP problem is formulated as the multi-objective optimization problem of extracting the Pareto optimal sensor configurations that simultaneously minimize the appropriately defined information entropy indices. The nondirective movement glowworm swarm optimization (NMGSO) algorithm (based on the basic glowworm swarm optimization (GSO) algorithm) is proposed for identifying the effective Pareto optimal sensor configurations. The one-dimensional binary coding system is introduced to code the glowworms instead of the real vector coding method. The Hamming distance is employed to describe the divergence of different glowworms. The luciferin level of the glowworm is defined as a function of the rank value (RV) and the crowding distance (CD), which are deduced by non-dominated sorting. In addition, nondirective movement is developed to relocate the glowworms. A numerical simulation of a long-span suspension bridge is performed to demonstrate the effectiveness of the NMGSO algorithm. The results indicate that the NMGSO algorithm is capable of capturing the Pareto optimal sensor configurations with high accuracy and efficiency.

SW Lyncis-Advances and Questions

  • Kim, Chun-Hwey;Kim, Ho-Il;Yoon, Tae-Seog;Han, Won-Yong;Lee, Jae-Woo;Lee, Chung-Uk;Kim, Jin-Hyung;Koch, Robert H.
    • Journal of Astronomy and Space Sciences
    • /
    • v.27 no.4
    • /
    • pp.263-278
    • /
    • 2010
  • Many filtered CCD measures form the basis of six new light curves of the eclipsing system SW Lyn. From these measures and additional observations for eclipse timing, 47 new times of minimum light over the time-interval of about 13 years have been calculated. The complex period variability can be sorted into a linear period improvement with 5.8-year and 33.9-year periodic terms. The shorter cyclic term of these is ascribed to a cool companion of the eclipsing pair but the longer one has no testable interpretation at present. The new light curves are synthesized by the 2003 version of the Wilson-Devinney differential corrections computer code. The results incorporate a source of "third light" which comes from the cool companion star that had been identified by the cycling of the period of the eclipsing pair and also had previously been identified spectroscopically. There is a measure of satisfaction with current understanding of the SW Lyn eclipsing system because of consistent syntheses of all historical light curves. This agreeable convergence, however, comes partly at the expense of an unanticipated temperature of the hot star and of a photospheric spot that has no obvious basis in the detached character modeled for the binary. We offer predictions of changes in the stellar parameters if the modeled detached-configuration should be wrong. The SW Lyn stellar system is still difficult to understand.

Constant Time Algorithm for Alignment of Unaligned Linear Quadtrees on RMESH (RMESH구조에서 unaligned 선형 사진트리의 alignment를 위한 상수시간 알고리즘)

  • 김경훈;우진운
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.10-18
    • /
    • 2004
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The operations of unaligned linear quadtrees, which are operations among the linear quadtrees with different origin, are able to perform the translated or rotated images efficiently. And this operations requires alignment of the linear quadtrees. In this paper, we present an efficient algorithm to perform alignment of unaligned linear quadtrees, using three-dimensional $n{\pm}n{\pm}n$ processors on RMESH(Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of $n{\pm}n{\pm}n$ RMESH.

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.