• Title/Summary/Keyword: Binary code

Search Result 507, Processing Time 0.023 seconds

Physical Properties of Transiting Planetary System TrES-3

  • Lee, Jae-Woo;Youn, Jae-Hyuck;Kim, Seung-Lee;Lee, Chung-Uk;Koo, Jae-Rim;Park, Byeong-Gon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.2
    • /
    • pp.65.2-65.2
    • /
    • 2010
  • We present four new transits of the planetary system TrES-3 observed between 2009 May and 2010 June. Among those, the third transit by itself indicates possible evidence for brightness disturbance, which could originate from a starspot or an overlapping double transit. A total of 107 transit times, including our measurements, were used to determine the improved ephemeris with a transit epoch of $2454185.910950\pm0.000073$ HJED (Heliocentric Julian Ephemeris Date) and an orbital period of $1.30618698\pm0.00000016$ d. We analyzed the transit light curves using the JKTEBOP code and adopting the quadratic limb-darkening law. In order to derive the physical properties of the TrES-3 system, the transit parameters are combined with the empirical relations from eclipsing binary stars and stellar evolutionary models, respectively. The stellar mass and radius obtained from a calibration using $T_{eff}$, log $\rho$ and [Fe/H] are in good agreement with those from the isochrone analysis within the uncertainties. We found that the exoplanet TrES-3b has a mass of $1.93\pm0.07\;M_{Jup}$, a radius of $1.30\pm0.04\;R_{Jup}$, a surface gravity of $28.2\pm1.1\;m\;s^{-1}$, a density of $0.82\pm0.06\;\rho_{Jup}$, and an equilibrium temperature of $1641\pm23K$.

  • PDF

Resynthesis of Logic Gates on Mapped Circuit for Low Power (저전력 기술 매핑을 위한 논리 게이트 재합성)

  • 김현상;조준동
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.11
    • /
    • pp.1-10
    • /
    • 1998
  • The advent of deep submicron technologies in the age of portable electronic systems creates a moving target for CAB algorithms, which now need to reduce power as well as delay and area in the existing design methodology. This paper presents a resynthesis algorithm for logic decomposition on mapped circuits. The existing algorithm uses a Huffman encoding, but does not consider glitches and effects on logic depth. The proposed algorithm is to generalize the Huffman encoding algorithm to minimize the switching activity of non-critical subcircuits and to preserve a given logic depth. We show how to obtain a transition-optimum binary tree decomposition for AND tree with zero gate delay. The algorithm is tested using SIS (logic synthesizer) and Level-Map (LUT-based FPGA lower power technology mapper) and shows 58%, 8% reductions on power consumptions, respectively.

  • PDF

Two-Dimensional Interleaving Structure of Holographic Digital Data Storage (홀로그래픽 디지털 정보 저장장치에서의 이차원 인터리빙 구조)

  • Kim, Min-Seung;Han, Seung-Hun;Yang, Byeong-Chun;Lee, Byeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.10
    • /
    • pp.721-727
    • /
    • 2001
  • In this paper, we propose a two-dimensional interleaving structure of holographic digital data storage. In this storage, many of the digital binary data are recorded, retrieved and processed in a two-dimensional data image (1000$\times$1000 bits). Therefore, burst errors in this digital device also have two-dimensional characteristics and it is required to use effective two-dimensional interleaving to overcome them. Bits of every code word should be distributed in an equilateral triangular lattice structure when they are scattered considering the random shape and occurrence of burst errors. We deal with factors and algorithm to construct this interleaving structure of equilateral triangular lattice.

  • PDF

Software Similarity Detection Using Highly Credible Dynamic API Sequences (신뢰성 높은 동적 API 시퀀스를 이용한 소프트웨어 유사성 검사)

  • Park, Seongsoo;Han, Hwansoo
    • Journal of KIISE
    • /
    • v.43 no.10
    • /
    • pp.1067-1072
    • /
    • 2016
  • Software birthmarks, which are unique characteristics of the software, are used to detect software plagiarism or software similarity. Generally, software birthmarks are divided into static birthmarks or dynamic birthmarks, which have evident pros and cons depending on the extraction method. In this paper, we propose a method for extracting the API sequence birthmarks using a dynamic analysis and similarity detection between the executable codes. Dynamic birthmarks based on API sequences extract API functions during the execution of programs. The extracted API sequences often include all the API functions called from the start to the end of the program. Meanwhile, our dynamic birthmark scheme extracts the API functions only called directly from the executable code. Then, it uses a sequence alignment algorithm to calculate the similarity metric effectively. We evaluate the birthmark with several open source software programs to verify its reliability and credibility. Our dynamic birthmark scheme based on the extracted API sequence can be utilized in a similarity test of executable codes.

Implementation of an Automatic Door Lock System Using DTMF Signal of a Mobile Phone (모바일 단말기의 DTMF 신호를 이용한 자동 도어락 시스템 구현)

  • Bae Ki-Won;Yang Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.

  • PDF

A Voice Coding Technique for Application to the IEEE 802.15.4 Standard (IEEE 802.15.4 표준에 적용을 위한 음성부호화 기술)

  • Chen, Zhenxing;Kang, Seog-Geun
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.612-621
    • /
    • 2008
  • Due to the various constraints such as feasible size of data payload and low transmission power, no technical specifications on the voice communication are included in the Zigbee standard. In this paper, a voice coding technique for application to the IEEE 802.15.4 standard, which is the basis of Zigbee communication, is presented. Here, both high compression and good waveform recovery are essential. To meet those requirements, a multi-stage discrete wavelet transform (DWT) block and a binary coding block consisting of two different pulse-code modulations are exploited. Theoretical analysis and simulation results in an indoor wireless channel show that the voice coder with 2-stage DWT is most appropriate from the viewpoint of compression and waveform recovery. When the line-of-sight component is dominant, the voice coding scheme has good recovery capability even in the moderate signal-to-noise power ratios. Hence, it is considered that the presented scheme will be a technical reference for the future recommendation of voice communication exploiting Zigbee.

Period Study and Light Curve Synthesis of BD Andromedae

  • Kim, Chun-Hwey;Song, Mi-Hwa;Yoon, Joh-Na;Han, Wong-Yong;Choi, Young-Joon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.141.1-141.1
    • /
    • 2011
  • New CCD BVR light curves of BD And are presented. Our light curves with nearly equal depths for both primary and secondary eclipses show well-defined photometric waves outside eclipse for all of BVR bandpasses. The orbital period is greatly revised as $0.^d92580519$ which is twice longer than that known previously. Sixteen timings from our observations and thirteen ones from the SuperWASP measurements were calculated. All available timings over 76 years, including ours, were analyzed to figure out the dynamical behavior of the system. It was found that the recent CCD O-C residuals varied in a cyclical way with a period of $9.^y18$ and a semi-amplitude of $0.^d0046$. The secondary period of $9.^y18$ is the most shortest one among those which have been ever found in the short period RS CVn binary stars. The periodic variation most likely arises from the light-travel time effect due to a low-mass ($m_3{\sim}0.88\;M_{\odot}$) tertiary companion moving in an orbit with an large eccentricity ($e_3$=0.70) and a low inclination ($i_3{\sim}28^{\circ}$). The Applegate mechanism could not operate properly in both components because the model parameters require too much large luminosity changes of ${\Delta}L/L_{p,s}$ > 10. The new light curves were synthesized using the 2003 version of Wilson-Divinney code. It was found useful to model two huge spots on the surface of the hotter star and a third-light in order to minimize the residuals from the observations. Astronomical basic parameters were deduced from our photometric solution.

  • PDF

Research of Semantic Considered Tree Mining Method for an Intelligent Knowledge-Services Platform

  • Paik, Juryon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.27-36
    • /
    • 2020
  • In this paper, we propose a method to derive valuable but hidden infromation from the data which is the core foundation in the 4th Industrial Revolution to pursue knowledge-based service fusion. The hyper-connected societies characterized by IoT inevitably produce big data, and with the data in order to derive optimal services for trouble situations it is first processed by discovering valuable information. A data-centric IoT platform is a platform to collect, store, manage, and integrate the data from variable devices, which is actually a type of middleware platforms. Its purpose is to provide suitable solutions for challenged problems after processing and analyzing the data, that depends on efficient and accurate algorithms performing the work of data analysis. To this end, we propose specially designed structures to store IoT data without losing the semantics and provide algorithms to discover the useful information with several definitions and proofs to show the soundness.

Health monitoring sensor placement optimization for Canton Tower using virus monkey algorithm

  • Yi, Ting-Hua;Li, Hong-Nan;Zhang, Xu-Dong
    • Smart Structures and Systems
    • /
    • v.15 no.5
    • /
    • pp.1373-1392
    • /
    • 2015
  • Placing sensors at appropriate locations is an important task in the design of an efficient structural health monitoring (SHM) system for a large-scale civil structure. In this paper, a hybrid optimization algorithm called virus monkey algorithm (VMA) based on the virus theory of evolution is proposed to seek the optimal placement of sensors. Firstly, the dual-structure coding method is adopted instead of binary coding method to code the solution. Then, the VMA is designed to incorporate two populations, a monkey population and a virus population, enabling the horizontal propagation between the monkey and virus individuals and the vertical inheritance of monkey's position information from the previous to following position. Correspondingly, the monkey population in this paper is divided into the superior and inferior monkey populations, and the virus population is divided into the serious and slight virus populations. The serious virus is used to infect the inferior monkey to make it escape from the local optima, while the slight virus is adopted to infect the superior monkey to let it find a better result in the nearby area. This kind of novel virus infection operator enables the coevolution of monkey and virus populations. Finally, the effectiveness of the proposed VMA is demonstrated by designing the sensor network of the Canton Tower, the tallest TV Tower in China. Results show that innovations in the VMA proposed in this paper can improve the convergence of algorithm compared with the original monkey algorithm (MA).

Real-Time Functional Reactive Program Translator for Embedded Systems (임베디드 시스템을 위한 실시간 함수형 반응적 프로그램 변환기)

  • Lee, Dong-Ju;Woo, Gyun
    • The KIPS Transactions:PartA
    • /
    • v.13A no.6 s.103
    • /
    • pp.481-488
    • /
    • 2006
  • FRP(Functional Reactive Programming) is a kind of embedded language in Haskell, it declaratively program reactive system based on two essential high-order types named behavior and events. This Paper design and implementation RT-FRP(Real-time Functional Reactive Programming) translator for using FRP in embedded systems with many constraints. The RT-FRP translator generates a C Program from an RT-FRP program according to the operational semantics of the RT-FRP language. To show the effectiveness of the RT-FRP translator, we loaded and executed the test program generated by the translator onto a real embedded system, LEGO Mindstorm. According to the experimental result, the reactive system software can be programmed more concisely using RT-FRP than using an imperative counter part although the size of the binary code is rather increased.