• Title/Summary/Keyword: Binary code

Search Result 507, Processing Time 0.025 seconds

Gamma ray exposure buildup factor and shielding features for some binary alloys using MCNP-5 simulation code

  • Rammah, Y.S.;Mahmoud, K.A.;Mohammed, Faras Q.;Sayyed, M.I.;Tashlykov, O.L.;El-Mallawany, R.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.8
    • /
    • pp.2661-2668
    • /
    • 2021
  • Gamma radiation shielding features for three series of binary alloys identified as (Pb-Sn), (Pb-Zn), and (Zn-Sn) have been investigated. The mass attenuation coefficients (µ/ρ) for the selected alloys were simulated using the MCNP-5 code in the energy range between 0.01 and 15 MeV. Moreover, the (µ/ρ) values were computed using WinXCOM database in the same energy range to validate the simulation results. Results reveal a good agreement between the simulated and computed values. The half value layer (HVL), mean free path (MFP), effective atomic number (Zeff) and exposure buildup factor (EBF) were evaluated for the selected binary alloys. Results showed that the PS1, PZ1, and ZS2 alloys have the best shielding parameters and better than the commercially standard and available radiation shielding materials. Therefore, the investigated alloys can be used as effective radiation shielding materials against gamma ray with energies between 0.01 and 15 MeV.

ECG Conversion System Using Description Method for Binary Files (바이너리 파일 디스크립션 방식을 이용한 ECG 변환 시스템)

  • Koo, Heung-Seo;Jung, Shin-Young
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.55 no.10
    • /
    • pp.464-470
    • /
    • 2006
  • In this paper, we develop a descriptor based on binary ECG conversion system that supports the conversion of a binary ECG format into XML-based HL7 aECG for the interoperability of ECG. HL7 aECG is a XML based standard for interoperability of ECG waveform. For the conversion of variety of ECG formats, we propose a binary ECG description mechanism. In order to describe binary ECG more efficiently, we develop a XML-based Binary ECG Description (BED) Language. One of the powerful features of using the XML-based ECG Description mechanism is that ECG data can read from various formats without the modification of source code of conversion system, and consequently it reduces conversion system maintenance costs.

Improved Binary CDMA Modem Design for High-Speed Wireless Communications (고속데이터 전송을 위한 개선된 Binary CDMA 모뎀 구현)

  • Lee, Jang-Youn;Cho, Jin-Woong;Hong, Dae-Ki
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.2
    • /
    • pp.11-14
    • /
    • 2010
  • In this paper, an improved binary-CDMA (Code Division Multiple Access) system for high speed multimedia data transmission will be presented. The improved binary CDMA technology will be used in municipal wireless network. The new name of the system is the Guardian system using a binary CDMA technology. The Guardian system can provide high data rate, and improve its throughput by minimizing latency from the limitation of resources of system bus during multimedia data transmission. Finally, we analyze the performance of Guardian modem according to the report of wireless data transmission test.

Bar Code Location Algorithm Using Pixel Gradient and Labeling (화소의 기울기와 레이블링을 이용한 효율적인 바코드 검출 알고리즘)

  • Kim, Seung-Jin;Jung, Yoon-Su;Kim, Bong-Seok;Won, Jong-Un;Won, Chul-Ho;Cho, Jin-Ho;Lee, Kuhn-Il
    • The KIPS Transactions:PartD
    • /
    • v.10D no.7
    • /
    • pp.1171-1176
    • /
    • 2003
  • In this paper, we propose an effective bar code detection algorithm using the feature analysis and the labeling. After computing the direction of pixels using four line operators, we obtain the histogram about the direction of pixels by a block unit. We calculate the difference between the maximum value and the minimum value of the histogram and consider the block that have the largest difference value as the block of the bar code region. We get the line passing by the bar code region with the selected block but detect blocks of interest to get the more accurate line. The largest difference value is used to decide the threshold value to obtain the binary image. After obtaining a binary image, we do the labeling about the binary image. Therefore, we find blocks of interest in the bar code region. We calculate the gradient and the center of the bar code with blocks of interest, and then get the line passing by the bar code and detect the bar code. As we obtain the gray level of the line passing by the bar code, we grasp the information of the bar code.

BER Improvement Correlation-Flattened Binary CDMA (상관도 평활화된 Binary CDMA의 BER 개선)

  • Seo, Keun-Jong;Chong, Min-Woo;Kim, Yong-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1C
    • /
    • pp.9-17
    • /
    • 2004
  • We present a performance improvement of Binary CDMA by flattening the correlation values. A Binary CDMA system, in which multi-leveled transmission signal of multi-code CDMA is clipped into a binary value, is cost-efficient since the strict linearity of the power amplifier is relieved. However, a loss of orthogonality among user channels due to the clipping causes the correlation values at the receiver to have a random distribution. If the correlation value for even a single channel goes too low, the average BER drops considerably. We developed a method of correlation flattening, where the binary chip pattern at the transmitter is adjusted so that the correlation values have averaged magnitude. Experimental results on several spreading codes show that the correlation flattening method increases the number of available channels at reduced BER.

The Future of Microprocessor: GHz, SMT and Code Morphing (마이크로프로세서의 미래)

  • 박성배
    • Journal of the Korean Professional Engineers Association
    • /
    • v.33 no.4
    • /
    • pp.53-58
    • /
    • 2000
  • Within 10years, it will be possible to integrate 10B transistors on a single chip microprocessor which wilt operate far beyond GHZ, and it will execute about 20-200 instructions per clock cycle from widely variable instruction streams leveraging SMT(Simultaneous Multithreading) technology . Also it will decouple the current legacy X86 binary compatibility by translation layer such as code morphing technology.

  • PDF

Iris Code Construction for Human Identification

  • Kim, Dong-Min
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.1
    • /
    • pp.83-86
    • /
    • 2004
  • The variation of the directional properties of an image is used to extract the iris code for human identification. In order to conserve the original information while minimizing the effect of noise, scale-space filtering is applied. Resulting binary codes have been tested on a set of 272 iris images obtained from 18 persons.

Implementation of Quantum Gates for Binary Field Multiplication of Code based Post Quantum Cryptography (부호 기반 양자 내성 암호의 이진 필드 상에서 곱셈 연산 양자 게이트 구현)

  • Choi, Seung-Joo;Jang, Kyong-Bae;Kwon, Hyuk-Dong;Seo, Hwa-Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1044-1051
    • /
    • 2020
  • The age of quantum computers is coming soon. In order to prepare for the upcoming future, the National Institute of Standards and Technology has recruited candidates to set standards for post quantum cryptography to establish a future cryptography standard. The submitted ciphers are expected to be safe from quantum algorithm attacks, but it is necessary to verify that the submitted algorithm is safe from quantum attacks using quantum algorithm even when it is actually operated on a quantum computer. Therefore, in this paper, we investigate an efficient quantum gate implementation for binary field multiplication of code based post quantum cryptography to work on quantum computers. We implemented the binary field multiplication for two field polynomials presented by Classic McEliece and three field polynomials presented by ROLLO in generic algorithm and Karatsuba algorithm.

A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis (바이너리 정적 분석 기반 Out-of-Bounds Read 취약점 유형 탐지 연구)

  • Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.687-699
    • /
    • 2021
  • When a vulnerability occurs in a program, it is documented and published through CVE. However, some vulnerabilities do not disclose the details of the vulnerability and in many cases the source code is not published. In the absence of such information, in order to find a vulnerability, you must find the vulnerability at the binary level. This paper aims to find out-of-bounds read vulnerability that occur very frequently among vulnerability. In this paper, we design a memory area using memory access information appearing in binary code. Out-of-bounds Read vulnerability is detected through the designed memory structure. The proposed tool showed better in code coverage and detection efficiency than the existing tools.

Adaptive-learning Code Allocation Technique for Improving Dimming Level and Reducing Flicker in Visible Light Communication (가시광통신에서 Dimming Level 향상 및 Flicker 감소를 위한 적응-학습 코드할당 기법)

  • Lee, Kyu-Jin;Han, Doo-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.30-36
    • /
    • 2022
  • In this paper, when the lighting and communication functions of the visible light communication system are used at the same time, we propose a technique to reduce the dimming level and flicker of the lighting. Visible light communication must satisfy both communication and lighting performance. However, the existing data code method results in reducing the brightness of the entire lighting. This causes deterioration of lighting performance and flicker phenomenon. To solve this problem, in this paper, we propose an adaptive learning code allocation technique that allocates binary codes to transmitted characters and optimizes and matches the binary codes allocated according to the frequency of occurrence of alphabets in character strings. Through this, we studied a technique that can faithfully play the role of lighting as well as communication function by allocating codes so that the 'OFF' pattern does not occur continuously while maintaining the maximum dimming level of each character string. As a result of the performance evaluation, the frequency of occurrence of '1' increased significantly without significantly affecting the overall communication performance, and on the contrary, the frequency of consecutive '0' decreased, indicating that the lighting performance of the system was greatly improved.