• Title/Summary/Keyword: Byte code

Search Result 62, Processing Time 0.021 seconds

Study on the coding rule of Characters by 1 byte of 3×4 bits with consideration for the transmission efficiency of data communications (데이터 전송 효율을 고려한 3×4비트 1 바이트 문자 부호화 규칙에 관한 연구)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.4
    • /
    • pp.499-504
    • /
    • 2011
  • This paper propose the rule of coding for the characters and symbol, etc which are used in computer, information devices, etc. When they use the rule of coding, they may improve the efficiency of transmission in data communications by reducing the number of scrambling during the line coding in the coder in the transmitter. The paper considered the codes of one byte of 3bits column ${\times}$ 4bits rows. ASCII code is one of the representative code for the codes of one byte of 3bits column ${\times}$ 4bits rows. Therefore, this paper applied ASCII code to study the coding rule of the characters and symbols, etc.

A study on the Hangul automata (한글 오토마타 개발에 관한 연구)

  • Kim, In-Jeong;Hwang, Hee-Yeung
    • Proceedings of the KIEE Conference
    • /
    • 1989.07a
    • /
    • pp.491-494
    • /
    • 1989
  • We have developed a simple and efficient hangul recognizing automata as a part of a graphic project. this automata accepts both English and Korean code from a Korean syllable from a stream of Korean alphabets. The automata then mates a 2 byte Hangul combination code from the recognized syllable and passes that code to the graphic system.

  • PDF

A Design of a Flash Memory Swapping File System using LFM (LFM 기법을 이용한 플래시 메모리 스와핑 파일 시스템 설계)

  • Han, Dae-Man;Koo, Yong-Wan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.47-58
    • /
    • 2005
  • There are two major type of flash memory products, namely, NAND-type and NOR-type flash memory. NOR-type flash memory is generally deployed as ROM BIOS code storage because if offers Byte I/O and fast read operation. However, NOR-type flash memory is more expensive than NAND-type flash memory in terms of the cost per byte ratio, and hence NAND type flash memory is more widely used as large data storage such as embedded Linux file systems. In this paper, we designed an efficient flash memory file system based an Embedded system and presented to make up for reduced to Swapping a weak System Performance to flash file system using NAND-type flash memory, then proposed Swapping algorithm insured to an Execution time. Based on Implementation and simulation studies, Then, We improved performance bases on NAND-type flash memory to the requirement of the embedded system.

  • PDF

Illumination Control in Visible Light Communication Using Manchester Code with Sync-Mark Signal

  • Lee, Seong-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.29 no.3
    • /
    • pp.149-155
    • /
    • 2020
  • In this study, we employed Manchester code for illumination control and flicker prevention of the light-emitting diode (LED) used in a visible light communication (VLC) system. In the VLC transmitter, the duty factor of the Manchester code was utilized for illumination control; in the VLC receiver, the spike signal from an RC-high pass filter was utilized to recover the transmitted signal whilst suppressing the 120-Hz noise arising from adjacent lighting lamps. Instead of the clock being transmitted in a separate channel, a syncmark signal was transmitted in front of each data byte and used as the reference time for transforming the Manchester code to non-return-to-zero (NRZ) data in the receiver. In experiments, the LED illumination was controlled in the range of approximately 12-84% of the constant wave (CW) light via changing of the duty factor from 10% to 90%. This scheme is useful for constructing indoor wireless sensor networks using LED light that is flicker-free and presents capability for illumination control.

A Study on Hangul Text File Management and Effective Code Conversion (한글 문서화일의 관리와 효과적인 코드변환에 관한 연구)

  • Yun, Ho-Sang;Shon, Jin-Gon;Hwang, Chong-Sun
    • Annual Conference on Human and Language Technology
    • /
    • 1989.10a
    • /
    • pp.191-196
    • /
    • 1989
  • 한글 문서화일을 작성할 때 한글코드로서 일반적으로 많이 사용되는 것은 2 Byte 완성형 코드와 2 Byte 조합형 코드이다. 이 두 코드체제는 각각 내제된 장점이 있으며 이로 인하여 많은 논란이 되어 왔으나, 두 코드체제를 이용하여 작성되는 한글 문서 화일은 여전히 늘어나고 있는 것이 현 실정이다. 이러한 배경에서 한글 문서화일의 코드변환에 관해서는 계속 연구되어 왔고 현재 여러종류의 변환프로그램이 실용화되어 있다. 본 논문에서는 기존의 변환프로그램에서 한글 문서화일을 화일 단위로 변환시키는 것을 표시난 (tag field) 개념을 도입하여 디스크 단위로 변환시킬 수 있도록 개선된 변환프로그램을 제시하였다. 아울러 코드변환시 변환이 필요한 화일을 쉽게 찾을 수 있도록 한글 문서화일에 대하여 그 작성 코드의 종류를 표시할 수 있는 DOS 명령어를 제시하였다.

  • PDF

Design of Lightweight Parallel BCH Decoder for Sensor Network (센서네트워크 활용을 위한 경량 병렬 BCH 디코더 설계)

  • Choi, Won-Jung;Lee, Je-Hoon
    • Journal of Sensor Science and Technology
    • /
    • v.24 no.3
    • /
    • pp.188-193
    • /
    • 2015
  • This paper presents a new byte-wise BCH (4122, 4096, 2) decoder, which treats byte-wise parallel operations so as to enhance its throughput. In particular, we evaluate the parallel processing technique for the most time-consuming components such as syndrome generator and Chien search owing to the iterative operations. Even though a syndrome generator is based on the conventional LFSR architecture, it allows eight consecutive bit inputs in parallel and it treats them in a cycle. Thus, it can reduce the number of cycles that are needed. In addition, a Chien search eliminates the redundant operations to reduce the hardware complexity. The proposed BCH decoder is implemented with VHDL and it is verified using a Xilinx FPGA. From the simulation results, the proposed BCH decoder can enhance the throughput as 43% and it can reduce the hardware complexity as 67% compared to its counterpart employing parallel processing architecture.

A Study on the Radio Controller with Convolution Coding for Industry application (컨볼루션 부호를 적용한 산업용 무선 콘트롤러에 관한 연구)

  • 이규선;강병권;김선형
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.205-208
    • /
    • 2003
  • In this paper, we realized radio controller with Convolution code and CRC code to solve the wired and wireless controller's problem that is present industry spot. We used microprocessor as a controller, and analyzed testing data with and without Convolution code. Convolution code of constraint length k=3, symbols rate 1/2 dramatically improves the radio controller's fidelity, and the number of CRC bit is 16bit(2byte) and the polynomial of /Χ$^{15}$ +Χ$^{2}$+1 is used.

  • PDF

Hangul Porting and Display Performance Comparison of an Embedded System (임베디드 시스템을 위한 한글 포팅 및 출력 성능 비교)

  • Oh, Sam-Kweon;Park, Geun-Duk;Kim, Byoung-Kuk
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.493-499
    • /
    • 2009
  • Three methods frequently used for Hangul display in computer systems are Standard Johab Code in which each of Hangul consonants and vowels is given a 5-bit code and each syllable created by combining them forms a 2-byte code, Standard Wansung Code in which each of all the syllables generally used for Hangul presentation forms a 2-byte code, and Unicode in which each syllable in most of the world's language systems is given a unique code so that it allows computers to consistently represent and manipulate them in a unified manner. An embedded system in general has a lower processing power and a limited amount of storage space, compared to a personal compute(PC) system. According to its usage, however, the former may have a processing power equal to that of the latter. Hence, when Hangul display needs to be adopted, an embedded system must choose a display method suitable for its own resource environment. This paper introduces a TFT LCD initialization method and pixel display functions of an LN2440SBC embedded board on which an LP35, a 3.5" TFT LCD kit, is attached. Using the initialization and pixel display functions, in addition, we compare three aforementioned Hangul display methods, in terms of their processing speeds and amounts of memory space required. According to experiments, Standard Johab Code requires less amount of memory space but more processing time than Standard Wansung Code, and Unicode requires the largest amount of memory space but the least processing time.

  • PDF

Composition Rule of Character Codes to efficiently transmit the Character Code in HDLC(High-level Data Link Control) Protocol (HDLC(High-level Data Link Control) 프로토콜에서 효율적 문자부호 전송을 위한 문자부호화 규칙)

  • Hong, Wan-Pyo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.4
    • /
    • pp.753-760
    • /
    • 2012
  • This paper is to show the character coding rule in computer and information equipment etc to improve the transmission efficiency in telecommunications. In the transmission system, the transmission efficiency can be increased by applying the proper character coding method. In datalink layer, HDSL ptotocol use FLAG byte to identify the frame to frame which consists of data bit stream and other control bytes. FLAG byte constits of "01111110". When data bit stream consist of the consecutive 5-bit "1" after "0", the decoder can not distinguish whether the data bit sequence is flag bit stream or data bit stream. To solve the problem, when the line coder in transmitter detects the consecutive 5-bits "1" after "0" in the input data stream, inserts violently the "0" after 5th "1" of the consecutive 5-bit "1" after "0". As a result, when the characters are decoded with the above procedure, the efficiency of system should be decreased. This paper shows the character code rule to minimize the consecutive 5-bits "1" after "0" when the code is given to each characters.

Extracting Scheme of Compiler Information using Convolutional Neural Networks in Stripped Binaries (스트립 바이너리에서 합성곱 신경망을 이용한 컴파일러 정보 추출 기법)

  • Lee, Jungsoo;Choi, Hyunwoong;Heo, Junyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.4
    • /
    • pp.25-29
    • /
    • 2021
  • The strip binary is a binary from which debug symbol information has been deleted, and therefore it is difficult to analyze the binary through techniques such as reverse engineering. Traditional binary analysis tools rely on debug symbolic information to analyze binaries, making it difficult to detect or analyze malicious code with features of these strip binaries. In order to solve this problem, the need for a technology capable of effectively extracting the information of the strip binary has emerged. In this paper, focusing on the fact that the byte code of the binary file is generated very differently depending on compiler version, optimazer level, etc. For effective compiler version extraction, the entire byte code is read and imaged as the target of the stripped binaries and this is applied to the convolution neural network. Finally, we achieve an accuracy of 93.5%, and we provide an opportunity to analyze stripped binary more effectively than before.