• Title/Summary/Keyword: C/A 코드

Search Result 686, Processing Time 0.027 seconds

GNSS 이용 시각비교 통합 모니터링

  • Kim, Jun-Hwan;Yang, Seong-Hun;Lee, Yeong-Gyu;Lee, Seung-U;Lee, Chang-Bok;Kim, Gi-Du
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.482-485
    • /
    • 2006
  • 다채널 시각비교 수신기(R100-40T, Euro-80)를 이용한 GPS C/A 코드 시각비교 데이터와 Ashtech Z12T 수신기를 이용한 P3 코드 시각비교 데이터를 통합 모니터링함으로서, 간편하게 시각비교 결과를 확인 할 수 있게 GUI(Graphic User Interface) 환경으로 구현하였다. 수신기들은 현재 KRISS(Korea Research Institute of Standards and Science)에서 사용 중인 위성이용 시각비교 수신기들이다. 본 시각비교 통합 모니터링 프로세스를 통해서 GPS C/A code 시각비교 데이터와 P3 code 시각비교 데이터 각각을 비교 분석함으로써 시각비교 결과의 신뢰성을 검증하는데 사용한다.

  • PDF

The design and implementation of automatic translation system for hangul's romanization (국어 로마자 표기 자동 변환 시스템 설계 및 구현)

  • 김홍섭
    • KSCI Review
    • /
    • v.2 no.1
    • /
    • pp.45-54
    • /
    • 1995
  • This study is, by assigning ASCII codes hardly used to Bandaljum(ˇ) and making the fonts of Korean-English character mode, to design the way of converting automatically a word, a sentence or a document of korean into phonetic letters by applying the algorismized phonological principles inputted as a letter string, even though a user do not konw the basic principles of the usage of Korean-to-Romanization notation rule. This is designed so that it may be possible to turn into a mechanical code with reference to the corresponding character in the table of Korean-to-Romanization notation rule that is the currently used standard proposition of the government. Consequently this program makes it user more convenient in the manipulations of special case words, the assistance of colorful-screen or pull-down, pop-up menu and the adoptation of utilizable mouse works for a user convienency. This program could be installed in a single diskette of 5.25"(2HD) and be made in C programming language to mplement various font, expansion or condense of font, alternative printing.ting.

  • PDF

Development of an Editor and Howling Engine for Realtime Software Programmable Logic Controller based on Intelligent Agents (지능적 에이전트에 의한 실시간 소프트웨어 PLC 편집기 및 실행엔진 개발)

  • Cho, Young-In
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.12
    • /
    • pp.1271-1282
    • /
    • 2005
  • Recently, PC-based control is incredibly developed in the industrial control field, but it is difficult for PLC programming in PC. Therefore, I need to develop the softeware PLC, which support the international PLC programming standard(IECl131-3) and can be applied to diverse control system by using C language. In this paper, I have developed the ISPLC(Intelligent Agent System based Software Programmable Logic Controller). In ISPLC system, LD programmed by a user which is used over $90\%$ among the 5 PLC languages, is converted to IL, which is one of intermediate codes, and IL is converted to the standard C rode which can be used in a commercial editor such as Visual C++. In ISPLC, the detection of logical error in high level programming(C) is more eaier than PLC programming itself The study of code conversion of LD->IL->C is firstly tried in the world as well as KOREA. I developed an execution engine with a good practical application. To show the effectiveness of the developed system, 1 applied it to a practical case, a real time traffic control(RT-TC) system. ISPLC is minimized the error debugging and programming time owing to be supported by windows application program.

Java and C/C++ Mixed Programming (자바와 C/C++의 혼합 프로그래밍)

  • Kim, Sang-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.10
    • /
    • pp.1514-1524
    • /
    • 2010
  • The standard Java class library does not support the platform-dependent features needed by the application. Therefore, the Java application including the platform -dependent features must supplement the required features by invoking native functions using JNI. The native language programmer has to explicitly specify how to connect to various Java objects and later to disconnect from them. In this paper, I suggest a way to avoid these annoying works. The native method in the pure java class can not contain a native code block. By providing a native code block for the native method, it is possible for programmer to write a native code without being aware of JNI. To achieve this, I introduced the native class that is a java class on the native environment, and made it possible to interchange data by placing an arbitrator between the java class and the native class.

Implementation and evaluation of enabling skill for POJO programing Based on Spring Framework (스프링 프레임워크를 기반으로 POJO 프로그래밍 가능기술의 구현 및 평가)

  • Kwon, Ki-Hong;Byun, Jeong-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1026-1029
    • /
    • 2013
  • 엔터프라이즈 시스템 개발에서 비즈니스 로직을 담은 애플리케이션 코드와 엔터프라이즈 기술을 처리하는 코드가 뒤섞여 존재함으로 인해 오는 여러 가지 단점들이 존재한다. 그렇기 때문에 이 두 가지 서로 다른 속성의 코드를 분리할 수 있는 방법이 요구되고 있다. 이러한 요구를 해결하기 위하여 스프링 프레임워크는 IoC/DI, AOP, PSA 등의 기반기술을 통하여 엔터프라이즈 서비스 기술과 POJO라는 애플리케이션 서비스 로직을 담은 코드를 분리한다. 이 연구는 스프링 프레임워크를 기반으로 웹 어플리케이션을 개발하면서 POJO 프로그래밍 방법의 적용과 그에 따른 정성적 평가를 하는 것에 있다.

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

Research on Malware Classification with Network Activity for Classification and Attack Prediction of Attack Groups (공격그룹 분류 및 예측을 위한 네트워크 행위기반 악성코드 분류에 관한 연구)

  • Lim, Hyo-young;Kim, Wan-ju;Noh, Hong-jun;Lim, Jae-sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.193-204
    • /
    • 2017
  • The security of Internet systems critically depends on the capability to keep anti-virus (AV) software up-to-date and maintain high detection accuracy against new malware. However, malware variants evolve so quickly they cannot be detected by conventional signature-based detection. In this paper, we proposed a malware classification method based on sequence patterns generated from the network flow of malware samples. We evaluated our method with 766 malware samples and obtained a classification accuracy of approximately 40.4%. In this study, malicious codes were classified only by network behavior of malicious codes, excluding codes and other characteristics. Therefore, this study is expected to be further developed in the future. Also, we can predict the attack groups and additional attacks can be prevented.

VRS-based Precision Positioning using Civilian GPS Code Measurements (가상기준점 기반 코드신호를 이용한 정밀 측위)

  • Bae, Tae-Suk
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.29 no.2
    • /
    • pp.201-208
    • /
    • 2011
  • With the increase in the number of smartphone users, precise 3D positional information is required by various applications. The positioning accuracy using civilian single-frequency pseudoranges is at the level of 10 m or so, but most applications these days are asking for a sub-meter level Therefore, instead of an absolute positioning technique, the VRS-based differential approach is applied along with the correction of the double-differenced (DD) residual errors using FKP (Flachen-Korrektur-Parameter). The VRS (Virual Reference Station) is located close to the rover, and the measurements are generated by correcting the geometrical distance to those of the master reference station. Since the unmodeled errors are generally proportional to the length of the baselines, the correction parameters are estimated by fitting a plane to the DD pseudorange errors of the CORS network. The DD positioning accuracy using 24 hours of C/A code measurements provides the RMS errors of 37 cm, 28 cm for latitudinal and longitudinal direction, respectively, and 76 cm for height. The accuracy of the horizontal components is within ${\pm}0.5m$ for about 90% of total epochs, and in particular the biases are significantly decreased to the level of 2-3 cm due to the network-based error modeling. Consequently, it is possible to consistently achieve a sub-meter level accuracy from the single-frequency pseudoranges using the VRS and double-differenced error modeling.

Development of an ECCS Injection Model By Gravity and Flow Rate Distributions in the Passive Reactor Systems (비상노심냉각수의 중력에 의한 주입 및 피동형노심내의 흐름율 분포모델의 개발)

  • Lim, H.G.;Kim, G.S.;Lee, U.C.
    • Nuclear Engineering and Technology
    • /
    • v.26 no.4
    • /
    • pp.562-569
    • /
    • 1994
  • In this study improvement of transient analysis model, KOTRAC, for the passive reactor has been performed. In the KOTRAC, mixture drift flux model is adopted to simulate thermal hydraulic behavior, which can simulate ECCS injection in the passive plant. However, there is a difficulty to handle complete phase separation phenomena due to the near-zero density, which may occur in the pressurizer surge line or horizontal flow paths. In this study, a couple of model changes to over-come Courant limit feilure has been examined. One of key features is to substitute flow distribution parameters with Ishii's correlation. Corrected results are nil compared to those of RELAP/MOD3 analysis.

  • PDF

Applying Design by Contract for software component design in C++ (C++에서 올바른 소프트웨어 콤포넌트 설계를 위한 Design by Contract 활용)

  • Kwak Jongseob;Kwon Keehang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.365-368
    • /
    • 2004
  • 소프트웨어 신뢰성을 보장하기 위한 Eiffel의 Design by Contract[1,2] 기법은 프로그램 코드 안에 코드가 뜻하는 바를 함께 기술하는 것으로 소프트웨어가 명세의 주어진 조건에 따라 정확히 동작하도록 하고 있다. 그것은 재사용성이 높은 콤포넌트를 기반으로 하는 콤포넌트 기반 소프트웨어 개발방법에 있어서 중요한 특징이다. 본 논문에서는 C++언어의 타입 상속에서 올바른 의미적 타입 계층구조를 유지할 수 있도록 Design by Contract 기법을 적용하고, 기능을 활용할 수 있는 방안을 제시하였다. 또한, 객체지향 프로그래밍에 있어서 올바른 타입 구조를 형성할 수 있도록 하여, 견고한 소프트웨어 콤포넌트를 제작할 수 있도록 유도하였다.

  • PDF