• Title/Summary/Keyword: CI Code

Search Result 87, Processing Time 0.018 seconds

An Excess-3 Code Adde $r_{}$tracter Design Decimal Computation (십진수 계산을 위한 3초과 부호 가감산기 설계)

  • 최종화;한선경;유영갑
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.6
    • /
    • pp.32-38
    • /
    • 2003
  • An excess-3 code adde $r_tracter circuit is proposed for human friendly decimal computation. Carry lookahead (CLA) circuitry can be used to enhance decimal computation speed. The proposed excess-3 adde $r_tracter employs improved CLA and compensation circuitry recoding computation delay. The circuitry used for addition is used for subtraction without further modification. Substantial speed improvement is obtained compared to conventional designs.signs.

Association of Lower Socioeconomic Status and SARS-CoV-2 Positivity in Los Angeles, California

  • Allan-Blitz, Lao-Tzu;Goldbeck, Cameron;Hertlein, Fred;Turner, Isaac;Klausner, Jeffrey D.
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.3
    • /
    • pp.161-165
    • /
    • 2021
  • Objectives: Severe acute respiratory syndrome coronavirus 2 (SARS-CoV-2) spreads heterogeneously, disproportionately impacting poor and minority communities. The relationship between poverty and race is complex, with a diverse set of structural and systemic factors driving higher rates of poverty among minority populations. The factors that specifically contribute to the disproportionate rates of SARS-CoV-2 infection, however, are not clearly understood. Methods: We evaluated SARS-CoV-2 test results from community-based testing sites in Los Angeles, California, between June and December, 2020. We used tester zip code data to link those results with United States Census report data on average annual household income, rates of healthcare coverage, and employment status by zip code. Results: We analyzed 2 141 127 SARS-CoV-2 test results, of which 245 154 (11.4%) were positive. Multivariable modeling showed a higher likelihood of SARS-CoV-2 test positivity among Hispanic communities than among other races. We found an increased risk for SARS-CoV-2 positivity among individuals from zip codes with an average annual household income

A Study on the dose distribution produced by $^{32}$ P source form in treatment for inhibiting restenosis of coronary artery (관상동맥 재협착 방지를 위한 치료에서 $^{32}$ P 핵종의 선원 형태에 따른 선량분포에 관한 연구)

  • 김경화;김영미;박경배
    • Progress in Medical Physics
    • /
    • v.10 no.1
    • /
    • pp.1-7
    • /
    • 1999
  • In this study, the dose distributions of a $^{32}$ p uniform cylindrical volume source and a surface source, a pure $\beta$emitter, were calculated in order to obtain information relevant to the utilization of a balloon catheter and a radioactive stent. The dose distributions of $^{32}$ p were calculated by means of the EGS4 code system. The sources are considered to be distributed uniformly in the volume and on the surface in the form of a cylinder with a radius of 1.5 mm and length of 20 mm. The energy of $\beta$particles emitted is chosen at random in the $\beta$ energy spectrum evaluated by the solution of the Dirac equation for the Coulomb potential. Liquid water is used to simulate the particle transport in the human body. The dose rates in a target at a 0.5mm radial distance from the surface of cylindrical volume and surface source are 12.133 cGy/s per GBq (0.449 cGy/s per mCi, uncertainty: 1.51%) and 24.732 cGy/s per GBq (0.915 cGy/s per mCi, uncertainty: 1.01%), respectively. The dose rates in the two sources decrease with distance in both radial and axial direction. On the basis of the above results, the determined initial activities were 29.69 mCi and 1.2278 $\mu$Ci for the balloon catheter and the radioactive stent using $^{32}$ P isotope, respectively. The total absorbed dose for optimal therapeutic regimen is considered to be 20 Gy and the treatment time in the case of the balloon catheter is less than 3 min. Absorbed doses in targets placed in a radial direction for the two sources were also calculated when it expressed initial activity in a 1 mCi/ml volume activity density for the cylindrical volume source and a 0.1 mCi/cm$^2$ area activity density for the surface source. The absorbed dose distribution around the $^{32}$ P cylindrical source with different size can be easily calculated using our results when the volume activity density and area activity density for the source are known.

  • PDF

A Study on the Pentium Code Generation using Retargetable Code Generation Technique from Bytecode (Bytecode로부터 재목적 코드 생성 기법을 이용한 Pentium 코드 생성에 관한 연구)

  • Jeong, Seong-Ok;Go, Gwang-Man;Lee, Seong-Ju
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.4
    • /
    • pp.1-8
    • /
    • 2000
  • The massive growth of the internet and the world-wide-web leads us to research the programming languages for the development of applications in heterogeneous, network-wide distributed environments. Java is an object-oriented language for such a environment and the Java programming language environment provides a portable, interpreted, high-performance, simple programming language. Bytecode is an intermediate code for Java language and it enables the development of applications on multiple platform in heterogeneous, distributed networks. But it takes much time to execute Bytecode because of using an interpretation method. In this paper, we design and implement a retargetable code generation system which can be systematically reconfigured to generate code for a variety of distinct target computers. From the system, we realize the code generation system which translates the Bytecode being produced by Java compiler into Pentium target code. We use ACK code generation system to do the work easily.

  • PDF

A Study on the Neutron Detection by change of Asphalt Content (아스팔트 함량 변화에 따른 중성자 검출에 관한 연구)

  • Kim, Ki-Joon
    • Journal of the Korea Computer Industry Society
    • /
    • v.8 no.1
    • /
    • pp.9-16
    • /
    • 2007
  • In this study, the change of neutron detection can be use the basic data of asphalt content detector under the influence of the jurisdiction and usage of radioisotopes are limited of $100[{\mu}Ci]$ or less. To obtain neutron detector's properties using design materials in first step phase, the change of neutron detection is to be calculated how can be increase or decrease due to the change of asphalt content, also it look over the change results which is installed absorber(cadmium plate) around moderator(polyethylene) using MCNP Code.

  • PDF

A Design on neutron absorber and moderator for the content measurement of Asphalt (아스팔트 함량 측정을 위한 중성자 흡수체 및 감속재 설계)

  • Kim Ki-Joon
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.1
    • /
    • pp.7-14
    • /
    • 2006
  • In Korea, under the influence of the jurisdiction, usage of radioisotopes are limited. The limitation is $100[{\mu}Ci]$ or less. Therefore, in this study, basic data were designed, and the following data are needed in order to improve content measuring instrument which is suitable for radioisotopes limitation. Owing to the source and detector's properties, measuring instrument was designed geometrically, neutron and photon's particle transportation was analysed by using the MCNP code which is in Monte Carlo Method, also the location of source and detectors, geometrical structure of neutron absorber and moderator was designed.

  • PDF

Colluders Tracing on the Collusion Codes of Multimedia Fingerprinting Codes based on BIBD (BIBD 기반의 멀티미디어 핑거프린팅 코드의 공모코드들에 대한 공모자 추적)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.6
    • /
    • pp.79-86
    • /
    • 2009
  • In this paper, it has the performance metrics and the utility evaluation of the collusion codes about multimedia fingerprinting code based on BIBD and then the tracing algorithm of all colluders is proposed. Among the collusion codes, the bit stream of "all 0" or "all 1" are generated, also same collusion code and bit reversed code with user's fingerprinting code are generated. Thus there was occurred some problems, in which a colluder is deciding to anti-colluder or anti-colluder is deciding to colluder. In this paper, for the performance metrics and the utility evaluation of the collude codes, the experiment onto the total solution is processed by the logical collusion operation added with a partially processed averaging attack in the past papers. The proposed performance metrics and the utility evaluation about the collusion code generated from multimedia fingerprinting code based on BIBD is operated. Through the experiment, it confirmed that the ratio of colluder tracing is 100%.

An Implementation on the XOR-ACC of Multimedia Fingerprinting using Neural Network (신경망을 이용한 멀티미디어 핑거프린팅의 XOR-ACC 구현)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.1-8
    • /
    • 2011
  • In multimedia fingerprinting field, it is many used a code based on BIBD, which has a strong resiliency of anti-collusion. When a collusion-attack code is generated with a logical XOR operation using the code based on BIBD, then some cases are occurred that a colluded code could be generated to the same fingerprint of non-colluder on the other hand, the colluder is decided to the non-colluder so that he would be excepted in the colluder tracing. For solving the serious problem of the wrong decision of the colluder tracing in this paper, XOR-ACC is implemented using multi-layer perceptron neural network among (AND, OR, XOR and Averaging)-ACC by the measured correlation coefficient. Through the experiment, it confirms that XOR-ACC efficiency of multimedia fingerprinting code{7,3,1} based on BIBD is improved to 88.24% from the conventional 41.18%, so that a ratio of the colluder tracing is also improved to 100% from the conventional 53%. As a result, it could be traced and decided completely a sectional colluder and non-colluder about the collusion attacks.

An Implementation of Multimedia Fingerprinting Algorithm Using BCH Code (BCH 코드를 이용한 멀티미디어 핑거프린팅 알고리즘 구현)

  • Choi, Dong-Min;Seong, Hae-Kyung;Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.1-7
    • /
    • 2010
  • This paper presents a novel implementation on multimedia fingerprinting algorithm based on BCH (Bose-Chaudhuri-Hocquenghem) code. The evaluation is put in force the colluder detection to n-1. In the proposed algorit hm, the used collusion attacks adopt logical combinations (AND, OR and XOR) and average computing (Averaging). The fingerprinting code is generated as below step: 1. BIBD {7,4,1} code is generated with incidence matrix. 2. A new encoding method namely combines BIBD code with BCH code, these 2 kind codes are to be fingerprinting code by BCH encoding process. 3. The generated code in step 2, which would be fingerprinting code, that characteristic is similar BCH {15,7} code. 4. With the fingerprinting code in step 3, the collusion codebook is constructed for the colluder detection. Through an experiment, it confirmed that the ratio of colluder detection is 86.6% for AND collusion, 32.8% for OR collusion, 0% for XOR collusion and 66.4% for Averaging collusion respectively. And also, XOR collusion could not detect entirely colluder and on the other hand, AND and Averaging collusion could detect n-1 colluders and OR collusion could detect k colluders.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.