• Title/Summary/Keyword: CODE

Search Result 18,043, Processing Time 0.036 seconds

Opticla Angle Sensor Using Pseudorandom-code And Geometry-code (슈도 랜덤 코드와 기하학 코드를 이용한 광학적 Angle Sensor)

  • 김희성;도규봉
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.2
    • /
    • pp.27-32
    • /
    • 2004
  • Absolute optical angle sensor is described that is an essentially digital opto-electronic device. Its purpose is to resolve the relative and absolute angle position of coded disk using Pseudorandom-code and Geometry-code. In this technique, the angular position of disk is determined in coarse sense first by Pseudorandom-code. A further fine angular position data based on Pixel count is obtained by Geometry-code which result 0.006$^{\circ}$ resolution of the system provided that 7 ${\mu}{\textrm}{m}$ line image sensor are used. The proposed technique is novel in a number of aspects, such that it has the non-contact reflective nature, high resolution of the system, relatively simple code pattern, and inherent digital nature of the sensor. And what is more the system can be easily modified to torque sensor by applying two coded disks in a manner that observe the difference in absolute angular displacement. The digital opto-electronic nature of the proposed sensor, along with its reporting of both torque and angle, makes the system ideal for use in intelligent vehicle systems. In this communication, we propose a technique that utilizes Pseudorandom-code and Geometry-code to determine accurate angular position of coded disk. We present the experimental results to demonstrate the validity of the idea.

Detecting Common Weakness Enumeration(CWE) Based on the Transfer Learning of CodeBERT Model (CodeBERT 모델의 전이 학습 기반 코드 공통 취약점 탐색)

  • Chansol Park;So Young Moon;R. Young Chul Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.431-436
    • /
    • 2023
  • Recently the incorporation of artificial intelligence approaches in the field of software engineering has been one of the big topics. In the world, there are actively studying in two directions: 1) software engineering for artificial intelligence and 2) artificial intelligence for software engineering. We attempt to apply artificial intelligence to software engineering to identify and refactor bad code module areas. To learn the patterns of bad code elements well, we must have many datasets with bad code elements labeled correctly for artificial intelligence in this task. The current problems have insufficient datasets for learning and can not guarantee the accuracy of the datasets that we collected. To solve this problem, when collecting code data, bad code data is collected only for code module areas with high-complexity, not the entire code. We propose a method for exploring common weakness enumeration by learning the collected dataset based on transfer learning of the CodeBERT model. The CodeBERT model learns the corresponding dataset more about common weakness patterns in code. With this approach, we expect to identify common weakness patterns more accurately better than one in traditional software engineering.

Designing A Concatenated Code To Improve The Error Performance Of Low-Priority Data In T-DMB System With The Hierarchical Modulation

  • Li, Erke;Kim, Sung-Gaun;Kim, Han-Jong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.689-692
    • /
    • 2008
  • Hierarchical modulation has been considered for achieving higher data rates in Terrestrial-DMB(T-DMB) systems. And for achieving a higher data rates transmission, the low-priority (LP) data, which is used to carry additional data, such as video data, audio data and textual data, should be perfectly decoded in a certain value of $E_b/N_o$. Unfortunately, the man-made noise badly affects the high-priority (HP) symbol, which is used to carry the conventional data in the existed T-DMB system; and since the advanced T-DMB system is proposed to fit for the legacy T-DMB receivers, the low-priority symbols in the hierarchical modulation are much worse affected by the neighbors, who are both in the same quadrant. Because of the feature that mentioned previously, the turbo code has been considered to deal with the LP data. And due to the degradation which caused by the shortened symbol distance, the error performance of LP data is not sufficient by only using the turbo code. In this paper, we propose a Reed-Solomon code used outside of turbo code, and with the turbo code, it becomes a concatenated code. In this paper, there are some simulation results, within the comparison of those performances, we can see how a Reed-Solomon code is utilized for degradation of error performance which is caused by the hierarchical constellation, and how to design a Reed-Solomon code which is suitable for improving the degradation of error performance.

  • PDF

The performance analysis of a novel enhanced turbo coded system with increased time diversity effect (시간 다이버시티 효과를 증대시키는 새로운 ETD-터보 코드 적용시스템의 성능분석)

  • 고연화;하덕호
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.4 no.4
    • /
    • pp.73-80
    • /
    • 2003
  • In this paper, we propose a ETD-turbo code(Enhanced Time Diversity turbo code) which is a novel turbo code configuration to increase the time diversity effect and analyze the performance of ETD-turbo coded MC-CDMA system. The ETD-turbo code, which is added another interleaver to the conventional turbo code structure, is consisted. Time diversity effect of the ETD-turbo code is improved by every parity bits converted into interleaver pattern. In order to the performance of the ETD-turbo code, we conduct a computer simulation about interleaver type. And we make comparison between the performance of ETD-turbo coded MC-CDMA system and the conventional turbo coded MC-CDMA system. By the simulation results, ETD-turbo code has less BER than the conventional turbo code and time delay is decreased by reducing iteration numbers. Therefore, it is defined that the performance of ETD-turbo coded MC-CDMA system is improved than the conventional turbo coded MC-CDMA system.

  • PDF

Recognition of Colors of Image Code Using Hue and Saturation Values (색상 및 채도 값에 의한 이미지 코드의 칼라 인식)

  • Kim Tae-Woo;Park Hung-Kook;Yoo Hyeon-Joong
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.150-159
    • /
    • 2005
  • With the increase of interest in ubiquitous computing, image code is attracting attention in various areas. Image code is important in ubiquitous computing in that it can complement or replace RFID (radio frequency identification) in quite a few areas as well as it is more economical. However, because of the difficulty in reading precise colors due to the severe distortion of colors, its application is quite restricted by far. In this paper, we present an efficient method of image code recognition including automatically locating the image code using the hue and saturation values. In our experiments, we use an image code whose design seems most practical among currently commercialized ones. This image code uses six safe colors, i.e., R, G, B, C, M, and Y. We tested for 72 true-color field images with the size of $2464{\times}1632$ pixels. With the color calibration based on the histogram, the localization accuracy was about 96%, and the accuracy of color classification for localized codes was about 91.28%. It took approximately 5 seconds to locate and recognize the image code on a PC with 2 GHz P4 CPU.

  • PDF

Three-dimensional QR Code Using Integral Imaging (집적 영상을 활용한 3차원 QR code)

  • Kim, Youngjun;Cho, Ki-Ok;Han, Jaeseung;Cho, Myungjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2363-2369
    • /
    • 2016
  • In this paper, we propose three-dimensional (3D) quick-response (QR) code generation technique using passive 3D integral imaging and computational integral imaging reconstruction technique. In our proposed method, we divide 2D QR code into 4 planes with different reconstruction depths and then we generate 3D QR code using synthetic aperture integral imaging and computational reconstruction. In this 3D QR code generation process, we use integral imaging which is one of 3D imaging technologies. Finally, 3D QR code can be scanned by reconstructing and merging 3D QR codes at 4 different planes with computational reconstruction. Therefore, the security level for QR code scanning may be enhanced when QR code is scanned. To show that our proposed method can improve the security level for QR code scanning, in this paper, we carry out the optical experiments and computational reconstruction. In addition, we show that 3D QR code can be scanned when reconstruction depths are known.

An Exploratory Study of QR Code Utilization for Retailers' Multichannel Strategy (소매업체의 멀티채널 전략을 위한 QR코드 활용의 탐색적 연구)

  • Yoon, Namhee;Kim, Eun Young
    • Fashion & Textile Research Journal
    • /
    • v.16 no.5
    • /
    • pp.730-744
    • /
    • 2014
  • With advances in QR code, mobile is becoming one of important channels in the fashion retail industries. This study attempts to understand the importance of QR code utilization in creating multi-channel business model. Study objectives are to classify types of multi-channel retailing by QR code utilization and to explore the role of QR code technology in strategic marketing elements for types of multichannel retailer. As an exploratory approach, a total of 78 news articles regarding QR code issues were reviewed and analyzed by focusing on 48retailers seleted in this study. The results found seven dimensions of QR code marketing strategies: abundant product information, additional information contents, transaction accessibility, connectedness to channels, location based service, loyalty program and multimedia advertising. Based a combination of channels and level of mobile apps' activation, multichannel retailers utilizing QR code technology were classified into four types; bricks-click-active mobile model, bricks-click-inactive mobile model, bricks-click model, and click-active mobile model. There were differences of using QR code marketing strategies among multichannel models. According to results, for bricks-and-mortar retailers, QR code was critical to integrate shopping experience with merchandise or sales promotions across channels. In addition, for non-store retailers, the QR code utilization was successful in expanding mobile channels, which can promote retail sales by a two-way interaction with customers via the mobile apps.

Performance Analysis of RS, Turbo and LDPC Code in the Binary Symmetric Erasure Channel (이진 대칭 소실 채널에서 RS, 터보 및 저밀도 패리티 검사 부호의 성능 분석)

  • Lim, Hyung-Taek;Park, Myung-Jong;Kang, Seog-Geun;Joo, Eon-Kyeong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.219-228
    • /
    • 2010
  • In this paper, performance of RS (Reed-Solomon), turbo and LDPC (low density parity check) code in the binary symmetric erasure channel is investigated. When the average erasure length is reduced, the frequency of short erasures is increased. The RS code shows serious performance degradation in such an environment since decoding is carried out symbol-by-symbol. As the erasure length is increased, however, the RS code shows much improved en-or performance. On the other hand, the message and corresponding parity symbols of the turbo code can be erased at the same time for the long erasures. Accordingly, iterative decoding of the turbo code can not improve error performance any more for such a long erasure. The LDPC code shows little difference in error performance with respect to the variation of the average erasure length due to the virtual interleaving effect. As a result, the LDPC code has much better erasure decoding performance than the RS and turbo code.

Detecting ShellCode Using Entropy (엔트로피를 이용한 ShellCode 탐지 방법)

  • Kim, Woosuk;Kang, Sunghoon;Kim, Kyungshin;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.3
    • /
    • pp.87-96
    • /
    • 2014
  • Hackers try to achieve their purpose in a variety of ways, such as operating own website and hacking a website. Hackers seize a large amount of private information after they have made a zombie PC by using malicious code to upload the website and it would be used another hacking. Almost detection technique is the use Snort rule. When unknown code and the patterns in IDS/IPS devices are matching on network, it detects unknown code as malicious code. However, if unknown code is not matching, unknown code would be normal and it would attack system. Hackers try to find patterns and make shellcode to avoid patterns. So, new method is needed to detect that kinds of shellcode. In this paper, we proposed a noble method to detect the shellcode by using Shannon's information entropy.

A method for automatic EPC code conversion based on ontology methodology (온톨로지 기반 EPC 코드 자동 변환 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.452-460
    • /
    • 2008
  • ALE-complient RFID middleware system receives EPC code data from reader devices and converts the data into URN format data internally. After filtering and grouping, the system sends the resulting URN code to application and(or) users. Meanwhile, not only the types of EPC code are very diverse, but also another new kinds of EPC code can be emerged in the future. Therefore, a method to process all kinds of EPC code effectively is required by RFID middleware. In this paper, a method to process various kinds of EPC code acquired from RFID reader devices in ALE-complient RFID middleware is proposed. Especially, we propose an approach using ontology technology to process not only existing EPC code but also newly defined code in the future. That is, we build an ontology of conversion rules for each EPC data type to effectively convert EPC data into URL format data. In this case, we can easily extend RFID middleware to process a new EPC code data by adding a conversion rule ontology for the code.