• Title/Summary/Keyword: CODE

Search Result 17,988, Processing Time 0.039 seconds

A Study on The Performance Improvement of HDR-WPAN System Using Turbo Code (Turbo Code를 사용한 HDR-WPAN 시스템의 성능개선 방안 연구)

  • Kang, Chul-Gyu;Kim, Jae-Young;OH, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.774-777
    • /
    • 2005
  • In this paper, we propose performance improvement algorithm for high data rate wireless personal area network (HDR-WPAN) system using turbo code. Turbo code increase detection delay and computation according to iterate counts. However, turbo code has been shown to be very close th the Shanon limit, can be classified as a block-based error correction code. Turbo code has gain about E$_b$/N$_o$=5.8dB at 10$^{-4}$ in the multipath indoor channel. In the result, HDR-WPAN system adopted turbo code has reliable communication by low power.

  • PDF

A Study of Multiple Compression for Malicious Code Execution and Concealment (악성코드 실행과 은닉을 위한 다중 압축 연구)

  • Yi, Jeong-Hoon;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.299-302
    • /
    • 2010
  • Recently, the malicious code is not easily detectable in the vaccine for the virus, malicious code as a compressed file by modulation pattern is the tendency to delay. Among the many antivirus engines on the market a compressed file that can be modulated by malicious code, and test whether the pattern will need to know. We cover a multi-compressed files, malicious code modulated secreted by examining patterns of test engine is being detected is through a computer simulation. Analysis of secreted activities of malicious code and infect the host file tampering with the system driver files and registry, it gets registered is analyzed. this study will contribute hidden malicious code inspection and enhance vaccine efficacy in reducing the damage caused by malicious code.

  • PDF

Analysis on the optimal 2-dimensional code generation algorithm for high-speed optical CDMA network (초고속 광 코드분할 다원접속 네트웍용 최적 2차 코드 생성 알고리즘 제안 및 연구)

  • 신종윤;박남규
    • Korean Journal of Optics and Photonics
    • /
    • v.13 no.5
    • /
    • pp.435-441
    • /
    • 2002
  • In this paper, we propose an optimal 2-dimensional construction algorithm of a code family for a high-speed optical code division multiple access network. The optimal 2-D code family generated by search algorithm has better spectrum efficiency than previous codes, having relatively many code sets with short code length and the same or lower BER. Using the optimal 2-D code, OCDMA systems make it possible to utilize the spectrum more efficiently than WDM systems. The probability of bit error for high-speed OCDMA transmissions is calculated as a function of the number of users in the presence of receiver and shot noise(additive white Gaussian noise).

QR code as speckle pattern for reinforced concrete beams using digital image correlation

  • Krishna, B. Murali;Tezeswi, T.P.;Kumar, P. Rathish;Gopikrishna, K.;Sivakumar, M.V.N.;Shashi, M.
    • Structural Monitoring and Maintenance
    • /
    • v.6 no.1
    • /
    • pp.67-84
    • /
    • 2019
  • Digital Image Correlation technique (DIC) is a non-contact optical method for rapid structural health monitoring of critical infrastructure. An innovative approach to DIC is presented using QR (Quick Response) code based random speckle pattern. Reinforced Cement Concrete (RCC) beams of size $1800mm{\times}150mm{\times}200mm$ are tested in flexure. DIC is used to extract Moment (M) - Curvature (${\kappa}$) relationships using random speckle patterns and QR code based random speckle patterns. The QR code based random speckle pattern is evaluated for 2D DIC measurements and the QR code speckle pattern performs satisfactorily in comparison with random speckle pattern when considered in the context of serving a dual purpose. Characteristics of QR code based random speckle pattern are quantified and its applicability to DIC is explored. The ultimate moment-curvature values computed from the QR code based random speckled pattern are found to be in good agreement with conventional measurements. QR code encrypts the structural information which enables integration with building information modelling (BIM).

Research Trend Analysis for Sustainable QR code use - Focus on Big Data Analysis

  • Lee, Eunji;Jang, Jikyung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3221-3242
    • /
    • 2021
  • The purpose of the study is to examine the current study trend of 'QR code' and suggest a direction for the future study of big data analysis: (1) Background: study trend of 'QR code' and analysis of the text by subject field and year; (2) Methodology: data scraping and collection, EXCEL summary, and preprocess and big data analysis by R x 64 4.0.2 program package; (3) the findings: first, the trend showed a continuous increase in 'QR code' studies in general and the findings were applied in various fields. Second, the analysis of frequent keywords showed somewhat different results by subject field and year, but the overall results were similar. Third, the visualization of the frequent keywords also showed similar results as that of frequent keyword analysis; and (4) the conclusions: in general, 'QR code' studies are used in various fields, and the trend is likely to increase in the future as well. And the findings of this study are a reflection that 'QR code' is an aspect of our social and cultural phenomena, so that it is necessary to think that 'QR code' is a tool and an application of information. An expansion of the scope of the analysis is expected to show us more meaningful indications on 'QR code' study trends and development potential.

Application of data driven modeling and sensitivity analysis of constitutive equations for improving nuclear power plant safety analysis code

  • ChoHwan Oh;Doh Hyeon Kim;Jeong Ik Lee
    • Nuclear Engineering and Technology
    • /
    • v.55 no.1
    • /
    • pp.131-143
    • /
    • 2023
  • Constitutive equations in a nuclear reactor safety analysis code are mostly empirical correlations developed from experiments, which always accompany uncertainties. The accuracy of the code can be improved by modifying the constitutive equations fitting wider range of data with less uncertainty. Thus, the sensitivity of the code with respect to the constitutive equations is evaluated quantitatively in the paper to understand the room for improvement of the code. A new methodology is proposed which first starts by dividing the thermal hydraulic conditions into multiple sub-regimes using self-organizing map (SOM) clustering method. The sensitivity analysis is then conducted by multiplying an arbitrary set of coefficients to the constitutive equations for each sub-divided thermal-hydraulic regime with SOM to observe how the code accuracy varies. The randomly chosen multiplier coefficient represents the uncertainty of the constitutive equations. Furthermore, the set with the smallest error with the selected experimental data can be obtained and can provide insight which direction should the constitutive equations be modified to improve the code accuracy. The newly proposed method is applied to a steady-state experiment and a transient experiment to illustrate how the method can provide insight to the code developer.

Realization of Smart Greenhouse Cost Using Greenhouse Structural Code and Greenhouse Construction Estimate (온실구조기준 및 온실공사 품셈을 활용한 스마트 온실 단가 현실화 연구)

  • Lee, Chul-sung;Kim, Hyuk;Shin, Seung-wook;Park, Mi-lan
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.2
    • /
    • pp.29-36
    • /
    • 2022
  • This study analyzed the effects of building and greenhouse structural code on the structural design and the greenhouse construction cost. The over-design possibility of greenhouse was analyzed when building structural code was applied using standard smart greenhouse drawings. The possibility of decrease in greenhouse construction cost was investigated if the currently applied building structural code was replaced with greenhouse structural code. As a result of comparing the member sizes with the standard drawings, building structural code was designed with 13%~74% more steel than greenhouse structural code. When building construction estimate was replaced with greenhouse construction estimate, it was possible to reduce the total construction cost of the glass greenhouse by 17% and that of the vinyl greenhouse by 14%. Since there is no standard construction estimate suitable for greenhouses, the wage unit price is set excessively, and the construction cost of the smart greenhouse is increasing. In conclusion, it is necessary to establish greenhouse structural code and greenhouse construction estimate to lower the greenhouse construction cost.

An Implementation of Multimedia Fingerprinting Algorithm Using BCH Code (BCH 코드를 이용한 멀티미디어 핑거프린팅 알고리즘 구현)

  • Choi, Dong-Min;Seong, Hae-Kyung;Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.1-7
    • /
    • 2010
  • This paper presents a novel implementation on multimedia fingerprinting algorithm based on BCH (Bose-Chaudhuri-Hocquenghem) code. The evaluation is put in force the colluder detection to n-1. In the proposed algorit hm, the used collusion attacks adopt logical combinations (AND, OR and XOR) and average computing (Averaging). The fingerprinting code is generated as below step: 1. BIBD {7,4,1} code is generated with incidence matrix. 2. A new encoding method namely combines BIBD code with BCH code, these 2 kind codes are to be fingerprinting code by BCH encoding process. 3. The generated code in step 2, which would be fingerprinting code, that characteristic is similar BCH {15,7} code. 4. With the fingerprinting code in step 3, the collusion codebook is constructed for the colluder detection. Through an experiment, it confirmed that the ratio of colluder detection is 86.6% for AND collusion, 32.8% for OR collusion, 0% for XOR collusion and 66.4% for Averaging collusion respectively. And also, XOR collusion could not detect entirely colluder and on the other hand, AND and Averaging collusion could detect n-1 colluders and OR collusion could detect k colluders.

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Improvement of the Code Classification Structure in Piping Material Management for Petrochemical Plant Projects (석유화학 플랜트의 효율적 배관자재 관리를 위한 코드분류체계 개선)

  • Lee, Jong-Pill;Moon, Yoon-Jae;Lee, Jae-Heon
    • Plant Journal
    • /
    • v.11 no.1
    • /
    • pp.39-49
    • /
    • 2015
  • The objective of this study is to improve the classification structure of commodity code for piping material management which is considered as the fundamental of commodity code and piping material management system. It enhances the efficiency of piping material management directly or indirectly affecting the engineering, procurement and construction in a petrochemical plant projects. To establish an improved code classification structure, this study identifies the problems of former code classification structure in details, as well as the characteristics of other domestic and global EPC company's code classification structures and presents the improved direction considering the recently mega-sized and specialized projects. Accordingly, to efficiently enhance piping material management, the improved code classification structures have been derived from defining suitable code classification structure for specific piping component, adding more standard attribute, expanding the number of code digits and classifying code hierarchy. The results of applying the improved classification structure of commodity code to on-going project have led to reduce the rate of rework from 4.98% to 2.48% for developing purchase description and also have saved working time for executing piping design by 3D modeling from 6 months by two persons to 4 months by a person which is decreased 67% consequently. In addition, the structures of pyramid code management have resulted to accumulation and analysis of the various piping data for other disciplines such as procurement and estimation team which require commodity code information through the company's material control system.

  • PDF