• Title/Summary/Keyword: Code & standard

Search Result 1,438, Processing Time 0.034 seconds

A Reconfigurable, General-purpose DSM-CC Architecture and User Preference-based Cache Management Strategy (재구성이 가능한 범용 DSM-CC 아키텍처와 사용자 선호도 기반의 캐시 관리 전략)

  • Jang, Jin-Ho;Ko, Sang-Won;Kim, Jung-Sun
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.89-98
    • /
    • 2010
  • In current digital broadcasting systems, GEM(Globally Executable MHP)-based middlewares such as MHP(Multimedia Home Platform), OCAP(OpenCable Application Platform), ACAP(Advanced Common Application Platform) are the norm. Despite much of the common characteristics shared, such as MPEG-2 and DSM-CC(Digital Storage Media-Command and Control) protocols, the information and data structures they need are slightly different, which results in incompatibility issues. In this paper, in line with an effort to develop an integrated DTV middleware, we propose a general-purpose, reconfigurable DSM-CC architecture for supporting various standard GEM-based middlewares without code modifications. First, we identify DSM-CC components that are common and thus can be shared by all GEM-based middlewares. Next, the system is provided with middleware-specific information and data structures in the form of XML. Since the XML information can be parsed dynamically at run time, it can be interchanged either statically or dynamically for a specific target middleware. As for the performance issues, the response time and usage frequency of DSM-CC module highly contribute to the performance of STB(Set-Top-Box). In this paper, we also propose an efficient application cache management strategy and evaluate its performance. The performance result has shown that the cache strategy reflecting user preferences greatly helps to reduce response time for executing application.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Hardware Design for JBIG2 Encoder on Embedded System (임베디드용 JBIG2 부호화기의 하드웨어 설계)

  • Seo, Seok-Yong;Ko, Hyung-Hwa
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.182-192
    • /
    • 2010
  • This paper proposes the hardware IP design of JBIG2 encoder. In order to facilitate the next generation FAX after the standardization of JBIG2, major modules of JBIG2 encoder are designed and implemented, such as symbol extraction module, Huffman coder, MMR coder, and MQ coder. ImpulseC Codeveloper and Xilinx ISE/EDK program are used for the synthesis of VHDL code. To minimize the memory usage, 128 lines of input image are processed succesively instead of total image. The synthesized IPs are downloaded to Virtex-4 FX60 FPGA on ML410 development board. The four synthesized IPs utilize 36.7% of total slice of FPGA. Using Active-HDL tool, the generated IPs were verified showing normal operation. Compared with the software operation using microblaze cpu on ML410 board, the synthesized IPs are better in operation time. The improvement ratio of operation time between the synthesized IP and software is 17 times in case of symbol extraction IP, and 10 times in Huffman coder IP. MMR coder IP shows 6 times faster and MQ coder IP shows 2.2 times faster than software only operation. The synthesized H/W IP and S/W module cooperated to succeed in compressing the CCITT standard document.

A Study on Reliability Based Design Criteria for Reinforced Concrete Columns (철근(鐵筋)콘크리트기둥의 신뢰성(信賴性) 설계규준(設計規準)에 관한 연구(研究))

  • Cho, Hyo Nam;Min, Kyung Ju
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.3 no.1
    • /
    • pp.25-33
    • /
    • 1983
  • This study is directed to propose a set of reliability based design provisions which gives more rational design for R.C. columns than the current WSD or USD standard design codes. Cornell's MFOSM theory is used for the derivation of the algorithm for the evaluation of uncertainties associated with resistances, whereas the magnitude of the uncertainties associated with load effects are chosen primarily by considering our level of practice. And thus the uncertainties so obtained are applied for the reliability analysis and the derivation of reliability based design criteria. A target reliability(${\beta}_0=4.0$) is selected as an appropriate value by comparing the values used in foreign countries and by analyzing the reliability levels of our current USD and WSD design standars. Then, a set of load and resistance factors corresponding to the target reliability is proposed as a reliability based design provision, and furthermoere a set of allowable stresses for reinforcing steel and concrete having same level of relibity with the corresponding LRFD criteria is also propared for the current WSD design provision. It may be concluded that the proposed LRFD reliability based design provisions and the corresponding allowable stresses give more rational design than the current code for R.C. columns and may be desirable to introdue into the current WSD and USD provision of R.C. column design.

  • PDF

A Numerical Study on the Optimization of Urea Solution Injection to Maximize Conversion Efficiency of NH3 (NH3 전환효율 극대화를 위한 Urea 인젝터의 분사 최적화에 관한 수치적 연구)

  • Moon, Seongjoon;Jo, Nakwon;Oh, Sedoo;Jeong, Soojin;Park, Kyoungwoo
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.3
    • /
    • pp.171-178
    • /
    • 2014
  • From now on, in order to meet more stringer diesel emission standard, diesel vehicle should be equipped with emission after-treatment devices as NOx reduction catalyst and particulate filters. Urea-SCR is being developed as the most efficient method of reducing NOx emissions in the after-treatment devices of diesel engines, and recent studies have begun to mount the urea-SCR device for diesel passenger cars and light duty vehicles. That is because their operational characteristics are quite different from heavy duty vehicles, urea solution injection should be changed with other conditions. Therefore, the number and diameter of the nozzle, injection directions, mounting positions in front of the catalytic converter are important design factors. In this study, major design parameters concerning urea solution injection in front of SCR are optimized by using a CFD analysis and Taguchi method. The computational prediction of internal flow and spray characteristics in front of SCR was carried out by using STAR-CCM+7.06 code that used to evaluate $NH_3$ uniformity index($NH_3$ UI). The design parameters are optimized by using the $L_{16}$ orthogonal array and small-the-better characteristics of the Taguchi method. As a result, the optimal values are confirmed to be valid in 95% confidence and 5% significance level through analysis of variance(ANOVA). The compared maximize $NH_3$ UI and activation time($NH_3$ UI 0.82) are numerically confirmed that the optimal model provides better conversion efficiency of $NH_3$. In addition, we propose a method to minimize wall-wetting around the urea injector in order to prevent injector blocks caused by solid urea loading. Consequently, the thickness reduction of fluid film in front of mixer is numerically confirmed through the mounting mixer and correcting injection direction by using the trial and error method.

A Study on the Validation of Effective Angle of Particle Deposition according to the Detection Efficiency of High-purity Germanium Gamma-ray Detector (고순도 저마늄 감마선 검출기의 검출효율에 따른 유효입체각 검증에 관한 연구)

  • Chang, Boseok
    • Journal of the Korean Society of Radiology
    • /
    • v.14 no.4
    • /
    • pp.487-494
    • /
    • 2020
  • The distance between the source and the detector, the diameter of the detector, and the volume effect of the radiation source result in a change in solid angle at the detector entrance, which affects the determination of detection efficiency by causing a difference in path length within the detector. A typical analysis method for calculating solid angles was useful only for a source (60Co) with a simple geometric structure, so in this experiment, the distance between the detector and the source was measured by switching on for up to 25 cm with the reference point of window cap 0.5 cm. In addition, 450 and 1000 ㎖ Marinelli beaker of standard volumetric sources were closely adhered to the detector. For circular point sources co-axial with the detector, the change in the solid angle to the distance from the detector window is equal to half the square radius of the source versus the square radius of the detector, if the resulting relationship of the calculation analysis results in the detector being less than the radius of the source. Since the solid angular difference is 0.5 the result of Monte Carlo is acceptable. The relationship between detector and source distance is shown. Solid angles have been verified to decrease rapidly with distance. Measurement and simulation results for a volumetric source show a difference of ±1.01% from a distance of 0 cm and less than 4 % when the distance is reduced to 5 and 10 cm. It can be seen that the longer distance, the smaller efficiency angle, and the exponential increase in attenuation as the energy decreases, is reflected in the calculation of efficiency. Thus, the detection efficiency has proved sufficient for the use of solid angle and Monte Carlo codes.

A study on the constitution of S box and G function in SEED-type cipher (SEED 형식 암호에서 S 박스와 G 함수 구성에 관한 연구)

  • 송홍복;조경연
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4A
    • /
    • pp.291-300
    • /
    • 2002
  • In this paper, a way of constituting optimized S box and G function was suggested in the block cipher whose structure is similar to SEED, which is KOREA standard of 128-bit block cipher. S box can be formed with nonlinear function and an affine transform. Nonlinear function must be strong with differential attack and linear attack, and it consists of an inverse number over GF(2$\^$8/) which has neither a fixed point, whose input and output are the same except 0 and 1, nor an opposite flexed number, whose output is one's complement of the input. Affine transform can be constituted so that the input/output correlation can be the lowest and there can be no fixed point or opposite fixed point. G function undergoes diffusive linear transform with 4 S-box outputs using the matrix of 4$\times$4 over GF(2$\^$8/). G function can be constituted so that MDS(Maximum Distance Separable) code can be formed, SAC(Strict Avalanche Criterion) can be met, there can be no weak input, where a fried point, an opposite fried point, and output can be two's complement of input, and the construction of hardware can be made easy. The S box and G function suggested in this paper can be used as a constituent of the block cipher with high security, in that they are strong with differential attack and linear attack with no weak input and they are excellent at diffusion.

Study on Guideline of Water Supply System for Forest Fire (산불방지 급수시설 설치 기준 마련에 관한 연구)

  • Kim, Dong-Hyun;Nam, Song-Hee;Keum, Si-Hoon
    • Fire Science and Engineering
    • /
    • v.27 no.3
    • /
    • pp.38-46
    • /
    • 2013
  • Permanent water supply and water sprinkling systems are essential to protect major forests and facilities from forest fire. Back in 2005, Naksan Temple, a valuable cultural asset of Korea, was burned down in a forest fire that took place in Yangyang. This started a series of movements including installing water supply facilities and managing forests near important cultural assets. As for the existing facilities, however, they were installed without any standard guidelines for management and installation according to each constructor's specifications, which were based on the National Fire Safety Code 109. Unfortunately, this is not effective in protecting facilities from forest fires such as they have a small protection area, limited simultaneous sprinkling, and a difficult the movement of fire hose. Against this background, the study examines the condition of water supply facilities currently in use, identifies their deficiencies, and suggests how to improve the criteria for water supply service to effectively prevent forest fire. Specifically, three systems were proposed: Water Sprinkler Tower System for preventing spread of crown fires, and Forest Fire Hydrant System and Portable Water Spray System to be effective for suppressing surface fires. In addition, the standards on the performance and components of water pumps are also suggested.

A Survey of the Presence of Aflatoxins in Herb Medicines (한약재중의 아플라톡신 오염도 조사)

  • Park, Sung-Kyu;Jang, Jung-Im;Ha, Kwang-Tae;Kim, Sung-Dan;Kim, Ouk-Hee;Choi, Younh-Hee;Seung, Hyun-Jeung;Kim, Si-Jung;Lee, Kyeong-Ah;Jo, Han-Bin;Choi, Byung-Hyum;Kim, Min-Young
    • Journal of Food Hygiene and Safety
    • /
    • v.24 no.2
    • /
    • pp.169-173
    • /
    • 2009
  • A survey of total aflatoxin levels was conducted on 145 samples(carthamiflos, thujae semen, giycyrrhizae radix et rhizoma) collected in Yakyeang markets in Seoul. Aflatoxin levels were quantified by the immunoaffinity column clean-up method followed by performance liguid chromatography(HPLC)-fluorescence detector(FLD). Aflatoxins were found in 10(6.9%)samples including 5 Arecae semen, 4 Thujae semen, 1 Zizyphi semen with a range of $0.45{\sim}79.15\;{\mu}g/kg$. Generally These results show that the contamination level of aflatoxins in Herb Medicines consumed in Korea is high compared with the standard in Korea Herb Medicine Code($10\;{\mu}g/kg$ as aflatoxin B1). It is considered that aflatoxin concentration was increased in herb medicines during a storage and drying in herb medicines examined

A Study on the Hand Hygiene of Food Handlers of Food Court and Cafeteria in University Campus (대학 구내 휴게음식점 종사자의 손 위생관리에 관한 연구)

  • Kim, Jong-Gyu;Park, Jeong-Yeong;Kim, Joong-Soon
    • Journal of Food Hygiene and Safety
    • /
    • v.25 no.2
    • /
    • pp.133-142
    • /
    • 2010
  • This study was performed to investigate awareness of hand washing, hand washing behavior, and the levels of indicator microorganisms on hands of food handlers who work in the food court and cafeteria of a university campus. The three methods used were questionnaire survey by interview, direct observation in restrooms, and microbiological examination according to the Food Code of Korea. A positive attitude toward hand washing compliance was reported by the responded food handlers; however, improper hand washing and poor hand hygiene of the food handlers were recognized by the unnoticed direct observation. Significant differences were found between the questionnaire survey and the direct observation (p < 0.05) in hand washing compliance after using the toilet, duration of hand washing, use of hand washing agent, washing different parts of the hands, hand-drying method, temperature of water, and method of turning off the water. Samples taken from their hands before work showed higher level of standard plate count, total and fecal coliforms, and Escherichia coli than those taken after washing with water. After washing hands with antiseptic liquid soap, the bacterial populations including Staphylococcus aureus on hands were dramatically reduced. This study indicates that there is a remarkable difference between the food handlers' awareness of hand washing and their hand washing behavior. Poor hand washing compliance and hand hygiene were indicated by the positive results of total and fecal coliforms, E. coli, and S. aureus on hands of some food handlers. The findings of this study suggest that the hand hygiene of the food handlers need to be improved. More training/education on hand washing and hand hygiene of the food handlers should be necessary.