• Title/Summary/Keyword: Code Insertion

Search Result 65, Processing Time 0.031 seconds

A New BIM Line Code for High Speed Binary Data Transmission (고속 이진 데이터 전송을 위한 새로운 BIM 선로부호)

  • 정희영;오행석;조경록
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1939-1947
    • /
    • 1999
  • This paper proposes new line code BIM (Bit Insertion and Manipulation) that is designed to overcome the problems of existing line codes. The block code, one of typical existing line code, has good transmission performance but difficulty in implementation. The other typical existing line code, bit insertion code, is easy to implementation but has bad transmission performance. BIM code in this paper could provide not only good performance but also provides simplicity in the implementation by combining the good points of block code into it of bit insertion code properly. In this paper, 5B6B type BIM code is designed. Designed 5B6B BIM code shows good transmission performance such $\pm$2 DSV, 0 RSD, 7 maximum run length and also it can be implemented under 2000 gates and need only 1 bit redundancy.

  • PDF

On a Reduced-Complexity Inner Decoder for the Davey-MacKay Construction

  • Jiao, Xiaopeng;Armand, M.A.
    • ETRI Journal
    • /
    • v.34 no.4
    • /
    • pp.637-640
    • /
    • 2012
  • The Davey-MacKay construction is a promising concatenated coding scheme involving an outer $2^k$-ary code and an inner code of rate k/n, for insertion-deletion-substitution channels. Recently, a lookup table (LUT)-based inner decoder for this coding scheme was proposed to reduce the computational complexity of the inner decoder, albeit at the expense of a slight degradation in word error rate (WER) performance. In this letter, we show that negligible deterioration in WER performance can be achieved with an LUT as small as $7{\cdot}2^{k+n-1}$, but no smaller, when the probability of receiving less than n-1 or greater than n+1 bits corresponding to one outer code symbol is at least an order of magnitude smaller than the WER when no LUT is used.

Dynamic Analysis based on AOP for Checking Security Vulnerability (보안 취약점 검사를 위한 AOP 기반의 동적 분석)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.773-778
    • /
    • 2010
  • OWASP announced most of vulnerabilities result from the data injection by user in 2010 after 2007. Because the contaminated input data is determined at runtime, those data should be checked dynamically. To analyze data and its flow at runtime, dynamic analysis method usually inserts instrument into source code. Intermediate code insertion makes it difficult to manage and extend the code so that the instrument code would be spreaded out according to increase of analysis coverage and volume of code under analysis. In addition, the coupling gets strong between instrument modules and target modules. Therefore developers will struggle against modify or extend the analysis code as instrument. To solve these problem, this paper defines vulnerabilities as a concern using AOP, and suggest the flexible and extensible analysis method to insertion and deletion without increase of coupling.

A Study of Barrier Insertion Loss Near a High Rise Building (고층 건물에 인접한 방음벽의 삽입손실에 관한 연구)

  • 진병주;김현실;김상렬
    • Journal of KSNVE
    • /
    • v.10 no.1
    • /
    • pp.49-56
    • /
    • 2000
  • In this paper performance of the noise barrier which is 53 m long and 6m high, and is located between the high rise apartment and road, is studied by using experimental and analytic method. The insertion loss is measured by using the direct method in accordance with the ISO code, while theoretical prediction is based on Muradali and Fyfe's method (Applied Acoustics, Vol. 53, 49~75, 1998). In addition to the diffraction at the top of the barrier, the waves are reflected infinite times between the building and the barrier, which is equivalent to replacing the building by the infinite series of the image receiver points. In two-dimensional study, the prediction of the insertion loss results in significantly overestimated values compared with the measurement. However three-dimensional analysis shows reasonable agreements, where traffic noise is assumed as incoherent line source and the length of the source is larger than that of the barrier.

  • PDF

MNSR transient analysis using the RELAP5/Mod3.2 code

  • Dawahra, S.;Khattab, K.;Alhabit, F.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.9
    • /
    • pp.1990-1997
    • /
    • 2020
  • To support the safe operation of the Miniature Neutron Source Reactor (MNSR), a thermo-hydraulic transient model using the RELAP5/Mod3.2 code was simulated. The model was verified by comparing the results with the measured and the previously calculated data. The comparisons consisted of comparing the MNSR parameters under normal constant power operation and reactivity insertion transients. Reactivity Insertion Accident (RIA) for three different initial reactivity values of 3.6, 6.0, and 6.53 mk have been simulated. The calculated peaks of the reactor power, fuel, clad and coolant temperatures in hot channel were calculated in this model. The reactor power peaks were: 103 kW at 240 s, 174 kW at 160 s and 195 kW at 140 s, respectively. The fuel temperature reached its maximum value of 116 ℃ at 240 s, 124 ℃ at 160 s and 126 ℃ at 140 s respectively. These calculation results ensured the high inherently safety features of the MNSR under all phases of the RIAs.

Static and transient analyses of Advanced Power Reactor 1400 (APR1400) initial core using open-source nodal core simulator KOMODO

  • Alnaqbi, Jwaher;Hartanto, Donny;Alnuaimi, Reem;Imron, Muhammad;Gillette, Victor
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.764-769
    • /
    • 2022
  • The United Arab Emirates is currently building and operating four units of the APR-1400 developed by a South Korean vendor, Korea Electric Power Corporation (KEPCO). This paper attempts to perform APR-1400 reactor core analysis by using the well-known two-step method. The two-step method was applied to the APR-1400 first cycle using the open-source nodal diffusion code, KOMODO. In this study, the group constants were generated using CASMO-4 fuel transport lattice code. The simulation was performed in Hot Zero Power (HZP) at steady-state and transient conditions. Some typical parameters necessary for the Nuclear Design Report (NDR) were evaluated in this paper, such as effective neutron multiplication factor, control rod worth, and critical boron concentration for steady-state analysis. Other parameters such as reactivity insertion, power, and fuel temperature changes during the Reactivity Insertion Accident (RIA) simulation were evaluated as well. The results from KOMODO were verified using PARCS and SIMULATE-3 nodal core simulators. It was found that KOMODO gives an excellent agreement.

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

Analysis and Comparison of Sorting Algorithms (Insertion, Merge, and Heap) Using Java

  • Khaznah, Alhajri;Wala, Alsinan;Sahar, Almuhaishi;Fatimah, Alhmood;Narjis, AlJumaia;Azza., A.A
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.197-204
    • /
    • 2022
  • Sorting is an important data structure in many applications in the real world. Several sorting algorithms are currently in use for searching and other operations. Sorting algorithms rearrange the elements of an array or list based on the elements' comparison operators. The comparison operator is used in the accurate data structure to establish the new order of elements. This report analyzes and compares the time complexity and running time theoretically and experimentally of insertion, merge, and heap sort algorithms. Java language is used by the NetBeans tool to implement the code of the algorithms. The results show that when dealing with sorted elements, insertion sort has a faster running time than merge and heap algorithms. When it comes to dealing with a large number of elements, it is better to use the merge sort. For the number of comparisons for each algorithm, the insertion sort has the highest number of comparisons.

Application of Coupled Reactor Kinetics Method to a CANDU Reactor Kinetics Problem.

  • Kim, Hyun-Dae-;Yeom, Choong-Sub;Park, Kyung-Seok-
    • Proceedings of the Korea Society for Energy Engineering kosee Conference
    • /
    • 1994.11a
    • /
    • pp.141-145
    • /
    • 1994
  • A computer code for solving the 3-D time-dependent multigroup neutron diffusion equation by a coupled reactor kinetics method recently developed has been developed and for evaluating its applicability in CANDU transient analysis applied to a 3-D kinetics benchmark problem which reveals non-uniform loss of coolant accident followed by an asymmetric insertion of shutdown devices. The performance of the method and code has been compared with the CANDU design code, CERBERUS, employing a finite difference improved quasistatic method.

  • PDF

High-fidelity numerical investigation on structural integrity of SFR fuel cladding during design basis events

  • Seo-Yoon Choi;Hyung-Kyu Kim;Min-Seop Song;Jae-Ho Jeong
    • Nuclear Engineering and Technology
    • /
    • v.56 no.2
    • /
    • pp.359-374
    • /
    • 2024
  • A high-fidelity numerical analysis methodology was proposed for evaluating the fuel rod cladding integrity of a Prototype Gen IV Sodium Fast Reactor (PGSFR) during normal operation and Design basis events (DBEs). The MARS-LMR code, system transient safety analysis code, was applied to analyze the DBEs. The results of the MARS-LMR code were used as boundary condition for a 3D computational fluid dynamics (CFD) analysis. The peak temperatures considering HCFs satisfied the cladding temperature limit. The temperature and pressure distributions were calculated by ANSYS CFX code, and applied to structural analysis. Structural analysis was performed using ANSYS Mechanical code. The seismic reactivity insertion SSE accident among DBEs had the highest peak cladding temperature and the maximum stress, as the value of 87 MPa. The fuel cladding had over 40 % safety margin, and the strain was below the strain limit. Deformation behavior was elucidated for providing relative coordinate data on each active fuel rod center. Bending deformation resulted in a flower shape, and bowing bundle did not interact with the duct of fuel assemblies. Fuel rod maximum expansion was generated with highest stress. Therefore, it was concluded that the fuel rod cladding of the PGSFR has sufficient structural safety margin during DBEs.