• Title/Summary/Keyword: Code Methods

Search Result 1,828, Processing Time 0.025 seconds

Development of the UPC-A Barcode Recognition Algorithm for Smartphone Applications (스마트 폰 어플리케이션 적용을 위한 UPC-A Bar code 인식 알고리즘 개발)

  • Lee, Sang-Joon;Lee, Sang-Yong;Lee, Young-Bum;Lee, Myoung-Ho
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.174-183
    • /
    • 2011
  • This paper is about a bar code decoding algorithm developed for smart phone applications. The algorithm consists of bar code data extraction procedure, bar code signal estimation procedure, and bar code decoding procedure. To detect the peak bar code module, a DSTW had been applied because of its outstanding performance in ECG peak detection. In order to minimize errors due to non-uniform light effect, the proposed algorithm was acted as a baseline wandering filter based on module peaks detection. The algorithm had been tested to evaluate the performance under the conditions of blurring, non-uniformed light and white noises. The algorithm had shown excellent performance in reconstruction of bar code decoding, compared to other conventional methods. In order to show the possibility of applying the algorithm to a smart phone, a real UPC-A type 150 bar code pictures obtained from a smart phone camera was applied to the algorithm, achieving the correct recognition rate of 97.33%.

Analysis Third-dimension Turbo Code for DVB-RCS Next Generation (DVB-RCS Next Generation을 위한 Third-dimension Turbo Code 분석)

  • Park, Tae-Doo;Kim, Min-Hyuk;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.279-285
    • /
    • 2011
  • The next generation wireless communication systems are required high BER performance better than present performance. Double binary Turbo code have error floor at high SNR, so it cannot be used in next generation wireless communication system. Therefore, many methods are proposed for overcome error floor at DVB-RCS NG(next generation). In this paper, we analysis structure of third-dimension Turbo code(3D-turbo code). 3D-Turbo code overcomes error flow by additive post-encoder in conventional DVB-RCS Turbo code. Performance of 3D-Turbo code is changed by post-encoder form, interleaving method, value of ${\lambda}$. So we are simulated by those parameter and proposed optimal form. By a result, performance of 3D-Turbo is better than conventional DVB-RCS Turbo code and it overcome error floor of conventional DVB-RCS Turbo code.

AJFCode: An Approach for Full Aspect-Oriented Code Generation from Reusable Aspect Models

  • Mehmood, Abid;Jawawi, Dayang N.A.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1973-1993
    • /
    • 2022
  • Model-driven engineering (MDE) and aspect-oriented software development (AOSD) contribute to the common goal of development of high-quality code in reduced time. To complement each approach with the benefits of the other, various methods of integration of the two approaches were proposed in the past. Aspect-oriented code generation, which targets obtaining aspect-oriented code directly from aspect models, offers some unique advantages over the other integration approaches. However, the existing aspect-oriented code generation approaches do not comprehensively address all aspects of a model-driven code generation system, such as a textual representation of graphical models, conceptual mapping, and incorporation of behavioral diagrams. These problems limit the worth of generated code, especially in practical use. Here, we propose AJFCode, an approach for aspect-oriented model-driven code generation, which comprehensively addresses the various aspects including the graphical models and their text-based representation, mapping between visual model elements and code, and the behavioral code generation. Experiments are conducted to compare the maintainability and reusability characteristics of the aspect-oriented code generated using the AJFCode with the most comprehensive object-oriented code generation approach. AJFCode performs well in terms of all metrics related to maintainability and reusability of code. However, the most significant improvement is noticed in the separation of concerns, coupling, and cohesion. For instance, AJFCode yields significant improvement in concern diffusion over operations (19 vs 51), coupling between components (0 vs 6), and lack of cohesion in operations (5 vs 9) for one of the experimented concerns.

Malicious Code Detection using the Effective Preprocessing Method Based on Native API (Native API 의 효과적인 전처리 방법을 이용한 악성 코드 탐지 방법에 관한 연구)

  • Bae, Seong-Jae;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.785-796
    • /
    • 2012
  • In this paper, we propose an effective Behavior-based detection technique using the frequency of system calls to detect malicious code, when the number of training data is fewer than the number of properties on system calls. In this study, we collect the Native APIs which are Windows kernel data generated by running program code. Then we adopt the normalized freqeuncy of Native APIs as the basic properties. In addition, the basic properties are transformed to new properties by GLDA(Generalized Linear Discriminant Analysis) that is an effective method to discriminate between malicious code and normal code, although the number of training data is fewer than the number of properties. To detect the malicious code, kNN(k-Nearest Neighbor) classification, one of the bayesian classification technique, was used in this paper. We compared the proposed detection method with the other methods on collected Native APIs to verify efficiency of proposed method. It is presented that proposed detection method has a lower false positive rate than other methods on the threshold value when detection rate is 100%.

Detection of Source Code Security Vulnerabilities Using code2vec Model (code2vec 모델을 활용한 소스 코드 보안 취약점 탐지)

  • Yang, Joon Hyuk;Mo, Ji Hwan;Hong, Sung Moon;Doh, Kyung-Goo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.45-52
    • /
    • 2020
  • Traditional methods of detecting security vulnerabilities in source-code require a lot of time and effort. If there is good data, the issue could be solved by using the data with machine learning. Thus, this paper proposes a source-code vulnerability detection method based on machine learning. Our method employs the code2vec model that has been used to propose the names of methods, and uses as a data set, Juliet Test Suite that is a collection of common security vulnerabilities. The evaluation shows that our method has high precision of 97.3% and recall rates of 98.6%. And the result of detecting vulnerabilities in open source project shows hopeful potential. In addition, it is expected that further progress can be made through studies covering with vulnerabilities and languages not addressed here.

Consideration for IMO Type C Independent Tank Rule Scantling Process and Evaluation Methods (IMO C형 독립탱크의 설계치수 계산과정 및 평가방법에 대한 고찰)

  • Heo, Kwang-hyun;Kang, Won-sik;Park, Bong-qyun
    • Special Issue of the Society of Naval Architects of Korea
    • /
    • 2017.10a
    • /
    • pp.93-104
    • /
    • 2017
  • IMO type C independent tank is one of the cargo containment system specified on IGC code. It is normally adopted for small and medium size liquefied gas carrier's cargo containment system and it can be applied to fuel tank of LNG fueled vessel. This study focuses on rule scantling process and evaluation methods in early design stage of type C independent tank. Actual design results of 22K LPG/Ammonia/VCM carrier's No.2 cargo tank are demonstrated. This paper presents the calculation methods of design acceleration and liquid height for internal design pressure as defined on IGC code. And this paper shows the applied results of classification rules about shell thickness requirement and buckling strength. Additionally this paper deals with evaluation methods of structural strength and cumulative fatigue damage using FE analysis.

  • PDF

Detection of GPS Multipath Errors Using 4-Receivers (4 수신기를 이용한 GPS 다중경로의 검출과 축소)

  • 박운용;정창식;김진수;곽두호
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.16 no.2
    • /
    • pp.235-242
    • /
    • 1998
  • This study aims to detect and to reduce the multipath errors which are main errors source in high precious surveying such as GPS-aided aerial triangulation and Car Navigation. which reference receivers being fixed, when kinematic receivers move continuously, multipath is performed using smoothed code measurement and pure code measurement in the network. Through this methods, 3D RMS errors are reduced into about 30% in the single differential code solution to the kinematic receiver. This is based on the fact that the network adjustment are performed at multiple reference receivers, but positioning is carried out by the single differential methods between a reference receiver and a kinematic receiver. So it was supposed that this methods reduced the correlation errors including the atmospheric errors using the nearest receivers and can be mixed with another methods.

  • PDF

Comparison of loads in Turkish earthquake code with those computed statistically

  • Firat, Fatih K.;Yucemen, M. Semih
    • Earthquakes and Structures
    • /
    • v.8 no.5
    • /
    • pp.977-994
    • /
    • 2015
  • In this study, earthquake loads are investigated statistically and compared with the nominal earthquake loads calculated according to the Turkish Earthquake Code, namely: "Specifications for Structures to be Built in Earthquake Areas". For this purpose, the "actual" mean load values estimated from statistical methods and the nominal load values computed according the Seismic Code are compared, with respect to some variations in the basic parameters, such as the importance factor, building height, site coefficient, seismic zone and seismic load reduction factor. In addition to the data compiled from different regions of Turkey, the published data and information in the foreign literature are also used in the determination of the earthquake load statistics. Although the dead and live loads acting on a structure are independent of the geographical location of the structure, environmental loads, such as earthquake loads are highly dependent on the location of the structure. Accordingly, for the assessment of statistical parameters associated with earthquake loads, twelve different locations which can represent the different seismic zones of Turkey as accurately as possible are chosen. As a result of the code calibration procedure considered in this study, it is observed that the load values obtained from the Turkish Seismic Code may overestimate or underestimate the actual seismic loads in some of the seismic zones.

Research on Mobile Malicious Code Prediction Modeling Techniques Using Markov Chain (마코프 체인을 이용한 모바일 악성코드 예측 모델링 기법 연구)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.19-26
    • /
    • 2014
  • Mobile malicious code is typically spread by the worm, and although modeling techniques to analyze the dispersion characteristics of the worms have been proposed, only macroscopic analysis was possible while there are limitations in predicting on certain viruses and malicious code. In this paper, prediction methods have been proposed which was based on Markov chain and is able to predict the occurrence of future malicious code by utilizing the past malicious code data. The average value of the malicious code to be applied to the prediction model of Markov chain model was applied by classifying into three categories of the total average, the last year average, and the recent average (6 months), and it was verified that malicious code prediction possibility could be increased by comparing the predicted values obtained through applying, and applying the recent average (6 months).

The Robust Derivative Code for Object Recognition

  • Wang, Hainan;Zhang, Baochang;Zheng, Hong;Cao, Yao;Guo, Zhenhua;Qian, Chengshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.272-287
    • /
    • 2017
  • This paper proposes new methods, named Derivative Code (DerivativeCode) and Derivative Code Pattern (DCP), for object recognition. The discriminative derivative code is used to capture the local relationship in the input image by concatenating binary results of the mathematical derivative value. Gabor based DerivativeCode is directly used to solve the palmprint recognition problem, which achieves a much better performance than the state-of-art results on the PolyU palmprint database. A new local pattern method, named Derivative Code Pattern (DCP), is further introduced to calculate the local pattern feature based on Dervativecode for object recognition. Similar to local binary pattern (LBP), DCP can be further combined with Gabor features and modeled by spatial histogram. To evaluate the performance of DCP and Gabor-DCP, we test them on the FERET and PolyU infrared face databases, and experimental results show that the proposed method achieves a better result than LBP and some state-of-the-arts.