• Title/Summary/Keyword: Code method

Search Result 5,292, Processing Time 0.029 seconds

A new PN code acquisition algorithm using a reference code (Reference code를 이용한 새로운 PN code 획득 알고리즘)

  • 이승환;김운경;박재영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06a
    • /
    • pp.279-282
    • /
    • 2002
  • Here we introduce so called Reference code-weighted sum of all PN codes used in the system-. We do inner product operation between received PN code and Reference code rather than locally generated PN code in the receiver. Acquisition process can be accomplished by only one inner product during full period of PN code. It's essential innovation against present method which can be viewed successive hypothesis test by inner product for entire candidate PH codes set. Well -defined decision region makes it possible. We suggest the. criterion fur designing the decision region and find a condition for weight (coefficient) of Reference code.

  • PDF

Dynamic code allocation using voice activeity detection in DS-CDMA cellular system (DS-CDMA 셀룰러 시스템에서의 음성검출을 사용한 동적코드할당방식)

  • 유명수;양영님;고종하;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.6
    • /
    • pp.1302-1310
    • /
    • 1997
  • In this paper, we propose a dynamic code allocation strategy using voice activity detection and evaluate the performance of a dynamic code allocation strategy using voice activeity detection in DS-CDMA system. Proposed method allocates code to mobile terminal according to the residual capacity computed by SIR in the base station. In hot spot traffic loading cell, we find that the performance of proposed method is better than that of a fixed code assignment strategy using voice activity detection. Also, we find that the proposed method provide much improvement in blocking probability against the dynamic code assignment strategy withoug voice activity detection.

  • PDF

A Program Similarity Check by Flow Graphs of Functional Programs (흐름 그래프 형태를 이용한 함수형 프로그램 유사성 비고)

  • Seo Sunae;Han Taisook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.290-299
    • /
    • 2005
  • Stealing the source code of a program is a serious problem not only in a moral sense but also in a legal sense. However, it is not clear whether the code of a program is copied from another or not. There was a program similarity checker detecting code-copy by comparing the syntax trees of programs. However this method has a limitation that it cannot detect the code-copy attacks when the attacker modifies the syntax of the program on purpose. We propose a program similarity check by program control graph, which reveals not only syntax information but also control dependancy. Our method can detect the code-copy attacks that do not change control dependancy Moreover, we define what code-copy means and establish the connection between code-copy and similarity of program control graph: we prove that two programs are related by copy congruence if and only if the program control graphs of these programs are equivalent. We implemented our method on a functional programming language, nML. The experimental results show us that the suggested method can detect code similarity that is not detected by the existing method.

A Comparative Study of Recognition Rate of Color QR Code Printed on Tyvek and Cotton Material

  • Park, Suhrin
    • Journal of Fashion Business
    • /
    • v.21 no.3
    • /
    • pp.14-28
    • /
    • 2017
  • This purpose of this study to analyze effect material properties have on change in QR code recognition rate according to change of materials by comparing recognition rate of color QR code. QR code applied to textile materials has the advantage of being washable and being applicable to lost child prevention goods or clothes or a person with dementia through record of information relating to the material or input of additional information, differently from QR code printed on the conventional paper. An effective method of entering QR code in textile materials is Digital Textile Printing(DTP), that facilitates printing by rapidly applying diverse information, and small quantity production. It is possible to tailor various QR codes according to use. Regarding samples to use, cotton material used in clothing products and Tyvek material recently applied to clothing and related products were selected. Reactive dyes were used for cotton, pigment was used for Tyvek, and QR code was printed with an inkjet printer by direct printing method. Printing methods and surface textures are different between cotton and Tyvek. It was revealed that consequent print results and results of recognition rate were different. Regarding color to be printed, 2015 S/S - 2017 S/S color presented by Pantone was used. Color combination affected recognition rate of color QR code. Understanding color combination, material properties and print characteristics may be helpful in increasing recognition rate of color QR code, and may contribute to usability of color QR code applied to textile materials in the future.

An LLVM-Based Implementation of Static Analysis for Detecting Self-Modifying Code and Its Evaluation (자체 수정 코드를 탐지하는 정적 분석방법의 LLVM 프레임워크 기반 구현 및 실험)

  • Yu, Jae-IL;Choi, Kwang-hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.2
    • /
    • pp.171-179
    • /
    • 2022
  • Self-Modifying-Code is a code that changes the code by itself during execution time. This technique is particularly abused by malicious code to bypass static analysis. Therefor, in order to effectively detect such malicious codes, it is important to identify self-modifying-codes. In the meantime, Self-modify-codes have been analyzed using dynamic analysis methods, but this is time-consuming and costly. If static analysis can detect self-modifying-code it will be of great help to malicious code analysis. In this paper, we propose a static analysis method to detect self-modified code for binary executable programs converted to LLVM IR and apply this method by making a self-modifying-code benchmark. As a result of the experiment in this paper, the designed static analysis method was effective for the standardized LLVM IR program that was compiled and converted to the benchmark program. However, there was a limitation in that it was difficult to detect the self-modifying-code for the unstructured LLVM IR program in which the binary was lifted and transformed. To overcome this, we need an effective way to lift the binary code.

Container BIC-code region extraction and recognition method using multiple thresholding (다중 이진화를 이용한 컨테이너 BIC 부호 영역 추출 및 인식 방법)

  • Song, Jae-wook;Jung, Na-ra;Kang, Hyun-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1462-1470
    • /
    • 2015
  • The container BIC-code is a transport protocol for convenience in international shipping and combined transport environment. It is an identification code of a marine transport container which displays a wide variety of information including country's code. Recently, transportation through aircrafts and ships continues to rise. Thus fast and accurate processes are required in the ports to manage transportation. Accordingly, in this paper, we propose a BIC-code region extraction and recognition method using multiple thresholds. In the code recognition, applying a fixed threshold is not reasonable due to a variety of illumination conditions caused by change of weather, lightening, camera position, color of the container and so on. Thus, the proposed method selects the best recognition result at the final stage after applying multiple thresholds to recognition. For each threshold, we performs binarization, labeling, BIC-code pattern decision (horizontal or vertical pattern) by morphological close operation, and character separation from the BIC-code. Then, each characters is recognized by template matching. Finally we measure recognition confidence scores for all the thresholds and choose the best one. Experimental results show that the proposed method yields accurate recognition for the container BIC-code with robustness to illumination change.

An Efficient Code Expansion from EM to SPARC Code (EM에서 SPARC 코드로 효율적인 코드 확장)

  • Oh, Se-Man;Yun, Young-Shick
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2596-2604
    • /
    • 1997
  • There are two kinds of backends in ACK:code generator(full-fledged backend) and code expander(fast backend). Code generators generate target code using string pattern matching and code expanders generate target code using macro expansion. ACK translates EM to SPARC code using code expander. The corresponding SPARC code sequences for a EM code are generated and then push-pop optimization is performed. But, there is the problem of maintaining hybrid stack. And code expander is not considered to passes parameters of a procedure call through register windows. The purpose of this paper is to improve SPARC code quality. We suggest a method of SPARC cod generation using EM tree. Our method is divided into two phases:EM tree building phase and code expansion phase. The EM tree building phase creates the EM tree and code expansion phase translates it into SPARC code. EM tree is designed to pass parameters of a procedure call through register windows. To remove hybrid stack, we extract an additional information from EM code. We improved many disadvantages that arise from code expander in ACK.

  • PDF

A Code Authentication System of Counterfeit Printed Image Using Multiple Comparison Measures (다중 비교척도에 의한 영상 인쇄물 위조 감식 시스템)

  • Choi, Do-young;Kim, Jin-soo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.23 no.4
    • /
    • pp.1-12
    • /
    • 2018
  • Currently, a large amount of printed matter associated with code authentication method are diffused widely, however, they have been reproduced with great precision and distributed successively in illegal ways. In this paper, we propose an efficient code authentication method which classifies authentic or counterfeit with smart-phone, effectively. The proposed method stores original image code in the server side and then extracts multiple comparison measures describing the original image. Based on these multiple measures, a code authentication algorithm is designed in such a way that counterfeit printed images may be effectively classified and then the recognition rate may be highly improved. Through real experiments, it is shown that the proposed method can improve the recognition rate greatly and lower the mis-recognition rate, compared with single measure method.

Blind Block Deinterleaving using Convolutional Code Reconstruction Method (길쌈 부호 복원 기법을 이용한 블라인드 블록 디인터리빙)

  • Jeong, Jin-Woo;Yoon, Dong-Weon;Park, Cheol-Sun;Yun, Sang-Bom;Lee, Sang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.10-16
    • /
    • 2011
  • Interleaving is applied to prevent from exceeding the error-correction capability of channel code. At the receiver, burst errors are converted into random errors after deinterleaving, so the error-correction capability of channel code is not exceeded. However, when a receiver does not have any information on parameters used at an interleaver, interleaving can be seen as an encryption with some pattern. In this case, deinterleaving becomes complicated. In the field of blind deinterleaving, there have recently been a number of researches using linearity of linear block code. In spite of those researches, since the linearity is not applicable to a convolutional code, it is difficult to estimate parameters as in a linear block code. In this paper, we propose a method of blind block deinterleaving using convolutional code reconstruction method.

Engineering Impact Assessment of the Site Coefficients In the Current Highway Bridge Code of Korea (현행 도로교시방서의 지반계수에 대한 공학적 영향평가)

  • 조양희
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 1998.04a
    • /
    • pp.89-97
    • /
    • 1998
  • This study is intended to investigate the seismic responses of bridge structures considering site effects. The site effects in the seismic analysis of bridge structures were classified into two parts. At first, the seismic responses of the structures on each "soil profile types" of the code were evaluated in accordance with code-specified method and compared with results of time-history analysis method. And next, as a second stage of the study, the responses of the two different soil with considerably different soil properties, even though they are classified to the same "soil profile types" of the code, were evaluated and compared each other. The first part of study is purposed to evaluate the applicability of code-specified method, while the other part is purposed to find the variance of the seismic responses from the different soil sites in the same soil profile types of the code. For the analysis, two major methods of the code, single-mode spectral anaysis and multi-mode spectral analysis, were used and the time-history analysis method which is expected to give more accurate responses was also used for the comparison purposes. For the time-history analysis, time-domain analysis technique of the lumped-mass model with frequency-independent soil springs and dampers was adopted and artificially generated spectra of the code was used as input motion. As the results of the study, the code specified methods for the seismic responses considering the site effects were verified to give the results in conservative side for the most of the cases. However, for the structures on the site with considerable flexibility, the responses of the bridge girders or deckplates by the code methods both in section forces and horizontal movement responses, may have much smaller values than the actual responses. Therefore, more detailed analysis considering the flexibility of the base soil may be required to have more reasonable results in girder responses.in girder responses.

  • PDF