• Title/Summary/Keyword: Code method

Search Result 5,292, Processing Time 0.031 seconds

Generation of Wavelet-Based Optimal Non-Binary Spreading Code Sequences for CDMA Communication (CDMA 통신을 위한 Wavelet,기저 최적 비이원 확산부호계열 발생)

  • 이정재
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.511-517
    • /
    • 1998
  • In this paper a new technique to generate spreading code sequences in the CDMA communication is introduced. It is an effective method to generate optimal code sequences using the orthogonality of wavelet packet basis set of subspaces. With a three-stage Quadrature Mirror Filter(QMF), generation of optimal code sequences has been demonstrated. Since these generated optimal code sequences are non-binary and have an arbitrary waveform which is different from that of the conventional PN-based Gold code sequences, a strong security against the intended interceptor is feasible. Encouraging good correlation properties are also achieved with this new method.

  • PDF

On the Optimum Dwell Time for Fast Code Acquisition is DS/SS Systems (DS/SS 시스템에서 최소 코드획득시간을 위한 최적 코드측정시간에 관한 연구)

  • 조권도;부수일;김철성
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.8
    • /
    • pp.11-18
    • /
    • 1993
  • In a spread spectrum system, the bandwidth and period of spreading code is wide and long, respectively. So it is necessary to make the code acquisition time as short as possible. In particular, serial search code acquisition system requires optimum dwell time for fast acquisition. In this paper, code acquisition time is calculated by varying dwell time. Among them, minimum code acquisition time is chosen and then optimum dwell time can be obtained. Detection probability (P$_{D}$) and false alarm probability (P$_{FA}$) can be obtained by integrating chi-square pdf by numerical analysis. The results are compared with that of gaussian approximation method and then it is concluded gaussian approximation method is not suitable for obtaining optimum dwell time. Computer simulation supports theoretical results.

  • PDF

DEVELOPMENT OF A COMPUTER CODE FOR PREDICTION OF INDOOR POLLUTANT DISPERSION (새집증후군 저감대책을 위한 실내 오염물질 확산 해석 코드 개발)

  • Jeon, H.J.;Yang, K.S.;Choi, C.B.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.508-516
    • /
    • 2010
  • An efficient code has been developed to predict dispersion of indoor air pollutants The computing capability of the code has been compared with that of a commercial code inn a benchmark test. After that, the code has been employed to compute dispersion of a pollutant released from a new furniture, a kind of Sick Building Syndrome (SBS). A sofa which generates formaldehyde is implemented by using an immersed boundary method. Large Eddy Simulation (LES) is employed to obtain time-dependent velocity and scalar fields. LES has bee regarded as an academic tool, but the newly-developed code reveals a possibility of application of LES to practical problems, especially dispersion of indoor pollutants.

  • PDF

Illumination Control of LEDs in Visible Light Communication Using Manchester Code Transmission

  • Lee, Seong-Ho
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.303-309
    • /
    • 2016
  • In this paper, we introduce a new method for controlling the illumination of LEDs in visible light communication (VLC) by changing the duty cycle of Manchester code. When VLC data were transmitted in Manchester code, the average optical power of the LEDs was proportional to the duty cycle. In experiments, we controlled the illumination of a $3{\times}3$ LED array from 10% to 90% of its peak value by changing the duty cycle of the Manchester code. The synchronizing clocks required for encoding and decoding the Manchester code were supplied by pulse generators that were connected to a 220 V power line. All pulse generators made the same pulses with a repetition frequency of 120 Hz, and they were synchronized with the full-wave rectified voltage of the power line. This scheme is a very simple and useful method for constructing indoor wireless sensor networks using LED light.

DEVELOPMENT AND PRELIMINARY ASSESSMENT OF A THREE-DIMENSIONAL THERMAL HYDRAULICS CODE, CUPID

  • Jeong, Jae-Jun;Yoon, Han-Young;Park, Ik-Kyu;Cho, Hyoung-Kyu;Lee, Hee-Dong
    • Nuclear Engineering and Technology
    • /
    • v.42 no.3
    • /
    • pp.279-296
    • /
    • 2010
  • For the analysis of transient two-phase flows in nuclear reactor components, a three-dimensional thermal hydraulics code, named CUPID, has been developed. The CUPID code adopts a two-fluid, three-field model for two-phase flows, and the governing equations were solved over unstructured grids, which are very useful for the analysis of flows in complicated geometries. To obtain numerical solutions, the semi-implicit numerical method for the REALP5 code was modified for an application to unstructured grids, and it has been further improved for enhanced accuracy and fast running. For the verification of the CUPID code, a set of conceptual problems and experiments were simulated. This paper presents the flow model, the numerical solution method, and the results of the preliminary assessment.

Development and Application of a Computer Code for Prediction of Indoor Pollutant Dispersion (새집증후군 저감대책을 위한 실내 오염물질 확산 해석 코드 개발 및 적용)

  • Jeon, Hyun-Jun;Yang, Kyung-Soo;Choi, Choon-Bum
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.11
    • /
    • pp.735-744
    • /
    • 2010
  • An efficient code has been developed to predict dispersion of indoor air pollutants. The computing capability of the code has been compared with that of a commercial code in a benchmark test. After that, the code has been employed to compute dispersion of a pollutant released from a new furniture, a kind of Sick Building Syndrome(SBS). A sofa which generates formaldehyde is implemented by using an immersed boundary method. Large Eddy Simulation (LES) is employed to obtain time-dependent velocity and concentration fields. LES has been regarded as an academic tool, but the newly-developed code reveals a possibility of application of LES to practical problems, especially dispersion of indoor pollutants.

A Study on Analysis of Error Correction Code in Server System (서버 시스템 내의 오류 정정 코드 분석에 관한 연구)

  • Lee, Chang-Hwa
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.8 no.3 s.22
    • /
    • pp.42-50
    • /
    • 2005
  • In this paper, a novel method is proposed how the ECC(Error Correction Code) in server system can be investigated and the robustness of each system against noisy environment and element failure in memory module has been verified. Chipset manufacturers have hided the algorithm of their Hamming code and the user has difficulty in verification of the robustness of each system. The proposed method is very simple, but the outputs of the experiment explain the core ability of error correction in server system and helps the detection of the failure element. On the basis of these results, we could expect the robustness of digitalized weapon system and the efficient design of our own error correction code.

Group Manchester Code Scheme for Medical In-body WBAN Systems (의료용 in-body WBAN 시스템을 위한 Group Manchester code 변조 방식)

  • Choi, Il-Muk;Won, Kyung-Hoon;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.10C
    • /
    • pp.597-604
    • /
    • 2011
  • In this paper, we propose group Manchester code (GM) modulation scheme for medical in-body wireless body area network (WBAN) systems. In IEEE, the WBAN system is assigned as 802.15. Task Group 6 (TG 6), and the related standardization is being progressed, Recently, in this Group, group pulse position modulation (GPPM), which can obtain data rate increase by grouping pulse position modulation (PPM) symbols, is proposed as a new modulation scheme for low-power operation of WBAN system. However, the conventional method suffers from BER performance degradation due to the absence of gray coding and its demodulation characteristics. Therefore, in this paper, we propose a modified GM scheme which groups Manchester code instead of PPM. In the proposed GM scheme, a low-complexity maximum likelihood (ML) demodulation method is employed in order to maximize the BER performances, Also, log likelihood ratio (LLR) decision method is proposed to employ the Turbo code as forward error correction (FEC), Finally, we verified that the proposed method has a good performance and is an appropriate scheme for in-body WBAN system through extensive performance evaluation.

A Technique for Protecting Android Applications using Executable Code Encryption and Integrity Verification (실행코드 암호화 및 무결성 검증을 적용한 안드로이드앱 보호 기법)

  • Shim, HyungJoon;Cho, Sangwook;Jeong, Younsik;Lee, Chanhee;Han, Sangchul;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.10 no.1
    • /
    • pp.19-26
    • /
    • 2014
  • In this paper, we propose a method for protecting Android applications against reverse engineering attacks. In this method, the server encrypts the original executable code (DEX) included in an APK file, inserts into the APK file a stub code that decrypts the encrypted DEX later at run-time, and distributes the modified APK file. The stub code includes an integrity validation code to detect attacks on itself. When a user installs and executes the APK file, the stub code verifies the integrity of itself, decrypts the encrypted DEX, and loads it dynamically to execute. Since the original DEX is distributed as an encrypted one, we can effectively protect the intellectual property. Further, by verifying the integrity of the stub code, we can prevent malicious users from bypassing our method. We applied the method to 15 Android apps, and evaluated its effectiveness. We confirmed that 13 out of them operates normally.

Malicious Code Detection using the Effective Preprocessing Method Based on Native API (Native API 의 효과적인 전처리 방법을 이용한 악성 코드 탐지 방법에 관한 연구)

  • Bae, Seong-Jae;Cho, Jae-Ik;Shon, Tae-Shik;Moon, Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.785-796
    • /
    • 2012
  • In this paper, we propose an effective Behavior-based detection technique using the frequency of system calls to detect malicious code, when the number of training data is fewer than the number of properties on system calls. In this study, we collect the Native APIs which are Windows kernel data generated by running program code. Then we adopt the normalized freqeuncy of Native APIs as the basic properties. In addition, the basic properties are transformed to new properties by GLDA(Generalized Linear Discriminant Analysis) that is an effective method to discriminate between malicious code and normal code, although the number of training data is fewer than the number of properties. To detect the malicious code, kNN(k-Nearest Neighbor) classification, one of the bayesian classification technique, was used in this paper. We compared the proposed detection method with the other methods on collected Native APIs to verify efficiency of proposed method. It is presented that proposed detection method has a lower false positive rate than other methods on the threshold value when detection rate is 100%.