• Title/Summary/Keyword: Code update

Search Result 90, Processing Time 0.029 seconds

PCM Encoder Structure for Real-time Updating of Telemetry System Parameters (원격 측정 시스템 파라미터 실시간 업데이트 PCM 엔코더 구조)

  • Park, Yu-Kwang;Yoon, Won-Ju
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.5
    • /
    • pp.452-459
    • /
    • 2019
  • In this paper, we describe a PCM encoder structure that can update the telemetry system parameters in real time. In the PCM encoder, an analog signal control unit for FPGA, flash memory, and sensor data acquisition was constructed. UART communication, analog signal control, flash memory control, and frame generation are possible through logic inside FPGA of PCM encoder. UART communication allows the PC to transmit parameter data to the PCM encoder, and flash memory is controlled to update the parameter of the telemetry system in real time and finally the frame is formed. Simulation and verification were performed to confirm whether the parameter data is updated in real time, and the proposed structure was used to construct a telemetry system with enhanced flexibility and convenience.

A Methodology for Using ChatGPT to Improve BIM-based Design Data Evaluation System (BIM기반 설계데이터 평가 시스템 개선을 위한 ChatGPT활용 방법론)

  • Yu, Eun-Sang;Kim, Gu-Taek;Ahn, Yong-Han;Choi, Jung-Sik
    • Journal of KIBIM
    • /
    • v.14 no.2
    • /
    • pp.25-34
    • /
    • 2024
  • This study proposes a new methodology to increase the flexibility and efficiency of the design data evaluation system by combining Building Information Modeling (BIM) technology in the architectural industry, OpenAI's interactive artificial intelligence, and ChatGPT. BIM technology plays an important role in digitally modeling and managing architectural information. Since architectural information is included, research and development are underway to review and evaluate BIM data according to conditions through program development. However, in the process of reviewing BIM design data, if the review criteria or evaluation criteria according to design change occur frequently, it is necessary to update the program anew. In order for designers or reviewers to apply the changed criteria, requesting a program developer will delay time. This problem was studied by using ChatGPT to modify and update the design data evaluation program code in real time. In this study, it is aimed to improve the changing standards and accuracy by enabling programming non-professionals to change the design regulations and calculation standards of the BIM evaluation program system using ChatGPT. In this study, in the BIM-based design certification automation evaluation program, a program in which the automation evaluation method is being studied based on the design certification evaluation manual was first used. In the design certification automation evaluation program, the programming non-majors checked the automation evaluation code by linking ChatGPT, and the changed calculation criteria were created and modified interactively. As a result of the evaluation, the change in the calculation standard was explained to ChatGPT and the applied result was confirmed.

Assessment of Mobile Technology Operability Based on RFID and QR Code for Real Time Information Management of Irrigation Facilities (수리시설물의 실시간 정보관리를 위한 RFID 및 QR 코드 기반의 모바일 기술 운용성 평가)

  • Kim, Tae-Gon;Nam, Won-Ho;Lee, Tae-Seok;Choi, Jin-Yong;Kim, Jin-Taek
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.54 no.1
    • /
    • pp.1-9
    • /
    • 2012
  • This study aims to assess the mobile information technology as an alternative means for managing information of irrigation facilities. Traditional irrigation facility management which is operated manually has faced to critical limitations, such as delayed and loss in data handling and facilities misidentification. Real time download, collection, and update the information about the irrigation structure conditions in terms of operation and maintenance can provide a better support of the management efforts. Thus this study suggested mobile information technology using RFID (Radio Frequency IDentification) and QR (Quick Response) code for real time information management of irrigation facilities. This paper describes the applications and implementation results of real-time mobile technology for the field information communication of the irrigation facilities. The system was tested in I-dong irrigation districts in Gyounggi-province, Korea and the assessment of operability demonstrated beneficial usability for inspection of agricultural irrigation facilities in the irrigation district. The tests showed that RFID was preferred method expected to improve operability although these had some limitation. The mobile technologies are expected to increase efficiency and effectiveness of irrigation facilities management.

An Adaptive Transform Code for Images (적응 변환코드를 이용한 영상신호 압축)

  • Kim, Dong-Youn;Lee, Kyung-Joung;Yoon, Hyung-Ro
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1991 no.11
    • /
    • pp.44-47
    • /
    • 1991
  • There exists a transform trellis code that is optimal for stationary Gaussian sources and the squared-error distortion measure at all rates. In this paper, we train an asymptotically optimal version of such a code to obtain one which is matched better to the statistics of real world data. The training algorithm uses the M-algorithm to search the trellis codebook and the LBG-algorithm to update the trellis codebook. To adapt the codebook for the varying input data. we use two gain-adaptive methods. The gain-adaptive scheme 1, which normalizes input block data by its gain factor, is applied to images at rate 0.5 bits/pixel. When each block is encoded at the same rate, the nonstationarity among the block variances leads to a variation in the resulting distortion from one block to another. To alleviate the non-uniformity among the encoded image, we design four clusters from the block power, in which each cluster has its own trellis codebook and different rates. The rate of each cluster is assigned through requiring a constant distortion per-letter. This gain-adaptive scheme 2 produces good visual and measurable quality at low rates.

  • PDF

Optimization Model for Location Management in WCDMA Networks (WCDMA 네트워크에서의 일치관리 최적화 모형)

  • Chung, Yong-Joo
    • Korean Management Science Review
    • /
    • v.26 no.3
    • /
    • pp.23-35
    • /
    • 2009
  • This study deals with the location management in WCDMA (Wideband Code Division Multiple Access) networks. The new location management method is the one of the many techniques used to provide the packet switched (PS) services effectively in WCDMA networks. WCDMA introduces RA (routing area) for the PS services in addition to LA (location area) for the circuit switched (CS) services. WCDMA system also adopts the cooperative paging and the combined area update which are to decrease signaling traffic using the PS network resources for the CS services. Considering the characteristics of the WCDMA networks, this study formulate into the mathematical programming problem for the location management. Rather than the existing researches which consider the single MSC/SGSN networks, we deal with the multi MSC/SGSN networks, where both MSC area and SGSN area should be determined as well. Fairness between traffic loads of MSC/SGSN and the system cost incurred to MSC/SGSN are also incorporated into our model, which make the model more realistic. We propose greedy algorithms for the problems, which consists of the merger of two neighboring areas and the movement of an area. Extensive experiment has been done based on the realistic problem examples. Followed by the analysis of parameter effect on the final solutions and the quality of final solutions obtained by our greedy algorithms. Our proposed model and analysis result can be used to determine WCDMA system areas and to predict the system performance measures by the determination.

An Efficient Overlapped LDPC Decoder with a Upper Dual-diagonal Structure

  • Byun, Yong Ki;Park, Jong Kang;Kwon, Soongyu;Kim, Jong Tae
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.1
    • /
    • pp.8-14
    • /
    • 2013
  • A low density parity check (LDPC) decoder provides a most powerful error control capability for mobile communication devices and storage systems, due to its performance being close to Shannon's limit. In this paper, we introduce an efficient overlapped LDPC decoding algorithm using a upper dual-diagonal parity check matrix structure. By means of this algorithm, the LDPC decoder can concurrently execute parts of the check node update and variable node update in the sum-product algorithm. In this way, we can reduce the number of clock cycles per iteration as well as reduce the total latency. The proposed decoding structure offers a very simple control and is very flexible in terms of the variable bit length and variable code rate. The experiment results show that the proposed decoder can complete the decoding of codewords within 70% of the number of clock cycles required for a conventional non-overlapped decoder. The proposed design also reduces the power consumption by 33% when compared to the non-overlapped design.

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

A Study on Horizontal Shuffle Scheduling for High Speed LDPC decoding in DVB-S2 (DVB-S2 기반 고속 LDPC 복호를 위한 Horizontal Shuffle Scheduling 방식에 관한 연구)

  • Lim, Byeong-Su;Kim, Min-Hyuk;Jung, Ji-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.10
    • /
    • pp.2143-2149
    • /
    • 2012
  • DVB-S2 employs LDPC codes which approach to the Shannon's limit, since it has characteristics of a good distance, error floor does not appear. Furthermore it is possible to processes full parallel processing. However, it is very difficult to high speed decoding because of a large block size and number of many iterations. This paper present HSS algorithm to reduce the iteration numbers without performance degradation. In the flooding scheme, the decoder waits until all the check-to-variable messages are updated at all parity check nodes before computing the variable metric and updating the variable-to-check messages. The HSS algorithm is to update the variable metric on a check by check basis in the same way as one code draws benefit from the other. Eventually, LDPC decoding speed based on HSS algorithm improved 30% ~50% compared to conventional one without performance degradation.

Analysis and Countermeasure for BadUSB Vulnerability (BadUSB 취약점 분석 및 대응 방안)

  • Seo, Jun-Ho;Moon, Jong-Sub
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.12 no.6
    • /
    • pp.359-368
    • /
    • 2017
  • As the BadUSB is a vulnerability, in which a hacker tampers the firmware area of a USB flash drive. When the BadUSB device is plugged into the USB port of a host system, a malicious code acts automatically. The host system misunderstands the act of the malicious behavior as an normal behaviour for booting the USB device, so it is hard to detect the malicious code. Also, an antivirus software can't detect the tampered firmware because it inspects not the firmware area but the storage area. Because a lot of computer peripherals (such as USB flash drive, keyboard) are connected to host system with the USB protocols, the vulnerability has a negative ripple effect. However, the countermeasure against the vulnerability is not known now. In this paper, we analyze the tampered area of the firmware when a normal USB device is changed to the BadUSB device and propose the countermeasure to verify the integrity of the area when the USB boots. The proposed method consists of two procedures. The first procedure is to verify the integrity of the area which should be fixed even if the firmware is updated. The verification method use hashes, and the target area includes descriptors. The second procedure is to verify the integrity of the changeable area when the firmware is updated. The verification method use code signing, and the target area includes the function area of the firmware. We also propose the update protocol for the proposed structure and verify it to be true through simulation.

Cloudification of On-Chip Flash Memory for Reconfigurable IoTs using Connected-Instruction Execution (연결기반 명령어 실행을 이용한 재구성 가능한 IoT를 위한 온칩 플래쉬 메모리의 클라우드화)

  • Lee, Dongkyu;Cho, Jeonghun;Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.14 no.2
    • /
    • pp.103-111
    • /
    • 2019
  • The IoT-driven large-scaled systems consist of connected things with on-chip executable embedded software. These light-weighted embedded things have limited hardware space, especially small size of on-chip flash memory. In addition, on-chip embedded software in flash memory is not easy to update in runtime to equip with latest services in IoT-driven applications. It is becoming important to develop light-weighted IoT devices with various software in the limited on-chip flash memory. The remote instruction execution in cloud via IoT connectivity enables to provide high performance software execution with unlimited software instruction in cloud and low-power streaming of instruction execution in IoT edge devices. In this paper, we propose a Cloud-IoT asymmetric structure for providing high performance instruction execution in cloud, still low power code executable thing in light-weighted IoT edge environment using remote instruction execution. We propose a simulated approach to determine efficient partitioning of software runtime in cloud and IoT edge. We evaluated the instruction cloudification using remote instruction by determining the execution time by the proposed structure. The cloud-connected instruction set simulator is newly introduced to emulate the behavior of the processor. Experimental results of the cloud-IoT connected software execution using remote instruction showed the feasibility of cloudification of on-chip code flash memory. The simulation environment for cloud-connected code execution successfully emulates architectural operations of on-chip flash memory in cloud so that the various software services in IoT can be accelerated and performed in low-power by cloudification of remote instruction execution. The execution time of the program is reduced by 50% and the memory space is reduced by 24% when the cloud-connected code execution is used.