• Title/Summary/Keyword: Codes Application

Search Result 500, Processing Time 0.028 seconds

Towards a physics-based description of intra-granular helium behaviour in oxide fuel for application in fuel performance codes

  • Cognini, L.;Cechet, A.;Barani, T.;Pizzocri, D.;Van Uffelen, P.;Luzzi, L.
    • Nuclear Engineering and Technology
    • /
    • v.53 no.2
    • /
    • pp.562-571
    • /
    • 2021
  • In this work, we propose a new mechanistic model for the treatment of helium behaviour which includes the description of helium solubility in oxide fuel. The proposed model has been implemented in SCIANTIX and validated against annealing helium release experiments performed on small doped fuel samples. The overall agreement of the new model with the experimental data is satisfactory, and given the mechanistic formulation of the proposed model, it can be continuously and easily improved by directly including additional phenomena as related experimental data become available.

Exploring the Ways to Apply Korean Traditional Medical Practices to the International Classification of Health Interventions through Focus Group Discussion (초점집단토론을 통한 국제의료행위분류의 한의의료행위 적용 방안 연구)

  • Kim, Mikyung;Kim, Eun-Jin;Cho, Yun-Jung;Han, Chang-ho
    • The Journal of Korean Medicine
    • /
    • v.41 no.3
    • /
    • pp.125-137
    • /
    • 2020
  • Objectives: This study was aimed to present the experts' opinions for the successful application of Korean traditional medical practices (KTMPs) to the International Classification of Health Intervention (ICHI). Methods: Two doctors of Korean Medicine and two health information managers who had tried coding 131 KTMPs using ICHI participated in the focus group discussion. The remarks from the discussion were summarized according to the thematic analysis method. Results: The participants expected ICHI to be mainly used for statistics when applied to TKMPs. It can be used for payment systems as well, but it was expected that additional work would be required. They thought the current version of the ICHI did not sufficiently reflect the KMTPs of the real world, and even the interventions already included in the ICHI were not explained enough in the system. They thought it would not be easy to explain more KTMPs within the current structure of the ICHI, but they also said it seemed possible. In the process, rather than adding entirely new stem codes, it would be better to generate new combinations of the existing codes, to suppose subdivided codes, and to utilize the include terms or extension codes. Conclusions: For the successful introduction of ICHI, clarifying the definition of each intervention of KTMPs is a top priority. In addition, it is necessary to continue the matching work of ICHI - KMPTs and also required to make this effort together with the field of traditional medicine and complementary medicine worldwide.

Analysis on the Infection Process and Abstract of the Hidden Files of Rustock B and C (Rustock B형과 C형의 감염절차 분석 및 은닉파일 추출)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.16 no.1
    • /
    • pp.41-53
    • /
    • 2012
  • The technologies used by the malicious codes have been being advanced and complicated through a merge of the existing techniques, while the damages by the malicious codes are moving from individuals and industries to organizations and countries. In this situation, the security experts are corresponding with the static analysis and the dynamic analysis such as signature searching and reverse engineering, respectively. However, they have had a hard time to respond against the obfuscated intelligent new zero day malicious codes. Therefore, it is required to prepare a process for a preliminary investigation and consequent detailed investigation on the infection sequence and the hiding mechanism to neutralize the malicious code. In this paper, we studied the formalization of the process against the infection sequence and the file hiding techniques with an empirical application to the Rustock malicious code that is most notorious as a spammer. Using the result, it is expected to promptly respond to newly released malicious codes.

Efficient Problem-Solving Idea Generation in the Design Phase VE of Construction Projects using Business Creativity Codes(BCC) (건설 설계VE의 효율적 문제해결 아이디어 도출을 위한 비즈니스 창의성 코드(BCC) 활용방안)

  • Kim, Huy-Qyou;Park, Young-Taek
    • Journal of the Korea Institute of Building Construction
    • /
    • v.16 no.4
    • /
    • pp.367-379
    • /
    • 2016
  • Although the importance of creative thinking is rapidly increasing in the new century, the generation of creative ideas and its application in the construction industry have been considered relatively difficult. Thus there have been a few studies on the subject that how to apply creative thinking tools with empirical evidence in the construction industry. Value engineering(VE) has been widely applied in the design phase of construction projects due to the government regulation, Brainstorming has been the most prevalent idea generation techniques in the VE activities during the past several decades. Contrary to popular belief, the performance of brainstorming is not so good. It is known as the brainstorming myth. This paper proposes the business creativity codes(BCC) as an alternative idea generation tool in the design phase VE of construction projects. In order to examine the effectiveness of the BCC, 50 successful field cases awarded in the design VE competition of government agency are used. The result shows that the BCC can be used as an effective idea generation tool in the design phase VE construction projects.

Improvement of Feedback Delay for Practical Distributed Source Coding (실제적인 분산 비디오 부호화를 위한 분산 소스 부호화 시스템의 피드백 지연 문제 개선 방안)

  • Shin, Seung-Shik;Shin, Sang-Yun;Jang, Min;Lim, Dae-Woon;Kim, Sang-Hyo
    • Journal of Broadcast Engineering
    • /
    • v.17 no.1
    • /
    • pp.122-128
    • /
    • 2012
  • Because of the system delay caused by the number of feedback retransmission in Distributed Video Coding (DVC) scheme, it is difficult to realize practical DVC in many cases. In this paper low feedback retransmission Distributed Source Coding (DSC) scheme is proposed for practical DVC scheme based on Low-Density Parity-Check (LDPC) codes because DVC system is an specific application of DSC system. This DSC scheme is achieved by using different LDPC codes optimized in each different compression rate and using source revealing scheme. Optimized LDPC codes provide us much better decoding performance which causes the 57% reduced number of iteration. Consequently, the number of feedback retransmission is decreased by 50%.

Malicious Codes Re-grouping Methods using Fuzzy Clustering based on Native API Frequency (Native API 빈도 기반의 퍼지 군집화를 이용한 악성코드 재그룹화 기법연구)

  • Kwon, O-Chul;Bae, Seong-Jae;Cho, Jae-Ik;Moon, Jung-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.115-127
    • /
    • 2008
  • The Native API is a system call which can only be accessed with the authentication of the administrator. It can be used to detect a variety of malicious codes which can only be executed with the administrator's authority. Therefore, much research is being done on detection methods using the characteristics of the Native API. Most of these researches are being done by using supervised learning methods of machine learning. However, the classification standards of Anti-Virus companies do not reflect the characteristics of the Native API. As a result the population data used in the supervised learning methods are not accurate. Therefore, more research is needed on the topic of classification standards using the Native API for detection. This paper proposes a method for re-grouping malicious codes using fuzzy clustering methods with the Native API standard. The accuracy of the proposed re-grouping method uses machine learning to compare detection rates with previous classifying methods for evaluation.

Curriculum of IoT by IPC Code Analysis of Patents (특허문헌의 IPC 코드 분석에 의한 사물인터넷 분야 교육과정에 관한 연구)

  • Shim, Jaeruen;Choi, Jin-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1642-1648
    • /
    • 2021
  • We analyzes representative technologies of IoT patents and reflects these results in the curriculum of IoT. In order to identify the representative technologies, the IPC codes of the patents were analyzed. Among the main category IPC codes, the most used IPC codes were H04L in Single IPC Patent with 974 cases(32.0%) and G06Q in Multiple IPC Patent with 710 cases(29.2%). As a result of classifying the IPC code into the WIPO technology classification system, the most emphasized technologies are Digital Communication, accounting for about 60.5% in the Single IPC Patent and IT Methods for Management(710 cases, 29.2%) in Multiple IPC Patent. The main points to be considered when organizing the curriculum of IoT are: ∇Emphasis on Digital Communication, ∇Expansion of Education related to IT Methods for Management(Including entrepreneurship and patent application), and ∇Consideration of subjects related to the Convergence of IoT. This research can contribute to the curriculum design of new industrial technologies such as AI and Fintech.

ACTIVITIES OF CALIBRATION AND VALIDATION FOR THE KOMPSAT-2 MSC DATA

  • Lee Dong-Han;Lee Sun-Gu;Seo Doo-Chun;Song Jeong-Heon;Shih Jae-Min;Kim Yongseung;Lim Hyo-Suk;Paik Hong-Yul
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.620-623
    • /
    • 2005
  • KARI has prepared Calibration and Validation activities for the KOMPSAT-2 (KOrea Multi-Purpose SATellite-2) MSC data that will be launched at the end of this year. Firstly, we divided the Cal/Val activities of it to four parts, Spatial, Spectral, Radiometric and Geometric, and defmed the detailed Cal/Val items from them. Secondly, Cal/Val targets have been defined and manufactured for the role of them. Thirdly, we have made the plan and the procedure for the Cal/Val items, developed the codes for them, studied more detailed method to do them, and trained the Cal/Val activities using the foreign satellite image data by ourselves. KARI has been now setting up the KOMPSAT-2 LEOP plan with the Cal/Val activities, and probably will finish the EOP Cal/Val activities for the KOMPSAT-2 MSC data by the next April or May.

  • PDF

A Packet Loss Control Scheme based on Network Conditions and Data Priority (네트워크 상태와 데이타 중요도에 기반한 패킷 손실 제어 기법)

  • Park, Tae-Uk;Chung, Ki-Dong
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.1
    • /
    • pp.1-10
    • /
    • 2004
  • This study discusses Application-layer FEC using erasure codes. Because of the simple decoding process, erasure codes are used effectively in Application-layer FEC to deal with Packet-level errors. The large number of parity packets makes the loss rate to be small, but causes the network congestion to be worse. Thus, a redundancy control algorithm that can adjust the number of parity packets depending on network conditions is necessary. In addition, it is natural that high-priority frames such as I frames should produce more parity packets than low-priority frames such as P and B frames. In this paper, we propose a redundancy control algorithm that can adjust the amount of redundancy depending on the network conditions and depending on data priority, and test the performance in simple links and congestion links.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.