• Title/Summary/Keyword: Computer code

Search Result 2,705, Processing Time 0.027 seconds

Tag-Identification Mechanism using Orthogonal Code in RFID System (RFID 시스템에서 Orthogonal Code를 사용한 태그 인식 메커니즘)

  • Kim, Sung-Jun;Jung, Young-Hwan;Ahn, Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.490-492
    • /
    • 2005
  • 본 논문에서는 별도의 충돌 방지 메커니즘이 필요 없는 orthogonal code를 태그 ID로 부여함으로써 태그 인식을 간단하게 하는 메커니즘에 대해 설명한다. 첫 번째 적용 메커니즘으로 Local환경에서 Orthogonal code가 적용될 수 있는 여러 가지 응용 분야를 제안하고 두 번째로 Orthogonal code를 기존 ID 체계의 일부분으로 사용하여 anti-collision algorithm의 효율을 높이는 방법을 제시한다. 마지막으로 orthogonal code ID의 개수가 많아짐에 따라 code bit수가 길어지는 문제를 해결하기 위하여 code를 블록화 하여 사용 bit를 줄이는 메커니즘을 제시한다.

  • PDF

A Study on a concatenated RS code and Turbo code for OFDM system over burst noise channel

  • Choi Sang Min;Moon Byung Hyun;Park Jong Soo
    • Proceedings of the IEEK Conference
    • /
    • 2004.08c
    • /
    • pp.649-652
    • /
    • 2004
  • In this paper, a concatenated RS and Turbo code is proposed for OFDM system over burst error channel. The concatenated code used in this study is a RS(255,2D2) code and a rate 1/2 turbo code. The turbo code uses 2 recursive systematic convolutional (RSC) code as the constituent codes and the parity bit are punctured to get the desired code rate. It is shown by simulation that the conventional OFDM system fails when there exists burst noise. The concatenated RS and turbo code obtains at least 5dB gain over the turbo code at the bit error probability of $10^{-3}$.

  • PDF

Analysis of Successful Adaptation Factors of Computer Science Freshmen Students (컴퓨터 전공 신입생의 성공적 적응 요인 분석)

  • Park, Uchang
    • Journal of Engineering Education Research
    • /
    • v.17 no.4
    • /
    • pp.95-101
    • /
    • 2014
  • As other major, students have difficulties to be successfully adapted to computer science major without some interest and skill to computer programming. In this paper, we try to find successful factors for computer science major freshmen students to computer programming. The factors we focused are programming experience before college entrance, taking liberal arts/natural science courses at high school, application motivations to computer major, existence of mentors, satisfaction to his/her computer department, student's holland job aptitude code. After analysis, taking liberal arts/natural science courses at high school, satisfaction to computer department, some holland job aptitude code are significant to their successful adaptation to computer major. Also, we found the holland job apptitude code is closely related to student's satisfaction to their major for engineering students including computer science students. Our analysis results will be a suggestion for designing computer science education program with students who enters college without some aptitude or preparation to his major.

Object-oriented Development of Computer Code for Inverse Heat Conduction Problem

  • Kim, Sun-Kyoung
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.8 no.1
    • /
    • pp.59-65
    • /
    • 2007
  • This paper suggests a method for developing computer code that can solve inverse heat conduction problem, The concept of the object-oriented development is employed to implement the computer code in an efficient and flexible fashion. The software design is conducted based on the unified modeling language. Furthermore, this paper also explains how to implement the deliverable computer code using the existing software development tools.

A study of the stack allocation policy on JIT Code Generator (JIT Code Generator 상의 스택할당 정책 적용에 관한 연구)

  • 김효남
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.100-103
    • /
    • 2001
  • The best solution to improve the execution speed of Java program is to make use of the high speed JVM(Java Virtual Machine). The performance of JVM depends on the difference of its implementation. One of the technologies to enhance JVM performance is a JIT(Just-in-Time) code generator. The JIT code generator transforms Java byte code to the native machine code in accordance with computer system platform. The native machine code is faster than the existing interpreter method, since it can reduce the time to analyze the Java byte code. But the JIT code generator have the problem of increasing the traffic between stack and register because of using many register. Therefore, this paper suggests how to reduce the traffic by applying the policy of stack allocation to JIT code generation, as one of the methods to enhance the performance of JVM.

  • PDF

Development of A Three-Dimensional Thermo-Hydraulic Computer Code for Incompressible Flows in Complex Geometries

  • Park, Seok-Ki;Lee, Yong-Bum;Hwang, Jong-Sun;Nam, Ho-Yun;Mann Cho
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.173-178
    • /
    • 1996
  • A three-dimensional thermo-hydraulic computer code is developed for simulation of incompressible flows in complex geometries. The computer code employs a body-fitted, nonorthogonal grid system in order to efficiently handle the complex geometries encountered in many engineering applications. The finite volume method is used to discretize the governing equations and the convection term is treated by higher-order bounded schemes. The cell-centered, nonstaggered grid arrangement is adopted and the resulting checkerboard pressure oscillation is avoided by use of momentum interpolation practice. The computer code employs the SIMPLE algorithm for pressure and velocity coupling and the k-$\varepsilon$ turbulence for turbulent calculation. The computer code has been tested through application to a variety of test problems and some results are presented in this paper

  • PDF

Node.js-based Online Source Code Storege(Code Box) (Node.js 기반의 온라인 소스코드 저장소(Code Box))

  • Hur, Tai-Sung;Mok, Gi-Yun;Lee, Jee-Hoon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.225-226
    • /
    • 2019
  • Code box 시스템은 프론트엔트 개발자를 위한 온라인 소스코드 저장소로 HTML. CSS, JavaScript를 작성하고 그 결과를 즉시 확인할 수 있으며, 소스코드의 버전관리 기능을 추가하여 소스코드의 변경에 따른 소스코드 관리 능력을 향상하도록 하였으며, 소스코드 작성 시 편의성을 향상시키기 위하여 코드 작성란에 문법자동완성과 Syntax Highlighting기능을 추가하였다. 또한 작성한 소스코드를 사용자들이 공유할 수 있으며 소스코드 작성 중 질문 사항이 발생하면 작성된 소스코드를 옮겨 실시간 질의 사항을 공유하도록 하였다.

  • PDF

Border Code : A New Extensible Code System for Augmented Reality (Border Code : 증강현실 서비스에 용이한 새로운 코드 체계 제안)

  • Park, Seong-hun;Lee, Chang-hyeon;Choi, Ga-yeong;Eun, Ae-cheoun;Ha, Young-guk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1488-1491
    • /
    • 2011
  • 증강현실 서비스를 제공하기 위해 현실세계와 가상세계의 연결고리인 위치 지시자가 필요하다. 위치 지시자는 RF칩이나 적외선 표시기 등의 능동형 위치 지시자와 특정 코드, 또는 이미지와 같은 수동형 위치 지시자가 있다. 그 중 수동형 위치 지시자가 갖는 한계점을 극복하고자 본 논문에서는 현실세계 컨텐츠 테두리에 코드를 삽입하는 1차원 코드 체계인 Border Code를 제안한다. 현실세계 컨텐츠의 테두리에 코드를 삽입함으로 인해 현실세계 컨텐츠와 독립적이지 않고, 현실세계 컨텐츠와 어울어져 증강현실 서비스 제공에 용이 하다. 이런 Border Code 체계의 구성, 인식 과정, 서비스 제공 방안과 실험내용을 보인다.

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

  • Huang, Peng-Cheng;Li, Yung-Hui;Chang, Chin-Chen;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2348-2365
    • /
    • 2018
  • QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.

EduCODE : Educational COntents DEvelopment method for SCORM supporting (EduCODE : SCORM 지원 교육용 컨텐츠 개발 방법)

  • Seo, Dae-Woo;Lee, Se-Hoon;Wang, Chang-Jong
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.123-133
    • /
    • 2002
  • In this paper we proposed EduCODE for educational contents development method and designed the system to support EduCODE. There are four models in EduCODE such as domain model, navigation model, abstract interface model, and asset model. The method includs graphic notations for contents structure. The system to support EduCODE consisted of authoring module and run-time module. The authoring module automatically generates ADL SCORM XML code using specifications produced by EduCODE and the code is serviced to a client by run-time module and web server.

  • PDF