• Title/Summary/Keyword: DETECT2000 코드

Search Result 6, Processing Time 0.03 seconds

Development of a High Resolution SPECT Detector with Depth-encoding Capability for Multi-energy Imaging: Monte Carlo Simulation (다중에너지 영상 획득을 위한 Depth-Encoding 고분해능 단일광자단층촬영 검출기 개발: 몬테칼로 시뮬레이션 연구)

  • Beak, Cheol-Ha;Hwang, Ji-Yeon;Lee, Seung-Jae;Chung, Yong-Hyun
    • Progress in Medical Physics
    • /
    • v.21 no.1
    • /
    • pp.93-98
    • /
    • 2010
  • The aim of this work was to establish the methodology for event positioning by measuring depth of interaction (DOI) information and to evaluate the system sensitivity and spatial resolution of the new detector for I-125 and Tc-99m imaging. For this purpose, a Monte Carlo simulation tool, DETECT2000 and GATE were used to model the energy deposition and light distribution in the detector and to validate this approach. Our proposed detector module consists of a monolithic CsI(Tl) crystal with dimensions of $50.0{\times}50.0{\times}3.0\;mm^3$. The results of simulation demonstrated that the resolution is less than 1.5 mm for both I-125 and Tc-99m. The main advantage of the proposed detector module is that by using 3 mm thick CsI(Tl) with maximum-likelihood position-estimation (MLPE) method, high resolution I-125 imaging and high sensitivity Tc-99m imaging are possible. In this paper, we proved that our new detector to be a reliable design as a detector for a multi-energy SPECT.

A Study On The Reliability Characteristics of Fail-Safe Control Logic (고장-안전 제어논리의 신뢰성 특성에 관한 연구)

  • 한상섭;이정석;김민수;이기서
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2000.04a
    • /
    • pp.247-253
    • /
    • 2000
  • 본 논문은 정보 여분(Information Redundancy)에서의 에러 검출 코딩(Error Detect Coding) 기법을 이용하여 3-out-of-6 자체 검사기를 설계하고, 주기적인 코드(Frequency Coding) 주입을 통해 고장-안전 제어 논리를 모델링 했다. 고장-안전 제어 논리 모듈과 TMR(Triple Modular Redundancy)의 단일 모듈간에 대해서 신뢰성 병렬 수치 해석을 수행하였고, 이때 고장-안전 제어 논리가 기존의 하드웨어 여분 기법보다 시스템 소모비용과 기능적 오버헤드가 감소되어 기능신뢰성이 증가되는 결과를 얻었다.

  • PDF

A reference code design for PN code acquisition in DS/SS CDMA systems (DS/SS CDMA 시스템 하에서 유사임의 코드 획득을 위한 reference code 설계)

  • 원승환;장승용;김운경
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.65-68
    • /
    • 2000
  • In CDMA, the currently used PN code acquisition methods detect the phase of the incoming PN signal on the basis of ML estimation. In serial search strategy, it takes relatively long time for PN code acquisition. A study related to reduce processing time of PN code acquisition is important. Therefore we propose a reference code design for a new algorithm that a reference code and the received PN code are fully correlated to detect the transmitted PN code, in detail, the relative phase offset j of c⒡. After choosing two weight factors, we show the mathematical analysis and derivation for the reference code design.

  • PDF

The Hangul 4 State Bar Code System for the Automatic processing of Mail Items (우편물 자동처리를 위한 한글 4 State 바코드 시스템)

  • Park, Moon-Sung;Song, Jae-Gwan;Woo, Dong-Chin
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.146-155
    • /
    • 2000
  • This paper describes a 4-state bar code called HANGUL 4 ST that has been specifically designed for automatic processing of the letter mails, A HANGUL 4 ST bar code is a necessary data base that is applied data capture and data carrier with it all the information necessary for sorting, the amount capture for transportation of mail items, and valued-added services such as indicia, tracking and trace. The 4-state bar code information contents are composed of a postal code, delivery point, customer information including customer identification number and name, and parity bits for error detect and correct. The data density capability of HANGUL 4 St allows all useful sorting data and customer data to be encoded on one label. This supports better automatic processing in mail items, higher level of customer service and more efficient operation.

  • PDF

Development of Non-contact Detector for Broken Cords of Steel-Cord Conveyor Belt (컨베이어벨트의 비접촉식 스틸코드파선 검사장치 개발)

  • Yoo, Jae-Sang;Son, Boong-Ho
    • Proceedings of the KIEE Conference
    • /
    • 2000.07d
    • /
    • pp.2535-2537
    • /
    • 2000
  • In order to detect and monitor the broken cords of steel-cord belt from being damaged by impact of large lump of materials and the corrosion of steel cord, we developed a non-contact magnetic coil detection system. This measures the deterioration of reinforcing cables in steel cord conveyor belt which transport the ores in raw material plant. In this research, magnetic coil sensor of broken-cord detection system has exciting part and sensing part. The broken-cord detection system is operated by supplying a transmitter coil with electric power to generate magnetic field, and then the change of induced voltage is detected in each receiver coils due to resultant magnetic flux effected by the broken steel cords at the inside of the conveyor belt. By the informations such as the position and size of the broken steel cords obtained by SCBMS(Steel Cord Belt Monitoring System), it is expected that not only the span of belt life will be lengthened, but also this system can enable operators to plan scheduled maintenance and prevent the enlargement of damaged parts in steel cord belt at an early stage

  • PDF

Microarchitectural Defense and Recovery Against Buffer Overflow Attacks (버퍼 오버플로우 공격에 대한 마이크로구조적 방어 및 복구 기법)

  • Choi, Lynn;Shin, Yong;Lee, Sang-Hoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.3
    • /
    • pp.178-192
    • /
    • 2006
  • The buffer overflow attack is the single most dominant and lethal form of security exploits as evidenced by recent worm outbreaks such as Code Red and SQL Stammer. In this paper, we propose microarchitectural techniques that can detect and recover from such malicious code attacks. The idea is that the buffer overflow attacks usually exhibit abnormal behaviors in the system. This kind of unusual signs can be easily detected by checking the safety of memory references at runtime, avoiding the potential data or control corruptions made by such attacks. Both the hardware cost and the performance penalty of enforcing the safety guards are negligible. In addition, we propose a more aggressive technique called corruption recovery buffer (CRB), which can further increase the level of security. Combined with the safety guards, the CRB can be used to save suspicious writes made by an attack and can restore the original architecture state before the attack. By performing detailed execution-driven simulations on the programs selected from SPEC CPU2000 benchmark, we evaluate the effectiveness of the proposed microarchitectural techniques. Experimental data shows that enforcing a single safety guard can reduce the number of system failures substantially by protecting the stack against return address corruptions made by the attacks. Furthermore, a small 1KB CRB can nullify additional data corruptions made by stack smashing attacks with only less than 2% performance penalty.