• Title/Summary/Keyword: In/Out Binary

Search Result 446, Processing Time 0.028 seconds

GENERAL PROGRAM FOR BINARY STARS RESEARCH AT MAYDANAK

  • ZAKIROV M. M.;HOJAEV A. S.;ARZUMANYANTS G. C.
    • Journal of The Korean Astronomical Society
    • /
    • v.29 no.spc1
    • /
    • pp.245-246
    • /
    • 1996
  • The extensive close binary research program earring out at High Altitude Maydanak Observatory (Uzbekistan) by means of the UBVR photoelectric photometry on 1.0 m and 0.6 m Zeiss telescopes is described. It includes more than 240 close binary systems (CBS) in 89 different stellar aggregates. Lightcurves of CBS as well as their orbital elements derived by us are presented.

  • PDF

A Out-of-Bounds Read Vulnerability Detection Method Based on Binary Static Analysis (바이너리 정적 분석 기반 Out-of-Bounds Read 취약점 유형 탐지 연구)

  • Yoo, Dong-Min;Jin, Wen-Hui;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.687-699
    • /
    • 2021
  • When a vulnerability occurs in a program, it is documented and published through CVE. However, some vulnerabilities do not disclose the details of the vulnerability and in many cases the source code is not published. In the absence of such information, in order to find a vulnerability, you must find the vulnerability at the binary level. This paper aims to find out-of-bounds read vulnerability that occur very frequently among vulnerability. In this paper, we design a memory area using memory access information appearing in binary code. Out-of-bounds Read vulnerability is detected through the designed memory structure. The proposed tool showed better in code coverage and detection efficiency than the existing tools.

A Photometric Investigation of KIC6118779 with Phase Smearing Effect

  • Jeong, Min-ji;Kim, Chun-Hwey
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.42 no.2
    • /
    • pp.63.3-64
    • /
    • 2017
  • KIC6118779 is an over-contact binary system having a short orbital period of about 0.36 days. The photometric data for this system are acquired by the observations of Kepler mission in the long cadence mode having a time resolution of about 30 minutes. It means that the Kepler light curves of the system may be strongly affected by phase smearing effect and the analysis of them without consideration of the phase smearing effect may result in wrong stellar properties. Additionally, this system also shows dynamical variation of light curve resulting from spot activity. For all those reasons, it is difficult to investigate KIC6118779, and the investigation should be carried out carefully. In this presentation, we introduce the phase smearing effect and carry out the light curve modeling with the 2015 version of the Wilson-Devinney binary code considering the phase smearing effect. Our results show that the system is a deep over contact binary system and has extremely low mass ratio of about 0.12. Moreover our spot modeling implies the cyclic migration of a big cool spot on the massive component.

  • PDF

Performance analysis of Binary Clipping PW-CDMA against non-linear distortion over Flat fading Channel (Flat 페이딩 채널환경에서 비선형 왜곡에 대한 Binary Clipping PW-CDMA 성능 분석)

  • 김현욱;안치훈;옥경준;정준엽;김동구
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.297-301
    • /
    • 2003
  • The binary clipping PW/CDMA system is considered. This system can be constructed with effective cost. leading to reduce the influence of the non-linear amplifier because of converting multi-level signals into constant envelope signals. In addition, the clipping method which is to clip out signal amplitude at some level when multi-level signals are converted into constant envelope signals is used. The multi-level signals are clipped at 1 and -1 to limit the extension of bandwidth and to maintain the bandwidth after clipping. In this paper, the performance of the binary clipping PW/CDMA system with the non-linear amplifier analyzed by simulation over AWGN and flat fading channels respectively. The binary clipping PW/CDMA system with the non-linear amplifier is 2.2dB and 0.9dB better than conventional DS/CDMA system over the flat fading channels when the number of users are 9 and 17 respectively.

  • PDF

Numerical Study on the Droplet Flows in a Cross-Junction Channel Using the Lattice Boltzmann Method (Lattice Boltzmann 법을 이용한 Cross-Junction 채널 내의 droplet 유동에 관한 수치해석적 연구)

  • Park, Jae-Hyoun;Suh, Young-Kweon
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2006.11a
    • /
    • pp.407-410
    • /
    • 2006
  • This study describes a simulation of two-dimensional bubble forming and motion by the Lattice Boltzmann Method with the phase field equation. The free energy model is used to treat the interfacial force and deformation of binary fluids system, drawn into a T-junction the micro channel. A numerical simulation of a binary flow in a cross-junction channel is carried out by using the parallel computation method. The aim in this investigation is to examine the applicability of LBM to numerical analysis of binary fluid separation and motion in the micro channel.

  • PDF

Dual Optical Encryption for Binary Data and Secret Key Using Phase-shifting Digital Holography

  • Jeon, Seok Hee;Gil, Sang Keun
    • Journal of the Optical Society of Korea
    • /
    • v.16 no.3
    • /
    • pp.263-269
    • /
    • 2012
  • In this paper, we propose a new dual optical encryption method for binary data and secret key based on 2-step phase-shifting digital holography for a cryptographic system. Schematically, the proposed optical setup contains two Mach-Zehnder type interferometers. The inner interferometer is used for encrypting the secret key with the common key, while the outer interferometer is used for encrypting the binary data with the same secret key. 2-step phase-shifting digital holograms, which result in the encrypted data, are acquired by moving the PZT mirror with phase step of 0 or ${\pi}/2$ in the reference beam path of the Mach-Zehnder type interferometer. The digital hologram with the encrypted information is a Fourier transform hologram and is recorded on CCD with 256 gray level quantized intensities. Computer experiments show the results to be encryption and decryption carried out with the proposed method. The decryption of binary secret key image and data image is performed successfully.

Variations of Equilibrium Adsorption Capacities According to Type and Mixing Fraction of Binary Mixed Gas on Activated Carbon Fixed-bed (활성탄 고정층에서 2성분 혼합가스의 종류와 혼합 분율에 따른 포화 흡착량의 변화)

  • Kim, Hyo-Won;Lee, Song-Woo;Lee, Min-Gyu;Cheon, Jae-Kee
    • Journal of Environmental Science International
    • /
    • v.16 no.10
    • /
    • pp.1197-1202
    • /
    • 2007
  • Adsorption experiments of binary mixed gases composed of acetone/methylethylketone (MEK), MEK/benzene, MEK/toluene, and benzene/toluene were carried out on activated carbon fixed-bed. The variations of equilibrium adsorption capacity according to type and fraction of binary gas were investigated. In case of binary gases composed of acetone/MEK and benzene/toluene, equilibrium adsorption capacities of MEK and toluene were increased according to the increase of fraction of MEK and toluene, but equilibrium adsorption capacities of acetone and benzene were decreased. In case of binary gases composed of MEK/benzene and MEK/toluene, equilibrium adsorption capacities of benzene and toluene were increased according to the increase of fraction of benzene and toluene, but equilibrium adsorption capacities of MEK was decreased.

Multiple Fault Detection in Combinational Logic Networks (조합논리회로의 다중결함검출)

  • 고경식;김흥수
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.12 no.4
    • /
    • pp.21-27
    • /
    • 1975
  • In this paper, a procedure for deriving of multiple fault detection test sets is presented for fan-out reconvergent combinational logic networks. A fan-out network is decomposed into a set of fan-out free subnetworks by breaking the internal fan-out points, and the minimal detecting test sets for each subnetwork are found separately. And then, the compatible tests amonng each test set are combined maximally into composite tests to generate primary input binary vectors. The technique for generating minimal test experiments which cover all the possible faults is illustrated in detail by examples.

  • PDF

Target Measurement Error Reduction Technique of Suboptimal Binary Integration Radar (부 최적 이진누적 적용 레이더의 표적 측정오차 감소 기법)

  • Nam, Chang-Ho;Choi, Seong-Hee;Ra, Sung-Woong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.9
    • /
    • pp.65-72
    • /
    • 2011
  • A binary integration is one of sub-optimal pulse integration which decides detection based on discriminating m successful detections out of n trials in radar systems using multiple pulse repetition frequencies. This paper introduces target measurement error reduction technique to reduce azimuth errors in suboptimal binary integration radar which applies the near value by m rather than the optimal m and verifies the performance by analyzing the experimental data measured from real radar.