• Title/Summary/Keyword: K-Code

Search Result 8,838, Processing Time 0.036 seconds

LDPC-LDPC Product Code Using Modified Log-likelihood Ratio for Holographic Storage System (홀로그래픽 저장장치를 위한 수정된 로그-유사도비를 이용한 LDPC-LDPC 곱부호)

  • Jeong, Seongkwon;Lee, Jaejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.17-21
    • /
    • 2017
  • Since holographic data storage has the advantage of high recording density and data transfer rate, it is a candidate for the next generation storage systems. However, Holographic data storage system is affected by interpage interference and two dimensional intersymbol interference. Also, burst error occurs by physical impact. In this paper, we propose an LDPC product code using modified log-likelihood ratio and extrinsic information to correct burst error and improve performance of holographic data storage. The performance of proposed LDPC product code is 0.5dB better than that of the conventional LDPC code.

The Chinese Performance-based Code for Fire-resistance of Steel Structures

  • Li, Guo-Qiang;Zhang, Chao
    • International Journal of High-Rise Buildings
    • /
    • v.2 no.2
    • /
    • pp.123-130
    • /
    • 2013
  • In the past two decades, researchers from different countries have conducted series of experimental and theoretical studies to investigate the behaviour of structures in fire. Many new insights, data and calculation methods have been reported, which form the basis for modern interdisciplinary structural fire engineering. Some of those methods are now adopted in quantitative performance-based codes and have been migrated into practice. Mainly based on the achievements in structural fire research at China, the Chinese national code for fire safety of steel structures in buildings has been drafted and approved, and will be released in this year. The code is developed to prevent steel structures subjected to fire from collapsing, ensure safe evacuation of building occupants, and reduce the cost for repairing the damages of the structure caused by fire. This paper presents the main contents of the code, which includes the fire duration requirements of structural components, fundamental requirements on fire safety design of steel components, temperature increasing of atmosphere and structural components in fire, loading effect and capacity of various components in fire, and procedure for fire-resistant check and design of steel components. The analytical approaches employed in the code and their validation works are also presented.

The Identification Framework for source code author using Authorship Analysis and CNN (작성자 분석과 CNN을 적용한 소스 코드 작성자 식별 프레임워크)

  • Shin, Gun-Yoon;Kim, Dong-Wook;Hong, Sung-sam;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.33-41
    • /
    • 2018
  • Recently, Internet technology has developed, various programs are being created and therefore various codes are being made through many authors. On this aspect, some author deceive a program or code written by other particular author as they make it themselves and use other writers' code indiscriminately, or not indicating the exact code which has been used. Due to this makes it more and more difficult to protect the code. In this paper, we propose author identification framework using Authorship Analysis theory and Natural Language Processing(NLP) based on Convolutional Neural Network(CNN). We apply Authorship Analysis theory to extract features for author identification in the source code, and combine them with the features being used text mining to perform author identification using machine learning. In addition, applying CNN based natural language processing method to source code for code author classification. Therefore, we propose a framework for the identification of authors using the Authorship Analysis theory and the CNN. In order to identify the author, we need special features for identifying the authors only, and the NLP method based on the CNN is able to apply language with a special system such as source code and identify the author. identification accuracy based on Authorship Analysis theory is 95.1% and identification accuracy applied to CNN is 98%.

Generating Verification Conditions from BIRS Code using Basic Paths for Java Bytecode Verification (자바 바이트코드 검증을 위해 기본경로를 통한 BIRS 코드로부터 검증조건 생성)

  • Kim, Je-Min;Kim, Seon-Tae;Park, Joon-Seok;Yoo, Weon-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.61-69
    • /
    • 2012
  • BIRS is an intermediate representation for verifying Java program. Java program in the form of bytecode could be translated into BIRS code. Verification conditions are generated from the BIRS code to verify the program. We propose a method generating verification conditions for BIRS code. Generating verification conditions is composed of constructing control flow graph for BIRS code, depth first searching for the control flow graph to generate basic paths, and calculating weakest preconditions of the basic paths.

Blind QR Code Steganographic Approach Based upon Error Correction Capability

  • Chiang, Yin-Jen;Lin, Pei-Yu;Wang, Ran-Zan;Chen, Yi-Hui
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.10
    • /
    • pp.2527-2543
    • /
    • 2013
  • A novel steganographic QR code algorithm, which not only coveys the secret into the widely-used QR barcode but also preserves the readability of QR content and the capability of error correction, is presented in this article. Different from the conventional applications for QR barcode, the designed algorithm conceals the secret into the QR modules directly by exploiting the error correction capability. General browsers can read the QR content from the QR code via barcode readers; however, only the authorized receiver can further reveal the secret from the QR code directly. The new mechanism can convey a larger secret payload along with adjustment of the QR version and error correction level. Moreover, the blind property allows the receiver to reveal the secret without the knowledge of the embedded position of modules. Experimental results demonstrate that the new algorithm is secure, efficient and feasible for the low-power QR readers and mobile devices.

ASSESSMENT OF THE CUPIDCODE APPLICABILITY TO SUBCHANNEL FLOW IN 2×2 ROD BUNDLE (CUPID 코드를 활용한 2×2 봉다발 부수로 유동 해석)

  • Lee, J.R.;Park, I.K.;Kim, J.
    • Journal of computational fluids engineering
    • /
    • v.21 no.4
    • /
    • pp.71-77
    • /
    • 2016
  • The CUPID code is a transient, three-dimensional, two-fluid, thermal-hydraulic code designed for a component-scale analysis of nuclear reactor components. The primary objective of this study is to assess the applicability of CUPID to single-phase turbulent flow analyses of $2{\times}2$ rod bundle subchannel. The bulk velocity at the inlet varies from 1.0 m/s up to 2.0 m/s which is equivalent to the fully turbulent flow with the range of Re=12,500 to 25,000. Adiabatic single-phase flow is assumed. The velocity profile at the exit region is quantitatively compared with both experimental measurement and commercial CFD tool. Three different boundary conditions are simulated and quantitatively compared each other. The calculation results of CUPID code shows a good agreement with the experimental data. It is concluded that the CUPID code has capability to reproduce the turbulent flow behavior for the $2{\times}2$ rod bundle geometry.

A study of KKR code translation methods for ALE middleware (ALE 미들웨어를 위한 KKR 코드 변환 방법에 관한 연구)

  • Byun, Ji-Woong;No, Young-Sik;Yang, Moon-Seok;Byun, Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.842-845
    • /
    • 2007
  • The field of automatic identification using RF is the one of the emerging ubiquitous computing areas. Early RFID techniques was focused on hardware areas, but RFID middleware has recently gained a lot of attention, which collects and filters tag data, and provides it to enterprise applications. The RFID middleware proposed by EPCglobal only can process EPC tag data, and cannot handle the KKR code which is defined by korean organization. So in this paper, we propose a method which can process the KKR code in RFID middleware systems. Using our approach, the RFID middleware can be extended as general ubiquitous middleware systems which process not only EPC code but also KKR code.

  • PDF

Development of Order Communication System - laboratory application - (처방 전달 시스템의 개발 - 검사 처방 시스템의 개발 -)

  • Kim, Jong-Won;Whang, Yoo-Sung;Cha, Eun-Jong;Lee, Tae-Soo
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1992 no.05
    • /
    • pp.118-120
    • /
    • 1992
  • We have developed and been using laboratory order communication system which is a computerized laboratory request and reception system wi th bar code between inpatient or outpatient and the clinical laboratory in Chungbuk National Unversity Hospital. Work flows are as follows: Tests are requested by the physicians through hospital information system without issuing request forms. Bar code stickers containing demographics of patient and other informations such as sample number, slip code and specimen code are printed and attached to smaple tubes. At the department of clinical pathology, smaples are received through the bar code reader. Area numbers are automatically created and laboratory work numbers are determined. Worklists can be issued by each section of laboratory when needed. Our order communication system alleviates the human labor such as specimen labelling and making worklist and reduces clerical errors that occur from sample collection to laboratory analysis.

  • PDF

A Distance Estimation Algorithm Based on Multi-Code Ultrasonic Sensor and Received Signal Strength (다중 코드 초음파와 전파 신호 강도를 이용한 거리 측정)

  • Cho, Bong-Su;Kim, Phil-Soo;Moon, Woo-Sung;Baek, Kwang-Ryul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.2
    • /
    • pp.149-156
    • /
    • 2011
  • This paper reveals a distance estimation algorithm based on multi-code ultrasonic and wireless sensor network. For measuring the distances among the sensor nodes, each ultrasonic transmitter transmits multi-code ultrasonic signal simultaneously. Receivers use cross correlation method to separate the coded signals. The information of measured distances is broadcasted to each sensor node by wireless sensor network. The wireless sensor network measures the distance among the sensor nodes using the received signal strength of the broadcasting. The multi-code ultrasonic have a limitation of measurable distance. And the received signal strength is affected from an environment. This paper measures a distance using ultrasonic and a received signal strength in short range. These measured data are applied to the least square estimation algorithm. By the expansion of the fitting curve, a distance measurement in long range using the received signal strength is compensated. The coupled system reduce the error to an acceptable level.

A Rule-based Optimal Placement of Scaling Shifts in Floating-point to Fixed-point Conversion for a Fixed-point Processor

  • Park, Sang-Hyun;Cho, Doo-San;Kim, Tae-Song;Paek, Yun-Heung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.6 no.4
    • /
    • pp.234-239
    • /
    • 2006
  • In the past decade, several tools have been developed to automate the floating-point to fixed-point conversion for DSP systems. In the conversion process, a number of scaling shifts are introduced, and they inevitably alter the original code sequence. Recently, we have observed that a compiler can often be adversely affected by this alteration, and consequently fails to generate efficient machine code for its target processor. In this paper, we present an optimization technique that safely migrates scaling shifts to other places within the code so that the compiler can produce better-quality code. We consider our technique to be safe in that it does not introduce new overflows, yet preserving the original SQNR. The experiments on a commercial fixed-point DSP processor exhibit that our technique is effective enough to achieve tangible improvement on code size and speed for a set of benchmarks.