• Title/Summary/Keyword: K-Code

Search Result 8,838, Processing Time 0.042 seconds

Smart-phone Malicious Code Countermeasure System (스마트폰 악성코드 대응 시스템)

  • Song, Jong-Gun;Lee, HoonJae;Kim, TaeYong;Jang, WonTae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.223-226
    • /
    • 2013
  • Information security breaches caused by malicious code is arising in various forms with exponential growth. The latest information security threats on computers are increasing, especially on smartphone, which has enabled malicious code to quickly surge. As a result, the leakage of personal information, such as billing information, is under threat. Meanwhile the attack vector o smartphone malware is difficult to detect. In this paper, we propose a smartphone security system to respond to the spread of malicious code by iPhone and Android OS-based malware analysis.

  • PDF

A Novel Scheme to Mitigate a GPS L1 C/A Signal Repeat-back Jamming Effect, According to a Code Tracking Bias Estimation, Using Combined Pseudo-random Noise Signals (통합 의사잡음신호 기반 부호추적편이 추정에 따른 GPS L1 C/A 신호의 재방송재밍 영향 완화 기법)

  • Yoo, Seungsoo;Yeom, Dong-Jin;Jee, Gyu-In;Kim, Sun Yong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.22 no.10
    • /
    • pp.869-875
    • /
    • 2016
  • In this paper, a novel scheme with which to mitigate a repeat-back jamming effect is proposed for the GPS L1 coarse/acquisition signal. The proposed scheme estimates the code tracking bias caused by repeat-back jamming signals using a Combined Pseudo-random noise signal. It then mitigates the repeat-back jamming effect by subtracting the estimated code timing on a normal correlation channel from the estimated value. Through a Monte-Carlo simulation, the proposed scheme can diminish the running average of code tracking bias to less than 10% of the bias using the conventional scheme.

Identification of hydrogen flammability in steam generator compartment of OPR1000 using MELCOR and CFX codes

  • Jeon, Joongoo;Kim, Yeon Soo;Choi, Wonjun;Kim, Sung Joong
    • Nuclear Engineering and Technology
    • /
    • v.51 no.8
    • /
    • pp.1939-1950
    • /
    • 2019
  • The MELCOR code useful for a plant-specific hydrogen risk analysis has inevitable limitations in prediction of a turbulent flow of a hydrogen mixture. To investigate the accuracy of the hydrogen risk analysis by the MELCOR code, results for the turbulent gas behavior at pipe rupture accident were compared with CFX results which were verified by the American National Standard Institute (ANSI) model. The postulated accident scenario was selected to be surge line failure induced by station blackout of an Optimized Power Reactor 1000 MWe (OPR1000). When the surge line failure occurred, the flow out of the surgeline was strongly turbulent, from which the MELCOR code predicted that a substantial amount of hydrogen could be released. Nevertheless, the results indicated nonflammable mixtures owing to the high steam concentration released before the failure. On the other hand, the CFX code solving the three-dimensional fluid dynamics by incorporating the turbulence closure model predicted that the flammable area continuously existed at the jet interface even in the rising hydrogen mixtures. In conclusion, this study confirmed that the MELCOR code, which has limitations in turbulence analysis, could underestimate the existence of local combustible gas at pipe rupture accident. This clear comparison between two codes can contribute to establishing a guideline for computational hydrogen risk analysis.

Development of a G-Code Generator for Color Gradation Generations in a Mixing Chamber FDM 3D Printers (Mixing chamber를 사용하여 그라데이션 색상을 구현하기 위한 G-code 생성기 개발)

  • Noh, Kyoung-Seok;Seo, Hae-Won;Kim, Tae-Young;Lee, Yong-Gu
    • Korean Journal of Computational Design and Engineering
    • /
    • v.22 no.1
    • /
    • pp.10-17
    • /
    • 2017
  • The recent 3D printing industry has been focusing on developing 3D printers to fulfill the user's need to bring more colorful and realistic outcomes. Several 3D printers have deployed multiple extruders to print different colors. However, this method has a limit on its availability of colors. To solve this, recent research is focused on using mixing chambers to mix the possible colors to provide more color availability. In this paper, we discuss the environment and algorithm behind the development of G-code which allows a gradation effect of the mix of two filaments. The generation algorithm to make gradient G-code has been implemented in Cura using C ++ and Python.

DEVELOPMENT OF A WALL-TO-FLUID HEAT TRANSFER PACKAGE FOR THE SPACE CODE

  • Choi, Ki-Yong;Yun, Byong-Jo;Park, Hyun-Sik;Kim, Hee-Dong;Kim, Yeon-Sik;Lee, Kwon-Yeong;Kim, Kyung-Doo
    • Nuclear Engineering and Technology
    • /
    • v.41 no.9
    • /
    • pp.1143-1156
    • /
    • 2009
  • The SPACE code that is based on a multi-dimensional two-fluid, three-field model is under development for licensing purposes of pressurized water reactors in Korea. Among the participating research and industrial organizations, KAERI is in charge of developing the physical models and correlation packages for the constitutive equations. This paper introduces a developed wall-to-fluid heat transfer package for the SPACE code. The wall-to-fluid heat transfer package consists of twelve heat transfer subregions. For each sub-region, the models in the existing safety analysis codes and the leading models in literature have been peer reviewed in order to determine the best models which can easily be applicable to the SPACE code. Hence a wall-to-fluid heat transfer region selection map has been developed according to the non-condensable gas quality, void fraction, degree of subcooling, and wall temperature. Furthermore, a partitioning methodology which can take into account the split heat flux to the continuous liquid, entrained droplet, and vapor fields is proposed to comply fully with the three-field formulation of the SPACE code. The developed wall-to-fluid heat transfer package has been pre-tested by varying the independent parameters within the application range of the selected correlations. The smoothness between two adjacent heat transfer regimes has also been investigated. More detailed verification work on the developed wall-to-fluid heat transfer package will be carried out when the coupling of a hydraulic solver with the constitutive equations is brought to completion.

Jittered Pulse Repetition Interval Coder Based on M-sequence Codes for Counter-Countermeasure of a Radar (레이더의 반 대응 능력을 위한 M-시퀀스 코드 기반의 펄스반복간격 지터 코더 구현)

  • Pyo, Sun-Oh;Seo, Dong-Sun;Jo, Jun-Yong;Lee, Jae-Cheol
    • Journal of IKEEE
    • /
    • v.15 no.2
    • /
    • pp.171-178
    • /
    • 2011
  • In this paper, a novel pulse repetition interval (PRI) jittering coder based on quasi-random M-sequence codes is proposed for improvement of counter-countermeasure capability in a radar. Each of the proposed jittered 256 PRI codes has a unique code chip combination with 256 code chips, such that any set of three consequent code chips (4 pulses) from any code appears only once among the entire code chip sequences of the codes. This indicates that only 4 of received pulses are enough to determine uniquely the exact timing position of the incoming pulse train (or code chip sequence) required for counter-countermeasure, as well as the identity of the transmitted code. To prove the proposed idea experimentally, the jittered PRI coder is implemented and demonstrated.

A Method to Collect Trusted Processes for Application Whitelisting in macOS (macOS 운영체제에서 화이트리스트 구축을 위한 신뢰 프로세스 수집 연구)

  • Youn, Jung-moo;Ryu, Jae-cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.397-405
    • /
    • 2018
  • Blacklist-based tools are most commonly used to effectively detect suspected malicious processes. The blacklist-based tool compares the malicious code extracted from the existing malicious code with the malicious code. Therefore, it is most effective to detect known malicious codes, but there is a limit to detecting malicious code variants. In order to solve this problem, the necessity of a white list-based tool, which is the opposite of black list, has emerged. Whitelist-based tools do not extract features of malicious code processes, but rather collect reliable processes and verify that the process that checks them is a trusted process. In other words, if malicious code is created using a new vulnerability or if variant malicious code appears, it is not in the list of trusted processes, so it can effectively detect malicious code. In this paper, we propose a method for effectively building a whitelist through research that collects reliable processes in the macOS operating system.

The Softest handoff Design using iterative decoding (Turbo Coding)

  • Yi, Byung-K.;Kim, Sang-G.;Picknoltz, Raymond-L.
    • Journal of Communications and Networks
    • /
    • v.2 no.1
    • /
    • pp.76-84
    • /
    • 2000
  • Communication systems, including cell-based mobile communication systems, multiple satellite communication systems of multi-beam satellite systems, require reliable handoff methods between cell-to-cell, satellite-to-satellite of beam-to-team, respectively. Recent measurement of a CDMA cellular system indicates that the system is in handoff at about 35% to 70% of an average call period. Therefore, system reliability during handoff is one of the major system performance parameters and eventually becomes a factor in the overall system capacity. This paper presents novel and improved techniques for handoff in cellular communications, multi-beam and multi-satellite systems that require handoff during a session. this new handoff system combines the soft handoff mechanism currently implemented in the IS-95 CDMA with code and packet diversity combining techniques and an iterative decoding algorithm (Turbo Coding). the Turbo code introduced by Berrou et all. has been demonstrated its remarkable performance achieving the near Shannon channel capacity [1]. Recently. Turbo codes have been adapted as the coding scheme for the data transmission of the third generation international cellular communication standards : UTRA and CDMA 2000. Our proposed encoder and decoder schemes modified from the original Turbo code is suitable for the code and packet diversity combining techniques. this proposed system provides not only an unprecedented coding gain from the Turbo code and it iterative decoding, but also gain induced by the code and packet diversity combining technique which is similar to the hybrid Type II ARQ. We demonstrate performance improvements in AWGN channel and Rayleigh fading channel with perfect channel state information (CSI) through simulations for at low signal to noise ratio and analysis using exact upper bounding techniques for medium to high signal to noise ratio.

  • PDF