• Title/Summary/Keyword: Korean Code

Search Result 11,497, Processing Time 0.052 seconds

Estimation of the Fundamental Period for Residential Buildings with Shear-Wall System

  • Chun, Young-Soo;Chang, Kug-Kwan;Lee, Li-Hyung
    • KCI Concrete Journal
    • /
    • v.12 no.1
    • /
    • pp.121-130
    • /
    • 2000
  • This study focused on evaluating the reliability of code formulas such as those of the current Korean Building Code(KBC 1988). UBC 1997, NBCC 1995. and BSLJ 1994 for estimating the fundamental period of RC apartment buildings with shear-wall dominant systems, representative of typical residential buildings in Korea. For this purpose, full-scale measurements were carried out on fifty RC apartment buildings, and these results were compared to those obtained by code formulas and also by dynamic analysis. Although these code formulas are based on the measured periods of buildings during various earthquakes and building period varies with the amplitude of structural deflection or strain level, ambient surveys should provide an effective tool for experimentally verifying the design period to the completed building. This comparison shows that comparatively large errors are likely to occure when the code formula of KBC 1988 is used, and all the other code formulas are not sufficient to estimate the fundamental period of apartment buildings with shear-wall dominant systems. An improved formula is proposed by regression analysis on the basis of the measured period data. The proposal is for the servicebility stress level, but it can also be applied for seismic code in the regions of low seismicity similar to Korea.

  • PDF

A Study of QR-Code Security Method for Smart Phone (스마트폰에서의 QR-Code 보안기법에 대한 연구)

  • Byeon, Jin-Young;Ahn, Yo-Han;Lee, Jae-Woong;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.699-700
    • /
    • 2011
  • This paper shows the way to prevent the leaking of private information due to malicious codes or connections of invalid URL in QR-Codes, which is used in the present smart-phone. It is difficult to filter out the connections directly with decoding the QR-Codes, so before connecting, we construct servers which compare results of decoding the QR-Codes to a valid URL. The server notifies warning to Smart-phone users if the results were uncertain URLs which did not registered in the server. This paper would help the Smart-phone users to protect their privacy.

  • PDF

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

  • Huang, Peng-Cheng;Li, Yung-Hui;Chang, Chin-Chen;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2348-2365
    • /
    • 2018
  • QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.

Comparison of Code Similarity Analysis Performance of funcGNN and Siamese Network (funcGNN과 Siamese Network의 코드 유사성 분석 성능비교)

  • Choi, Dong-Bin;Jo, In-su;Park, Young B.
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.113-116
    • /
    • 2021
  • As artificial intelligence technologies, including deep learning, develop, these technologies are being introduced to code similarity analysis. In the traditional analysis method of calculating the graph edit distance (GED) after converting the source code into a control flow graph (CFG), there are studies that calculate the GED through a trained graph neural network (GNN) with the converted CFG, Methods for analyzing code similarity through CNN by imaging CFG are also being studied. In this paper, to determine which approach will be effective and efficient in researching code similarity analysis methods using artificial intelligence in the future, code similarity is measured through funcGNN, which measures code similarity using GNN, and Siamese Network, which is an image similarity analysis model. The accuracy was compared and analyzed. As a result of the analysis, the error rate (0.0458) of the Siamese network was bigger than that of the funcGNN (0.0362).

Knowledge Graph of Administrative Codes in Korea: The Case for Improving Data Quality and Interlinking of Public Data

  • Haklae Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.43-57
    • /
    • 2023
  • Government codes are created and utilized to streamline and standardize government administrative procedures. They are generally employed in government information systems. Because they are included in open datasets of public data, users must be able to understand them. However, information that can be used to comprehend administrative code is lost during the process of releasing data in the government system, making it difficult for data consumers to grasp the code and limiting the connection or convergence of different datasets that use the same code.This study proposes a way to employ the administrative code produced by the Korean government as a standard in a public data environment on a regular basis. Because consumers of public data are barred from accessing government systems, a means of universal access to administrative code is required. An ontology model is used to represent the administrative code's data structure and meaning, and the full administrative code is built as a knowledge graph. The knowledge graph thus created is used to assess the accuracy and connection of administrative codes in public data. The method proposed in this study has the potential to increase the quality of coded information in public data as well as data connectivity.

The applicability study and validation of TULIP code for full energy range spectrum

  • Wenjie Chen;Xianan Du;Rong Wang;Youqi Zheng;Yongping Wang;Hongchun Wu
    • Nuclear Engineering and Technology
    • /
    • v.55 no.12
    • /
    • pp.4518-4526
    • /
    • 2023
  • NECP-SARAX is a neutronics analysis code system for advanced reactor developed by Nuclear Engineering Computational Physics Laboratory of Xi'an Jiaotong University. In past few years, improvements have been implemented in TULIP code which is the cross-section generation module of NECP-SARAX, including the treatment of resonance interface, considering the self-shielding effect in non-resonance energy range, hyperfine group method and nuclear library with thermal scattering law. Previous studies show that NECP-SARAX has high performance in both fast and thermal spectrum system analysis. The accuracy of TULIP code in fast and thermal spectrum system analysis is demonstrated preliminarily. However, a systematic verification and validation is still necessary. In order to validate the applicability of TULIP code for full energy range, 147 fast spectrum critical experiment benchmarks and 170 thermal spectrum critical experiment benchmarks were selected from ICSBEP and used for analysis. The keff bias between TULIP code and reference value is less than 300 pcm for all fast spectrum benchmarks. And that bias keeps within 200 pcm for thermal spectrum benchmarks with neutron-moderating materials such as polyethylene, beryllium oxide, etc. The numerical results indicate that TULIP code has good performance for the analysis of fast and thermal spectrum system.

유압식 조향장치 신뢰성 평가 기준개발

  • 김형의;정동수;이용범;이근호;강보식;윤소남;성백주;김도식;조정대
    • Proceedings of the Korean Reliability Society Conference
    • /
    • 2000.11a
    • /
    • pp.87-95
    • /
    • 2000
  • The testing product is the HSU(Hydrostatic Steering Unit) installed in the armored vehicle which has the compact structure of assembly with hydraulic pump, hydraulic motor, and several hydraulic valves. There are no assesment testing code for HSU within a country because the testing code for HUS is not involved in the technical concert from USA. Therefore the testing code is developed by the dynamic analysis of the armored vehicle. By the developed testing code, the test equipment is designed, manufactured, and used to apply the assesment test.

  • PDF

ADAPTIVE CHANGE OF CODE RATE IN DS-SSMA COMMUNICATION SYSTEMS

  • Youngkwon-Ryu;Jinsoo-Bae;Iickho-Song
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1995.06a
    • /
    • pp.59-61
    • /
    • 1995
  • An adaptive code rate change scheme in DS-SSMA systems is proposed. In the proposed scheme, the error correcting code rate is changed according to the channel state, the effective number of users. The channel state is estimated based on retransmission requests. The criterion for the change of the code rate is to maximize the throughput under given error bound.

INTRODUCING tlc_s05: A CODE TO FIT CEPHEID JHK BAND LIGHT CURVES USING A TEMPLATE APPROACH

  • NGEOW, CHOW-CHOONG;KANBUR, SHASHI M.
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.225-227
    • /
    • 2015
  • We introduce a code called tlc_s05, to fit sparsely sampled JHK band Cepheid light curve data with template light curves to derive the mean magnitude. A brief description of the code is provided here. We tested the performance of the code in deriving the mean JHK band magnitudes using simulations, and we found that it is better to observe more than four evenly spaced data points per light curve, which permits tlc_s05 to derive accurate mean magnitudes for Cepheid JHK band light curves.

CONSTRUCTION FOR SELF-ORTHOGONAL CODES OVER A CERTAIN NON-CHAIN FROBENIUS RING

  • Kim, Boran
    • Journal of the Korean Mathematical Society
    • /
    • v.59 no.1
    • /
    • pp.193-204
    • /
    • 2022
  • We present construction methods for free self-orthogonal (self-dual or Type II) codes over ℤ4[v]/〈v2 + 2v〉 which is one of the finite commutative local non-chain Frobenius rings of order 16. By considering their Gray images on ℤ4, we give a construct method for a code over ℤ4. We have some new and optimal codes over ℤ4 with respect to the minimum Lee weight or minimum Euclidean weight.