• Title/Summary/Keyword: P 코드

Search Result 219, Processing Time 0.031 seconds

Evaluation of Direct Vessel Injection Design With Pressurized Thermal Shock Analysis (가압 열충격해석에 의한 직접용기주입 설계의 평가)

  • Cha, Jong-Hee;Jun, Hyung-Gil
    • Nuclear Engineering and Technology
    • /
    • v.24 no.1
    • /
    • pp.86-97
    • /
    • 1992
  • The purpose of this paper is to evaluate the direct vessel injection design from a pressurized thermal shock(PTS) viewpoint for the Combustion Engineering System 80+ A break of the main steam line from zero power and a 0.05 ft$^2$small break loss-of-coolant accident (LOCA) from full power were selected as the potential PTS events. In order to investigate the stratification effects in the reactor downcomer region, the fluid mixing analysis was performed using the COMMIX-IB code for steam line break and using the REMIX code for 0.05 ft$^2$small break LOCA. The stress distributions within the reactor vessel walls experiencing the pressure and the temperature transients were calculated using the OCA-P code for both events. The results of the analysis showed that a small break LOCA without decay heat presented the greatest challenge to the vessel, however, there is no crack initiation through end-of-life of the vessel with consideration of decay heat.

  • PDF

Analyzing Vulnerable Software Code Using Dynamic Taint and SMT Solver (동적오염분석과 SMT 해석기를 이용한 소프트웨어 보안 취약점 분석 연구)

  • Kim, Sungho;Park, Yongsu
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.3
    • /
    • pp.257-262
    • /
    • 2015
  • As software grows more complex, it contains more bugs that are not recognized by developers. Attackers can then use exploitable bugs to penetrate systems or spread malicious code. As a representative method, attackers manipulated documents or multimedia files in order to make the software engage in unanticipated behavior. Recently, this method has gained frequent use in A.P.T. In this paper, an automatic analysis method to find software security bugs was proposed. This approach aimed at finding security bugs in the software which can arise from input data such as documents or multimedia. Through dynamic taint analysis, how input data propagation to vulnerable code occurred was tracked, and relevant instructions in relation to input data were found. Next, the relevant instructions were translated to a formula and vulnerable input data were found via the formula using an SMT solver. Using this approach, 6 vulnerable codes were found, and data were input to crash applications such as HWP and Gomplayer.

Establishment of Cosmetic Raw Material Weighing and Bulk Manufacturing Management System Using Bar Code, QR Code and Database (바코드, 큐알코드와 데이터베이스를 활용한 화장품 원료 칭량 및 벌크제조 관리시스템 구축)

  • Lee, Chung-Hee;Bae, Jun-Tae;Hong, Jin-Tae
    • Journal of the Society of Cosmetic Scientists of Korea
    • /
    • v.45 no.3
    • /
    • pp.277-285
    • /
    • 2019
  • In this study, effective cosmetic raw material weighing and bulk manufacturing management system were constructed by using bar code or quick response code (QR code) and database. Raw material labels and weighing labels for bulk manufacturing were published in web environment using the information entered in the database using ScriptX, a print component of Medi&Co. By checking the weighing and manufacturing process by using scanner, tablet and PC, it was possible to remarkably improve the product error caused by erroneous amount or misapplication which is the most cause of error in the production of cosmetic bulk. In conclusion, applying a database that utilizes bar code and QR code to cosmetics manufacturing can reduce the various problems in the process, thereby improving quality control and productivity of cosmetics.

The Traffic Analysis of P2P-based Storm Botnet using Honeynet (허니넷을 이용한 P2P 기반 Storm 봇넷의 트래픽 분석)

  • Han, Kyoung-Soo;Lim, Kwang-Hyuk;Im, Eul-Gyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.51-61
    • /
    • 2009
  • Recently, the cyber-attacks using botnets are being increased, Because these attacks pursue the money, the criminal aspect is also being increased, There are spreading of spam mail, DDoS(Distributed Denial of Service) attacks, propagations of malicious codes and malwares, phishings. leaks of sensitive informations as cyber-attacks that used botnets. There are many studies about detection and mitigation techniques against centralized botnets, namely IRC and HITP botnets. However, P2P botnets are still in an early stage of their studies. In this paper, we analyzed the traffics of the Peacomm bot that is one of P2P-based storm bot by using honeynet which is utilized in active analysis of network attacks. As a result, we could see that the Peacomm bot sends a large number of UDP packets to the zombies in wide network through P2P. Furthermore, we could know that the Peacomm bot makes the scale of botnet maintained and extended through these results. We expect that these results are used as a basis of detection and mitigation techniques against P2P botnets.

Detecting Members of P2P Botnets Using Probabilistic Dye-Pumping Algorithm (Probabilistic Dye-Pumping 알고리즘을 이용한 P2P 봇넷 멤버 탐지)

  • Choi, Seung-hwan;Park, Hyo-seong;Kim, Ki-chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.744-748
    • /
    • 2012
  • Botnet is a network that consists of bot hosts infected by malware. The C&C server of centralized botnet, which is being used widely, is relatively easy to detect, while detecting P2P botnet is not a trivial problem because of the existence of many avoiding techniques. In this paper, we separate the network into inner and outer sub-network at the location of the router, and analyze the method of detecting botnet using path of packet and infection probability. We have extended Dye-Pumping algorithm in order to detect P2P botnet members more accurately, and we expect that the analysis of the results can be used as a basis of techniques that detect and block P2P botnet in the networks.

  • PDF

Sensitivity Analyses of Three-Dimensional Discrete Fracture Network Modeling of Rock Mass (암반의 3차원 불연속균열망(DFN)에 관한 연구 및 민감도분석)

  • Park, Jung Chan;Park, Seung Hun;Kim, Ha Yung;Kim, Geon-Young;Kwon, Sangki
    • Tunnel and Underground Space
    • /
    • v.25 no.4
    • /
    • pp.341-358
    • /
    • 2015
  • This study analyzes the relationship between parameters of the discontinuity in Discrete Fracture Network model such as fracture intensity, fracture orientation, fracture size, fracture shape etc. In this paper, FracMan code was used to model and analyze 3D DFN. A sensitivity analysis was performed in order to analyze the relationship between linear fracture intensity measure ($P_{10}$) and parameters of the discontinuity in $100m{\times}100m{\times}100m$ model area. As a result the sensitivity analysis showed that key parameters affecting fracture intensity are fracture orientation (Trend / Plunge). Conversion factor($C_{13}$) for $P_{10}$, to calculate volumetric fracture intensity measure ($P_{32}$), is derived in case of vertical well and horizontal well when trend is $10^{\circ}$, $30^{\circ}$, $60^{\circ}$, $90^{\circ}$, $120^{\circ}$, $150^{\circ}$, $180^{\circ}$ (7cases) and plunge is $5^{\circ}$, $15^{\circ}$, $30^{\circ}$, $45^{\circ}$, $60^{\circ}$, $75^{\circ}$, $85^{\circ}$ (7cases). It is expected that this paper can be used effectively for modeling and understanding DFN model.

Real-time implementation of the 2.4kbps EHSX Speech Coder Using a $TMS320C6701^TM$ DSPCore ($TMS320C6701^TM$을 이용한 2.4kbps EHSX 음성 부호화기의 실시간 구현)

  • 양용호;이인성;권오주
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.962-970
    • /
    • 2004
  • This paper presents an efficient implementation of the 2.4 kbps EHSX(Enhanced Harmonic Stochastic Excitation) speech coder on a TMS320C6701$^{TM}$ floating-point digital signal processor. The EHSX speech codec is based on a harmonic and CELP(Code Excited Linear Prediction) modeling of the excitation signal respectively according to the frame characteristic such as a voiced speech and an unvoiced speech. In this paper, we represent the optimization methods to reduce the complexity for real-time implementation. The complexity in the filtering of a CELP algorithm that is the main part for the EHSX algorithm complexity can be reduced by converting program using floating-point variable to program using fixed-point variable. We also present the efficient optimization methods including the code allocation considering a DSP architecture and the low complexity algorithm of harmonic/pitch search in encoder part. Finally, we obtained the subjective quality of MOS 3.28 from speech quality test using the PESQ(perceptual evaluation of speech quality), ITU-T Recommendation P.862 and could get a goal of realtime operation of the EHSX codec.c.

Digital Watermark Generation Algorithm Embedding Hangul Text (한글 텍스트가 내장된 디지털 워터마크 생성 알고리즘)

  • Cho, Dae-Jea;Kim, Hyun-ki
    • The KIPS Transactions:PartB
    • /
    • v.10B no.5
    • /
    • pp.485-490
    • /
    • 2003
  • In this paper, we propose the possibility of introducing chaotic sequences into digital watermarking systems as potential substitutes to commonly used pseudo noise sequences. Chaotic sequences have several good properties including the availability of a great number of them, the ease of their generation, as well as their sensitive dependence on their initial conditions. And the quantization does not destroy the good property. So this paper proposes a method that transforms Hangul text to chaotic sequence. And we presents how the Hangul text is expressed by an implied data and the implied data is regenerated into the original text. In this paper, we use this implied Hangul text for watermarking.

Verification and Analysis for Recommendation ITU-R P.526, P.1546, P.1812 of Propagation Model Loaded in Spectrum Management Intelligent System (주파수자원분석시스템 탑재 전파모델 ITU-R P.526, P.1546, P.1812의 검증 및 분석)

  • Kim, Dong-Woo;Oh, Soon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.2
    • /
    • pp.247-254
    • /
    • 2021
  • Problems such as a limited frequency resource and interference between adjacent bands have been continuously raised because of rapidly developing wireless technology and communication service. In order to solve that problem, government has been developed and operating the Spectrum Management Intelligent System(SMIS). This paper compares the results simulated by SMIS with the ATDI and the Matlab coded provided by ITU-R for verification of SMIS operating for the public interests. The Recommendation ITU-R P.526, P.1546, and P.1812 among the propagation model loaded in SMIS were chosen because of the relation to the broadcasting service. The comparison and analysis result shows that the outputs derived by SMIS has the small error of less than 1 dB. This research could be utilized for the policy establishment and R&D for the frequency allocation and the interference between adjacent bands.

Modulation Code for Removing Error Patterns on 4-Level NAND Flash Memory (4-레벨 낸드 플래시 메모리에서 오류 발생 패턴 제거 변조 부호)

  • Park, Dong-Hyuk;Lee, Jae-Jin;Yang, Gi-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12C
    • /
    • pp.965-970
    • /
    • 2010
  • In the NAND flash memory storing two bits per cell, data is discriminated among four levels of electrical charges. We refer to these four levels as E, P1, P2, and P3 from the low voltage. In the statistics, many errors occur when E and P3 are stored at the next cells. Therefore, we propose a coding scheme for avoiding E-P3 or P3-E data patterns. We investigate two modulation codes for 9/10 code (9 bit input and 5 symbol codeword) and 11/12 code (11 bit input and 6 symbol codeword).