• Title/Summary/Keyword: Program Codes

Search Result 367, Processing Time 0.029 seconds

A Study on the Design and Simulation of 16-bit SIP by using IDL (IDL을 이용한 16-비트 SIP의 설계와 시뮬레이션에 관한 연구)

  • 박두열;이종헌
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.1
    • /
    • pp.29-42
    • /
    • 1990
  • In this paper, We use the APL as IDL when simulation a 16-bit SIP. It was possible for IDL to represent and describe a structure of a H/W which other HDL have not. Because We partitioned whole system to various modules when desingning processor, We adpoted a direct decoding method. A designed each modules are executed according to 12-bit control word was inputed through experimental framework, Which were composed to symbolized instructions. In here, By setting instruction codes of the SIP using binary code, We composed instruction format and assembler instruction, and verified the SIP behaviour that try to implement by entering a presented instruction set through experimental framework. In a presented SIP, Because inputing program are a symbolized language, Designer and user will easily understand behaviour of system. Especially, Because we can immediatly specify a unit function within SIP, We will use variously and easily the library cell.

  • PDF

Cognitive Approach to Anti-Phishing and Anti-Pharming: Survey (피싱/파밍 예방을 위한 인지기반 접근 방법)

  • Hong, Sunghyuck
    • Journal of Convergence Society for SMB
    • /
    • v.3 no.2
    • /
    • pp.33-39
    • /
    • 2013
  • Recently, lots of anti-phishing schemes have been developed. Several products identify phishing sites and show the results on the address bar of the internet browser. However, they determine only by domain names or IP addresses. Although this kind of method is effective against recent DNS Pharming attacks, there is still a possibility that hidden attacks which modifies HTML codes could incapacitate those anti-phishing programs. In this paper, the cognitive approach which compares images to decide phishing or Pharming is presented by using system tray and balloon tips that are hard to fake with pop-ups or flash in order for users to compare pictures from connecting sites and system tray. It differs from an old method that a program analyzes IP or domains to judge if it is phishing or Pharming. Therefore, proposed method effective cognitive approach against phishing and Pharming attacks.

  • PDF

Planning of Apartment Units for Improving Natural Ventilation Performance based on the Analysis of Indoor Pollutant Concentrations (오염농도 분포 해석을 통한 공동주택의 자연환기성능 향상을 위한 평면계획)

  • Kim, Jiyoeng;Lee, Seung-Hee;Kim, Taeyeon
    • KIEAE Journal
    • /
    • v.5 no.3
    • /
    • pp.41-48
    • /
    • 2005
  • Before occupation of an apartment housing, the builders are required to inform the test result of IAQ to the public. However, there is no simplified method to predict IAQ before measurement of pollutant concentration. In this study, a simplified way of predicting IAQ based on the distribution of indoor pollutant concentration is proposed. 7 different cases of air change rate have been simulated through CFD analysis to get the distribution ratio of each pollutant material and then simplified functions were used with CRIAQ1 values derived from CFD simulation to evaluate by comparing the influence of each material in the indoor pollutant concentration. Again, a lot of efforts which can improve the indoor air quality have been performed. Materials used in indoor space are labeled with their pollutant emission level. Installation of ventilation system in residential buildings will be regulated by a building codes sooner or later. But it is important to understand the fact that layout of walls, location or size of openings will influence the indoor air flow and pollutant concentration. And location of emitting material influences to indoor air pollutants distribution. But until now there is few recognition and consideration of these factors. Therefore, in this paper the effects of these factors is proved and some kind of guideline is made for designers after a comparison of typical apartment floor plan and a new type plan with their average pollutant concentration and its distribution of each room. CFD(Computational Fluid Dynamics) program was used to show the indoor air flow and pollutant concentration distribution. For this purpose, a typical $100m^2$ apartment floor plan was chosen as a case study model and several alternatives were reviewed to improve the IAQ performance. The simulation took place in the condition of natural ventilation through windows.

VLSI Architecture of High Performance Huffman Codec (고성능 허프만 코덱의 VLSI 구조)

  • Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.439-446
    • /
    • 2011
  • In this paper, we proposed and implemented a dedicated hardware for Huffman coding which is a method of entropy coding to use compressing multimedia data with video coding. The proposed Huffman codec consists Huffman encoder and decoder. The Huffman encoder converts symbols to Huffman codes using look-up table. The Huffman code which has a variable length is packetized to a data format with 32 bits in data packeting block and then sequentially output in unit of a frame. The Huffman decoder converts serial bitstream to original symbols without buffering using FSM(finite state machine) which has a tree structure. The proposed hardware has a flexible operational property to program encoding and decoding hardware, so it can operate various Huffman coding. The implemented hardware was implemented in Cyclone III FPGA of Altera Inc., and it uses 3725 LUTs in the operational frequency of 365MHz

Revaluation of Nominal Flexural Strength of Composite Girders in Positive Bending Region (정모멘트부 강합성거더의 공칭휨강도 재평가)

  • Youn, Seok Goo
    • Journal of Korean Society of Steel Construction
    • /
    • v.25 no.2
    • /
    • pp.165-178
    • /
    • 2013
  • This paper presents a research work for the evaluation of the nominal flexural strength of composite girders in positive bending region. Current predicting equations for the nominal flexural strength of composite girders in the 2012 version of the Korea Bridge Design Codes based on Limit State Design Method are able to apply for the composite girders with conventional structural steels. For applying composite girders with high yield strength steels of HSB800 as well as HSB600, there is a need for improving the current predicting equations. In order to investigate the nominal flexural strength of composite girders, previous research works are carefully reviewed and parametric study using a moment-curvature analysis program is conducted to evaluate the ultimate moment capacity and the ductility of a wide range of composite girders. Based on the results of the parametric study, less conservative nominal flexural strength design equations are proposed for conventional composite girders. In addition, new design equations for predicting the nominal flexural strength of composite girders with HSB600 and HSB800 high-performance steels are provided.

A Study on Consciousness & Value of Sexuality of Elementary School Children (초등학교 학생들의 성 의식 및 가치관에 관한 연구)

  • Lee, Hae-Yun;Park, Young-Soo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.2 no.1
    • /
    • pp.53-65
    • /
    • 2001
  • The purposes of this study were to collect basic data on education of Sexuality(Health education) of consciousness & value of sexuality of elementary school children. 584,6th grade students in elementary school in Yong-In city were analysed and the results are as follow; 1. Knowledges of sexuality for children was at a average level, especially "physical change of puberty" and "sexual violence" were well recognized but "the physical characteristics of male & female" and "physiological phenomena of men" were less recognized. Attitudes of sexuality were positive for "relationship with partners" and "expression of mind". Practices of sexuality were at a low rate in the case of "shaking hands with partner" and "experience of sexual behavior". The Value of sexuality was at a high rates in the case of "the role of sex", "equality" & "self-identification", therefore students need good education of sexuality from childhood 2. Sexuality education of students increased knowledges of sexuality as a consciousness. There was no relationship between attitudes and pratices of sexuality. Educated children valued sexuality move highly than uneducated children. This result shows that education is needed with regard to both the knowledge and value of sexuality in a planned system. We need some program to provide more information on sexual attitudes and practices. 3. There was a high correlation between the consciousness of sexuality and value placed on it. As sexual awareness increases amongst students codes of morality develop Positive sexual attitudes served as good role models for sex. In particular positive sexual attitudes have a big effect on sexual values. In addition, as sexual awareness and attitude increase amongst students the role of sexual development. The elementary school phase sexual values are developed and determined. It is therefore an important phase.

  • PDF

A Systematic Literature Survey of Software Metrics, Code Smells and Refactoring Techniques

  • Agnihotri, Mansi;Chug, Anuradha
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.915-934
    • /
    • 2020
  • Software refactoring is a process to restructure an existing software code while keeping its external behavior the same. Currently, various refactoring techniques are being used to develop more readable and less complex codes by improving the non-functional attributes of software. Refactoring can further improve code maintainability by applying various techniques to the source code, which in turn preserves the behavior of code. Refactoring facilitates bug removal and extends the capabilities of the program. In this paper, an exhaustive review is conducted regarding bad smells present in source code, applications of specific refactoring methods to remove that bad smell and its effect on software quality. A total of 68 studies belonging to 32 journals, 31 conferences, and 5 other sources that were published between the years 2001 and 2019 were shortlisted. The studies were analyzed based on of bad smells identified, refactoring techniques used, and their effects on software metrics. We found that "long method", "feature envy", and "data class" bad smells were identified or corrected in the majority of studies. "Feature envy" smell was detected in 36.66% of the total shortlisted studies. Extract class refactoring approach was used in 38.77% of the total studies, followed by the move method and extract method techniques that were used in 34.69% and 30.61% of the total studies, respectively. The effects of refactoring on complexity and coupling metrics of software were also analyzed in the majority of studies, i.e., 29 studies each. Interestingly, the majority of selected studies (41%) used large open source datasets written in Java language instead of proprietary software. At the end, this study provides future guidelines for conducting research in the field of code refactoring.

A Study on Dynamic Code Analysis Method using 2nd Generation PT(Processor Trace) (2세대 PT(Processor Trace)를 이용한 동적 코드분석 방법 연구)

  • Kim, Hyuncheol
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.97-101
    • /
    • 2019
  • If the operating system's core file contains an Intel PT, the debugger can not only check the program state at the time of the crash, but can also reconfigure the control flow that caused the crash. We can also extend the execution trace scope to the entire system to debug kernel panics and other system hangs. The second-generation PT, the WinIPT library, includes an Intel PT driver with additional code to run process and core-specific traces through the IOCTL and registry mechanisms provided by Windows 10 (RS5). In other words, the PT trace information, which was limited access only by the first generation PT, can be executed by process and core by the IOCTL and registry mechanism provided by the operating system in the second generation PT. In this paper, we compare and describe methods for collecting, storing, decoding and detecting malicious codes of data packets in a window environment using 1/2 generation PT.

Software Design about Integrated Fault Diagnosis for the Propulsion System of the Tracked Amphibious Assault Vehicle (궤도형 상륙돌격차량용 추진장치의 통합고장진단 S/W 설계)

  • Lee, Changkyu;Choi, Byeongho;Park, Daegon;Koo, Youngho;Shim, Sangchul;Chang, Kyogun
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.4
    • /
    • pp.457-466
    • /
    • 2021
  • This paper describes the design of model-based fault diagnosis software to apply to the propulsion system in tracked amphibious assault vehicle which consists of an engine, a transmission, a cooling system, and two waterjets. This software includes specific functions to detect the failures regarding sensor malfunctions, mechanical malfunctions, control errors, and communication errors. This software generates the proper malfunction codes which are classified as the warning and caution. In order to validate the fault diagnosis software, the manual and automatic test are performed using the test program with 32 test cases. Test results show that the designed fault diagnosis software is reliable and effective for applying to the propulsion system.

A Study On Effectiveness of Prevent Smoke Backflow in Apartment (계단식 공동주택 방연풍속 실효성에 대한 연구)

  • Lee, Kwang­Soo;Yoon, Myong­O;Lee, Jun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.1-9
    • /
    • 2021
  • Purpose: The purpose of this study is to analyze the differential pressure and velocity to prevent smoke backflow of Stairways Apartment House fire, and verified the effectiveness of smoke velocity standards proposed by NFSC 501A. Method: The smoke control design of the stairways apartment house of the real model and the performance of the velocity to prevent smoke backflow according to the window opening conditions of the living room were analyzed using the CONTAM program. Result: Although the differential pressure performance of the apartment's smoke control system was satisfactory, it was found that Performance of velocity to prevent smoke backflow did not come out according to the opening condition of the living room window. Conclusion: In the case of Stairways Apartment House, it is necessary to review the method of making exceptions to the 'velocity to prevent smoke backflow' standard required by the National Fire Safety Codes(NFSC 501A)