• Title/Summary/Keyword: R code

Search Result 1,022, Processing Time 0.027 seconds

Real-time Implementation of the AMR-WB+ Audio Coder using ARM Core(R) (ARM Core(R)를 이용한 AMR-WB+ 오디오 부호화기의 실시간 구현)

  • Won, Yang-Hee;Lee, Hyung-Il;Kang, Sang-Won
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.3
    • /
    • pp.119-124
    • /
    • 2009
  • In this paper, AMR-WB+ audio coder is implemented, in real-time, using Intel 400MHz Xscale PXA250 with 32bit RISC processor ARM9E-J(R)core. The assembly code for ARM9E-J(R)core is developed through the serial process of C code optimization, cross compile, assembly code manual optimization and adjusting the optimized code to Embedded Visual C++ platform. C code is trimmed on Visual C++ platform. Cross compile and assembly code manual optimization are performed on CodeWarrior with ARM compiler. Through these stages the code for both ARM EVM board and PDA is implemented. The average complexities of the code are 160.75MHz on encoder and 33.05MHz on decoder. In case of static link library(SLL), the required memories are 65.21Kbyte, 32.01Kbyte and 279.81Kbyte on encoder, decoder and common sources, respectively. The implemented coder is evaluated using 16 test vectors given by 3GPP to verify the bit-exactness of the coder.

ON THE CONSTRUCTION OF MDS SELF-DUAL CODES OVER GALOIS RINGS

  • HAN, SUNGHYU
    • Journal of Applied and Pure Mathematics
    • /
    • v.4 no.3_4
    • /
    • pp.211-219
    • /
    • 2022
  • We study MDS(maximum distance separable) self-dual codes over Galois ring R = GR(2m, r). We prove that there exists an MDS self-dual code over R of length n if (n - 1) divides (2r - 1), and 2m divides n. We also provide the current state of the problem for the existence of MDS self-dual codes over Galois rings.

MDS SELF-DUAL CODES OVER GALOIS RINGS WITH EVEN CHARACTERISTIC

  • Sunghyu Han
    • Journal of the Chungcheong Mathematical Society
    • /
    • v.36 no.3
    • /
    • pp.181-194
    • /
    • 2023
  • Let GR(2m, r) be a Galois ring with even characteristic. We are interested in the existence of MDS(Maximum Distance Separable) self-dual codes over GR(2m, r). In this paper, we prove that there exists an MDS self-dual code over GR(2m, r) with parameters [n, n/2, n/2 + 1] if (n - 1) | (2r - 1) and 8 | n.

Performance of W-CDMA System with SOVA-based Turbo Decoder in ITU-R Realistic Channel (ITU-R 실측채널에서 SOVA 기반의 터보부호를 적용한 W-CDMA 시스템의 성능 분석)

  • Jeon Jun-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1613-1619
    • /
    • 2004
  • Turbo codes of long block sizes have been known to show very good performance in an AWGN channel and the turbo code has been strongly recommended as error correction code for W-CDMA in 3GPP(3rd Generation Partnership Project). Recently, turbo codes of short block sizes suitable for real time communication systems have attracted a lot of attention. Thus, in this paper we consider the turbo code of 1/3 code rate and short frame size of 192 bits in ITU-R channel model. We analyzed the performance of W-CDMA systems of 10MHz bandwidths employing RAKE receiver with not only MRC diversity but also SOVA-based turbo code.

길이가 16인 Z$_4$위의 Preparata 부호는 연쇄조건을 만족하지 않는다

  • Kyeongcheol Yang;Dooroo Lim
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.286-294
    • /
    • 1996
  • In a remarkable paper 〔3〕, Hammons et al. showed that, when properly defined, the binary nonlinear Preparata code can be considered as the Gray map of a linear code eve. Z$_4$, the so-called Preparata code eve. Z$_4$. Recently, Yang and Helleseth 〔12〕 considered the generalized Hamming weights d$\_$r/(m) for Preparata codes of length 2$\^$m/ over Z$_4$ and exactly determined d$\_$r/, for r = 0.5,1.0,1.5,2,2.5 and 3.0. In particular, they completely determined d$\_$r/(m) for any r in the case of m $\leq$ 6. In this paper we show that the Preparata code of length 16 over Z$_4$ does not satisfy the chain condition.

  • PDF

Development of bio-signal analysis system applying source code based on various algorithm development tools (다양한 알고리즘 개발 툴 기반의 소스 코드를 적용한 생체신호 분석 시스템 개발)

  • Ju, Mun-Il;Kim, Won-Il;Kim, Hui-Cheol
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.238-240
    • /
    • 2018
  • Recently, healthcare services have been developed and studied using various bio-signal analysis tools. Most bio-signal analysis studies utilize Matlab and R Programming. However, in order to apply the algorithm developed by Matlab and R Programming to the system, it is necessary to convert the source code. This paper proposes a smart interface that can skip source code conversion.

  • PDF

An Experimental Study for Estimation of Effective Temperature for Design in Steel Box Girder Bridge (강박스거더교의 설계 유효온도 산정을 위한 실험적 연구)

  • Lee, Seong Haeng;Shin, Hyo Kyoung;Kim, Kyoung Nam;Jung, Kyoung Sup
    • Journal of Korean Society of Steel Construction
    • /
    • v.28 no.6
    • /
    • pp.449-458
    • /
    • 2016
  • The temperature data were measured for two years in a bridge specimen and the bridge in service nearby in order to calculate the effective temperature for thermal loads in steel box girder bridge. The maximum and minimum effective temperatures were calculated in the bridge specimen and the bridge according to air temperature in 2014, 2015 and 2years. The effective temperatures calculated in this study were compared the Euro code and the Highway Bridge Design Criteria. The coefficients of determination in the maximum effective temperature and the Euro code for 2 year were calculated from R = 0.927, R = 0.894 in a bridge specimen and the bridge respectively. Those of minimum temperature and the Euro code were analyzed from R = 0.992, R = 0.813 in two bridge respectively. Also, the results were evaluated as being very similar, or slightly increased as compared with the maximum temperature of the Korean Highway Bridge Design Code(Limit State Design).

Decoder Design of a Nonbinary Code in the System with a High Code Rate (코드 레이트가 높은 시스템에 있어서의 비이진코드의 디코더 설계)

  • 정일석;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.11 no.1
    • /
    • pp.53-63
    • /
    • 1986
  • In this paper the decoder of nonbinary code satisfying R>1/t has been designed and constructed, where R is the code rate and t is the error correcting capability. In order to design the error trapping decoder, the concept of covering monomial is used and them the decoder system using the (15, 11) Reed-Solomon code is implemented. Without Galois Fiedl multiplication and division circuits, the decoder system is simply constructed. In the decoding process, it takes 60clocks to decode one code word. Two symbol errors and eight binary burst errors are simultaneously corrected. This coding system is shown to be efficient when the channel error probability is approximately from $5{\times}10^-4$~$5{\times}10^-5$.

  • PDF

J-Integral Estimate for Circumferential Cracked Pipes Under Primary and Secondary Stress in R6, RCC-MR A16 (원주방향 균열 배관에 대한 R6, RCC-MR A16 코드에 의한 1,2 차 복합 하중하에서 J-적분 비교)

  • Nam, Hyun Suk;Oh, Chang Young;Kim, Yun Jae
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.5
    • /
    • pp.631-640
    • /
    • 2013
  • This paper provides a comparison of the J-integral estimation method under combined primary and secondary stress in the R6, RCC-MR A16 code. The comparisons of each code are based on finite element analysis using ABAQUS with regard to the crack shape, crack depth, and magnitude of secondary load. The estimate of the R6 code is conservative near $L_r=1$, and that of the RCC-MR A16 code is conservative near $L_r=0$. As a result, this paper proposes a modified method of J-integral estimation in the R6, RCC_MR A16 code. The J-integral using the modified method corresponds to the finite element analysis result.

The Malware Detection Using Deep Learning based R-CNN (딥러닝 기반의 R-CNN을 이용한 악성코드 탐지 기법)

  • Cho, Young-Bok
    • Journal of Digital Contents Society
    • /
    • v.19 no.6
    • /
    • pp.1177-1183
    • /
    • 2018
  • Recent developments in machine learning have attracted a lot of attention for techniques such as machine learning and deep learning that implement artificial intelligence. In this paper, binary malicious code using deep learning based R-CNN is imaged and the feature is extracted from the image to classify the family. In this paper, two steps are used in deep learning to image malicious code using CNN. And classify the characteristics of the family of malicious codes using R-CNN. Generate malicious code as an image, extract features, classify the family, and automatically classify the evolution of malicious code. The detection rate of the proposed method is 93.4% and the accuracy is 98.6%. In addition, the CNN processing speed for image processing of malicious code is 23.3 ms, and the R-CNN processing speed is 4ms to classify one sample.