• Title/Summary/Keyword: binary codes

Search Result 208, Processing Time 0.024 seconds

PHOTOMETRIC STUDY OF EXTREME LONG PERIOD ECLIPSING BINARY 31 CYG (초거성을 가지고 있는 초 장주기 식쌍성 31 CYG의 측광적 연구)

  • 정장해;이용삼;김호일
    • Journal of Astronomy and Space Sciences
    • /
    • v.8 no.2
    • /
    • pp.133-140
    • /
    • 1991
  • The UBV light curves of an extreme long period binary star 31 Cyg are made with the observations obtained at Yonsei University Observatory for three seasons from 1988 to 1991 and the RI light curves are also made for one season in 1990-1991. The new combined UBV light curves of 31 Cyg are constructed with You's and collected data. A preliminary solution of the light curves of 31 Cyg is made using Wilson-Devinney codes.

  • PDF

Additional Thermometer Code Locking Technique for Minimizing Quantization Error in Low Area Digital Controlled Oscillators (저면적 디지털 제어 발진기의 양자화 에러 최소화를 위한 추가 서모미터 코드 잠금 기법)

  • Byeongseok Kang;Young-Sik Kim;Shinwoong Kim
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.573-578
    • /
    • 2023
  • This paper introduces a new locking technique applicable to high-performance digital Phase-Locked Loops (DPLL). The study employs additional thermometer codes to reduce quantization errors in LC-based Digital Controlled Oscillators (DCO). Despite not implementing the entire DCO codes in thermometer mode, this method effectively reduces quantization errors through enhanced linearity. In the initial locking phase, binary codes are used, and upon completion of locking, the system transitions to thermometer codes, achieving high frequency linearity and reduced jitter characteristics. This approach significantly reduces the number of switches required and minimizes the oscillator's area, especially in applications requiring low DCO gain (Kdco), compared to the traditional method that uses only thermometer codes. Furthermore, the jitter performance is maintained at a level equivalent to that of the thermometer-only approach. The efficacy of this technique has been validated through modeling and design at the RTL level using SystemVerilog and Verilog HDL.

A Hashing Method Using PCA-based Clustering (PCA 기반 군집화를 이용한 해슁 기법)

  • Park, Cheong Hee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.6
    • /
    • pp.215-218
    • /
    • 2014
  • In hashing-based methods for approximate nearest neighbors(ANN) search, by mapping data points to k-bit binary codes, nearest neighbors are searched in a binary embedding space. In this paper, we present a hashing method using a PCA-based clustering method, Principal Direction Divisive Partitioning(PDDP). PDDP is a clustering method which repeatedly partitions the cluster with the largest variance into two clusters by using the first principal direction. The proposed hashing method utilizes the first principal direction as a projective direction for binary coding. Experimental results demonstrate that the proposed method is competitive compared with other hashing methods.

M/B-MC/CDMA performance analysis for high speed data transmission in IS-95 evolution (IS-95 진화방안에서 고속 데이터 전송을 위한 M/B-MC/CDMA 전송방식의 성능분석)

  • 임명섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1494-1500
    • /
    • 1999
  • In order to provide high speed multimedia data rate service, Multi-Code CDMA has been proposed which converts high speed serial data stream into N parallel low speed data streams with orthogonal PN codes for spreading. However this signal has multi level and causes interferences to be increased at the neighboring cell boundary in the reverse link. Therefore in order to solve the above mentioned problem, M/B-MC/CDMA, in which multi level signal is converted to binary level signal using M/B conversion, is proposed and the performance is compared with MC-CDMA.

  • PDF

Extraction Scheme of Function Information in Stripped Binaries using LSTM (스트립된 바이너리에서 LSTM을 이용한 함수정보 추출 기법)

  • Chang, Duhyeuk;Kim, Seon-Min;Heo, Junyoung
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.39-46
    • /
    • 2021
  • To analyze and defend malware codes, reverse engineering is used as identify function location information. However, the stripped binary is not easy to find information such as function location because function symbol information is removed. To solve this problem, there are various binary analysis tools such as BAP and BitBlaze IDA Pro, but they are based on heuristics method, so they do not perform well in general. In this paper, we propose a technique to extract function information using LSTM-based models by applying algorithms of N-byte method that is extracted binaries corresponding to reverse assembling instruments in a recursive descent method. Through experiments, the proposed techniques were superior to the existing techniques in terms of time and accuracy.

Instrumentation Performance Measurement Technique for Evaluating Efficiency of Binary Analysis Tools (바이너리 분석도구 효율성 평가를 위한 Instrumentation 성능 측정기법)

  • Lee, Minsu;Lee, Jehyun;Kim, Hobin;Ryu, Chanho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1331-1345
    • /
    • 2017
  • Binary instrumentation has been developed for monitoring and debugging executables without their source codes. Previous efforts on the binary instrumentation are mainly focused on its capability and accuracy, but not on efficiency for practical application. In particular, criteria and measurement methodologies for evaluating and comparing the efficiency of binary investigation tools and algorithms do not estimated yet. In this paper, we propose the instrumentation primitives which are a unit functionality and measurement methodology. Through the empirical experiments by adopting the proposed methodology on DynamoRIO and Pin, we show the feasibility of the proposal.

A New Soft-Decision Decoding of Binary BCH Codes (2진 BCH 부호의 새로운 연판정 복호법)

  • 심용걸
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.7
    • /
    • pp.79-81
    • /
    • 1998
  • 2진 BCH 부호에 대한 새로운 연판정 복호법을 제안하였다. 후보부호어가 선출되지 않을 때의 성능 저하를 방지할 수 있는 개선된 알고리듬을 개발하여 오정정 확률과 정정 불 능 확률이 낮아지게 하였다. 또한, 복잡도를 줄이는 방안도 개발하여 알고리듬 개선으로 인 한 복잡도 증가가 거의 나타나지 않도록 하였다. (31,16) BCH 부호에 대한 시뮬레이션 결과 로 이러한 사실들을 확인할 수 있었다.

  • PDF

Performance Analysis of Turbo Code Based on DVB-RCS for Ship-Internet High-Quality Service (선박 Internet 고품질 서비스를 위한 DVB-RCS 기반 터보부호 성능 분석)

  • Kim, Min-Hyuk;Choi, Duk-Gun;Jung, Jin-Hee;Jung, Ji-Won
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.61-62
    • /
    • 2005
  • In this paper, we investigate the encoding and decoding method of turbo codes that offer a variety of coding rates from 1/3 to 6/7 in Digital Video Broadcast Return Channel via Satellite (DVB-RCS) standard to provide ship-internet service with high-quality.

  • PDF

Unequal Bit - Error - Probability of Convolutional codes and its Application (길쌈부호의 부등 오류 특성 및 그 응용)

  • Lee, Soo-In;Lee, Sang-Gon;Moon, Sang-Jae
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.194-197
    • /
    • 1988
  • The unequal bit-error-probability of rate r=b/n binary convolutional code is analyzed. The error protection affored each digit of the b-tuple information word can be different from that afforded other digit. The property of the unequal protection can be applied to transmitting sampled data in PCM system.

  • PDF

Hardware Implementation or (255,239) BCH decoder using Direct Decoding Method (직접복호법을 이용한 (255,239) BCH 부호의 복호기)

  • Cho, Yong-Suk;Park, Cha-Sang;Rhee, Man-Young
    • Proceedings of the KIEE Conference
    • /
    • 1988.07a
    • /
    • pp.203-206
    • /
    • 1988
  • Direct Decoding Method for binary BCH codes which directly can find error location number from syndrome without calculating error locator polynomial is presented in this paper. The (255,239) BCH decoder is implemented using TTL logics. It is shown from our results that this decoder can be implemented with relatively simple hardware.

  • PDF