• Title/Summary/Keyword: code tracking

Search Result 222, Processing Time 0.029 seconds

The Horizon Run 5 Cosmological Hydrodynamical Simulation: Probing Galaxy Formation from Kilo- to Giga-parsec Scales

  • Lee, Jaehyun;Shin, Jihey;Snaith, Owain N.;Kim, Yonghwi;Few, C. Gareth;Devriendt, Julien;Dubois, Yohan;Cox, Leah M.;Hong, Sungwook E.;Kwon, Oh-Kyoung;Park, Chan;Pichon, Christophe;Kim, Juhan;Gibson, Brad K.;Park, Changbom
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.38.2-38.2
    • /
    • 2020
  • Horizon Run 5 (HR5) is a cosmological hydrodynamical simulation which captures the properties of the Universe on a Gpc scale while achieving a resolution of 1 kpc. This enormous dynamic range allows us to simultaneously capture the physics of the cosmic web on very large scales and account for the formation and evolution of dwarf galaxies on much smaller scales. Inside the simulation box. we zoom-in on a high-resolution cuboid region with a volume of 1049 × 114 × 114 Mpc3. The subgrid physics chosen to model galaxy formation includes radiative heating/cooling, reionization, star formation, supernova feedback, chemical evolution tracking the enrichment of oxygen and iron, the growth of supermassive black holes and feedback from active galactic nuclei (AGN) in the form of a dual jet-heating mode. For this simulation we implemented a hybrid MPI-OpenMP version of the RAMSES code, specifically targeted for modern many-core many thread parallel architectures. For the post-processing, we extended the Friends-of-Friend (FoF) algorithm and developed a new galaxy finder to analyse the large outputs of HR5. The simulation successfully reproduces many observations, such as the cosmic star formation history, connectivity of galaxy distribution and stellar mass functions. The simulation also indicates that hydrodynamical effects on small scales impact galaxy clustering up to very large scales near and beyond the baryonic acoustic oscillation (BAO) scale. Hence, caution should be taken when using that scale as a cosmic standard ruler: one needs to carefully understand the corresponding biases. The simulation is expected to be an invaluable asset for the interpretation of upcoming deep surveys of the Universe.

  • PDF

A Blockchain Framework for Investment Authorities to Manage Assets and Funds

  • Vinu Sherimon;Sherimon P.C.;Jeff Thomas;Kevin Jaimon
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.128-132
    • /
    • 2023
  • Investment authorities are broad financial institutions that carefully manage investments on behalf of the national government using a long-term value development approach. To provide a stronger structure or framework for In-vestment Authorities to govern the distribution of funds to public and private markets, we've started research to create a blockchain-based prototype for managing and tracking numerous finances of such authorities. We have taken the case study of Oman Investment Authority (OIA) of Sultanate of Oman. Oman's wealth is held in OIA. It is an organization that oversees and utilizes the additional capital generated by oil and gas profits in public and private markets. Unlike other Omani funds, this one focus primarily on assets outside the Sultanate. The operation of the OIA entails a huge number of transactions, necessitating a high level of transparency and administration among the parties involved. Currently, OIA relies on various manuals to achieve its goals, such as the Authorities and Responsibilities manual, the In-vestment Manual, and the Code of Business Conduct, among others. In this paper, we propose a Blockchain based framework to manage the operations of OIA. Blockchain is a part of the Fourth Industrial Revolution, and it is re-shaping every industry. The main components of every blockchain are assets and participants. The funds are the major assets in the proposed study, and the participants are the various fund shareholders/recipients. The block-chain's transactions are all safe, secure, and immutable, and it's part of a trustless network. The transactions are simple to follow and verify. By replacing intermediary firms with smart contracts, blockchain-based solutions eliminate any middlemen in the fund allocation process.

A Passport Recognition and face Verification Using Enhanced fuzzy ART Based RBF Network and PCA Algorithm (개선된 퍼지 ART 기반 RBF 네트워크와 PCA 알고리즘을 이용한 여권 인식 및 얼굴 인증)

  • Kim Kwang-Baek
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.1
    • /
    • pp.17-31
    • /
    • 2006
  • In this paper, passport recognition and face verification methods which can automatically recognize passport codes and discriminate forgery passports to improve efficiency and systematic control of immigration management are proposed. Adjusting the slant is very important for recognition of characters and face verification since slanted passport images can bring various unwanted effects to the recognition of individual codes and faces. Therefore, after smearing the passport image, the longest extracted string of characters is selected. The angle adjustment can be conducted by using the slant of the straight and horizontal line that connects the center of thickness between left and right parts of the string. Extracting passport codes is done by Sobel operator, horizontal smearing, and 8-neighborhood contour tracking algorithm. The string of codes can be transformed into binary format by applying repeating binary method to the area of the extracted passport code strings. The string codes are restored by applying CDM mask to the binary string area and individual codes are extracted by 8-neighborhood contour tracking algerian. The proposed RBF network is applied to the middle layer of RBF network by using the fuzzy logic connection operator and proposing the enhanced fuzzy ART algorithm that dynamically controls the vigilance parameter. The face is authenticated by measuring the similarity between the feature vector of the facial image from the passport and feature vector of the facial image from the database that is constructed with PCA algorithm. After several tests using a forged passport and the passport with slanted images, the proposed method was proven to be effective in recognizing passport codes and verifying facial images.

  • PDF

HTTP Request - SQL Query Mapping Scheme for Malicious SQL Query Detection in Multitier Web Applications (Multitier 웹 어플리케이션 환경에서 악의적인 SQL Query 탐지를 위한 HTTP Request - SQL Query 매핑 기법)

  • Seo, Yeongung;Park, Seungyoung
    • Journal of KIISE
    • /
    • v.44 no.1
    • /
    • pp.1-12
    • /
    • 2017
  • The continuously growing internet service requirements has resulted in a multitier system structure consisting of web server and database (DB) server. In this multitier structure, the existing intrusion detection system (IDS) detects known attacks by matching misused traffic patterns or signatures. However, malicious change to the contents at DB server through hypertext transfer protocol (HTTP) requests at the DB server cannot be detected by the IDS at the DB server's end, since the DB server processes structured query language (SQL) without knowing the associated HTTP, while the web server cannot identify the response associated with the attacker's SQL query. To detect these types of attacks, the malicious user is tracked using knowledge on interaction between HTTP request and SQL query. However, this is a practical challenge because system's source code analysis and its application logic needs to be understood completely. In this study, we proposed a scheme to find the HTTP request associated with a given SQL query using only system log files. We first generated an HTTP request-SQL query map from system log files alone. Subsequently, the HTTP request associated with a given SQL query was identified among a set of HTTP requests using this map. Computer simulations indicated that the proposed scheme finds the HTTP request associated with a given SQL query with 94% accuracy.

Deisgn of adaptive array antenna for tracking the source of maximum power and its application to CDMA mobile communication (최대 고유치 문제의 해를 이용한 적응 안테나 어레이와 CDMA 이동통신에의 응용)

  • 오정호;윤동운;최승원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2594-2603
    • /
    • 1997
  • A novel method of adaptive beam forming is presented in this paper. The proposed technique provides for a suboptimal beam pattern that increases the Signal to Noise/Interference Ratio (SNR/SIR), thus, eventually increases the capacity of the communication channel, under an assumption that the desired signal is dominant compared to each component of interferences at the receiver, which is precoditionally achieved in Code Division Multiple Access (CDMA) mobile communications by the chip correlator. The main advantages of the new technique are:(1)The procedure requires neither reference signals nor training period, (2)The signal interchoerency does not affect the performance or complexity of the entire procedure, (3)The number of antennas does not have to be greater than that of the signals of distinct arrival angles, (4)The entire procedure is iterative such that a new suboptimal beam pattern be generated upon the arrival of each new data of which the arrival angle keeps changing due tot he mobility of the signal source, (5)The total amount of computation is tremendously reduced compared to that of most conventional beam forming techniques such that the suboptimal beam pattern be produced at vevery snapshot on a real-time basis. The total computational load for generating a new set of weitht including the update of an N-by-N(N is the number of antenna elements) autocovariance matrix is $0(3N^2 + 12N)$. It can further be reduced down to O(11N) by approximating the matrix with the instantaneous signal vector.

  • PDF

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

Method of a Multi-mode Low Rate Speech Coder Using a Transient Coding at the Rate of 2.4 kbit/s (전이구간 부호화를 이용한 2.4 kbit/s 다중모드 음성 부호화 방법)

  • Ahn Yeong-uk;Kim Jong-hak;Lee Insung;Kwon Oh-ju;Bae Mun-Kwan
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.131-142
    • /
    • 2005
  • The low rate speech coders under 4 kbit/s are based on sinusoidal transform coding (STC) or multiband excitation (MBE). Since the harmonic coders are not efficient to reconstruct the transient segments of speech signals such as onsets, offsets, non-periodic signals, etc, the coders do not provide a natural speech quality. This paper proposes method of a efficient transient model :d a multi-mode low rate coder at 2.4 kbit/s that uses harmonic model for the voiced speech, stochastic model for the unvoiced speech and a model using aperiodic pulse location tracking (APPT) for the transient segments, respectively. The APPT utilizes the harmonic model. The proposed method uses different models depending on the characteristics of LPC residual signals. In addition, it can combine synthesized excitation in CELP coding at time domain with that in harmonic coding at frequency domain efficiently. The proposed coder shows a better speech quality than 2.4 kbit/s version of the mixed excitation linear prediction (MELP) coder that is a U.S. Federal Standard for speech coder.

Research in the Direction of Improvement of the Web Site Utilizing Google Analytics (구글 애널리틱스를 활용한 웹 사이트의 개선방안 연구 : 앱팩토리를 대상으로)

  • Kim, Donglim;Lim, Younghwan
    • Cartoon and Animation Studies
    • /
    • s.36
    • /
    • pp.553-572
    • /
    • 2014
  • In this paper, for the evaluation of the ease of a particular Web site (www.appbelt.net), insert the log tracking code for Google Analytics in a page of the Web site to collect behavioral data of visitor and has studied the improvement measures for the problems of the Web site, after the evaluation of the overall quality of the Web site through the evaluation of Coolcheck. These findings set the target value of the company's priority (importance) companies want to influence the direction of the business judgment are set up correctly, and the user's needs and behavior will be appropriate for the service seems to help improvement.

Knowledge Modeling and Database Construction for Human Biomonitoring Data (인체 바이오모니터링 지식 모델링 및 데이터베이스 구축)

  • Lee, Jangwoo;Yang, Sehee;Lee, Hunjoo
    • Journal of Food Hygiene and Safety
    • /
    • v.35 no.6
    • /
    • pp.607-617
    • /
    • 2020
  • Human bio-monitoring (HBM) data is a very important resource for tracking total exposure and concentrations of a parent chemical or its metabolites in human biomarkers. However, until now, it was difficult to execute the integration of different types of HBM data due to incompatibility problems caused by gaps in study design, chemical description and coding system between different sources in Korea. In this study, we presented a standardized code system and HBM knowledge model (KM) based on relational database modeling methodology. For this purpose, we used 11 raw datasets collected from the Ministry of Food and Drug Safety (MFDS) between 2006 and 2018. We then constructed the HBM database (DB) using a total of 205,491 concentration-related data points for 18,870 participants and 86 chemicals. In addition, we developed a summary report-type statistical analysis program to verify the inputted HBM datasets. This study will contribute to promoting the sustainable creation and versatile utilization of big-data for HBM results at the MFDS.

Numerical Analysis of Wave Transformation of Bore in 2-Dimensional Water Channel and Resultant Wave Loads Acting on 2-Dimensional Vertical Structure (2차원수조내에서 단파의 변형과 구조물에 작용하는 단파파력에 관한 수치해석)

  • Lee, Kwang Ho;Kim, Chang Hoon;Kim, Do Sam;Hwang, Young Tae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.29 no.5B
    • /
    • pp.473-482
    • /
    • 2009
  • This study numerically discusses wave forces acting on a vertical wall such as breakwaters or revetments, subjected to incident undular or turbulent bores. Due to the complex hydrodynamics of bore, its wave forces have been predicted, mainly through laboratory experiments. Numerical simulations in this paper were carried out by CADMAS-SURF(CDIT, 2001), which is based on Navier-Stokes momentum equations and VOF method (Hirt and Nichols, 1981) for tracking free water surface. Its original source code was also partly revised to generate bore in the numerical water channel. Numerical raw data computed by CADMAS-SURF included great strong spike phenomena that show the abrupt jumps of wave loads. To resolve this undesired noise of raw data, the band-pass filter with the frequency of 5Hz was utilized. The filtered results showed reasonable agreements with the experimental results performed by Matsutomi (1991) and Ramsden (1996). It was confirmed that CADMASSURF can be applied to the design of coastal structures against tsunami bores. In addition, the transformation process and propagation speed of bores in the same 2-d water channel were discussed by the variations of water level for time and space. The numerical results indicated that the propagation speed of bore was changed due to the nonlinear interactions between negative and reflected waves.