• Title/Summary/Keyword: one-one code

Search Result 2,580, Processing Time 0.039 seconds

A Hierarchical Contact Searching Algorithm in Sheet Forming Analysis (박판성형공정해석에서의 계층적 접촉탐색 알고리즘 적용)

  • 김용환
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1999.03b
    • /
    • pp.22-25
    • /
    • 1999
  • A dynamic explicit finite element code for simulating sheet forming processes has been developed The code utilises the discrete Kirchhoff shell element and contact force is treated by a conventional penalty method. In order to reduce the computational cost a new and robust contact searching algorithm has been developed and implemented into the code. in the method a hierarchical structure of tool segments called a tree structure is built for each tool at the initial stage of the analysis Tree is built in a way to divide a trunk to 8 sub-trunk 2 in each direction until the lowest level of the tree(leaf) contains exactly one segment of the tool. In order to have a well-balanced tree each box on each sub level contains one eighth of the segments. Then at each time step contact line from a node comes out of the surface of the tool. Simulation of various sheet forming processes were performed to verify the validity of the developed code with main focus on he usefulness of the developed contact searching algorithm.

  • PDF

ON CLOSING CODES

  • Shaldehi, Somayyeh Jangjooye
    • Bulletin of the Korean Mathematical Society
    • /
    • v.55 no.2
    • /
    • pp.359-366
    • /
    • 2018
  • We extend Jung's result about the relations among bi-closing, open and constant-to-one codes between general shift spaces to closing codes. We also show that any closing factor code ${\varphi}:X{\rightarrow}Y$ has a degree d, and it is proved that d is the minimal number of preimages of points in Y. Some other properties of closing codes are provided. Then, we show that any closing factor code is hyperbolic. This enables us to determine some shift spaces which preserved by closing codes.

A Study on the ADSL transmission based DMT line code (DMT 방식을 기반으로 한 ADSL 전송에 관한 연구)

  • 박인정;강영태
    • Proceedings of the IEEK Conference
    • /
    • 1999.11a
    • /
    • pp.503-506
    • /
    • 1999
  • Recently, as increasing population of internet, the larger one of required facts is solution for access speed, that transmission performance. ADSL system can provide the best application to resident in low cost, flexible approach. In this paper, for DMT line code that is one of ADSL modulation/demodulation signal processing methods, transmission performance and characteristic are discussed as studies and analysis through computer simulation using MATLAB. We made results with practising simulation using parameters based on ANSI standard Tl .413 Iusse2.

  • PDF

Performance Analysis of a Robust Trellis Coded Modulation for a Correlated Fading Channel (페이딩 환경에 강한 트렐리스 부호화 방식의 성능분석)

  • 임수환;황병대;오성근
    • Proceedings of the IEEK Conference
    • /
    • 2001.06a
    • /
    • pp.117-120
    • /
    • 2001
  • In this paper, we propose a robust trellis coded modulation for a correlated Rayleigh fading channel. This method use only one transmit antenna, which can achieve superior performance compared to Space-Time Trellis Coded Modulation (STTC) over a wide channel correlation range among transmit antennas. The code is designed to have the largest Euclidean distance between faded signals at the receiver. Computer simulations are performed to evaluate the frame error rate (FER) performance and to compare the proposed code with the conventional one.

  • PDF

Enhanced Knock Code Authentication with High Security and Improved Convenience

  • Jang, Yun-Hwan;Park, Yongsu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.9
    • /
    • pp.4560-4575
    • /
    • 2018
  • Since smartphone contains various personal data, security is one of the important aspects in smartphone technologies. Up to now, various authentication techniques have been proposed to protect smartphones. The pattern lock on the Android system is one of the most widely used authentication methods for low-cost devices but it is known to be vulnerable to smudge attack or shoulder surfing attack. LG's smartphone uses its own technique, which is called "Knock Code." The knock code completes the authentication by touching the user defined area in turn on the screen. In this paper, we propose the new, enhanced version of knock code by adding the sliding operation and by using flexible area recognition. We conducted security analysis, which shows that under the same password size, the search space is overwhelmingly larger than the original algorithm. Also, by using the sliding operation, the proposed scheme shows resilience against smudge attacks. We implemented the prototype of our scheme. Experimental results show that compared with the original Knock Code and Android pattern lock, our scheme is more convenient while providing better security.

Application of Flow Network Models of SINDA/FLUIN $T^{TM}$ to a Nuclear Power Plant System Thermal Hydraulic Code

  • Chung, Ji-Bum;Park, Jong-Woon
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05a
    • /
    • pp.641-646
    • /
    • 1998
  • In order to enhance the dynamic and interactive simulation capability of a system thermal hydraulic code for nuclear power plant, applicability of flow network models in SINDA/FLUIN $T^{™}$ has been tested by modeling feedwater system and coupling to DSNP which is one of a system thermal hydraulic simulation code for a pressurized heavy water reactor. The feedwater system is selected since it is one of the most important balance of plant systems with a potential to greatly affect the behavior of nuclear steam supply system. The flow network model of this feedwater system consists of condenser, condensate pumps, low and high pressure heaters, deaerator, feedwater pumps, and control valves. This complicated flow network is modeled and coupled to DSNP and it is tested for several normal and abnormal transient conditions such turbine load maneuvering, turbine trip, and loss of class IV power. The results show reasonable behavior of the coupled code and also gives a good dynamic and interactive simulation capabilities for the several mild transient conditions. It has been found that coupling system thermal hydraulic code with a flow network code is a proper way of upgrading simulation capability of DSNP to mature nuclear plant analyzer (NPA).

  • PDF

Algorithm of Decoding the Base 256 mode in Two-Dimensional Data Matrix Barcode (이차원 Data Matrix 바코드에서 Base 256 모드의 디코딩 알고리즘)

  • Han, Hee June;Lee, Hyo Chang;Lee, Jong Yun
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.3
    • /
    • pp.27-33
    • /
    • 2013
  • Conventional bar code has the appearance of line bars and spaces, called as one-dimensional bar code. In contrast, the information in two-dimensional bar code is represented by either a small, rectangular or square with the types of mosaic and Braille. The two-dimensional bar code is much more efficient than one-dimensional bar code because it can allow to store and express large amounts of data in a small space and so far there is also a little information about decoding the Data Matrix in base 256 mode. According to the ISO international standards, there are four kinds of bar code: QR code, Data Matrix, PDF417, and Maxi code. In this paper, among them, we focus on describing the basic concepts of Data Matrix in base 256 mode, how to encode and decode them, and how to organize them in detail. In addition, Data Matrix can be organized efficiently depending on the modes of numeric, alphanumeric characters, and binary system and expecially, we focus on describing how to decode the Data Matrix code by four modes.

CFD Code Development for a Two-phase Flow with an Interfacial Area Transport Equation (계면면적 수송방정식을 적용한 이상유동 해석코드 개발)

  • Bae, B.U.;Yoon, H.Y.;Euh, D.J.;Song, C.H.;Park, G.C.
    • Proceedings of the KSME Conference
    • /
    • 2007.05b
    • /
    • pp.2696-2701
    • /
    • 2007
  • For the analysis of a two-phase flow, the interaction between two phases such as the interfacial momentum or heat transfer is proportional to the interfacial area. So the interfacial area concentration (IAC) is one of the most important parameters governing the behavior of each phase. This study focuses on the development of a computational fluid dynamics (CFD) code for investigating a boiling flow with a one-group IAC transport equation. It was based on the two-fluid model and governing equations were calculated by SMAC algorithm. For checking the robustness of the developed code, the experiment of a subcooled boiling in a vertical annulus channel was analyzed to validate the capability of the IAC transport equation. As the results, the developed code was confirmed to have the capability in predicting multi-dimensional phenomena of vapor generation and propagation in a subcooled boiling.

  • PDF

State of Practice of Performance-Based Seismic Design in Indonesia

  • Sukamta, Davy;Alexander, Nick
    • International Journal of High-Rise Buildings
    • /
    • v.1 no.3
    • /
    • pp.211-220
    • /
    • 2012
  • The current 2002 Indonesian Seismic Code consists of prescriptive criteria that are intended to result in buildings capable of providing certain levels of performance. However, the actual performance capability of buildings is not assessed as part of the code procedures. Several analysis procedures are allowed, and the state of practice is to use the RSA with six-zone seismic map developed for 475-year earthquake. This code is being revised and will adopt many of the ASCE7-10 provisions and 2475-year earthquake for MCE. The growth of tall buildings compels engineers to look for more optimal lateral system. The use of RC core wall as single system has been adopted by very few engineering firms, which is allowed in the current code but will no longer be the case if the new one is in effect. Other innovative structural system such as core wall and outrigger is not addressed in the proposed new code. Engineers must then resort to NLRHA. Currently, one 50-story building under construction using RC core wall and outrigger has been designed with RSA and employing capacity design principles, then evaluated using NLRHA per TBI Guidelines. Based on the evaluation, the performance of the 50-story building generally still meets the criteria of the TBI Guidelines. The result of the case study is presented in this paper.

Erasure Decoding Method of RS-Convolutional Concatenated Code in Frequency-Hopping Spread Spectrum of Partial Band Jamming Environment. (부분대역 간섭 환경의 주파수도약 대역확산 시스템에서 RS-콘볼루션 연쇄부호의 Erasure 복호방식)

  • 강병무;유흥균
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12A
    • /
    • pp.1960-1965
    • /
    • 1999
  • In this paper, we propose a new method of erased concatenated code with RS-convolutional code. In the method, we make use of erasure for undecoded information when we have some errors in RS decoding. For decoding with erasure, the method is processed inner decoding and outer decoding again. After the erasure decoding, if the decoding result is better than the previous one, then we use this result. If not, use the previous one. In this paper, we use concatenated RS(63,31)-convolutional(4.1/2) code. Simulation result is compared with calculation result for performance analysis. According to the result, the proposed method has better performance than the others without erasure such that 2dB when 0.5$\leq\rho\leq$1 and 4dB when $\rho\leq$0.3.

  • PDF