• Title/Summary/Keyword: type code

Search Result 1,486, Processing Time 0.023 seconds

Encoding of a run-length soruce using recursive indexing (줄길이 신호원의 순환지수 부호화)

  • 서재준;나상신
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.33A no.7
    • /
    • pp.23-33
    • /
    • 1996
  • This paper deals with the design of a recursively-indexed binary code for facsimile soruces and its performance. Sources used here are run-lengths of white pixels form higher-resolution facsimile. The modified huffman code used for G.3 facsimile is chosen for the performance comparison. Experiments confirm the fact that recursive indexing preserves the entropy of a memoryless geometric source: the entropy of recursively-indexed physical surce iwth roughly geometric distributin remains within 2% of the empirical source entropy. The designed recursively-indexed binary codes consist of a code applied to text-type documents and to graphics - type documents is compared iwth that of the modified huffman code. Numerical resutls show that the modified huffman code performs well for text-type documents and not equally well for graphics-tyep documents. On the other hand, recursively-indexed binary codes have shown a better performance for graphics-type documents whose distribution are similar to a geometric distribution. Specifically, the code rates of recursively-indexed binary codes with 60 codewords are from 8% to 20% of the empirical source entropy smaller than that of th emodified huffman code with 91 codewords.

  • PDF

A study on Countermeasures by Detecting Trojan-type Downloader/Dropper Malicious Code

  • Kim, Hee Wan
    • International Journal of Advanced Culture Technology
    • /
    • v.9 no.4
    • /
    • pp.288-294
    • /
    • 2021
  • There are various ways to be infected with malicious code due to the increase in Internet use, such as the web, affiliate programs, P2P, illegal software, DNS alteration of routers, word processor vulnerabilities, spam mail, and storage media. In addition, malicious codes are produced more easily than before through automatic generation programs due to evasion technology according to the advancement of production technology. In the past, the propagation speed of malicious code was slow, the infection route was limited, and the propagation technology had a simple structure, so there was enough time to study countermeasures. However, current malicious codes have become very intelligent by absorbing technologies such as concealment technology and self-transformation, causing problems such as distributed denial of service attacks (DDoS), spam sending and personal information theft. The existing malware detection technique, which is a signature detection technique, cannot respond when it encounters a malicious code whose attack pattern has been changed or a new type of malicious code. In addition, it is difficult to perform static analysis on malicious code to which code obfuscation, encryption, and packing techniques are applied to make malicious code analysis difficult. Therefore, in this paper, a method to detect malicious code through dynamic analysis and static analysis using Trojan-type Downloader/Dropper malicious code was showed, and suggested to malicious code detection and countermeasures.

ON THE RETRACTS AND RECODINGS OF CONTINUING CODES

  • YOO, JISANG
    • Bulletin of the Korean Mathematical Society
    • /
    • v.52 no.4
    • /
    • pp.1375-1382
    • /
    • 2015
  • We investigate what happens when we try to work with continuing block codes (i.e., left or right continuing factor maps) between shift spaces that may not be shifts of finite type. For example, we demonstrate that continuing block codes on strictly sofic shifts do not behave as well as those on shifts of finite type; a continuing block code on a sofic shift need not have a uniformly bounded retract, unlike one on a shift of finite type. A right eresolving code on a sofic shift can display any behavior arbitrary block codes can have. We also show that a right continuing factor of a shift of finite type is always a shift of finite type.

Relational Logic Definition of Articles and Sentences in Korean Building Code for the Automated Building Permit System (인허가관련 설계품질검토 자동화를 위한 건축법규 문장 관계논리에 관한 연구)

  • Kim, Hyunjung;Lee, Jin-Kook
    • Korean Journal of Computational Design and Engineering
    • /
    • v.21 no.4
    • /
    • pp.433-442
    • /
    • 2016
  • This paper aims to define the relational logic of in-between code articles as well as within atomic sentences in Korean Building Code, as an intermediate research and development process for the automated building permit system of Korea. The approach depicted in this paper enables the software developers to figure out the logical relations in order to compose KBimCode and its databases. KBimCode is a computer-readable form of Korean Building Code sentences based on a logic rule-based mechanism. Two types of relational logic definition are described in this paper. First type is a logic definition of relation between code sentences. Due to the complexity of Korean Building code structure that consists of decree, regulation or ordinance, an intensive analysis of sentence relations has been performed. Code sentences have a relation based on delegation or reference each other. Another type is a relational logic definition in a code sentence based on translated atomic sentence(TAS) which is an explicit form of atomic sentence(AS). The analysis has been performed because the natural language has intrinsic ambiguity which hinders interpreting embedded meaning of Building Code. Thus, both analyses have been conducted for capturing accurate meaning of building permit-related requirements as a part of the logic rule-based mechanism.

The Brand Communication Effect of QR Code for Product Package Design (제품 포장 디자인에서의 QR 코드가 브랜드 커뮤니케이션에 미치는 효과)

  • Lee, Kwang-Sook;Kwak, Bo-Sun
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.29 no.3
    • /
    • pp.31-40
    • /
    • 2011
  • Using of QR(Quick Response) code is dramatically extended to various marketing area; not only substitute of bar code but also new tool of PR and marketing. This research attempts to analyze brand communication effect using QR code printed on product package especially in snack product category. Findings are 1) communication effect are different according to the type of book-trailers; 2) cinematic production and animation are the most effective type of book-trailers; 3) for memory and confirmation(sharing), a)stills and straplines, Analysis result of hypothesis I showed that characters of QR code influence on brand attitude. Among dependent variables, only reliability is significant. That means reliability of company and brand using QR code influence on brand attitude. The higher reliability of QR code, the better brand attitude of the brand. Analysis result of hypothesis II found that only reliability is significant on purchasing intention. Reliability of company and product using QR code influences on purchasing intention. The higher reliability of QR code, the higher possibility of purchasing products. Therefore, company can enhance reliability of both company and its products by using QR code. Using QR code will bring high reliability and high brand attitude and purchasing intention.

The Development of New Hangul Code "Truecode" and Its Applications (새로운 한글코드 “Truecode”의 개발과 응용)

  • 이문형;김기두
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.5
    • /
    • pp.43-51
    • /
    • 1993
  • A new Hangul code called Truecode is developed for accomodating to the future computing environments of graphical user interface and multimedia as well as for corresponding with the invention principle of Hangul. Truecode is not a forced two-byte code of syllable unit, as completion-type of combination-type, currently used, but a one byte code of phoneme unit, which can represent initial consonant, vowel, and final consonant each. It is quite different from three-byte code of syllable unit and also does not require the fill code used for three-byte code. We expect great contribution to the Hangul culture from Truecode's some important following features. It can express all the Korean characters we may imagine and does not cause any problem in communication. As well as we may use direct connection font, we can assign ont-to-one correspondence between Truecode and a keyboard with three sets. Truecode has a good advantage in developing application softwares of Hangul and it can nicely be applied to the fields of speech recognition and artificial intelligence using natural language.

  • PDF

Propose and Performance Analysis of Turbo Coded New T-DMB System (터보부호화된 새로운 T-DMB 시스템 제안 및 성능 분석)

  • Kim, Hanjong
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.269-275
    • /
    • 2014
  • The DAB system was designed to provide CD quality audio and data services for fixed, portable and mobile applications with the required BER below $10^{-4}$. However for the T-DMB system with the video service of MPEG-4 stream, BER should go down $10^{-8}$ by adding FEC blocks which consist of the Reed-Solomon (RS) encoder/decoder and convolutional interleaver/deinterleaver. In this paper we propose two types of turbo coded T-DMB system without altering the puncturing procedure and puncturing vectors defined in the standard T-DMB system for compatibility. One(Type 1) can replace the existing RS code, convolutional interleaver and RCPC code by a turbo code and the other one (Type 2) can substitute the existing RCPC code by a turbo code. Simulation results show that two new turbo coded systems are able to yield considerable performance gain after just 2 iterations. Type 2 system is better than type 1 but the amount of performance improvement is small.

A Study on the Natural Period Estimation for the Buildings of Upper Wall and Lower Frame Type (상부벽식-하부골조를 가진 복합구조물의고유주기 산정에 관한 연구)

  • 박기수
    • Proceedings of the Earthquake Engineering Society of Korea Conference
    • /
    • 1999.10a
    • /
    • pp.170-177
    • /
    • 1999
  • The natural period calculation equations specified in the current building code are empirical formulas that depend on height and material type of the structure. Building with the upper wall and lower frame type is a unique structure which composed of two different structural system This type of structure needs either the deep transfer girder or the thick transfer plate that brings the sudden change of stiffness and mass. Therefore the natural period equations recommended by the current code can not be applied directly. In this study the natural period of building with typical plan obtained by dynamci analysis is compared with that of various codes. Ad approximate estimation equation for the natural period of building with the upper wall and lower frame type obtained by regression analysis is recommended. by the current code can not be applied directly. In this study the natural period of building with typical plan obtained by dynamic analysis is compared with that of various codes, And approximate estimation equation for the natural period of building with the upper wall and lower frame type obtained by regression analysis is recommended.

  • PDF

The Study of Transmission Performance of Line Code on High Speed Optical Transmission Ethernet (고속 광 이더넷에서 선로 부호에 따른 전송 성능에 대한 연구)

  • Kim Chang-Bong;Ko Je Soo;Kim Ik-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6A
    • /
    • pp.510-516
    • /
    • 2005
  • In this paper, we discuss parameters of line code and simulate a same optical ethernet having minimum bandwidth(MB810) and non-minimum bandwidth line code(8B/10B) to present the possibility of improving of transmission performance using minimum bandwidth line code on the high speed optical ethernet. We design the high speed optical ethernet using Serial type LAN PHY 10GBASE-E(WDM type LAN PHY 10GBASE-LX4) for the single(multi) channel link. To compare the transmission performance of MB810, 8B/10B line code we measure the bit error rate(BER) according to the received optical power of single and multi channel link.

THE BIDAS-2007: BIOASSAY DATA ANALYSIS SOFTWARE FOR EVALUATING A RADIONUCLIDE INTAKE AND DOSE

  • Lee, Jong-Il;Lee, Tae-Young;Kim, Bong-Whan;Kim, Jang-Lyul
    • Nuclear Engineering and Technology
    • /
    • v.42 no.1
    • /
    • pp.109-114
    • /
    • 2010
  • Bioassay data analysis software (BiDAS-2007) has been developed by KAERI, which adds several new functions to its previous version. New functions of the BiDAS-2007 computer code enable the user not only to do a simultaneous analysis by using two or more types of bioassay for the best internal dose evaluation, but also to do a continual internal dose evaluation from a change of the internal exposure conditions such as an intake type (acute, chronic), an intake pathway (inhalation, ingestion), an absorption type (Type F, M, S), and a particle size (AMAD, activity median aerodynamic diameter), and also to estimate the intakes in various conditions of an internal exposure at a time. The values calculated by the BiDAS-2007 code are consistent and in good agreement with those values by IMIE-2004 code by Berkovski and IMBA code by Birchall. The BiDAS-2007 computer code is very useful and user-friendly to estimate the radionuclide intakes and committed effective doses of a radiation worker.