• Title/Summary/Keyword: 유니 코드

Search Result 213, Processing Time 0.024 seconds

Spreading Codes Based Multicast Feedback Scheme for Reliable Multicast Services (신뢰성 있는 멀티캐스트 서비스를 위한 스프레딩 코드 기반 피드백 기법)

  • Lee, Howon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.787-793
    • /
    • 2015
  • In order to support reliable medium access control (MAC) layer multicast services in Broadband Wireless Access (BWA) networks, we here propose spreading codes (Cumulative ACK (CA) code and ARQ Feedback Request (AFR) code) based reliable multicast feedback scheme. The status indications based on the automatic repeat request (ARQ) mechanism are needed in some multicast services. In accordance with various wireless channel environments, we demonstrate the performance excellency of our proposed scheme with respect to required uplink resources compared with the original feedback scheme based on unicast ARQ feedback messages. In addition, we analyze packet error rate (PER) against the various wireless channel environments.

Hangul Porting and Display Performance Comparison of an Embedded System (임베디드 시스템을 위한 한글 포팅 및 출력 성능 비교)

  • Oh, Sam-Kweon;Park, Geun-Duk;Kim, Byoung-Kuk
    • Journal of Digital Contents Society
    • /
    • v.10 no.4
    • /
    • pp.493-499
    • /
    • 2009
  • Three methods frequently used for Hangul display in computer systems are Standard Johab Code in which each of Hangul consonants and vowels is given a 5-bit code and each syllable created by combining them forms a 2-byte code, Standard Wansung Code in which each of all the syllables generally used for Hangul presentation forms a 2-byte code, and Unicode in which each syllable in most of the world's language systems is given a unique code so that it allows computers to consistently represent and manipulate them in a unified manner. An embedded system in general has a lower processing power and a limited amount of storage space, compared to a personal compute(PC) system. According to its usage, however, the former may have a processing power equal to that of the latter. Hence, when Hangul display needs to be adopted, an embedded system must choose a display method suitable for its own resource environment. This paper introduces a TFT LCD initialization method and pixel display functions of an LN2440SBC embedded board on which an LP35, a 3.5" TFT LCD kit, is attached. Using the initialization and pixel display functions, in addition, we compare three aforementioned Hangul display methods, in terms of their processing speeds and amounts of memory space required. According to experiments, Standard Johab Code requires less amount of memory space but more processing time than Standard Wansung Code, and Unicode requires the largest amount of memory space but the least processing time.

  • PDF

A Design on the Multimedia Fingerprinting code based on Feature Point for Forensic Marking (포렌식 마킹을 위한 특징점 기반의 동적 멀티미디어 핑거프린팅 코드 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.4
    • /
    • pp.27-34
    • /
    • 2011
  • In this paper, it was presented a design on the dynamic multimedia fingerprinting code for anti-collusion code(ACC) in the protection of multimedia content. Multimedia fingerprinting code for the conventional ACC, is designed with a mathematical method to increase k to k+1 by transform from BIBD's an incidence matrix to a complement matrix. A codevector of the complement matrix is allowanced fingerprinting code to a user' authority and embedded into a content. In the proposed algorithm, the feature points were drawing from a content which user bought, with based on these to design the dynamical multimedia fingerprinting code. The candidate codes of ACC which satisfied BIBD's v and k+1 condition is registered in the codebook, and then a matrix is generated(Below that it calls "Rhee matrix") with ${\lambda}+1$ condition. In the experimental results, the codevector of Rhee matrix based on a feature point of the content is generated to exist k in the confidence interval at the significance level ($1-{\alpha}$). Euclidean distances between row and row and column and column each other of Rhee matrix is working out same k value as like the compliment matrices based on BIBD and Graph. Moreover, first row and column of Rhee matrix are an initial firing vector and to be a forensic mark of content protection. Because of the connection of the rest codevectors is reported in the codebook, when trace a colluded code, it isn't necessity to solve a correlation coefficient between original fingerprinting code and the colluded code but only search the codebook then a trace of the colluder is easy. Thus, the generated Rhee matrix in this paper has an excellent robustness and fidelity more than the mathematically generated matrix based on BIBD as ACC.

A Study on Efficient Algorithm for CW Signal Detection and Determination in Noisy Environment (잡음 환경하에서의 CW신호 검출 및 판독을 위한 효율적인 알고리듬 연구)

  • Kim Hyo-Won;Yi Kyu-Ha;Bang Keuk-Joon;Joo Pan-Yuh;Ham Young-Kwon;Hong Dae-Sik;Youn Dae-Hee
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • autumn
    • /
    • pp.127-130
    • /
    • 1999
  • 본 논문에서는 수신된 CW 신호로부터 Morse 코드를 자동 인식하는 알고리듬을 제안하였다. 전체 알고리듬은 수신된 CW 신호로부터 잡음 및 간섭신호 성분을 제거하고 신호의 존재유무를 판정하는 부분, 신호 길이의 변화를 극복하여 Morse 코드의 요소(Long, Short, Null set)로부터 코드로 판독하는 부분으로 구성되었다. 제안된 알고리듬은 CW 신호의 주파수, 위상 및 길이 정보가 필요 없으며, 모의 실험 결과, SNR -15dB, $20\%$의 신호 길이 변화 환경에서도 $100\%$의 해석률을 나타내었다.

  • PDF

XML based Classics Archive Management System (XML 기반 고문서 편찬 관리시스템)

  • Jin, Du-Seok;Choi, Yun-Su;Ahn, Sung-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.1693-1696
    • /
    • 2002
  • 최근 고문서 전산화 작업에 대한 관심이 증가함에 따라 대규모의 고문서 전산화 작업이 진행 되어지고 있다. 그러나 현재의 표준화 되어있는 코드체계만을 가지고는 고문서를 표현 할 수 없으며 문서의 구조에 포함된 의미적 특징을 손상시키지 않고 데이터베이스를 구축하기가 매우 어렵다. 또한 이러한 작업은 수개월에서 수년에 걸쳐 여러 차례의 교정 작업이 수행된다. 그러므로 효과적인 고문서 전산화를 위해서는 문서 편찬, 교정, 서비스가 동시에 수행되는 시스템이 필요하다. 따라서 본 논문에서는 기존 코드체계를 확장하여 고문서 전산화에 필요한 확장한자 처리가 가능한 유니코드 기반 입력기를 소개하고, 고문서의 의미적 특징을 손상시키지 않기 위해서 문서 구조정보의 표현이 가능한 XML을 이용한 실시간 문서 편찬 관리시스템을 소개한다.

  • PDF

A Design and Implementation of the Performance Testing Tool for Embedded Softwares (임베디드 소프트웨어를 위한 실시간 성능 테스팅 도구의 설계 및 구현)

  • 신경호;조용윤;유재우
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.763-765
    • /
    • 2004
  • 본 논문은 임베디드 시스템의 제한된 자원을 효율적으로 사용할 수 있는 임베디드 소프트웨어의 개발을 위한 성능 측정 도구를 제안한다. 제안하는 성능 측정 도구는 편리한 GUI를 제공하는 호스트-타겟(host-target) 기반의 테스팅 환경이다. 제안하는 테스팅 도구는 타겟 머신에 맞는 테스팅 코드 생성을 위한 파싱 엔진과 호스트-타겟간 소스 코드와 결과의 전송 및 테스팅 수행을 위한 에이젼트 모듈로 구성된다. 또한, 문자 스트링 형태의 저수준 테스팅 결과를 API 형태로 변경하는 데이터 처리기와 API 형태의 결과 정보를 그래픽 형태로 출력하는 레포트 생성기를 포함한다. 본 테스팅 도구는 개발자에게 레포트 뷰(view)를 제공하여 빠른 성능 분석과 코드 수정을 지원하며, 효율적이고 신뢰성 있는 임베디드 기반 소프트웨어 개발의 기회를 제공할 것으로 기대된다.

  • PDF

Validation Plan of Android applications (안드로이드 어플리케이션의 진본 검증 방안)

  • Han, Kyu-cheon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.415-417
    • /
    • 2015
  • 스마트폰이 출시된 이후 지금까지 개발된 안드로이드 앱은 초기 앱 자체의 문제가 있었으나 스마트폰 시장이 점차 확대 되면서 개발된 안드로이드 앱의 보안 취약점과 악성코드가 삽입된 어플리케이션의 .apk 파일 배포로 인해 무결성이 지켜지지 못하고 보안 문제가 끊임없이 발생하며 안드로이드폰에 설치된 앱의 위 변조로 악성코드가 삽입된 APK 파일을 이용해 설치하였을 경우 소스코드의 부정 사용과 개인정보유출 등 2 차로 금융사기 유도, 소액결재 등 사회적인 문제가 되고 있다. 본 논문은 위 변조된 안드로이드 어플리케이션의 진본 여부를 확인하 위해 방안을 제안하며 악의적인 목적으로 만들어진 위 변조된 안드로이드 어플리케이션 apk 파일을 이용한 설치로 부정 사용되는 안드로이드 어플리케이션의 진본 설치 여부를 진단할 수 있는 방안을 제안하고자 한다.

Performance Analysis of STBC Concatenated Convolutional Code for Improvement of Transmission Reliability (STBC의 전송 신뢰성 향상을 위한 컨볼루션 코드 연계 시스템)

  • Shin, Hyun-jun;Oh, Chang-Heon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.586-589
    • /
    • 2013
  • In this paper, the proposed scheme is STBC system combined with convolutional code to ensure the reliability of data transmission for a high rate wireless communication. In addition, this scheme uses a modified viterbi algorithm in order to get a high system gain when data is transmitted. Because we combine STBC and comvolutional code, the proposed scheme can get a diversity gain of STBC and coding gain of convolutional code at the same time. Unlike existing viterbi docoding algorithm using Hamming distance in order to calculate branch matrix, the modified viterbi algorithm uses Euclidean distance value between received symbol and reference symbol. To analyze the system proposed, it was simulated by changing the constraint length of the convolutional code and the number of transmit and receive antennas of STBC.

  • PDF

Design of a new family of multi wavelength two-dimensional codes for optical code division multiple access networks (다파장 OCDMA 네트웍에서의 새로운 2차원 코드의 설계)

  • 유경식;박남규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.31-41
    • /
    • 2000
  • It has been known that the optical code division multiple access (OCDMA) is a prominent future technology to support many simultaneous users and to increase transmission capacity of optical fiber. In this paper, we proposed the new construction of 2 dimensional code, which can be used as a codeword in temporal/wavelength OCDMA networks. New code family is obtained by extending the concept of Hamming correlation. All optical encoder and decoder for newly proposed code were also developed. In considering bit error ratio, we verified that new coding scheme outperforms conventional coding scheme by simulation. This system is applicable to asynchronous fast local area network, which needs a high security level and a flexible network configuration.

  • PDF

Assessment of RELAP5MOD2 Cycle 36.04 using LOFT Intermediate Break Experiment L5-1 (LOFT중형 냉각재 상실 사고 모사 실험 자료 L5-1을 이용한 RELAP5/MOD2 Cycle 36.04 코드 평가)

  • Lee, E.J.;Chung, B.D.;Kim, H.J.
    • Nuclear Engineering and Technology
    • /
    • v.23 no.1
    • /
    • pp.66-80
    • /
    • 1991
  • The LOFT intermediate break experiment L5-1, which simulates 12 inch diameter ECC line break in a typical PWR, has been analyzed using the reactor thermal/hydraulic analysis code RELAP5/MOD2, Cycle 36.04. The base calculation, which modeled the core with single flow channel and two heat structures without using the options of reflood and gap conductance model, has been successfully completed and compared with experimental data. Sensitivity studies were carried out to investigate the effects of nodalization at reactor vessel and core modeling on major thermal hydraulic parameters, especially on peak cladding temperature(PCT). These sensitivity items are : single flow channel and single heat structure (Case A), two flow channel and two heat structures (Case B), reflood option added (Case C) and both reflood and gap conductance options added (Case D). The code, RELAP5/MOD2 Cycle 36.04 with the base modeling, predicted the key parameters of LOFT IBLOCA Test L5-1 better than Cases A,B,C and D. Thus, it is concluded that the single flow channel modeling for core is better than the two flow channel modeling and two heat structure is also better than single heat structure modeling to predict PCT at the central fuel rods. It is, therefore, recommended to use the reflood option and not to use gap conductance option for this L5-1 type IBLOCA.

  • PDF