• Title/Summary/Keyword: 코드 재사용

Search Result 475, Processing Time 0.028 seconds

Frequency-Scanning Type Microwave Tag System Using Defected Ground Structures (결함 접지 구조를 이용한 주파수 스캐닝 방식의 마이크로파 태그 시스템)

  • Lee, Seok-Jae;Han, Sang-Min
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.24 no.3
    • /
    • pp.247-252
    • /
    • 2013
  • In this paper, a microwave tag system of a frequency-scanning type is proposed with multi-resonators using defected ground structures. While a conventional chip-based RFID stores time-sequential codes, the proposed type achieves pure passive tags by using multi-resonant bits over a frequency range. Moreover, the resonators of the spiral defected ground structures implemented on the back side of transmission lines have advantages of the excellent bandstop characteristics as well as the bit-error avoidance by the re-radiation on normal resonators. The proposed microwave tag is designed with UWB antennas at 3~7 GHz. From the experimental results in an anechoic chamber, it has been verified of the excellent recognitions for various 5-bits identification codes.

Developing a Low Power BWE Technique Based on the AMR Coder (AMR 기반 저 전력 인공 대역 확장 기술 개발)

  • Koo, Bon-Kang;Park, Hee-Wan;Ju, Yeon-Jae;Kang, Sang-Won
    • The Journal of the Acoustical Society of Korea
    • /
    • v.30 no.4
    • /
    • pp.190-196
    • /
    • 2011
  • Bandwidth extension is a technique to improve speech quality and intelligibility, extending from 300-3400 Hz narrowband speech to 50-7000 Hz wideband speech. This paper designs an artificial bandwidth extension (ABE) module embedded in the AMR (adaptive multi-rate) decoder, reducing LPC/LSP analysis and algorithm delay of the ABE module. We also introduce a fast search codebook mapping method for ABE, and design a low power BWE technique based on the AMR decoder. The proposed ABE method reduces the computational complexity and the algorithm delay, respectively, by 28 % and 20 msec, compared to the traditional DTE (decode then extend) method. We also introduce a weighted classified codebook mapping method for constructing the spectral envelope of the wideband speech signal.

Hybrid ARQ scheme using RCPC codes in Wireless (무선 ATM 환경에서 RCPC 코드를 이용한 하이브리드 ARQ 기법)

  • Han, Eun-Jung;Cho, Young-Jong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.7
    • /
    • pp.12-21
    • /
    • 2002
  • In this paper, we propose a new hybrid ARQ scheme to consider real-time and non real-time services in a wireless ATM network. Real-time and non-real-time services require different error control schemes according to each service characteristics. Therefore, in the next generation mobile communication environments where these service scenarios should be deployed, hybrid ARQ scheme using RCPC code with variable coding rate becomes one of the most suitable solutions. Because the variable coding rate is applied according to traits of transmitted frame and channel status, hybrid ARQ scheme using RCPC code can expect UEP effect. The UEP scheme does not apply equal error protection level to all information, but does high error protection level to more important information. In Our scheme, UEP of high error protection level is applied to real-time service, and UEP of low error protection and retransmission techniques are applied to non real-time service. We show that the proposed hybrid ARQ scheme improves channel utilization efficiency and yields high error correction behaviors.

Calculation of Power Distributions on Uranium- and Plutonium-Loaded Cores Moderated by Light Water (우라늄 및 플루토늄 장전 노심에서의 출력 분포 계산)

  • Sang Keun Lee;Kap Suk Moon;Jong-Hwa Jang;Ji Bok Lee;Chang Kun Lee
    • Nuclear Engineering and Technology
    • /
    • v.15 no.4
    • /
    • pp.267-279
    • /
    • 1983
  • An analytical system has been established for scrutinizing both uranium- and plutonium-fueled lattices moderated by light water. This system consists of two primary codes. One is a unit cell program called KICC, which has theoretical foundation on the models of GAM and THERMOS incorporated with appropriate approximate treatments for various phenomena, whereas the other is a multi-dimensional diffusion-depletion program entitled KIDD. The adequacy of this system is verified by performing extensive benchmark calculations on a variety of critical experiments. The average value of effective multiplication factors for the selected nineteen UO$_2$ critical experiments of heterogeneous lattice structure is calculated to be 1.0006 with a standard deviation of 0.0039. Power distributions have also been calculated for some critical experiments fueled with both uranium and plutonium of varying concentrations. The maximum percentage difference between the measured and calculated power distributions appears to be less than 5%. This result, together with the previously reported result, illustrates that the KICC/KIDD system is a very effective tool for the analysis of a light water reactor core.

  • PDF

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Design of SW Framework for Airborne Radar Real-time Signal Processing using Modular Programming (모듈화를 활용한 항공기 레이다 실시간 신호처리 SW Framework 설계)

  • Jihyun, Lee;Changki, Lee;Taehee, Jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.27 no.1
    • /
    • pp.76-86
    • /
    • 2023
  • Radars used by air-crafts have two important characteristics; First, they should have a real-time signal processing system finishing signal processing before deadline while getting and processing successive in-phase and quadrature data. Second, they can cover a lot of modes including A2A(Air to Air), A2G(Air to Gound), A2S(Air to Sea), and Ground Map(GM). So the structure of radar signal processing SWs in modern airborne radars are becoming more complicate. Also, the implementation of radar signal processing SW needs to reuse common code blocks between other modes for efficiency or change some of the code blocks into alternative algorithm blocks. These are the reason why the radar signal processing SW framework suggested in this paper is taking advantage of modular programming. This paper proposes an modular framework applicable on the airborne radar signal processing SW maintaining the real-time characteristic using the signal processing procedures for A2G/A2S as examples.

An Efficient Test Data Compression/Decompression Using Input Reduction (IR 기법을 이용한 효율적인 테스트 데이터 압축 방법)

  • 전성훈;임정빈;김근배;안진호;강성호
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.11
    • /
    • pp.87-95
    • /
    • 2004
  • This paper proposes a new test data compression/decompression method for SoC(Systems-on-a-Chip). The method is based on analyzing the factors that influence test parameters: compression ratio and hardware overhead. To improve compression ratio, the proposed method is based on Modified Statistical Coding (MSC) and Input Reduction (IR) scheme, as well as a novel mapping and reordering algorithm proposed in a preprocessing step. Unlike previous approaches using the CSR architecture, the proposed method is to compress original test data and decompress the compressed test data without the CSR architecture. Therefore, the proposed method leads to better compression ratio with lower hardware overhead than previous works. An experimental comparison on ISCAS '89 benchmark circuits validates the proposed method.

The Study on Radioactivity Reduction of Spent PWR Cladding Hull (경수로사용후핵연료 폐피복관의 방사능 저감방안)

  • 정인하;김종호;박창제;정양홍;송기찬;이정원;박장진;양명승
    • Proceedings of the Korean Radioactive Waste Society Conference
    • /
    • 2003.11a
    • /
    • pp.381-387
    • /
    • 2003
  • Hull arising from the spent PWR fuel elements is classified as a high-level radioactive waste. This report describes the radio-chemical characteristics of the hull -from PWR spent fuel of 32, 000MWd/tU burn-up and 15 years cooling, discharged from Gori Unit I cycled 4 -7-by examination and literature survey. On the basis of the results, a method of degradation to middle and low-level radio active waste was proposed by dry process such as laser or plasma technique with removing the nuclides deposited on the surface of the hull.

  • PDF

Detection of an Open-Source Software Module based on Function-level Features (함수 수준 특징정보 기반의 오픈소스 소프트웨어 모듈 탐지)

  • Kim, Dongjin;Cho, Seong-je
    • Journal of KIISE
    • /
    • v.42 no.6
    • /
    • pp.713-722
    • /
    • 2015
  • As open-source software (OSS) becomes more widely used, many users breach the terms in the license agreement of OSS, or reuse a vulnerable OSS module. Therefore, a technique needs to be developed for investigating if a binary program includes an OSS module. In this paper, we propose an efficient technique to detect a particular OSS module in an executable program using its function-level features. The conventional methods are inappropriate for determining whether a module is contained in a specific program because they usually measure the similarity between whole programs. Our technique determines whether an executable program contains a certain OSS module by extracting features such as its function-level instructions, control flow graph, and the structural attributes of a function from both the program and the module, and comparing the similarity of features. In order to demonstrate the efficiency of the proposed technique, we evaluate it in terms of the size of features, detection accuracy, execution overhead, and resilience to compiler optimizations.

Design and Implementation of Component Adaptation Supporting Tool (컴포넌트 개조 지원 도구의 설계 및 구현)

  • Kim, Jeong-Ah;Kwon, Oh-Cheon;Choi, Yoo-Hee;Shin, Gyu-Sang;Yoon, Shim
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.903-914
    • /
    • 2002
  • In this research, the technique and tool for the adaptation of components are suggested. While reusing a component or assembling components, component adaptation should be required since the interfaces of component to be assembled might not be exactly matched. Sometimes, other attributes are needed for new business features or even the same business concept. So, in reusing or assembling a component, component adaptation techniques are essentially required. In this research, we proposed the following Component Adaptation by Binary Component Adaptation Techniques : and Component Adaptation by Adaptation Components. Also, we constructed a component adaptation supporting tool. As the results, we can adapt the existing components without source code and can reuse the existing components when the components do not meet new requirements or can not be directly connected with other components to be integrated.