• Title/Summary/Keyword: Binary Code Analysis

Search Result 126, Processing Time 0.034 seconds

LIGHT CURVE ANALYSIS OF A SHORT PERIOD ECLIPSING BINARY SW LYNCIS (근접 식쌍성 SW LYNCIS의 광도곡선 분석)

  • 김호일;한원용;이우백;김천휘
    • Journal of Astronomy and Space Sciences
    • /
    • v.12 no.2
    • /
    • pp.196-203
    • /
    • 1995
  • The UBV light curves of a close eclipsing binary SW Lyn were obtained with the observations made at the Sobaeksan Astronomy Observatory during 7 nights from September 1983 to March 1987. These light curves show asymmetry to the secondary minimum light and the asymmetry is larger at the shorter wavelength light curve. Assuming that the star sport makes the asymmetry, we employed the WD code to make the B and V light curves solution. We confirmed that SW Lyu has near contact(semi-detached) Roche configuration and has the Case A evolution.

  • PDF

Analysis of Electroluminescent Device Using Fractal Theory (프랙탈 이론을 이용한 발광소자 발광특성 분석)

  • 조재철;박계춘;홍경진
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.15 no.4
    • /
    • pp.332-337
    • /
    • 2002
  • The applicability of models based on fractal geometry to characterize the surface of the EL devices was investigated. Insulating layer and phosphor layer of EL devices were deposited on ITO glass using e-beam method. The images of phosphor layer by scanning electron microscope(SEM) were transformed to binary coded data. The relations between fractal geometry and electrical characteristics of EL devices were investigated. When the fractal dimension of $Cas:EuF_3$ EL device was 1.82 and its grain boundary area was 19%, the brightness of $Cas:EuF_3$ EL device was 261 cd/$\textrm{m}^2$.

Performance Analysis aginst Single Tone Jamming for CPM DS-SS System with FSK Modulation. (FSK 변조에 의한 CPM DS-SS 통신시스템의 단일주파수 잡음에 대한 성능평가)

  • Park, Chong-Yeon;Hwang, Jun-Won
    • Journal of Industrial Technology
    • /
    • v.17
    • /
    • pp.153-160
    • /
    • 1997
  • This paper has analyzed the performance against a single tone jamming for the CPM DS-SS system with a Binary FSK Modulation. The CPM DS-SS system designed with the different phase shift of the same pseude-noise code has the advantage of reducing the jamming and interference effects on multi-users communication environment. Analytical results show that the system preformance improves by increasing parrallel users in the presence of the coherent single-tone, which is the worst interference since the jamming signal has the same frequency as a carrier.

  • PDF

A Study on the recognition of local name using Spatio-Temporal method (Spatio-temporal방법을 이용한 지역명 인식에 관한 연구)

  • 지원우
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1993.06a
    • /
    • pp.121-124
    • /
    • 1993
  • This paper is a study on the word recognition using neural network. A limited vocabulary, speaker independent, isolated word recognition system has been built. This system recognizes isolated word without performing segmentation, phoneme identification, or dynamic time wrapping. It needs a static pattern approach to recognize a spatio-temporal pattern. The preprocessing only includes preceding and tailing silence removal, and word length determination. A LPC analysis is performed on each of 24 equally spaced frames. The PARCOR coefficients plus 3 other features from each frame is extracted. In order to simplify a structure of neural network, we composed binary code form to decrease output nodes.

  • PDF

Performance Analysis of Turbo Code Based on DVB-RCS for Ship-Internet High-Quality Service (선박 Internet 고품질 서비스를 위한 DVB-RCS 기반 터보부호 성능 분석)

  • Kim, Min-Hyuk;Choi, Duk-Gun;Jung, Jin-Hee;Jung, Ji-Won
    • Proceedings of the Korean Society of Marine Engineers Conference
    • /
    • 2005.11a
    • /
    • pp.61-62
    • /
    • 2005
  • In this paper, we investigate the encoding and decoding method of turbo codes that offer a variety of coding rates from 1/3 to 6/7 in Digital Video Broadcast Return Channel via Satellite (DVB-RCS) standard to provide ship-internet service with high-quality.

  • PDF

Study on Error Correction Method for Advanced Terrestrial DMB (고품질 지상파 DMB를 위한 오류정정방식 연구)

  • Choi, Gyoo-Seok;Jeon, Byung-Chan;Park, In-Kyoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.69-75
    • /
    • 2010
  • Advanced T-DMB(Terrestial DMB )system which is a new portable mobile broadcasting system has been developed to increase data rate up to double of conventional T-DMB in same bandwidth while maintaining backward compatibility, using hierarchical modulation method. The Advanced T-DMB system realize high qualification of conventional T-DMB system by adding BPSK signal or QPSK signal as enhanced layer to existing DQPSK signal. The enhanced layer signal should be small enough to maintain backward compatibility and to minimize the coverage loss of existing T-DMB service area. But this causes the enhanced layer signal of Advanced T-DMB susceptible to fading effect in transmission channel. In this paper we applied the duo-binary turbo code which has powerful error correction capability to the enhanced layer signal for compensating channel distortion. And the computer simulation results about the performance of the duo-binary turbo code in Advanced T-DMB system are presented along with analysis comments.

Analysis of Code Sequence Generating Algorism and Implementation of Code Sequence Generator using Boolean Functions (부울함수를 이용한 부호계열 발생알고리즘 분석 부호계열발생기 구성)

  • Lee, Jeong-Jae
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.13 no.4
    • /
    • pp.194-200
    • /
    • 2012
  • In this paper we analyze the code sequence generating algorism defined on $GF(2^n)$ proposed by S.Bostas and V.Kumar[7] and derive the implementation functions of code sequence generator using Boolean functions which can map the vector space $F_2^n$ of all binary vectors of length n, to the finite field with two elements $F_2$. We find the code sequence generating boolean functions based on two kinds of the primitive polynomials of degree, n=5 and n=7 from trace function. We then design and implement the code sequence generators using these functions, and produce two code sequence groups. The two groups have the period 31 and 127 and the magnitudes of out of phase(${\tau}{\neq}0$) autocorrelation and crosscorrelation functions {-9, -1, 7} and {-17, -1, 15}, satisfying the period $L=2^n-1$ and the correlation functions $R_{ij}({\tau})=\{-2^{(n+1)/2}-1,-1,2^{(n+l)/2}-1\}$ respectively. Through these results, we confirm that the code sequence generators using boolean functions are designed and implemented correctly.

Study on the comparison result of Machine code Program (실행코드 비교 감정에서 주변장치 분석의 유효성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.37-44
    • /
    • 2020
  • The similarity of the software is extracted by the verification of comparing with the source code. The source code is the intellectual copyright of the developer written in the programming language. And the source code written in text format contains the contents of the developer's expertise and ideas. The verification for judging the illegal use of software copyright is performed by comparing the structure and contents of files with the source code of the original and the illegal copy. However, there is hard to do the one-to-one comparison in practice. Cause the suspected source code do not submitted Intentionally or unconsciously. It is now increasing practically. In this case, the comparative evaluation with execution code should be performed, and indirect methods such as reverse assembling method, reverse engineering technique, and sequence analysis of function execution are applied. In this paper, we analyzed the effectiveness of indirect comparison results by practical evaluation . It also proposes a method to utilize to the system and executable code files as a verification results.

The Study on Improvement of the Program that Traces the Binary Codes in Execution (실행 중인 바이너리 코드 추출 프로그램의 기능 확장 연구)

  • Chang, Hang-Bae;Kwon, Hyuk-Jun;Kim, Yang-Hoon;Kim, Guk-Boh
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1309-1315
    • /
    • 2009
  • This research goal of developing and producing a tool that finds security weakness that may happen when a usual program is executed. The analyzing tool for security weakness has the major functions as follows. In case that a part of anticipated security weakness are in execution, it traces a machine language to a part in execution. And Monitoring System calls and DLL(API) calls when a program is in execution. The result of this study will enable to contribute to use as educational materials for security service in companies and related agencies and to prevent from hacking of external information invaders in the final analysis.

  • PDF

Image-Based Machine Learning Model for Malware Detection on LLVM IR (LLVM IR 대상 악성코드 탐지를 위한 이미지 기반 머신러닝 모델)

  • Kyung-bin Park;Yo-seob Yoon;Baasantogtokh Duulga;Kang-bin Yim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.31-40
    • /
    • 2024
  • Recently, static analysis-based signature and pattern detection technologies have limitations due to the advanced IT technologies. Moreover, It is a compatibility problem of multiple architectures and an inherent problem of signature and pattern detection. Malicious codes use obfuscation and packing techniques to hide their identity, and they also avoid existing static analysis-based signature and pattern detection techniques such as code rearrangement, register modification, and branching statement addition. In this paper, We propose an LLVM IR image-based automated static analysis of malicious code technology using machine learning to solve the problems mentioned above. Whether binary is obfuscated or packed, it's decompiled into LLVM IR, which is an intermediate representation dedicated to static analysis and optimization. "Therefore, the LLVM IR code is converted into an image before being fed to the CNN-based transfer learning algorithm ResNet50v2 supported by Keras". As a result, we present a model for image-based detection of malicious code.