• Title/Summary/Keyword: Code distribution

Search Result 1,271, Processing Time 0.027 seconds

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

Wind Speed Prediction in Complex Terrain Using a Commercial CFD Code (상용 CFD 프로그램을 이용한 복잡지형에서의 풍속 예측)

  • Woo, Jae-Kyoon;Kim, Hyeon-Gi;Paek, In-Su;Yoo, Neung-Soo;Nam, Yoon-Su
    • Journal of the Korean Solar Energy Society
    • /
    • v.31 no.6
    • /
    • pp.8-22
    • /
    • 2011
  • Investigations on modeling methods of a CFD wind resource prediction program, WindSim for a ccurate predictions of wind speeds were performed with the field measurements. Meteorological Masts having heights of 40m and 50m were installed at two different sites in complex terrain. The wind speeds and direction were monitored from sensors installed on the masts and recorded for one year. Modeling parameters of WindSim input variables for accurate predictions of wind speeds were investigated by performing cross predictions of wind speeds at the masts using the measured data. Four parameters that most affect the wind speed prediction in WindSim including the size of a topographical map, cell sizes in x and y direction, height distribution factors, and the roughness lengths were studied to find out more suitable input parameters for better wind speed predictions. The parameters were then applied to WindSim to predict the wind speed of another location in complex terrain in Korea for validation. The predicted annual wind speeds were compared with the averaged measured data for one year from meteorological masts installed for this study, and the errors were within 6.9%. The results of the proposed practical study are believed to be very useful to give guidelines to wind engineers for more accurate prediction results and time-saving in predicting wind speed of complex terrain that will be used to predict annual energy production of a virtual wind farm in complex terrain.

Performance Analysis of Initial Cell Search in WCDMA System over Rayleigh Fading Channels (레일리 페이딩 채널에서 W-CDMA 시스템의 초기 셀 탐색 성능 해석)

  • Song, Moon-Kyou
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.38 no.4
    • /
    • pp.1-10
    • /
    • 2001
  • The 3-step cell search has been considered for fast acquisition of the scrambling code unique to a cell in the W -CDMA system. In this paper, the performance of the cell search scheme is analyzed in Rayleigh fading channels. And the system parameters for cell search scheme and the design parameters for the receivers are examined. The probabilities of detection, miss and false alarm for each step are derived in closed forms based on the statistics of CDMA noncoherent demodulator output. Through the analysis, the effect of threshold setting and post detection integration for each step is investigated, and the optimal values of the power allocation for the synchronization channels are also considered. The number of post-detection integrations for each step is a design parameter for the receiver, and the optimum values may depend on not only the power allocation for each channel related to the cell search, but the false alarm penalty time. It is shown that optimal values could be determined through the analysis. Also, the cumulative probability distribution of the average cell search time is obtained.

  • PDF

3-D Optical Earth System Model Construction and Disk Averaged Spectral Simulation for Habitable Earth-like Exoplanet

  • Ryu, Dong-Ok;Kim, Sug-Whan
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.1
    • /
    • pp.27.2-27.2
    • /
    • 2011
  • The Kepler(NASA) and CoRoT(ESA) space telescopes are surveying thousands of exoplanet for finding Earth-like exoplanets with similar environments of the Earth. Then the TPF(NASA), DARWIN(ESA) and many large-aperture ground telescopes have plan for spectroscopic observations of these earth-like exoplanets in next decades. Now, it has been started to simulate the disk averaged spectra of the earthlike exoplanets for comparing the observed spectra and suggesting solutions of environment of these planets. Previous research, the simulations are based on radiative transfer method, but these are limited by optical models of Earth system and instruments. We introduce a new simulation method, IRT(Integrated Ray Tracing) to overcome limitations of previous method. The 3 components are defined in IRT; 1)Sun model, 2)Earth system model (Atmosphere, Land and Ocean), 3)Instrument model. The ray tracing in IRT is simulated in composed 3D real scale space from inside the sun model to the detector of instrument. The Sun model has hemisphere structure with Lambertian scattering optical model. Atmosphere is composed of 16 distributed structures and each optical model includes BSDF with using 6SV radiative transfer code. Coastline and 5 kinds of vegetation distribution data are used to land model structure, and its non-Lambertian scattering optical model is defined with the semi-empirical "parametric kernel method" used for MODIS(NASA) and POLDER(CNES) missions. The ocean model includes sea ice cap structure with the monthly sea ice area variation, and sea water optical model which is considering non-lambertian sun-glint scattering. Computation of spectral imaging and radiative transfer performance of Earth system model is tested with hypothetical space instrument in IRT model. Then we calculated the disk averaged spectra of the Earth system model in IRT computation model for 8 cases; 4 viewing orientation cases with full illuminated phase, and 4 illuminated phase cases in a viewing orientation. Finally the DAS results are compared with previous researching results of radiative transfer method.

  • PDF

Flow Investigations in the Crossover System of a Centrifugal Compressor Stage

  • Reddy, K. Srinivasa;Murty, G.V. Ramana;Dasgupta, A.;Sharma, K.V.
    • International Journal of Fluid Machinery and Systems
    • /
    • v.3 no.1
    • /
    • pp.11-19
    • /
    • 2010
  • The performance of the crossover system of a centrifugal compressor stage consisting of static components of $180^{\circ}$ U-bend, return channel vanes and exit ducting with a $90^{\circ}$ bend is investigated. This study is confined to the assessment of performance of the crossover system by varying the shape of the return channel vanes. For this purpose two different types of Return Channel Vanes (RCV1 and RCV2) were experimentally investigated. The performance of the crossover system is discussed in terms of total pressure loss coefficient, static pressure recovery coefficient and vane surface pressure distribution. The experimentation was carried out on a test setup in which static swirl vanes were used to simulate the flow at the exit of an actual centrifugal compressor impeller with a design flow coefficient of 0.053. The swirl vanes are connected to a mechanism with which the flow angle at the inlet of U-bend could be altered. The measurements were taken at five different operating conditions varying from 70% to 120% of design flow rate. On an overall assessment RCV1 is found to give better performance in comparison to RCV2 for different U-bend inlet flow angles. The performance of RCV2 was verified using numerical studies with the help of a CFD Code. Three dimensional sector models were used for simulating the flow through the crossover system. The turbulence was predicted with standard k-$\varepsilon$, 2-equation model. The iso-Mach contour plots on different planes and development of secondary flows were visualized through this study.

Convergence of Min-Sum Decoding of LDPC codes under a Gaussian Approximation (MIN-SUM 복호화 알고리즘을 이용한 LDPC 오류정정부호의 성능분석)

  • Heo, Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10C
    • /
    • pp.936-941
    • /
    • 2003
  • Density evolution was developed as a method for computing the capacity of low-density parity-check(LDPC) codes under the sum-product algorithm [1]. Based on the assumption that the passed messages on the belief propagation model can be approximated well by Gaussian random variables, a modified and simplified version of density evolution technique was introduced in [2]. Recently, the min-sum algorithm was applied to the density evolution of LDPC codes as an alternative decoding algorithm in [3]. Next question is how the min-sum algorithm is combined with a Gaussian approximation. In this paper, the capacity of various rate LDPC codes is obtained using the min-sum algorithm combined with the Gaussian approximation, which gives a simplest way of LDPC code analysis. Unlike the sum-product algorithm, the symmetry condition [4] is not maintained in the min-sum algorithm. Therefore, the variance as well as the mean of Gaussian distribution are recursively computed in this analysis. It is also shown that the min-sum threshold under a gaussian approximation is well matched to the simulation results.

Effect of Air Flow Rate on the Performance of Planar Solid Oxide Fuel Cell using CFD (평판형 고체산화물 연료전지의 CFD 성능해석에서 공기유량변화의 영향)

  • Kim, Danbi;Han, Kyoungho;Yoon, Do-Young
    • Journal of the Korean Electrochemical Society
    • /
    • v.18 no.4
    • /
    • pp.172-181
    • /
    • 2015
  • Solid Oxide Fuel Cells (SOFC) continue to be among the most promising alternative energy devices. This paper addresses i-V characteristics of SOFC with a focus on air flow rate along the planar anode electrodes. To address this, detailed Butler-Volmer kinetics are implemented in a general-purpose CFD code FLUENT. The numerical results were validated against experimental data from the literature showing excellent match with i-V polarization data ranging 1V-0.4V. Numerical calculations of fuel cell operation under different flow rare conditions were performed in three-dimensional geometries. Results are presented in terms of concentration distribution of hydrogen, oxygen, and water. The simulations and results indicate that advanced CFD with UDF(User-Defined Function) of Butler-Volmer kinetics can be used to identify the conditions leading to air flow rate and specific surface area and guide development of operating conditions and improve the fuel cell system performance.

Analysis of GPS Signal Acquisition Performance

  • Li, Xiaofan;Manandhar, Dinesh;Shibasaki, Ryosuke
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.229-234
    • /
    • 2006
  • Acquisition is to detect the presence of the GPS signal. Once the signal is detected, the estimated frequency and code phase are passed to a tracking loop to demodulate the navigation data. In order to detect the weak signal, multiple length of data integration is always needed. In this paper, we present five different acquisition approaches based on circular correlation and Fast Fourier Transform (FFT), using coherent as well as non-coherent integration techniques for the multiple length of collected GPS satellite signal. Moreover a general approach of determining the acquisition threshold is introduced based on noise distribution which has been proved effective, and independent of the hardware. In the end of this paper, the processing speed and acquisition gain of each method are illustrated, compared, and analyzed. The results show that coherent approach is much more time consuming compared to noncoherent approaches, and in the case of multiple length of data integration from 2ms to 8ms, the processing times consumed by the fastest non-coherent acquisition method are only 25.87% to 1.52% in a single search, and 34.76% to 1.06% in a global search of those in the coherent acquisition. However, coherent acquisition also demonstrates its better performance in the acquisition gain, and in the case of 8ms of data integration it is 4.23 to 4.41 dB higher than that in the non-coherent approaches. Finally, an applicable scheme of combining coherent and non-coherent acquisition approaches in the development of a real-time Software GPS receiver in the University of Tokyo is provided.

  • PDF

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

A Study of Gate Control System Using RFID (RFID를 이용한 출입문 제어 시스템 연구)

  • Kang, Sung-Chul;Kim, Hyung-Chan;Doh, Yang-Hoi;Lee, Kwang-Man;Kim, Do-Hyeun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1505-1512
    • /
    • 2007
  • The RFID Technology (which is importantly used at the Ubiquitous environment) is attached to all of the units like the ID cards and then information on the units and units' environment is transferred and processed through the radio frequency. so it is the no touched recognition system. RFID Technology's research of the middle ware and wireless interface etc. is currently conducted and variously broaden like the industry of the distribution and logistics. This paper suggests that the gate control system which is based on RFID middle ware is realized to prevent the district and facility for security. The indication of this paper is that algorithm (which is to certificate Users' enterance through RFID EPC code) is proposed and realizes the user certification module, the control module of the gates' opening and closing, the maintenance module of the gate, the display module of coming and going information, test program ect. through RFID technology.

  • PDF