• Title/Summary/Keyword: Code method

Search Result 5,276, Processing Time 0.035 seconds

Research on the Standard Code for Korean Letters (한글 통일부호에 관한 연구)

  • Kim, Jae-Gyun;Sim, Yeong-Seok;Kim, Nam-Cheol
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.16 no.4
    • /
    • pp.13-21
    • /
    • 1979
  • In this paper, some fundamental problems in the assignment and standardization of codes for Korean letters are discussed, and a multi-code method is proposed for the code assignment. This method is designed in particular to reflect the characteristics of Korean letters. Also, based on this method, a computer internal code and a telex code are suggested. The multi-code method enables us to obtain information on the display at a terminal rather easily by assigning the information dispersed among the code sequences to code himself and position. Further this method is shown to be capable of improving the transmission rate by 7.5% over the conventional resolution method if the given code space is efficiently utilized.

  • PDF

QR-code finder recognition using four directional scanning method (네 방향 스캔 방법을 이용한 QR코드 파인더 인식)

  • Lee, Yeon-Kyung;Yoo, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1187-1192
    • /
    • 2012
  • This paper describes a method to detect QR-code finders by four-direction scanning. The finder recognition is the first step in the QR-code recognition. If the finder is missing, QR-code recognition fails. The existing QR-code recognition method has a problem that the recognition performance decreases for perspectively distored images. To overcome the problem, we introduce four-direction scanning and a candidate set image to accurately detect QR-code finders. Using morphological operations detect the QR-code finder in the candidate set image robustly. To show the effectiveness of our method, we compared our method with the well-known existing method. The experimental result indicates that the proposed method is superior to the existing method in terms of the finder recognition performance.

Efficient method of Searching PI Code on RDS System (RDS System 에서의 효율적인 PI code 검출 기법에 관한 연구)

  • Cho, Chung-bum;Kim, Yound-cil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.112-115
    • /
    • 2009
  • PI code searching method of RDS(Radio Data System) are unique method of maintain desired channel on moving machine like vehicle. Efficient and fast PI code search method are researching on the all of RDS related systems for both find more better channel before Original channel signal go to bad and find desired good signal quickly when get out of Weak signal Area. But Embedded system has limited environment like memory size, so It is very difficult to apply many well known PI code searching method. This thesis suggests simple and effective method of searching PI code, considering a Embedded System Environment.

  • PDF

EduCODE : Educational COntents DEvelopment method for SCORM supporting (EduCODE : SCORM 지원 교육용 컨텐츠 개발 방법)

  • Seo, Dae-Woo;Lee, Se-Hoon;Wang, Chang-Jong
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.4
    • /
    • pp.123-133
    • /
    • 2002
  • In this paper we proposed EduCODE for educational contents development method and designed the system to support EduCODE. There are four models in EduCODE such as domain model, navigation model, abstract interface model, and asset model. The method includs graphic notations for contents structure. The system to support EduCODE consisted of authoring module and run-time module. The authoring module automatically generates ADL SCORM XML code using specifications produced by EduCODE and the code is serviced to a client by run-time module and web server.

  • PDF

A Study on Joint Coding System using VF Arithmetic Code and BCH code

  • Sukhee Cho;Park, Jihwan;Ryuji Kohno
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.537-545
    • /
    • 1998
  • This paper is the research about a joint coding system of source and channel coding using VF(Variable-to-fixed length) arithmetic code and BCH code. We propose a VF arithmetic coding method with EDC( Error Detecting Capability) and a joint coding method in that the VF arithmetic coding method with EDC is combined with BCH code. By combining both the VF arithmetic code with EDC and BCH code. the proposed joint coding method corrects a source codeword with t-errors in decoding of BCH code and carries out a improvement of the EDC of a codeword with more than (t+1)-errors in decoding of the VF arithmetic coding with EDC. We examine the performance of the proposed method in terms of compression ratio and EDC.

  • PDF

A Study on Reconstruction Vulnerability of Daugman's Iriscode

  • Youn, Soung-Jo;Anusha, B.V.S;Kim, Gye-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.2
    • /
    • pp.35-40
    • /
    • 2019
  • In this paper, we propose a technique to reconstruct the iris image from the iris code by analyzing the process of generating the iris code and calculating it inversely. Iris recognition is an authentication method for authenticating an individual's identity by using iris information of an eye having unique information of an individual. The iris recognition extracts the features of the iris from the iris image, creates the iris code, and determines whether to authenticate using the corresponding code. The iris recognition method using the iris code is a method proposed by Daugman for the first time and is widely used as a representative method of iris recognition technology currently used commercially. In this paper, we restore the iris image with only the iris code, and test whether the reconstructed image and the original image can be recognized, and analyze restoration vulnerability of Daugman's iris code.

Domain Analysis of Device Drivers Using Code Clone Detection Method

  • Ma, Yu-Seung;Woo, Duk-Kyun
    • ETRI Journal
    • /
    • v.30 no.3
    • /
    • pp.394-402
    • /
    • 2008
  • Domain analysis is the process of analyzing related software systems in a domain to find their common and variable parts. In the case of device drivers, they are highly suitable for domain analysis because device drivers of the same domain are implemented similarly for each device and each system that they support. Considering this characteristic, this paper introduces a new approach to the domain analysis of device drivers. Our method uses a code clone detection technique to extract similarity among device drivers of the same domain. To examine the applicability of our method, we investigated whole device drivers of a Linux source. Results showed that many reusable similar codes can be discerned by the code clone detection method. We also investigated if our method is applicable to other kernel sources. However, the results show that the code clone detection method is not useful for the domain analysis of all kernel sources. That is, the applicability of the code clone detection method to domain analysis is a peculiar feature of device drivers.

  • PDF

A ASIC design of the Improved PN Code Acquisition System for DS/CDMA (DS-CDMA용 개선된 PN 코드 포착 시스템의 ASIC 설계)

  • Jo, Byeong-Rok;Park, Jong-U
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.161-166
    • /
    • 2002
  • The existing method in PN code acquisition process have a problem in PN code acquisition time because PN code searching is accomplished in one epoch. In this paper, we propose algorithm that can reduce PN code acquisition time because PN code searching is accomplished in each other two epoches. The designed ASIC chip using proposed algorithm confirmed that the area (the number of gates) increase more than existing method in PN code acquisition, but the performance of PN code acquisition is better than existing method.

A Source Code Cross-site Scripting Vulnerability Detection Method

  • Mu Chen;Lu Chen;Zhipeng Shao;Zaojian Dai;Nige Li;Xingjie Huang;Qian Dang;Xinjian Zhao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.6
    • /
    • pp.1689-1705
    • /
    • 2023
  • To deal with the potential XSS vulnerabilities in the source code of the power communication network, an XSS vulnerability detection method combining the static analysis method with the dynamic testing method is proposed. The static analysis method aims to analyze the structure and content of the source code. We construct a set of feature expressions to match malignant content and set a "variable conversion" method to analyze the data flow of the code that implements interactive functions. The static analysis method explores the vulnerabilities existing in the source code structure and code content. Dynamic testing aims to simulate network attacks to reflect whether there are vulnerabilities in web pages. We construct many attack vectors and implemented the test in the Selenium tool. Due to the combination of the two analysis methods, XSS vulnerability discovery research could be conducted from two aspects: "white-box testing" and "black-box testing". Tests show that this method can effectively detect XSS vulnerabilities in the source code of the power communication network.

A Transformation from POSIX Based Source Code to OSEK/VDX Source Code Based on API and OIL Translation (API 및 OIL 변환을 이용한 POSIX 기반 코드의 OSEK/VDX 코드로의 변환)

  • Song, Young-Ho;Lee, Tae-Yang;Lee, Jong-Deok;Moon, Chan-Woo;Jeong, Gu-Min;Ahn, Hyun-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.16 no.6
    • /
    • pp.559-565
    • /
    • 2010
  • In this paper, we present a transformation method of source code from a POSIX (Portable Operating System Interface) based source code into an OSEK/VDX (Offene Systeme und deren Schnittstellen fur die Elektronik in Kraftfahrzeugen/Vehicle Distributed eXecutive) source code. As the electronic parts of automobile systems increase, the use of embedded software in automobile systems is also growing. Accordingly, many electronic systems are designed in automobile system with OSEK/VDX. Otherwise, one of the major problems of embedded software would be portability to other OS's. To enhance the portability and interoperability of embedded software, we propose a source code transformation method from POSIX to OSEK/VDX based on API (Application Programming Interface) translation method. Considering the characteristics of the OSEK/VDX which uses OIL (OSEK/VDX Implementation Language) standard, transformation process is performed with source code transformation and OIL code generation. For the validity of the proposed method, the transformation experiment is given using Micro-C OS II and OSEK/VDX with XC167CI micro-controller.