• Title/Summary/Keyword: Code selection

Search Result 264, Processing Time 0.032 seconds

DC-Suppression Selection Criteria of Multimode Modulation Code for Optical Recording (광 기록 시스템을 위한 멀티모드 변조 코드의 DC-억압 코드 선택 방법)

  • Lee, Myoung-Jin;Lee, Jun;Lee, Jae-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.3C
    • /
    • pp.209-214
    • /
    • 2003
  • Multi-mode coding method is a reliable DC-suppression method. There are two ways to improve the DC-suppression performance. One is improving scrambler's performance, and the other is improving selection criteria. The latter uses the MRDS(minimum running digital sum) criterion. It is easy to calculate, but its performance goes down when the length of codeword is getting longer. The MSW(mean squared weight) criterion that is known as the best so far regardless of the length of codeword has the high complexity. In this paper, we present the new selection criteria, MPRDS(minimum peak RDS) and A BSRDS(absolute RDS). Their performance are close to the MSW, implementation is simple. And also we present the SC(sign change) that has a subsidiary role with the original selection criteria and improve the capacity.

A Study on the Location of Pan for n Optimal Flow in Water Pool (최적유동을 위한 수조 내 팬의 위치에 관한 연구)

  • 박성수;도영민;유재환
    • Journal of the Korean Society of Safety
    • /
    • v.17 no.3
    • /
    • pp.50-55
    • /
    • 2002
  • In this numerical study, characteristics of swirl generation by the fan and selection of the location of the fan was studied theoretically by the modified TEACH code. The governing equations for the system are solved by means of the k dimensional version of the SIMPLE method and STAGGERED grid. From the present results, the optimal position of the fm is 0.625(h/H).

Study on the Inspection of Repairing Materials and Methods for Concrete Structures (콘크리트 보수 재료 효과 분석 및 공법기준관련 연구)

  • Kim, Do-Gyum;Oh, Kwang-Chin;Ahn, Sang-Ku;Park, Jung-Jun
    • Proceedings of the Korea Concrete Institute Conference
    • /
    • 2006.05b
    • /
    • pp.317-320
    • /
    • 2006
  • In this paper, in order to inspect effect of marketed repair materials, it inspected first the repair material through laboratory work by repair method. After we carry out laboratory work and choice the construction with ongoing deterioration to inspect performance of repair materials, we apply the repair materials there. This results will be make use of reference whenever selection of repair materials and repair method. Also which will be used basic data for repair construction code.

  • PDF

Study on the Precision Cold Forging for Steering Yoke of Automobiles (자동차 Steering Yoke의 정밀냉간단조에 대한 연구)

  • 민동균
    • Proceedings of the Korean Society for Technology of Plasticity Conference
    • /
    • 1999.03b
    • /
    • pp.120-123
    • /
    • 1999
  • The precision cold forging process for steering yoke of automobile has been analysed by using rigid-plastic finite element analysis code DEFORM-3D Also the experiment has been performed through the optimized process. Until now steering yoke has been largely manufactured by hot forging or welding of forged head and shaft parts because of technical difficulty. the study has shown successful results of the precision cold forging through the proper selection of the process.

  • PDF

Development of evaluation criteria for selection of source code security vulnerability verification rules for industrial control systems (산업제어시스템의 소스코드 보안 취약점 검증 룰 선정을 위한 평가 기준 개발)

  • Kim, Eunbi;Choi, Yisoo;Han, Dongjoon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.449-452
    • /
    • 2021
  • 산업제어시스템은 IT 기술의 발전에 따라 다양한 기기 환경과 네트워크를 적용해 진화하고 있다. 이러한 상황에서 사이버 보안의 위협은 가중되고 있으며, 이를 예방하는 방법의 하나로 산업제어시스템에 탑재되는 소프트웨어의 소스코드 개발 과정에서 보안 취약점을 예방하기 위해 소스코드 보안 룰을 적용하여 위반사항을 제거한다. 본 연구에서는 소스코드 보안 룰에서 적용 우선순위를 선정하기 위한 가이드를 개발한다.

Suggestion of Selecting features and learning models for Android-based App Malware Detection (안드로이드 기반 앱 악성코드 탐지를 위한 Feature 선정 및 학습모델 제안)

  • Bae, Se-jin;Rhee, Jung-soo;Baik, Nam-kyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.377-380
    • /
    • 2022
  • An application called an app can be downloaded and used on mobile devices. Among them, Android-based apps have the disadvantage of being implemented on an open source basis and can be exploited by anyone, but unlike iOS, which discloses only a small part of the source code, Android is implemented as an open source, so it can analyze the code. However, since anyone can participate in changing the source code of open source-based Android apps, the number of malicious codes increases and types are bound to vary. Malicious codes that increase exponentially in a short period of time are difficult for humans to detect one by one, so it is efficient to use a technique to detect malicious codes using AI. Most of the existing malicious app detection methods are to extract Features and detect malicious apps. Therefore, three ways to select the optimal feature to be used for learning after feature extraction are proposed. Finally, in the step of modeling with optimal features, ensemble techniques are used in addition to a single model. Ensemble techniques have already shown results beyond the performance of a single model, as has been shown in several studies. Therefore, this paper presents a plan to select the optimal feature and implement a learning model for Android app-based malicious code detection.

  • PDF

Criticality benchmarking of ENDF/B-VIII.0 and JEFF-3.3 neutron data libraries with RMC code

  • Zheng, Lei;Huang, Shanfang;Wang, Kan
    • Nuclear Engineering and Technology
    • /
    • v.52 no.9
    • /
    • pp.1917-1925
    • /
    • 2020
  • New versions of ENDF/B and JEFF data libraries have been released during the past two years with significant updates in the neutron reaction sublibrary and the thermal neutron scattering sublibrary. In order to get a more comprehensive impression of the criticality quality of these two latest neutron data libraries, and to provide reference for the selection of the evaluated nuclear data libraries for the science and engineering applications of the Reactor Monte Carlo code RMC, the criticality benchmarking of the two latest neutron data libraries has been performed. RMC was employed as the computational tools, whose processing capability for the continuous representation ENDF/B-VIII.0 thermal neutron scattering laws was developed. The RMC criticality validation suite consisting of 116 benchmarks was established for the benchmarking work. The latest ACE format data libraries of the neutron reaction and the thermal neutron scattering laws for ENDF/B-VIII.0, ENDF/B-VII.1, and JEFF-3.3 were downloaded from the corresponding official sites. The ENDF/B-VII.0 data library was also employed to provide code-to-code validation for RMC. All the calculations for the four different data libraries were performed by using a parallel version of RMC, and all the calculated standard deviations are lower than 30pcm. Comprehensive analyses including the C/E values with uncertainties, the δk/σ values, and the metrics of χ2 and < |Δ| >, were conducted and presented. The calculated keff eigenvalues based on the four data libraries generally agree well with the benchmark evaluations for most cases. Among the 116 criticality benchmarks, the numbers of the calculated keff eigenvalues which agree with the benchmark evaluations within 3σ interval (with a confidence level of 99.6%) are 107, 109, 112, and 113 for ENDF/B-VII.0, ENDF/B-VII.1, ENDF/B-VIII.0 and JEFF-3.3, respectively. The present results indicate that the ENDF/B-VIII.0 neutron data library has a better performance on average.

The Development of Performance Analysis Code for Conceptual Design of Jet Fighters (전투기의 개념설계를 위한 성능해석 프로그램 개발)

  • Kim, Taewoo;Choi, Hyunmin;Choi, Byungryul;Lee, Sungjin;Nam, Hwajin;Choi, Donghoon;Cho, Jinsoo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.41 no.5
    • /
    • pp.404-414
    • /
    • 2013
  • In the conceptual design phase of jet fighters, the trade study is performed repeatedly for a selection of the baseline configuration. The automation of repeated trade study makes possible to select efficiently the baseline configuration. In this study, the performance analysis code was developed for the automation of trade study. The code was consists of the module of shape generation, the module of weight estimation, the module of mission performance analysis. 3D CAD Model can be generated by the module of shape generation and Weight can be estimated by using the empirical equation in the module of weight estimation. The module of mission performance analysis was able to calculate the mission performance about the arbitrary mission profile. In addition, the optimal mission performance can be calculated by using optimization method. By performing the validation, the code was confirmed to be able to apply to the conceptual design phase.

Antenna Selection and Shuffling for DSTTD Systems with Correlated Transmit-Antenna (송신 안테나 사이에 상관관계가 있는 DSTTD 시스템에서 안테나 선택과 뒤섞는 기법)

  • Joung, Jin-Gon;Jeong, Eui-Rim;Lee, Yong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.8C
    • /
    • pp.767-774
    • /
    • 2007
  • A new transmit antenna selection and shuffling($AS^2$) method for spatially correlated double space time transmit diversity(DSTTD) systems is proposed. The proposed method allows dumb antennas and the superposition of multiple signals at the same transmit antenna, whereas the conventional methods consider the antenna shuffling(AS) only. According to the simulation result, the proposed method provides a 1.8 dB signal-to-noise ratio(SNR) gain over the conventional methods for spatially correlated transmit antennas. Although the number of candidates for $AS^2$ is much higher than that of AS, it is found that the number of candidates for $AS^2$ can be reduced to 36 by using the characteristics and properties of preprocessing matrices, and among them, only 6 candidates are almost always chosen. Next, we empirically compare the bit-error-rate (BER) performance of the proposed method with the conventional spatial multiplexing(SM) technique with antenna selection. Simulation results show that the proposed method outperforms the SM technique.