• Title/Summary/Keyword: Code size

Search Result 1,080, Processing Time 0.029 seconds

Design of MSB-First Digit-Serial Multiplier for Finite Fields GF(2″) (유한 필드 $GF(2^m)$상에서의 MSB 우선 디지트 시리얼 곱셈기 설계)

  • 김창훈;한상덕;홍춘표
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6C
    • /
    • pp.625-631
    • /
    • 2002
  • This paper presents a MSB-first digit-serial systolic array for computing modular multiplication of A(x)B(x) mod G(x) in finite fields $GF(2^m)$. From the MSB-first multiplication algorithm in $GF(2^m)$, we obtain a new data dependence graph and design an efficient digit-serial systolic multiplier. For circuit synthesis, we obtain VHDL code for multiplier, If input data come in continuously, the implemented multiplier can produce multiplication results at a rate of one every [m/L] clock cycles, where L is the selected digit size. The analysis results show that the proposed architecture leads to a reduction of computational delay time and it has much more simple structure than existing digit-serial systolic multiplier. Furthermore, since the propose architecture has the features of unidirectional data flow and regularity, it shows good extension characteristics with respect to m and L.

Efficient Blind Estimation of Block Interleaver Parameters (효율적인 블록 인터리버 파라미터 블라인드 추정 기법)

  • Jeong, Jin-Woo;Choi, Sung-Hwan;Yoon, Dong-Weon;Park, Cheol-Sun;Yoon, Sang-Bom
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5C
    • /
    • pp.384-392
    • /
    • 2012
  • Recently, much research on blind estimation of the interleaver parameters has been performed by using Gauss-Jordan elimination to find the linearity of the block channel code. When using Gauss-Jordan elimination, the input data to be calculated needs to run as long as the square multiple of the number of the interleaver period. Thus, it has a limit in estimating the interleaver parameters with insufficient input data. In this paper, we introduce and analyze an estimation algorithm which can estimate interleaver parameters by using only 15 percent of the input data length required in the above algorithm. The shorter length of input data to be calculated makes it possible to estimate the interleaver parameters even when limited data is received. In addition, a 80 percent reduction in the number of the interleaver period candidates increases the efficiency of analysis. It is also feasible to estimate both the type and size of the interleaver and the type of channel coding.

A Study on The Safety Management of City Gas Pipelines Attached on the Bridges (교량에 설치된 도시가스배관의 안전관리에 관한 연구)

  • Yun, Young-Man;Son, Sang-Geun;Choi, Do-Kyun;Lee, Su-Kyung
    • Journal of the Korean Institute of Gas
    • /
    • v.22 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • In this study, 398 city gas pipe systems installed on the bridges were surveyed and analyzed classified characteristics about the ages, length, and remote isolation devices installed or not. As a result of analysis, 43.0% pipes have been used more than 20 years and 89.4% do not have remote cut-off devices, so this study suggest safety management ways for the issues. Chosen 76 pipes were researched stress strain characteristics by CAESAR-II which is a specialized program for stress analysis. And, when a loop is installed on the bridge pipe, effect on code stress by the location and size of the loop was performed. This study can help to improve safety level by revising criteria of new installation, inspection and diagnostic.

Analyses of Hardware Architecture for High-speed VPN System (VPN 시스템 고속화를 위한 하드웨어 구조 분석)

  • 김정태;허창우;한종욱
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1471-1477
    • /
    • 2003
  • In order to realize the Gbps VPN system, however, newer and more advanced technologies are required to enable wire-rate processing across a wide range of functions and layers. While it is generally accepted that a software soluTion on general-purpose processors cannot scale to process these functionsa wire rate, the KEY POINT is that a software solution on general-purpose processors is the most practical way by which these security allocationscan be developed. Many of these security functions require application layer processing on the content of the packets, and the very nature of application layer software development is characterized by relatively large code size with a high need for portability an flexibility. We have analysed the consideration and specification for realizing Gbps VPN system. from this work. we can obtain a technology of originality.

Design and Implementation of Version Control System for Meta Information Management of Source Codes (원시코드의 메타 정보 관리를 위한 버전 제어 시스템의 설계와 구현)

  • Oh, Sang-Yeob;Chang, Duk-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.633-648
    • /
    • 1998
  • Rapid computing environment, change of the application structure, and various user demand will increase the demand of the software development. Version control is helpful to improve productivity using delta, and useful to establish component from existing data of source code. This paper presents the design and implementation of the version control system. which is composed of retrieval system and delta management system. In retrieval system, vanous retrieve methods arc proposed. This methods provides the process methodology with filename, content, size and date. Various retrieve methods arc important for the effective delta management. Meta data can be easily composed for the delta management by these methods. Compared with other systems, this implemented version control system has some advantage. First, for delta management, version maintenance for delta management becomes easier by integrating the forward and back-ward methods. Second, delta managent part of a project is to unite the forward and backward method. the effieiency of this system is to increased in management. Also, this system supports a thechnique of using the database and files for project repository and makes the version management more effective.

  • PDF

A study on the fading compensation scheme for wireless ATM systems (무선 ATM 시스템을 위한 페이딩 보상기법에 관한 연구)

  • Chung, Boo-Young;Kang, Young-Heung;Cho, Sung-Jun;Lee, Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.12
    • /
    • pp.2727-2735
    • /
    • 1997
  • This paper describes a new fading compensation scheme for Wireless ATM(WATM) sytem using pilot symbols. We have carried out a simulation for bit error rate(BER) and cell loss probability(CLP) to analyze the performance of a new scheme. As the resutls, BER performance we improved by means of HEC only above 3 dB of $E_{b}/N_{0}$ in AWGN, but not at all in fading environment. However, by using a new fading compenstion scheme with HEC, BER performance degraded below to 1 dB of $E_{b}/N_{0}$ in AWGN, but BER and CLP performances in WATM system were improved remarkably, and meeted at CLP performance criterion for K=10 dB rician fading. Also, code rate will be high and harware size of codec will be small by using this new scheme with HEC OR FEC.

  • PDF

Using Image Visualization Based Malware Detection Techniques for Customer Churn Prediction in Online Games (악성코드의 이미지 시각화 탐지 기법을 적용한 온라인 게임상에서의 이탈 유저 탐지 모델)

  • Yim, Ha-bin;Kim, Huy-kang;Kim, Seung-joo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1431-1439
    • /
    • 2017
  • In the security field, log analysis is important to detect malware or abnormal behavior. Recently, image visualization techniques for malware dectection becomes to a major part of security. These techniques can also be used in online games. Users can leave a game when they felt bad experience from game bot, automatic hunting programs, malicious code, etc. This churning can damage online game's profit and longevity of service if game operators cannot detect this kind of events in time. In this paper, we propose a new technique of PNG image conversion based churn prediction to improve the efficiency of data analysis for the first. By using this log compression technique, we can reduce the size of log files by 52,849 times smaller and increase the analysis speed without features analysis. Second, we apply data mining technique to predict user's churn with a real dataset from Blade & Soul developed by NCSoft. As a result, we can identify potential churners with a high accuracy of 97%.

A Study on Adaptive Interference Canceller of Wireless Repeater for Wideband Code Division Multiple Access System (WCDMA시스템 무선 중계기의 적응간섭제거기에 관한 연구)

  • Han, Yong-Sik;Yang, Woon-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.7
    • /
    • pp.1321-1327
    • /
    • 2009
  • In this paper, as the mobile communication service is widely used and the demand for wireless repeaters is rapidly increasing because of the easiness of extending service areas. But a wireless repeater has a problem the oscillation due to feedback signal. We proposed a new hybrid interference canceller using the adaptive filter with CMA(Constant Modulus Algorithm)-Grouped LMS(Least Mean Square) algorithm in the adaptive interference canceller. The proposed interference canceller has better channel adaptive performance and a lower MSE(Mean Square Error) than conventional structure because it uses the cancellation method of Grouped LMS algorithm. The proposed detector uses the LMS algorithms with two different step size to reduce mean square error and to obtain fast convergence. This structure reduces the number of iterations for the same MSE performance and hardware complexity compared to conventional nonlinear interference canceller.

Design and Implementaion of IPv4/IPv6 Translation Protocol (IPv4/IPv6 변환 프로토콜의 설계 및 구현)

  • Park, Seok-Cheon;Lee, Gwang-Bae
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.783-792
    • /
    • 2001
  • It is well known that, in the near future, the lifetime of the IPv4 address space will be limited and available 32-bit IP network addresses will not be left any more. In order to solve such IPv4 address space problem in an effective way, the transition to the new version using IPv6 architecture is inevitably required. At present, it is impossible to convert IPv4 into IPv6 at a time, since the coverage and the size of today's Internet is too huge. Therefore, the coexistence of both IPv4 and IPv6 must be arranged in a special and practical fashion for rapid conversion on the whole. IP protocol translation has been proposed to ease the translation of the Internet from IPv4 to IPv6. This paper presents the design and implementation of a transparent transition service that translates packet header as they cross between IPv4 and IPv6 networks. IPv4/IPv6 Translation Protocol is written in c source code and is tested by the local test recommended by ISO, which has the most excellent error detection function. The test was processed with a test scenario and it was found that the results were successful.

  • PDF

Dependence of Explosion Overpressure of Flammable Gas on the Change of Volume Blockage Ratio of Facilities (설비 혼잡도에 따른 가연성 증기운의 폭발과압의 변화)

  • Lee, Seung Kuk;Lee, Da Eun;Kim, Sung Chan;Yoon, Kee Bong
    • Journal of the Korean Institute of Gas
    • /
    • v.19 no.6
    • /
    • pp.54-61
    • /
    • 2015
  • A series of CFD calculation has been conducted to investigate the effect of facility confinement on explosion power for process plant facility. The level of confinement of a facility was simplified with VBR(volume blockage ratio) and averaged size of obstacles. FLACS which is 3D CFD code of gas dispersion and the explosion was used for simulating the explosion phenomena in the idealized domain with different confinement level. The CFD results showed a tendency that the overpressure increases with increasing VBR and number of obstacles. The effect of VBR on the overpressure was relatively small for the case of number of obstacle less than 25. The results of this study can be used to provide a safety guideline considering the facility confinement in case of leakage accident of flammable gas and vapor in process plants.