• Title/Summary/Keyword: Code-Grouping

Search Result 40, Processing Time 0.023 seconds

NC Code Post-Processor Considering Metal Removal Rate (절삭부하 예측을 통한 NC코드 후처리시스템)

  • 이기우;노상도;신동목;한형상
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.17 no.5
    • /
    • pp.116-123
    • /
    • 2000
  • This paper presents an NC code post-processor that adjusts feedrates to keep the variation of metal removal rate along the tool paths minimum. Metal removal rate is estimated by virtually machining the part, whose surface model is built from a series of NC codes defined in operation plan, with cutting-tool-assembly models, whose geometry are defined in a machining database. The NC code post-processor modifies the feedrates by the adjustment rules, which are based on the machining knowledge for effective machining. This paper illustrates a procedure fur grouping machining conditions and we also show how to determine an adjustment rule for a machining-condition group. An example part was machined and it shows that the variation of cutting force was dramatically reduced after applying the NC code post-processor. The NC code post-processor is expected to increase productivity while maintaining the quality of the machined part.

  • PDF

Detection of Malicious Code using Association Rule Mining and Naive Bayes classification (연관규칙 마이닝과 나이브베이즈 분류를 이용한 악성코드 탐지)

  • Ju, Yeongji;Kim, Byeongsik;Shin, Juhyun
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1759-1767
    • /
    • 2017
  • Although Open API has been invigorated by advancements in the software industry, diverse types of malicious code have also increased. Thus, many studies have been carried out to discriminate the behaviors of malicious code based on API data, and to determine whether malicious code is included in a specific executable file. Existing methods detect malicious code by analyzing signature data, which requires a long time to detect mutated malicious code and has a high false detection rate. Accordingly, in this paper, we propose a method that analyzes and detects malicious code using association rule mining and an Naive Bayes classification. The proposed method reduces the false detection rate by mining the rules of malicious and normal code APIs in the PE file and grouping patterns using the DHP(Direct Hashing and Pruning) algorithm, and classifies malicious and normal files using the Naive Bayes.

Multirate Multicarrier DS/CDMA with 2-Domain Spreading (2차원 확산을 사용하는 다중전송률 MC-DS/CDMA 시스템)

  • Kim, Nam-Sun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.27-35
    • /
    • 2011
  • Multicarrier-Direct Sequence/Code Division Multiple Access(MC-DS/ CDMA) which is a combination of Orthogonal Frequency Division Multiplexing(OFDM) and DS/CDMA has been of significant interest as a means to take such advantages as bandwidth efficiency, high bit rate and robustness against multipath fading. In this paper we study a reduced-complexity multiuser detection aided multirate MC-DS/CDMA with time(T)-domain and frequency(F)-domain spreading. The one- dimensional orthogonal variable spreading factor(1D OVSF) code extracted from 2D OVSF code are used as a spreading code in T/F-domain. The proposed system will use code grouping interference cancellation(CGIC) receiver to reduce Multiuser Interference(MUI). The CGIC receiver uses code grouping by the correlation properties of 1D OVSF code and dose not requires the code information and activity of other user. The multiuser detector with CGIC receiver will be analyzed in Time- and Frequency-domain separately(jointly). The system performance is analytically derived in Additive White Gaussian Noise(AWGN) channel and we also compare the system performance between proposed system and T/F spreaded single(multi) rate multiuser MC-DS/CDMA system. In the computer simulation results, the proposed receiver of demonstrated huge performance improvement over conventional matched filter receiver.

API Grouping Based Flow Analysis and Frequency Analysis Technique for Android Malware Classification (안드로이드 악성코드 분류를 위한 Flow Analysis 기반의 API 그룹화 및 빈도 분석 기법)

  • Shim, Hyunseok;Park, Jungsoo;Doan, Thien-Phuc;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1235-1242
    • /
    • 2019
  • While several machine learning technique has been implemented for Android malware categorization, there is still difficulty in analyzing due to overfitting problem and including of un-executable code, etc. In this paper, we introduce our implemented tool to address these problems. Tool is consists of approximately 1,500 lines of Java code, and perform Flow analysis on set of APIs, or on control flow graph. Our tool groups all the API by its relationship and only perform analysis on actually executing code. Using our tool, we grouped 39032 APIs into 4972 groups, and 12123 groups with result of including class names. We collected 7,000 APKs from 7 families and evaluated our feature reduction technique, and we also reduced features again with selecting APIs that have frequency more than 20%. We finally reduced features to 263-numbers of feature for our collected APKs.

A method for automatic EPC code conversion based on ontology methodology (온톨로지 기반 EPC 코드 자동 변환 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.452-460
    • /
    • 2008
  • ALE-complient RFID middleware system receives EPC code data from reader devices and converts the data into URN format data internally. After filtering and grouping, the system sends the resulting URN code to application and(or) users. Meanwhile, not only the types of EPC code are very diverse, but also another new kinds of EPC code can be emerged in the future. Therefore, a method to process all kinds of EPC code effectively is required by RFID middleware. In this paper, a method to process various kinds of EPC code acquired from RFID reader devices in ALE-complient RFID middleware is proposed. Especially, we propose an approach using ontology technology to process not only existing EPC code but also newly defined code in the future. That is, we build an ontology of conversion rules for each EPC data type to effectively convert EPC data into URL format data. In this case, we can easily extend RFID middleware to process a new EPC code data by adding a conversion rule ontology for the code.

Performance Analysis of Dualrate Multi-code/ Multi-carrier CDMA System with Interference Canceller (간섭제거기를 갖는 이중전송률 MC/MC-CDMA 시스템의 성능분석)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.830-837
    • /
    • 2009
  • In this thesis, Multi-code/Multi-carrier CDMA(MC/MC CDMA) system which is combination of Multi-code CDMA and Multi-carrier CDMA is analyzed. This system is suitable fur multi-rate services that use multi-codes and high data rate transmission that employ multi-carriers. In addition, the MC/MC CDMA system is robust against frequency selective fading, is good for narrowband interference rejection, and has higher spectral efficiency. In this paper, The users are assigned OVSF codes as a spreading code according to their data rates and divides the active users having different representative code split into a number of groups for effective cancellation. At the receiver, The code grouping interference canceller performs cancellation between the groups. The proposed receiver does not require any information about interference users, such as code, data and amplitude, and has relatively low complexity. The results show the large improvement in performance that can be attained by cancellation scheme.

Secrecy Performance Analysis of One-Bit Feedback-Based OSTBC in Cross-Polarized MIMO Channels (교차 편파를 이용한 MIMO 채널에서 1-비트 피드백 기반 OSTBC의 물리계층 보안 성능 분석)

  • Lee, Sangjun;Lee, In-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.301-307
    • /
    • 2015
  • In this paper, we consider wiretap channels in the presence of an eavesdropper assuming spatially correlated MIMO(multiple-input multiple-output) channels, where we analyze a physical layer security performance of orthogonal space-time block code(OSTBC) using one-bit feedback assuming cross polarized antennas at each node. In this paper, we present a method to select a transmit-antenna group for OSTBC using one-bit feedback(O-OSTBC) and compare secrecy outage probabilities of various transmit-antenna grouping methods. Especially, we propose an efficient transmit-antenna grouping method by comparing secrecy outage probabilities of O-OSTBC and conventional OSTBC in highly correlated MIMO channels.

The Study on Hybrid Interference Cancellation Methods for Multirate MC DS/CDMA System (다중전송률 MC DS/CDMA 시스템의 복합간섭제거기법에 대한 연구)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.7
    • /
    • pp.2623-2631
    • /
    • 2010
  • In this paper, we propose a new interference cancellation(IC) receiver for multirate Multicarrier DS/CDMA(MC DS/CDMA) system based on orthogonal variable spreading factor(OVSF) code. The users are assigned different lengths of OVSF codes as a spreading code according to their data rates and the active users having same representative code split into a group for effective cancellation. The code grouping interference cancellation(IC) receiver performs cancellation between the groups first and cancellation within group. This proposed IC receiver can cancel the interferences using desired user's code information and then desired signals are detected. The results show that the large improvement in performance can be attained by group-wise IC scheme and we can make the effective systems compare to conventional ones. The bit error rate of the system is analytically derived in frequency selective Rayleigh fading channel and we also compare the system performance with that of multirate DS/CDMA system. We also analyze the performance of the proposed system with same bandwidth and processing gain. The results show the large improvement in performance that can be attained by cancellation scheme.

Complexity Reduction of Block-Layered QOSTC with Less Transmission Time (복잡도 감소와 전송시간이 덜 소요되는 블록 층의 준 직교 시공간코드 설계)

  • Abu Hanif, Mohammad;Lee, Moon-Ho;Hai, Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.7
    • /
    • pp.48-55
    • /
    • 2012
  • Because of increasing complexity in maximum-likelihood (ML) decoding of four of higher antenna scenario, Partial Interference Cancellation (PIC) group decoding could be the perfect solution to reduce the decoding complexity occurs in ML decoding. In this paper, we separate the symbols the users in the layered basis and find the equivalent channel matrix. Based on the equivalent channel matrix we provide the grouping scheme. In our paper, we construct a block wise transmission technique which will achieve the desired code rate and reduce the complexity and provide less transmission time. Finally we show the different grouping performance.

Binary Image Watermarking Based on Grouping Feature Regions (특수런을 이용한 특징영역 분리에 의한 이진영상 워터마킹)

  • 이정환;박세현;노석호
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.177-180
    • /
    • 2002
  • In this paper, an effective digital watermarking method for copyright protection of binary image data is proposed. First, a binary image is grouped into feature regions which have geometrical features and general one. The watermark for authentication is embedded in general regions in order to preserve geometrical features regions. We have used run-length code and special runs for grouping feature regions and general one. For invisibility of watermark, we have embedded the watermark considering transition sensitivity of each pixel in general regions. The proposed method is applied to some binary image such as character, signature, seal, and fingerprint image to evaluate performance. By the experimental results, the proposed method preserve feature regions of original image and have higher invisibility of watermarks.

  • PDF