• Title/Summary/Keyword: Data Code

Search Result 4,173, Processing Time 0.038 seconds

Rapid Data Allocation Technique for Multiple Memory Bank Architectures (다중 메모리 뱅크 구조를 위한 고속의 자료 할당 기법)

  • 조정훈;백윤홍;최준식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.196-198
    • /
    • 2003
  • Virtually every digital signal processors(DSPs) support on-chip multi- memory banks that allow the processor to access multiple words of data from memory in a single instruction cycle. Also, all existing fixed-point DSPs have irregular architecture of heterogeneous register which contains multiple register files that are distributed and dedicated to different sets of instructions. Although there have been several studies conducted to efficiently assign data to multi-memory banks, most of them assumed processors with relatively simple, homogeneous general-purpose resisters. Therefore, several vendor-provided compilers fer DSPs were unable to efficiently assign data to multiple data memory banks. thereby often failing to generate highly optimized code fer their machines. This paper presents an algorithm that helps the compiler to efficiently assign data to multi- memory banks. Our algorithm differs from previous work in that it assigns variables to memory banks in separate, decoupled code generation phases, instead of a single, tightly-coupled phase. The experimental results have revealed that our decoupled algorithm greatly simplifies our code generation process; thus our compiler runs extremely fast, yet generates target code that is comparable In quality to the code generated by a coupled approach

  • PDF

Design and Implementation of Circular Dot Pattern Code (CDPC) and Its Recognition Algorithm which is robust to Geometric Distortion and Noise (대화형 인쇄물 구현을 위한 기하변형과 잡음에 강인한 원형 점 패턴코드의 설계와 인식 알고리즘 구현)

  • Shim, Jae-Youn;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1166-1169
    • /
    • 2011
  • In this paper, we design a Circle dot Code, In our scheme, we design a dot patterns for increasing maximum capacity and also for increasing robustness to Affine Transformation. Our code Can be extended according number of data circle. We use three data circle vision code. In this type code, after acquiring camera images for the Circle dot Codes, and perform error correction decoding using four position symbols and six CRC symbols. We perform graph based dot code analysis which determines the topological distance between dot pixels. Our code can be bridged the real world and ubiquitous computing environment.

Ternary Bose - Chaudhuri - Hocquenghem (BCH) with t = 2 code for steganography (3진 BCH (Bose - Chaudhuri - Hocquenghem) 코드를 이용하는 스테가노그라피 기법)

  • Sachnev, Vasily;Choi, Yong Soo
    • Journal of Digital Contents Society
    • /
    • v.17 no.6
    • /
    • pp.461-469
    • /
    • 2016
  • A novel steganography based on ternary BCH code with t = 2 is presented in this paper. Proposed method utilizes powerful BCH code with t = 2 for data hiding to the DCT coefficients from JPEG images. The presented data hiding technique uses a proposed look up table approach for searching multiple solutions for ternary BCH code with t = 2. The proposed look up table approach enables fast and efficient search for locations of DCT coefficients, which are necessary to modify for hiding data. Presented data hiding technique is the first steganography technique based on ternary BCH code. Experimental results clearly indicate advantages of using ternary BCH compared to binary BCH.

4-Level 4/6 Modulation Code with Trellis Encoding on Holographic Data Storage (홀로그래픽 데이터 저장장치에서 트렐리스 인코딩을 이용한 4-레벨 4/6 변조부호)

  • Jeong, Seongkwon;Lee, Jaejin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.11-16
    • /
    • 2017
  • Multi-level holographic data storage requires modulation codes for avoiding two dimensional inter-symbol interference (2D-ISI). Modulation codes can remove the fatal ISI pattern of neighboring the largest and the smallest symbols. In this paper, we propose a 4-level 4/6 modulation code and its trellis encoding for error correction. The proposed 4/6 modulation code prevents that the symbol 0 and 3 are not adjacent in any direction. Also, we compare the proposed modulation code with the same code rate modulation codes for four-level holographic data storage.

INTRODUCING tlc_s05: A CODE TO FIT CEPHEID JHK BAND LIGHT CURVES USING A TEMPLATE APPROACH

  • NGEOW, CHOW-CHOONG;KANBUR, SHASHI M.
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.225-227
    • /
    • 2015
  • We introduce a code called tlc_s05, to fit sparsely sampled JHK band Cepheid light curve data with template light curves to derive the mean magnitude. A brief description of the code is provided here. We tested the performance of the code in deriving the mean JHK band magnitudes using simulations, and we found that it is better to observe more than four evenly spaced data points per light curve, which permits tlc_s05 to derive accurate mean magnitudes for Cepheid JHK band light curves.

Visualization Techniques for Massive Source Code (대용량 소스코드 시각화기법 연구)

  • Seo, Dong-Su
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.4
    • /
    • pp.63-70
    • /
    • 2015
  • Program source code is a set of complex syntactic information which are expressed in text forms, and contains complex logical structures. Structural and logical complexity inside source code become barriers in applying visualization techniques shown in traditional big-data approaches when the volume of source code become over ten-thousand lines of code. This paper suggests a procedure for making visualization of structural characteristics in source code. For this purpose, this paper defines internal data structures as well as inter-procedural relationships among functions. The paper also suggests a means of outlining the structural characteristics of source code by visualizing the source codes with network forms The result of the research work can be used as a means of controling and understanding the massive volume of source code.

Design of sub-code Multi-Code Hybrid DS/FH-SS System for the Efficient Data Transmission (효율적인 데이터 전송을 위한 sub-code 멀티코드 하이브리드 DS/FH-SS 시스템 설계)

  • Kong Hyung-Yun
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.223-228
    • /
    • 2005
  • The existing mobile communication system called DS/CDMA system, which is serviced widely nowadays, has some problems such as the severe ISI and multiple access interferences under the multi-path fading channel when applied to high-speed data transmission like multimedia transmission. To compensate these problems, we propose a sub-code multi-code hybrid DS/FH (Frequency Hopping) SS (Spread Spectrum) System by combining the multi-code system that restrains the multiple access interference with the hybrid DS/FH SS technique that reduces ISI(Intersymbol Interference) effect for high-speed transmission. Moreover, we implement and propose the sub-code technique to remedy the problems of the generic multi-code system. To verify the performance of the proposed system, the computer simulations are executed under the various channel environments.

Efficient method of Searching PI Code on RDS System (RDS System 에서의 효율적인 PI code 검출 기법에 관한 연구)

  • Cho, Chung-bum;Kim, Yound-cil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.112-115
    • /
    • 2009
  • PI code searching method of RDS(Radio Data System) are unique method of maintain desired channel on moving machine like vehicle. Efficient and fast PI code search method are researching on the all of RDS related systems for both find more better channel before Original channel signal go to bad and find desired good signal quickly when get out of Weak signal Area. But Embedded system has limited environment like memory size, so It is very difficult to apply many well known PI code searching method. This thesis suggests simple and effective method of searching PI code, considering a Embedded System Environment.

  • PDF

Design of a C-based Independent Motion Controller using CAD&CAM (CAD&CAM을 활용한 C기반 독립형 모션 제어기 설계)

  • Kim, Sam-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.105-110
    • /
    • 2016
  • Recently, as to changes in the paradigm of domestic manufacturing CNC industry, the application of advanced technologies in machine tools are actively being pursued. IT in responsible for controlling it is the most important part in the field of CNC. The biggest lack of the necessary expertise in the field of motion control in CNC is coding G-Code in setting adjust coordinate directly and convert it through expensive foreign s/w rather than using windows language in PC based controller. In this paper, We implemented G-Code convert program that is change various type of CAD data to G-Code data and CAD/CAM application program and developed exclusive motion controller which is to run a robot directly using changed data.

Development of the Program(FDS2EXODUS) for Generating Hazard condition file of Building-EXODUS code based on the FDS Fire-simulation Data (화재모사전용 FDS code의 계산값을 이용하여 피난해석 BuildingEXODUS code의 피난의 환경조건 파일을 생성하는 프로그램(FDS2EXODUS) 개발)

  • Kim, H.B.;Jang, Y.J.;Jung, W.S.;Park, W.H.;Lee, D.H.
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2009.04a
    • /
    • pp.570-575
    • /
    • 2009
  • In this paper shows the development of the Program(FDS2EXODUS) for Generating Hazard condition file of BuildingEXODUS code based on the FDS Fire-simulation Data. The program were applied with numerical method to translate from FDS to BuildingEXODUS. Using both single or multi block meshes of FDS get to be possible. For application of fire effect, the fire data were loaded directly to BuildingEXODUS in the case of FDS code with using this Program(FDS2EXODUS). It was very convenient to input to BuildingEXODUS and could be reduced the procedure of egress simulation from fire disaster.

  • PDF