• Title/Summary/Keyword: Information code

Search Result 6,012, Processing Time 0.032 seconds

Optimal Heterogeneous Distributed Storage Regenerating Code at Minimum Remote-Repair Bandwidth Regenerating Point

  • Xu, Jian;Cao, Yewen;Wang, Deqiang;Wu, Changlei;Yang, Guang
    • ETRI Journal
    • /
    • v.38 no.3
    • /
    • pp.529-539
    • /
    • 2016
  • Recently, a product-matrix (PM) framework was proposed to construct optimal regenerating codes for homogeneous distributed storage systems (DSSs). In this paper, we propose an extended PM (EPM) framework for coding of heterogeneous DSSs having different repair bandwidths but identical storage capacities. Based on the EPM framework, an explicit construction of minimum remote-repair bandwidth regenerating (MRBR) codes is presented for a specific heterogeneous DSS, where two geographically different datacenters with associated storage nodes are deployed. The data reconstruction and regeneration properties of the MRBR code are proved strictly. For the purpose of demonstration, an example implementation of MRBR code is provided. The presented MRBR code is the first optimal strict-regenerating code for heterogeneous DSSs. In addition, our proposed EPM framework can be applied to homogeneous systems also.

Development of Code-Domain Power module for CDMA signal (CDMA 신호의 Code Domain Power 모듈 개발)

  • Lee, Young Kyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.1
    • /
    • pp.17-24
    • /
    • 2008
  • This paper describes the measurements that provide a characterization of the code-domain channels of a CDMA base station transmitter. One of the measurements, called code-domain power(CDP), provides the distribution of power in the code domain channels. This measurement can be used to verify that the various channels are at expected power levels and to determine when one code channel is leaking energy into the other code channels. We develop module of CDP measurement in the CDMA system.

An Implementation of Time Code Generator for Sending Real Time Information (실 시각정보 전송을 위한 시각코드발생기 제작)

  • Kim, Young-Beom;Park, Young-Tae;Lee, Young-Kyu
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.6 no.3
    • /
    • pp.9-13
    • /
    • 2007
  • In this paper, we propose a system that can be used to provide the national standard time for the general public with ease by using the self-implemented independent time-code generator for transmitting standard time information through both the wired and the wireless networks. The newly proposed time code is different from conventional methods in the point that it has a structural advantage of having an ability of obtaining reliable data by repeatedly transmitting the same information. We observe that it is sufficiently possible to transmit the time information with a microsecond level because measurement result shows that the system uncertainty is about few nanosecond of time-error fluctuation through the self characteristic measurement of total system including the time-code generator and decoder system receiving time-information.

  • PDF

On the Existence of the (2,1) Mother Code of (n,n-1) Convolutional Code ((n,n-1) 길쌈부호에 대한 (2,1) 마더부호의 존재)

  • Jang, Hwan-Seok;Chung, Ha-Bong;Seong, Jin-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.4
    • /
    • pp.165-171
    • /
    • 2014
  • The rate of the channel code can be controlled by various methods. Puncturing is one of the methods of increasing the code rate, and the original code before puncturing is called the mother code. Any (n,k) convolutional code is obtainable by puncturing some mother codes, and the process of finding the mother code is necessary for designing the optimum channel decoder. In this paper, we proved that any (n,n-1) convolutional code has (2,1) mother codes regardless of the puncturing pattern and showed that they must be equivalent.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.

Design of Low-Density Parity-Check Codes for Multiple-Input Multiple-Output Systems (Multiple-Input Multiple-output system을 위한 Low-Density Parity-Check codes 설계)

  • Shin, Jeong-Hwan;Chae, Hyun-Do;Han, In-Duk;Heo, Jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7C
    • /
    • pp.587-593
    • /
    • 2010
  • In this paper we design an irregular low-density parity-check (LDPC) code for multiple-input multiple-output (MIMO) system, using a simple extrinsic information transfer (EXIT) chart method. The MIMO systems considered are optimal maximum a posteriori probability (MAP) detector. The MIMO detector and the LDPC decoder exchange soft information and form a turbo iterative receiver. The EXIT charts are used to obtain the edge degree distribution of the irregular LDPC code which is optimized for the MIMO detector. It is shown that the performance of the designed LDPC code is better than that of conventional LDPC code which was optimized for either the Additive White Gaussian Noise (AWGN) channel or the MIMO channel.

Two-Dimensional Symmetric Balance Incomplete Block Design Codes for Small Input Power (작은 입력신호를 위한 Two-Dimensional Symmetric Balance Incomplete Block Design Code)

  • Jhee, Yoon Kyoo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.121-127
    • /
    • 2013
  • When input power is small, nonideal symmetric balance incomplete block design(BIBD) code design is effective in the spectral-amplitude-code(SAC) optical code-division multiple-access (OCDMA) system. But the number of simultaneous users is not sufficient. To overcome this property, we propose 2-D BIBD codes, where nonideal BIBD codes are used as spectral code and ideal BIBD codes are used as spatial codes. Analytical results show that the number of simultaneous users increases significantly.

Improvement of code acquisition time in DS/SS systems using a hybrid scheme (복합방식을 이용한 직접대역확산통신시스템의 코드획득 성능개선)

  • 조권도;김선영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.3
    • /
    • pp.684-691
    • /
    • 1996
  • Since the period of a spreading code in DS/SS communication systems is generally long, it is necessary to make the code acquisition as fast as possible. The code acquisition time can be sued as a measure to evaluate the performance of code acquisition systems. The search rate of serial search codee acquisition system used in the coventional CDMA cellular system is lower than that of the matched filter technique. In order to reduce the code acquisition time, this paper proposes hybrid code acquisition system composed filters combined with serial search blocks. In the proposed system, the matched filter sweeps possible code phases fast and the acquired phase information is verified by the serial search block. The mean and the variance of its acquisition time are calculated and compared with those of double dwell serial search system. The results indicate better performance of the proposed system by yielding its small vaues of the mean and the variance of code acquisition time.

  • PDF

Efficient Scheme for Secret Hiding in QR Code by Improving Exploiting Modification Direction

  • Huang, Peng-Cheng;Li, Yung-Hui;Chang, Chin-Chen;Liu, Yanjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2348-2365
    • /
    • 2018
  • QR codes as public patent are widely used to acquire the information in various fields. However, it faces security problem when delivering the privacy message by QR code. To overcome this weakness, we propose a secret hiding scheme by improving exploiting modification direction to protect the private message in QR code. The secret messages will be converted into octal digit stream and concealed to the cover QR code by overwriting the cover QR code public message bits. And the private messages can be faithfully decoded using the extraction function. In our secret hiding scheme, the QR code public message still can be fully decoded publicly from the marked QR codes via any standard QR Code reader, which helps to reduce attackers' curiosity. Experiments show that the proposed scheme is feasible, with high secret payload, high security protection level, and resistant to common image post-processing attacks.

Knowledge Graph of Administrative Codes in Korea: The Case for Improving Data Quality and Interlinking of Public Data

  • Haklae Kim
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.3
    • /
    • pp.43-57
    • /
    • 2023
  • Government codes are created and utilized to streamline and standardize government administrative procedures. They are generally employed in government information systems. Because they are included in open datasets of public data, users must be able to understand them. However, information that can be used to comprehend administrative code is lost during the process of releasing data in the government system, making it difficult for data consumers to grasp the code and limiting the connection or convergence of different datasets that use the same code.This study proposes a way to employ the administrative code produced by the Korean government as a standard in a public data environment on a regular basis. Because consumers of public data are barred from accessing government systems, a means of universal access to administrative code is required. An ontology model is used to represent the administrative code's data structure and meaning, and the full administrative code is built as a knowledge graph. The knowledge graph thus created is used to assess the accuracy and connection of administrative codes in public data. The method proposed in this study has the potential to increase the quality of coded information in public data as well as data connectivity.