• Title/Summary/Keyword: Information codes

Search Result 2,112, Processing Time 0.03 seconds

Detection Of Unknown Malicious Scripts using Code Insertion Technique (코드 삽입 기법을 이용한 알려지지 않은 악성 스크립트 탐지)

  • 이성욱;방효찬;홍만표
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.663-673
    • /
    • 2002
  • Server-side anti-viruses are useful to protect their domains, because they can detect malicious codes at the gateway of their domains. In prevailing local network, all clients cannot be perfectly controlled by domain administrators, so server-side inspection, for example in e-mail server, is used as an efficient technique of detecting mobile malicious codes. However, current server-side anti-virus systems perform only signature-based detection for known malicious codes, simple filtering, and file name modification. One of the main reasons that they don't have detection features, for unknown malicious codes, is that activity monitoring technique is unavailable for server machines. In this paper, we propose a detection technique that is executed at the server, but it can monitor activities at the clients without any anti-virus features. we describe its implementation.

Performance Analysis of Hybrid Concatenated Convolutional Codes over AWGN and Rayleigh/Rician Fading Channels (가산성 백색 가우시안 잡음과 레일레이/라이시안 페이딩 채널에서 하이브리드 연쇄 길쌈부호의 성능 분석)

  • 김세훈;윤원식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1A
    • /
    • pp.43-47
    • /
    • 2000
  • In regions of low signal-to-noise ratio (SNR), performance analysis uses simulations of hybrid concatenated coding systems. However, for higher SNR regions beyond simulation capabilities, average upper bounds to bit error rate (BER) and word error rate (WER) are used. In [1], all weight enumerating functions are needed to obtain average bounds. In this paper, we use RSC as constituent codes, by using effective free distances instead of WEF, we derive average BER and WER bounds of hybrid concatenated convolutional codes (HCCC) and analyze the BER and WER over AWGN and Rayleigh/Rician fading channels.

  • PDF

An Algorithm for Computing the Weight Enumerating Function of Concatenated Convolutional Codes (연쇄 컨볼루션 부호의 가중치 열거함수 계산 알고리듬)

  • 강성진;권성락;이영조;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7A
    • /
    • pp.1080-1089
    • /
    • 1999
  • The union upper bounds to the bit error probability of maximum likelihood(ML) soft-decoding of parallel concatenated convolutional codes(PCCC) and serially concatenated convolutional codes(SCCC) can be evaluated through the weight enumerating function(WEF). This union upper bounds become the lower bounds of the BER achievable when iterative decoding is used. In this paper, to compute the WEF, an efficient error event search algorithm which is a combination of stack algorithm and bidirectional search algorithm is proposed. By computor simulation, it is shown that the union boounds obtained by using the proposed algorithm become the lower bounds to BER of concatenated convolutional codes with iterative decoding.

  • PDF

4-level Error Correcting Modulation Codes for Holographic Data Storage System (홀로그래픽 데이터 저장장치를 위한 4-레벨 오류정정 변조부호)

  • Lee, Jaehun;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.10
    • /
    • pp.610-612
    • /
    • 2014
  • Mutilevel holographic data storage systems have a big advantage for capacity since it can store more than one bit per pixel. For instance, 2/3 modulation code stores 2/3(symbol/pixel) and 4/3(bit/pixel). Then it is about 1.3 bits per one pixel. In this paper, we propose two 4-level modulation codes, which have the minimum Euclidean distances of 3 and 4, respectively. The proposed codes perform better than random data. The performance of larger minimum distance code shows better than that of shorter one.

Optimal Radar Pulse Compression Processing Algorithm and the Resulting Optimal Codes for Pulse Compressed Signals (레이더 펄스 압축 신호의 최적 탐색 알고리즘 개발 및 최적 코드에 관한 연구)

  • 김효준;이명수;김영기;송문호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6B
    • /
    • pp.1100-1105
    • /
    • 2000
  • The most widely used radar pulse compression technique is correlation processing using Barker code. This technique enhances detection sensitivity but, unfortunately, suffers from the addition of range sidelobes which sometimes will degrade the performance of radar systems. In this paper, our proposed optimal algorithm eliminates the sidelobes at the cost of additional processing and is evaluated in the presence of Doppler shift. We then propose optimal codes with regard to the proposed algorithm and the performance is compared against the traditional correlation processing with Barker codes. The proposed processing using optimal codes will be shown to be superior over the traditional processing in the presence of Doppler shift.

  • PDF

Generalization of Tanner′s Minimum Distance Bounds for LDPC Codes (LDPC 부호 적용을 위한 Tanner의 최소 거리 바운드의 일반화)

  • Shin Min Ho;Kim Joon Sung;Song Hong Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.10C
    • /
    • pp.1363-1369
    • /
    • 2004
  • LDPC(Low Density Parity Check) codes are described by bipartite graphs with bit nodes and parity-check nodes. Tanner derived minimum distance bounds of the regular LDPC code in terms of the eigenvalues of the associated adjacency matrix. In this paper we generalize the Tanner's results. We derive minimum distance bounds applicable to both regular and blockwise-irregular LDPC codes. The first bound considers the relation between bit nodes in a minimum-weight codeword, and the second one considers the connectivity between parity nodes adjacent to a minimum-weight codeword. The derived bounds make it possible to describe the distance property of the code in terms of the eigenvalues of the associated matrix.

FPGA Implementation of Reed-Solomon Encoder for image transmission (영상 전송을 위한 Reed-Solomon Encoder의 FPGA 구현)

  • Kim, Dong-Nyeon;Cai, Yu Qing;Byon, Kun-sik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.907-910
    • /
    • 2009
  • This paper is the FPGA Implementation of Reed-Solomon Encoder that is one of Error control Codes. Reed-Solomon codes are block-based error control codes with a wide range of applications in digital communications. RS codes are strong on burst errors because it process signals as symbol. We simulate this system using Matlab from Mathworks and design it using System Generator from Xilinx. We refer Matlab source in Implementation of Reed-Solomon Error Control Coding for Compressed Images by Simon Anthony Raspa.

  • PDF

A Discovery System of Malicious Javascript URLs hidden in Web Source Code Files

  • Park, Hweerang;Cho, Sang-Il;Park, Jungkyu;Cho, Youngho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.5
    • /
    • pp.27-33
    • /
    • 2019
  • One of serious security threats is a botnet-based attack. A botnet in general consists of numerous bots, which are computing devices with networking function, such as personal computers, smartphones, or tiny IoT sensor devices compromised by malicious codes or attackers. Such botnets can launch various serious cyber-attacks like DDoS attacks, propagating mal-wares, and spreading spam e-mails over the network. To establish a botnet, attackers usually inject malicious URLs into web source codes stealthily by using data hiding methods like Javascript obfuscation techniques to avoid being discovered by traditional security systems such as Firewall, IPS(Intrusion Prevention System) or IDS(Intrusion Detection System). Meanwhile, it is non-trivial work in practice for software developers to manually find such malicious URLs which are hidden in numerous web source codes stored in web servers. In this paper, we propose a security defense system to discover such suspicious, malicious URLs hidden in web source codes, and present experiment results that show its discovery performance. In particular, based on our experiment results, our proposed system discovered 100% of URLs hidden by Javascript encoding obfuscation within sample web source files.

Review of international wind codes and recent research on mono-slope canopy roof

  • Pratap, Ajay;Rani, Neelam
    • Wind and Structures
    • /
    • v.34 no.4
    • /
    • pp.371-383
    • /
    • 2022
  • Buildings with mono-sloped roofs are used for different purposes like at railway platforms, restaurants, industrial buildings, etc. Between two types of mono-slope roofs, clad and unclad, unclad canopy types are more vulnerable to wind load as wind produces pressure on both upper and lower surfaces of the roof, resulting in uplifting of the roof surface. This paper discusses the provisions of wind loads in different codes and standards for Low-rise buildings. Further, the pressure coefficients on mono-slope canopy roof available in wind code and standards are compared. Previous experimental studies for mono-slope canopy roof along with the recent wind tunnel testing carried out at Indian Institute of Technology, Roorkee is briefly discussed and compared with the available wind codes. From the study it can further be asserted that the information available related to staging or blocking under the mono-slope canopy roofs is limited. This paper is an attempt to put together the available information in different wind codes/standards and the research works carried out by different researchers, along with shedding some light on the future scopes of research on mono-slope canopy roofs.

An SS_RRA Protocol for Integrated Voice/Data Services in Packet Radio Networks

  • Lim, In-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.88-92
    • /
    • 2007
  • In this paper, an SS-RRA protocol that is based on Code Division Multiple Access is proposed and analyzed under the integrated voice and data traffic load. The backward logical channels consist of slotted time division frames with multiple spreading codes per slot. The protocol uses a reservation mechanism for the voice traffic, and a random access scheme for the data traffic. A discrete-time, discrete-state Markov chain is used to evaluate the performance. The numerical results show that the performance can be significantly improved by a few distinct spreading codes.