• Title/Summary/Keyword: Intermediate Code

Search Result 192, Processing Time 0.023 seconds

A GNSS Signal Correlation Using Map-based Partial-time Common Intermediate Frequency Removal Method (맵 기반의 부분시간 공통 중간주파수 제거방식을 이용한 GNSS 신호의 상관 기법)

  • Im, Sung-Hyuck;Jee, Gyu-In
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.14 no.7
    • /
    • pp.695-701
    • /
    • 2008
  • In this paper, we propose the efficient Doppler removal method using map-based partial-time common intermediate frequency removal technique. In the proposed algorithm, the 2-stage carrier removal process was used. First, the component of common intermediate frequency is removed. Next the component of Doppler was removed with averaging and approximation. For the evaluation of the proposed algorithm, The real-time software GPS L1 C/A-code receiver was implemented. When the proposed algorithms are used, 12 tracking channels with 3 track arm(early, prompt, late) is operated real-time on PC using a Intel Pentium-III 1.0GHz CPU. Also, the requirement of memory was less than 2Mbytes. The real-time software GNSS receiver using the proposed algorithms provides the navigation solution with below 10 meter rms error. Especially, in spited of using the various approximations for implementing the algorithms, the high sensitivity capability (able to track the weak signal with -159dBm) was achieved.

Homomorphic Subspace MAC Scheme for Secure Network Coding

  • Liu, Guangjun;Wang, Xiao
    • ETRI Journal
    • /
    • v.35 no.1
    • /
    • pp.173-176
    • /
    • 2013
  • Existing symmetric cryptography-based solutions against pollution attacks for network coding systems suffer various drawbacks, such as highly complicated key distribution and vulnerable security against collusion. This letter presents a novel homomorphic subspace message authentication code (MAC) scheme that can thwart pollution attacks in an efficient way. The basic idea is to exploit the combination of the symmetric cryptography and linear subspace properties of network coding. The proposed scheme can tolerate the compromise of up to r-1 intermediate nodes when r source keys are used. Compared to previous MAC solutions, less secret keys are needed for the source and only one secret key is distributed to each intermediate node.

Design Characteristics Analysis for Very High Temperature Reactor Components (VHTR 초고온기기 설계특성 분석)

  • Kim, Yong Wan;Kim, Eung Seon
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.12 no.1
    • /
    • pp.85-92
    • /
    • 2016
  • The operating temperature of VHTR components is much higher than that of conventional PWR due to high core outlet temperature of VHTR. Material requirements and technical issues of VHTR reactor components which are mainly dominated by high temperature service condition were discussed. The codification effort for high temperature material and design methodology are explained. The design class for VHTR components are classified as class A or B according to the recent ASME high temperature reactor design code. A separation of thermal boundary and pressure boundary is used for VHTR components as an elevated design solution. Key design characteristics for reactor pressure vessel, control rod, reactor internals, graphite reflector, circulator and intermediate heat exchanger were analysed. Thermo-mechanical analysis of the process heat exchanger, which was manufactured for test, is presented as an analysis example.

Development of a Quality Assurance Safety Assessment Database for Near Surface Radioactive Waste Disposal

  • Park J.W.;Kim C.L.;Park J.B.;Lee E.Y.;Lee Y.M.;Kang C.H.;Zhou W.;Kozak M.W.
    • Nuclear Engineering and Technology
    • /
    • v.35 no.6
    • /
    • pp.556-565
    • /
    • 2003
  • A quality assurance safety assessment database, called QUARK (QUality Assurance Program for Radioactive Waste Management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of low- and intermediate-level radioactive waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code.

Dynamic Analysis based on AOP for Checking Security Vulnerability (보안 취약점 검사를 위한 AOP 기반의 동적 분석)

  • Seo, Kwang-Ik;Choi, Eun-Man
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.10
    • /
    • pp.773-778
    • /
    • 2010
  • OWASP announced most of vulnerabilities result from the data injection by user in 2010 after 2007. Because the contaminated input data is determined at runtime, those data should be checked dynamically. To analyze data and its flow at runtime, dynamic analysis method usually inserts instrument into source code. Intermediate code insertion makes it difficult to manage and extend the code so that the instrument code would be spreaded out according to increase of analysis coverage and volume of code under analysis. In addition, the coupling gets strong between instrument modules and target modules. Therefore developers will struggle against modify or extend the analysis code as instrument. To solve these problem, this paper defines vulnerabilities as a concern using AOP, and suggest the flexible and extensible analysis method to insertion and deletion without increase of coupling.

A design and implementation of VHDL-to-C mapping in the VHDL compiler back-end (VHDL 컴파일러 후반부의 VHDL-to-C 사상에 관한 설계 및 구현)

  • 공진흥;고형일
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.12
    • /
    • pp.1-12
    • /
    • 1998
  • In this paper, a design and implementation of VHDL-to-C mapping in the VHDL compiler back-end is described. The analyzed data in an intermediate format(IF), produced by the compiler front-end, is transformed into a C-code model of VHDL semantics by the VHDL-to-C mapper. The C-code model for VHDL semantics is based on a functional template, including declaration, elaboration, initialization and execution parts. The mapping is carried out by utilizing C mapping templates of 129 types classified by mapping units and functional semantics, and iterative algorithms, which are combined with terminal information, to produce C codes. In order to generate the C program, the C codes are output to the functional template either directly or by combining the higher mapping result with intermediate mapping codes in the data queue. In experiments, it is shown that the VHDL-to-C mapper could completely deal with the VHDL analyzed programs from the compiler front-end, which deal with about 96% of major VHDL syntactic programs in the Validation Suite. As for the performance, it is found that the code size of VHDL-to-C is less than that of interpreter and worse than direct code compiler of which generated code is increased more rapidly with the size of VHDL design, and that the VHDL-to-C timing overhead is needed to be improved by the optimized implementation of mapping mechanism.

  • PDF

ISPLC:Intelligent Agent System based Software Programmable Logic Control (ISPLC: 지능적인 에이전트 기반 소프트웨어 PLC)

  • 조영임;심재홍
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11b
    • /
    • pp.557-560
    • /
    • 2003
  • In this paper, we developed an editor and running engine for the SoftPLC. LD is the most popular standard IEC 1131-3 PLC language in Korea and used over 90% among the 5 PLC languages. In this paper, we have developed the ISPLC(Intelligent Agent System based Software Programmable Logic Controller). In ISPLC system, LD programmed by a user is converted to IL, which is one of intermediate codes, and IL is converted to the standard C code which can be used in a commercial editor such as visual C++. In ISPLC, the detection of logical error in high level programming(C) is more efficient than PLC programming itself. ISPLC provide easy programming platform to such beginner as well as professionals. The study of code conversion of LD-> U->C is firstly tried in the world as well as KOREA.

  • PDF

A Description Technique and It's Simulation of Gate Level Digital Circuits (게이트 레벨 디지털 회로의 기술방법 및 시뮬레이션)

  • 권승학;이명호
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.4
    • /
    • pp.57-68
    • /
    • 1999
  • The purpose of this study is to build a description technique and to make a simulator, which can simulate and verify the behavior of gate level digital system. To get the object code from the input description language, we build a translator. To do this, we used YACC of the UNIX parser generator. and made an intermediate code in the mid-process between translator and simulator to extend the range of application. For experimental models. we used the Full-Adder and Modulo-3 Counter.

  • PDF

Intelligent Multiagent Based Software Programmable Logic Control (지능적인 멀티에이전트 기반 소프트웨어 PLC)

  • Cho Young Im
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.11 no.4
    • /
    • pp.297-303
    • /
    • 2005
  • In this paper, I developed an intelligent multi agents based softPLC(IMPLC). In IMPLC, the standard IEC 1131-3 PLC languages(LD, SFC, FBD, ST) programmed by a user are converted to IL, which is one of intermediate codes, in order to make them interactions. And then the IL is converted to the standard C code regarding some extension and transplanting, which can be used in a commercial editor such as visual C++. In IMPLC, the logical errors and syntax errors occurred by users are detected, so that the optimal PC control based softPLC can be possible. IMPLC provide easy programming platform to such beginner as well as professionals. The study of code conversion is firstly tried in the world as well as KOREA. I applied IMPLC to 3 steps conveyer belt system. The simulation results say that the debugging steps by IMPLC using multi agents are decreased than the conventional softPLC's.

EVOLUTIONARY MODELS OF ROTATING DENSE STELLAR SYSTEMS WITH EMBEDDED BLACK HOLES

  • FIESTAS, JOSE A.
    • Publications of The Korean Astronomical Society
    • /
    • v.30 no.2
    • /
    • pp.345-347
    • /
    • 2015
  • We present evolutionary models of rotating self-gravitating systems (e.g. globular clusters, galaxy cores). These models are characterized by the presence of an initial axi-symmetry due to rotation. Central black hole seeds are included in our models, and black hole growth due to the consumption of stellar matter is simulated until the central potential dominates the kinematics of the core. Our goal is to study the long-term evolution (Gyr) of relaxed dense stellar systems which deviate from spherical symmetry, and their morphology and final kinematics. With this purpose in mind, we developed a 2D Fokker-Planck analytical code, and confirmed its results using detailed N-Body simulations, applying a high performance code developed for GPU machines. We conclude that the initial rotation significantly modifies the shape and lifetime of these systems, and cannot be neglected in the study of the evolution of globular clusters, and the galaxy itself. Our models give a constraint for the final intermediate black hole masses expected to be present in globular clusters.