• Title/Summary/Keyword: Intermediate Code

Search Result 192, Processing Time 0.027 seconds

A 3.3V 30mW 200MHz CMOS upconversion mixer using replica transconductance (복제 V-I 변환기를 이용한 3.3V 30mW 200MHz CMOS 업 컨버젼 믹서)

  • Kwon, Jong-Kee;Kim, Ook;Oh, Chang-Jun;Lee, Jong-Ryul;Song, Won-Chul;Kim, Kyung-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.9
    • /
    • pp.1941-1948
    • /
    • 1997
  • In this paper, the power efficient linear upconversion mixer which is a functional circuit in transmit path of intermediate frequency(IF) part of Code Division Multiple (CDMA) cellular phone was explained. In generally, the low CMOS devices limits the implementation of upconversion mixer especially for lower loads. Using replica transconductor, the linear range is extended up to the limit. Thiscircuit was imprlemented using $0.8{\mu}\textrm{m}$ N-well CMOS technology with 2-poly/2-metal. The active area of chip is $0.53mm{\times}0.92mm$. The power consumption is 30mW with 3.3V suply voltage. The 1dB conpression characteristics is -27.3dB with $25{\Omega}$. load and being applied by 2-tone input signal. The mixer operates properly above 200MHz.

  • PDF

Analysis of Effect of Spoofing Signal According to Code Delay in GPS L1 Signal (GPS L1 신호에서 코드지연에 따른 기만신호 영향 분석)

  • Kim, Tae-Hee;Sin, Cheon-Sig;Lee, Sang-Uk
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.1
    • /
    • pp.128-133
    • /
    • 2012
  • In this paper, we analysis the effect of error of code tracking and frequency tracking according to the chip delay of spoofing signal through the simulation. Firstly, we investigate the type of spoofing signal and defense technical of spoofing attack. For simulation, we generated the intermediate spoofing signal using the software GNSS signal generator simulator(SGGS), the intermediate spoofers synchronize its counterfeit GPS signals with the current broadcast GPS signals. The software GPS receiver simulator(SGRS) received the spoofing signal and normal signal from SGGS, and process the signals. In paper, we can check that the DLL and PLL tracking loop error are generated and pseudo-range is changed non-linear according to chip delay of spoofing signal when the spoofing signal is entered. As a result, we can check that navigation solution is incorrectly effected by spoofing signal.

Compiler triggered C level error check (컴파일러에 의한 C레벨 에러 체크)

  • Zheng, Zhiwen;Youn, Jong-Hee M.;Lee, Jong-Won;Paek, Yun-Heung
    • The KIPS Transactions:PartA
    • /
    • v.18A no.3
    • /
    • pp.109-114
    • /
    • 2011
  • We describe a technique for automatically proving compiler optimizations sound, meaning that their transformations are always semantics-preserving. As is well known, IR (Intermediate Representation) optimization is an important step in a compiler backend. But unfortunately, it is difficult to detect and debug the IR optimization errors for compiler developers. So, we introduce a C level error check system for detecting the correctness of these IR transformation techniques. In our system, we first create an IR-to-C converter to translate IR to C code before and after each compiler optimization phase, respectively, since our technique is based on the Memory Comparison-based Clone(MeCC) detector which is a tool of detecting semantic equivalency in C level. MeCC accepts only C codes as its input and it uses a path-sensitive semantic-based static analyzer to estimate the memory states at exit point of each procedure, and compares memory states to determine whether the procedures are equal or not. But MeCC cannot guarantee two semantic-equivalency codes always have 100% similarity or two codes with different semantics does not get the result of 100% similarity. To increase the reliability of the results, we describe a technique which comprises how to generate C codes in IR-to-C transformation phase and how to send the optimization information to MeCC to avoid the occurrence of these unexpected problems. Our methodology is illustrated by three familiar optimizations, dead code elimination, instruction scheduling and common sub-expression elimination and our experimental results show that the C level error check system is highly reliable.

Integrated NURBS Surface Interpolator Considering Both Rough and Finish Cuts (황삭 및 정삭을 고려한 통합형 NURBS 곡면 인터폴레이터)

  • Koo, Tae-Hoon;Jee, Sung-Chul
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.27 no.11
    • /
    • pp.1958-1966
    • /
    • 2003
  • Three-axis CNC surface machining entails a series of processes including rough cutting, intermediate cutting and finish cutting for a reference surface defined in CAD/CAM. This study is targeting development of an integrated NURBS surface interpolator that can incorporate rough, intermediate and finish cutting processes. In each process, volume to be removed and cutting condition are different according to the shape of a part to be machined and the reference surface. Accordingly, the proposed NURBS surface interpolator controls motion in real-time optimized for the machining conditions of each process. In this paper, a newly defined set of G-codes is proposed such that NURBS surface machining through CNC is feasible with minimal information on the surface composition. To verify the usefulness of the proposed interpolator, through computer simulations on NURBS surface machining, total machining time, size of required NC data and cutting force variations are compared with the existing method.

Implementation of Java Bytecode Framework (자바 바이트코드 프레임워크 구현)

  • Kim, Ki-Tae;Kim, Je-Min;Yoo, Weon-Hee
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.122-131
    • /
    • 2010
  • In this paper, we design and implement CTOC, a new bytecode analysis and translation tool. We also propose E-Tree, a new intermediate code, to efficiently deal with intermediate codes translated from bytecodes. E-Tree is expressed in a tree form by combining relevant bytecode instructions in basic blocks of eCFG to overcome the weaknesses of bytecodes such as complexity and analytical difficulty. To demonstrate the usefulness and possible extensibility of CTOC, we show the creation process of eCFG and E-Tree through practical bytecode analysis and translation and shows the optimization process of a bytecode program as an example of possible extensibility.

Characterization of Plasmids from Bifidobacterium sp.

  • Lee, Ju-Hoon;Park, Myeong-Soo;Lee, Ke-Ho;Ji, Geun-Eog
    • Journal of Microbiology and Biotechnology
    • /
    • v.11 no.1
    • /
    • pp.1-6
    • /
    • 2001
  • Ten strains of plasmid-harboring Bifidobacterium sp. were isolated from the feces of adults and children, and named as Bifidobacterium sp. GE1-GE8, ST, and SH5. These plasmids were categorized into three homologous groups (pKJ50-homologous, pKJ36-homologous, and non-homologous groups) according to Southern hybridization patterns using the formerly characterized bifidobacterial plasmids, pKJ50 and pKJ36, as probes. nine strains harboring the plasmids were shown to accumulate single-stranded DNA as a replication intermediate, based on the S1 nuclease treatment and Southern hybridization. These results suggest that the strains replicate by a rolling circle mechanism. Minimal inhibitory concentrations (MIC) of the isolated bifidobacteria against several antibiotics were determined. Two strains, GE2 and GE3, showed relatively high MiC values against tetracycline ($793.6{\mu}g/ml$) and erythromycin ($153.6{\mu}g/ml$), respectively. The tetracycline resistance of GE2 disappeared when the resident plasmid of GE2 was cured by ethidium bromide. These results show that pKJ36-homologous and pKJ50-homologous plasmids are prevalent among various Bifidobacterium strains and some Bifidobacterium plasmids appear to code for antibiotic resistance.

  • PDF

What Makes Red Quasars Red?

  • Kim, Dohyeong;Im, Myungshin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.41 no.1
    • /
    • pp.66.2-66.2
    • /
    • 2016
  • Red quasars have been suspected to be an intermediate population between merger-driven star-forming galaxies and normal quasars. In this scenario, red quasars are expected to have dusty red color coming from the dust extinction by dust and gas in their host galaxy. However, several studies have proposed different explanation of the red color of red quasars, which are i) a moderate viewing angle between type 1 and 2 quasars, ii) an unusual covering factor of dust torus, and iii) an anomalous synchrotron emission with a peak at NIR wavelength. In this study, we investigate the factor leading to the red color of red quasars by using the line luminosity ratios of the hydrogen Balmer to Paschen series of 11 red quasars. We find the Pb/Hb luminosity ratios of the red quasars are significantly higher than those of normal quasars. Moreover, we compare the Pb/Hb luminosity ratios of the red quasars to the theoretically expected line luminosity ratios computed from the CLOUDY code. We find the line luminosity ratios of the red quasars cannot be explained by the theoretical line luminosity ratios with any physical conditions. We conclude that red color of red quasars comes from dust extinction by their host galaxy. This result is consistent with the picture that red quasars are an intermediate population between the merger-driven star-forming galaxies and normal quasars.

  • PDF

An authenticated key distribution protocol for the CDMA mobile communication network (부호 분할 다중 접속 이동 통신망을 위한 인증 키 분해 프로토콜)

  • Hak S. Jeon;Dong K. Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.43-54
    • /
    • 1997
  • In this paper, we introduce a secure and minimal protocol for authenticated key distribution over the CDMA mobile communication network. The CDMA mobile communication network has been developed the security protocol that provides a means for user authentication and subsequent protection of user traffic. However, this model has no security assumptions for the intermediate, fixed networks. To avoiding these drawbacks, we introduce a minimal authenticated key distribution protocol. This protocol provides the security of the intermediate and fixed network in mobile environment, and maintains the confidentiality of user identification and the minimum size of information flow compared with the existing protocols.

A Study About Radionuclides Migration Behavior in Terms of Solubility at Gyeongju Low- and Intermediate-Level Radioactive Waste (LILW) Repository

  • Park, Sang June;Byon, Jihyang;Lee, Jun-Yeop;Ahn, Seokyoung
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.19 no.1
    • /
    • pp.113-121
    • /
    • 2021
  • A safety assessment of radioactive waste repositories is a mandatory requirement process because there are possible radiological hazards owing to radionuclide migration from radioactive waste to the biosphere. For a reliable safety assessment, it is important to establish a parameter database that reflects the site-specific characteristics of the disposal facility and repository site. From this perspective, solubility, a major geochemical parameter, has been chosen as an important parameter for modeling the migration behavior of radionuclides. The solubilities were derived for Am, Ni, Tc, and U, which were major radionuclides in this study, and on-site groundwater data reflecting the operational conditions of the Gyeongju low and intermediate level radioactive waste (LILW) repository were applied to reflect the site-specific characteristics. The radiation dose was derived by applying the solubility and radionuclide inventory data to the RESRAD-OFFSITE code, and sensitivity analysis of the dose according to the solubility variation was performed. As a result, owing to the low amount of radionuclide inventory, the dose variation was insignificant. The derived solubility can be used as the main input data for the safety assessment of the Gyeongju LILW repository in the future.

Molybdenum isotopes separation using squared-off optimized cascades

  • Mahdi Aghaie;Valiyollah Ghazanfari
    • Nuclear Engineering and Technology
    • /
    • v.55 no.9
    • /
    • pp.3291-3300
    • /
    • 2023
  • Recently molybdenum alloys have been introduced as accident tolerating materials for cladding of fuel rods. Molybdenum element has seven stable isotopes with different neutron absorption cross section used in various fields, including nuclear physics and radioisotope production. This study presents separation approaches for all intermediate isotopes of molybdenum element by squared-off cascades using a newly developed numerical code with Salp Swarm Algorithm (SSA) optimization algorithm. The parameters of cascade including feed flow rate, feed entry stage, cascade cut, input feed flow rate to gas centrifuges (GCs), and cut of the first stage are optimized to maximize both isotope recovery and cascade capacity. The squared off and squared cascades are studied, and the efficiencies are compared. The results obtained from the optimization showed that for the selected squared off cascade, Mo94 in four separation steps, Mo95 in five steps, Mo96 in six steps, Mo97 in seven steps, and Mo98 in two steps are separated to the desired concentrations. The highest recovery factor is obtained 63% for Mo94 separation and lowest recovery factor is found 45% for Mo95.