• Title/Summary/Keyword: System Codes

Search Result 1,764, Processing Time 0.029 seconds

Management of oral and maxillofacial radiological images (Dr. Image를 이용한 구강악안면방사선과 의료영상 관리)

  • Kim Eun-Kyung
    • Imaging Science in Dentistry
    • /
    • v.32 no.3
    • /
    • pp.129-134
    • /
    • 2002
  • Purpose : To implement the database system of oral and maxillofacial radiological images using a commercial medical image management software with personally developed classification code. Materials and methods : The image database was built using a slightly modified commercial medical image management software, Dr. Image v.2.1 (Bit Computer Co., Korea). The function of wild card '*' was added to the search function of this program. Diagnosis classification codes were written as the number at the first three digits, and radiographic technique classification codes as the alphabet right after the diagnosis code. 449 radiological films of 218 cases from January, 2000 to December, 2000, which had been specially stored for the demonstration and education at Dept. of OMF Radiology of Dankook University Dental Hospital, were scanned with each patient information. Results: Cases could be efficiently accessed and analyzed by using the classification code. Search and statistics results were easily obtained according to sex, age, disease diagnosis and radiographic technique. Conclusion : Efficient image management was possible with this image database system. Application of this system to other departments or personal image management can be made possible by utilizing the appropriate classification code system.

  • PDF

A Study on Sizing System for Mail-Order Clothing (통신판매의류의 치수에 대한 조사 연구)

  • 박경화;천종숙
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.20 no.1
    • /
    • pp.43-53
    • /
    • 1996
  • This study was initiated to investigate (1) the current sizing system for mail-order clothing, (2) consumers' preference for sizing systems, and (3) consumers' satisfaction with garment size. The apparel items and the sizes available at various mail-order companies in Korea were also reviewed. This investigation of consumers' preferences for various size description systems includes a survey of 410 men and women who had purchased garments by mail-order. The data were analyzed by Statistical Analysis System/pc. The major results are as follows; 1. The sizing system of mail-order clothing was different by garment items. The number of apparel sizes available for mail-order purchasing was three or less. The most mail∼order garments were labeled by the numerical size codes of body girth nleasurements or letter code (S, M, L). 2. The size description system most prefered by female subjects(N : 360) was the numerical size code of a body measurement(55.4%). The combination of bust-hips-height measurements size codes were prefered by 13.3% . The pictogram was least premiered by the subjects. 3. The apparel items that subjects wanted to buy using mail-order were underwear, home -weat and night-wear. The heavy users of mail-order purchasing, however, also wanted to purchase expensive garments requiring precise fit. The subjects aged from 20's to 80's wanted to purchase childern's wear by mail. 4. The desire for diversity of garment item and size of mail-order apparel was relatively high. The subjets also wanted to purchase special size garments by mail-order, e. g., garment sizes for full or tall figure.

  • PDF

Performance Evaluation of Multi-Phased MC-CD74A System for transmitting the High Rate Data (고속데이터 전송을 위한 Multi-Phased MC-CDMA 시스템의 제안 및 성능 분석)

  • 안철용;안치훈;김동구;류승문
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.12B
    • /
    • pp.1637-1647
    • /
    • 2001
  • Multi-Code CDMA (MC-CDMA) can not only be integrated easily with a conventional system, but also achieve good spectral efficiency and high processing gain. However, it suffers from high value of peak-to-average power ratio (PAPR). In this paper, we propose the Multi-Phase CDMA (MP-CDMA) system that can provide variable rate service and is not susceptible to the non-linear characteristics of amplifier. The clipping is introduced between at the output of multi-code modulator and at the input of MPSK modulator in order to improve the performance of MPSK chip demodulator and reduce the system complexity, The system performances are compared for the different Number of codes and different clipping levels, respectively. The optimum clipping level is also evaluated for the different number of codes in both, AWGN and frequency flat fading channel.

  • PDF

DEVELOPMENT OF THE MULTI-DIMENSIONAL HYDRAULIC COMPONENT FOR THE BEST ESTIMATE SYSTEM ANALYSIS CODE MARS

  • Bae, Sung-Won;Chung, Bub-Dong
    • Nuclear Engineering and Technology
    • /
    • v.41 no.10
    • /
    • pp.1347-1360
    • /
    • 2009
  • A multi-dimensional component for the thermal-hydraulic system analysis code, MARS, was developed for a more realistic three-dimensional analysis of nuclear systems. A three-dimensional and two-fluid model for a two-phase flow in Cartesian and cylindrical coordinates was employed. The governing equations and physical constitutive relationships were extended from those of a one-dimensional version. The numerical solution method adopted a semi-implicit and finite-difference method based on a staggered-grid mesh and a donor-cell scheme. The relevant length scale was very coarse compared to commercial computational fluid dynamics tools. Thus a simple Prandtl's mixing length turbulence model was applied to interpret the turbulent induced momentum and energy diffusivity. Non drag interfacial forces were not considered as in the general nuclear system codes. Several conceptual cases with analytic solutions were chosen and analyzed to assess the fundamental terms. RPI air-water and UPTF 7 tests were simulated and compared to the experimental data. The simulation results for the RPI air-water two-phase flow experiment showed good agreement with the measured void fraction. The simulation results for the UPTF downcomer test 7 were compared to the experiment data and the results from other multi-dimensional system codes for the ECC delivery flow.

A Study of Logical Network Partition and Behavior-based Detection System Using FTS (FTS를 이용한 논리적 망 분리와 행위기반 탐지 시스템에 관한 연구)

  • Kim, MinSu;Shin, SangIl;Ahn, ChungJoon;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.109-115
    • /
    • 2013
  • Security threats through e-mail service, a representative tool to convey information on the internet, are on the sharp rise. The security threats are made in the path where malicious codes are inserted into documents files attached and infect users' systems by taking advantage of the weak points of relevant application programs. Therefore, to block infection of camouflaged malicious codes in the course of file transfer, this work proposed an integrity-checking and behavior-based detection system using File Transfer System (FTS), logical network partition, and conducted a comparison analysis with the conventional security techniques.

Performance Analysis of Low Bit-Rate Image Transmission over Concatenated Code WLL system (연쇄 부호화된 WLL 시스템을 통한 저비트율 영상전송 성능분석)

  • 이병길;조현욱;박길흠
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1616-1623
    • /
    • 1999
  • This paper describes error resilient coding scheme is added in WLL system and its application for robust low-bit rate still image transmission over power controlled W-CDA system Rayleigh fading channels. The baseline JPEG compressing methods are uses in image coding over wireless channel. The channel uses Reed-Solomon(RS) outer codes concatenated with convolutional inner codes, and truncated type I hybrid ARQ protocol based on the selective repeat strategy and the RS error detection capability. Simulation results are proved for the statistics of the frame-error bursts of the proposed system in comparison with conventional WLL system. it gains the 2 dB of the Eb/No in same BER.

  • PDF

PASTELS project - overall progress of the project on experimental and numerical activities on passive safety systems

  • Michael Montout;Christophe Herer;Joonas Telkka
    • Nuclear Engineering and Technology
    • /
    • v.56 no.3
    • /
    • pp.803-811
    • /
    • 2024
  • Nuclear accidents such as Fukushima Daiichi have highlighted the potential of passive safety systems to replace or complement active safety systems as part of the overall prevention and/or mitigation strategies. In addition, passive systems are key features of Small Modular Reactors (SMRs), for which they are becoming almost unavoidable and are part of the basic design of many reactors available in today's nuclear market. Nevertheless, their potential to significantly increase the safety of nuclear power plants still needs to be strengthened, in particular the ability of computer codes to determine their performance and reliability in industrial applications and support the safety demonstration. The PASTELS project (September 2020-February 2024), funded by the European Commission "Euratom H2020" programme, is devoted to the study of passive systems relying on natural circulation. The project focuses on two types, namely the SAfety COndenser (SACO) for the evacuation of the core residual power and the Containment Wall Condenser (CWC) for the reduction of heat and pressure in the containment vessel in case of accident. A specific design for each of these systems is being investigated in the project. Firstly, a straight vertical pool type of SACO has been implemented on the Framatome's PKL loop at Erlangen. It represents a tube bundle type heat exchanger that transfers heat from the secondary circuit to the water pool in which it is immersed by condensing the vapour generated in the steam generator. Secondly, the project relies on the CWC installed on the PASI test loop at LUT University in Finland. This facility reproduces the thermal-hydraulic behaviour of a Passive Containment Cooling System (PCCS) mainly composed of a CWC, a heat exchanger in the containment vessel connected to a water tank at atmospheric pressure outside the vessel which represents the ultimate heat sink. Several activities are carried out within the framework of the project. Different tests are conducted on these integral test facilities to produce new and relevant experimental data allowing to better characterize the physical behaviours and the performances of these systems for various thermo-hydraulic conditions. These test programmes are simulated by different codes acting at different scales, mainly system and CFD codes. New "system/CFD" coupling approaches are also considered to evaluate their potential to benefit both from the accuracy of CFD in regions where local 3D effects are dominant and system codes whose computational speed, robustness and general level of physical validation are particularly appreciated in industrial studies. In parallel, the project includes the study of single and two-phase natural circulation loops through a bibliographical study and the simulations of the PERSEO and HERO-2 experimental facilities. After a synthetic presentation of the project and its objectives, this article provides the reader with findings related to the physical analysis of the test results obtained on the PKL and PASI installations as well an overall evaluation of the capability of the different numerical tools to simulate passive systems.

An Analysis Method for Detecting Vulnerability to Symbolic Link Exploit (심볼릭 링크 공격 취약성 검출을 위한 분석 기법)

  • Joo, Seong-Yong;Ahn, Joon-Seon;Jo, Jang-Wu
    • The KIPS Transactions:PartA
    • /
    • v.15A no.1
    • /
    • pp.45-52
    • /
    • 2008
  • In this paper we define a vulnerable code to symbolic link exploit and propose a technique to detect this using program analysis. The existing methods to solve symbolic link exploit is for protecting it, on accessing a temporary file they should perform an investigation whether the file is attacked by symbolic link exploit. If programmers miss the investigation, the program may be revealed to symbolic link exploit. Because our technique detects all the vulnerable codes to symbolic link exploit, it helps programmers keep the program safety. Our technique add two type qualifiers to the existing type system to analyze vulnerable codes to symbolic link exploit, it detects the vulnerable codes using type checking including the added type qualifiers. Our technique detects all the vulnerable codes to symbolic link exploit automatically, it has the advantage of saving costs of modifying and of overviewing all codes because programmers apply the methods protecting symbolic link exploit to only the detected codes as vulnerable. We experiment our analyzer with widely used programs. In our experiments only a portion of all the function fopen() is analyzed as the vulnerabilities to symbolic link exploit. It shows that our technique is useful to diminish modifying codes.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.