• Title/Summary/Keyword: System Codes

Search Result 1,764, Processing Time 0.027 seconds

Underwater Acoustic Communication of FH-MFSK Method with Multiple Orthogonal Properties (다중 직교 특성을 갖는 FH-MFSK 방식의 수중음향통신)

  • Lee, Hyeung-Woo;Kim, Ki-Man;Son, Yun-Joon;Kim, Woo-Sik;Chun, Seung-Yong;Lee, Sang-Kook
    • The Journal of the Acoustical Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.407-412
    • /
    • 2014
  • In this paper, we propose an underwater acoustic communication of FH-MFSK(Frequency-Hopped Multiple Frequency Shift Keying) system with multiple orthogonal property. Generally, the processing of FSK(Frequency Shift Keying) method is simple, but it is vulnerable to ISI (Inter-Symbol Interference) caused by multipath transmission. In this paper, the orthogonal codes are generated with the same number of transmitting symbols, and these codes are corresponding to multiple frequencies. We used m-sequence to generate multiple orthogonal codes. We compared the performance of proposed method with conventional MFSK method via the experiment. As a result, we confirmed that the proposed method shows 6~10 % lower error rate at 100 bps than conventional method.

Recognition System of Car License Plate using Fuzzy Neural Networks (퍼지 신경망을 이용한 자동차 번호판 인식 시스템)

  • Kim, Kwang-Baek;Cho, Jae-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.313-319
    • /
    • 2007
  • In this paper, we propose a novel method to extract an area of car licence plate and codes of vehicle number from a photographed car image using features on vertical edges and a new Fuzzy neural network algorithm to recognize extracted codes. Prewitt mask is used in searching for vertical edges for detection of an area of vehicle number plate and feature information of vehicle number palate is used to eliminate image noises and extract the plate area and individual codes of vehicle number. Finally, for recognition of extracted codes, we use the proposed Fuzzy neural network algorithm, in which FCM is used as the learning structure between input and middle layers and Max_Min neural network is used as the learning structure within inhibition and output layers. Through a variety of experiments using real 150 images of vehicle, we showed that the proposed method is more efficient than others.

  • PDF

A Study on the Apparel Sizing System of SPA brands (SPA 브랜드의 의류치수 사용 실태에 관한 연구)

  • Yi, Kyonghwa;Cho, Mina
    • Journal of Fashion Business
    • /
    • v.19 no.5
    • /
    • pp.139-156
    • /
    • 2015
  • The purpose of this study is to investigate various information relating to research on the dimensions of clothing used in the sale of products via the internet that used to target global SPA((Specialty Store Retailer of Private Label Apparel) brands sold in Korea. A total of 12 SPA brands including seven global SPA brands and five national. SPA brands were surveyed in this study. Brands were chosen net sales and consumer preferences the last three years. In all SPA brands, literal size designation such as S, M, L and numeric size designation such as 0, 2, 4 or 32, 34, 36 etc. were mixed, but in case of Jean, the size codes mark waist circumference were dominant. European size codes were more common in case of European brands while literal codes were more dominantly used for American size codes with in the US brands. By reviewing the measurement information of the body and product size, the product measurement methods of UNIQLO, FOREVER 21 and TOPTEN were much more accountable and excellent than other brands. However, most of the others didn't offer proper information such as pictograms or figures about measurement methods relating body sizes and product sizes. In addition, most of global SPA brands offered size conversion chart which consumers could reference, however of none of the national SPA brands offered a conversion size chart on their website. Regardless of the type of clothing, the coverage of clothing size was higher than in global SPA brands such as H&M GAP compared to national SPA brands. In particular, 8seconds did not present apparel size ranges that fit consumers' individual clothes sizes.

Design Load Case Analysis and Comparison for a 5MW Offwhore Wind Turbine Using FAST, GH Bladed and CFD Method (FAST, GH Bladed 및 CFD기법을 이용한 5MW 해상풍력터빈 시스템 설계하중조건 해석 및 비교)

  • Kim, Ki-Ha;Kim, Dong-Hyun;Kwak, Young-Seob;Kim, Su-Hyun
    • The KSFM Journal of Fluid Machinery
    • /
    • v.18 no.2
    • /
    • pp.14-21
    • /
    • 2015
  • Design lifetime of a wind turbine is required to be at least 20 years. The most important step to ensure the deign is to evaluate the loads on the wind turbine as accurately as possible. In this study, extreme design load of a offshore wind turbine using Garrad Hassan (GH) Bladed and National Renewable Energy Laboratory (NREL) FAST codes are calculated considering structural dynamic loads. These wind turbine aeroelastic analysis codes are high efficiency for the rapid numerical analysis scheme. But, these codes are mainly based on the mathematical and semi-empirical theories such as unsteady blade element momentum (UBEM) theory, generalized dynamic wake (GDW), dynamic inflow model, dynamic stall model, and tower influence model. Thus, advanced CFD-dynamic coupling method is also applied to conduct cross verification with FAST and GH Bladed codes. If the unsteady characteristics of wind condition are strong, such as extreme design wind condition, it is possible to occur the error in analysis results. The NREL 5 MW offshore wind turbine model as a benchmark case is practically considered for the comparison of calculated designed loads. Computational analyses for typical design load conditions such as normal turbulence model (NTM), normal wind profile (NWP), extreme operation gust (EOG), and extreme direction change (EDC) have been conducted and those results are quantitatively compared with each other. It is importantly shown that there are somewhat differences as maximum amount of 18% among numerical tools depending on the design load cases.

Performance Analysis of Turbo Codes for LEO Satellite Communication Channel (저궤도 위성통신 채널에서 터보부호의 성능분석)

  • 강군석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.9A
    • /
    • pp.1313-1321
    • /
    • 2000
  • In recent years LEO(Low Earth Orbit) satellite communication systems have gained a lot of interest as high speed multimedia services by satellite are about to be provided. It is mandatory to use very efficient ECC(Error Correcting Code) to support high speed multimedia services over LEO satellite channel. Turbo codes developed by Berrou et al. in 1993 have been actively researched since it can achieve a performance close to the Shannon limit. In this paper, a LEO satellite channel model is adopted and the fading characteristics of LEO satellite channel are analyzed for the change of elevation angle in various propagation environments. The performance of turbo code is analyzed and compared to that of conventional convolutional code using the satellite channel model. In the simulation results using the Globalstar orbit constellations, performance of turbo codes shows 1.0~2.0dB coding gain compared to that of convolutional codes over all elevation angle and propagation environment ranges we have investigated. The performance difference resulting from the change of elevation angle in various propagation environments and the performance of different ECC are analyzed in detail, so that the results can be applied to choose an appropriate ECC scheme for various system environment.

  • PDF

A Behavior based Detection for Malicious Code Using Obfuscation Technique (우회기법을 이용하는 악성코드 행위기반 탐지 방법)

  • Park Nam-Youl;Kim Yong-Min;Noh Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.17-28
    • /
    • 2006
  • The appearance of variant malicious codes using obfuscation techniques is accelerating the spread of malicious codes around the detection by a vaccine. n a system does not patch detection patterns for vulnerabilities and worms to the vaccine, it can be infected by the worms and malicious codes can be spreaded rapidly to other systems and networks in a few minute. Moreover, It is limited to the conventional pattern based detection and treatment for variants or new malicious codes. In this paper, we propose a method of behavior based detection by the static analysis, the dynamic analysis and the dynamic monitoring to detect a malicious code using obfuscation techniques with the PE compression. Also we show that dynamic monitoring can detect worms with the PE compression which accesses to important resources such as a registry, a cpu, a memory and files with the proposed method for similarity.

Curriculum of IoT by IPC Code Analysis of Patents (특허문헌의 IPC 코드 분석에 의한 사물인터넷 분야 교육과정에 관한 연구)

  • Shim, Jaeruen;Choi, Jin-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1642-1648
    • /
    • 2021
  • We analyzes representative technologies of IoT patents and reflects these results in the curriculum of IoT. In order to identify the representative technologies, the IPC codes of the patents were analyzed. Among the main category IPC codes, the most used IPC codes were H04L in Single IPC Patent with 974 cases(32.0%) and G06Q in Multiple IPC Patent with 710 cases(29.2%). As a result of classifying the IPC code into the WIPO technology classification system, the most emphasized technologies are Digital Communication, accounting for about 60.5% in the Single IPC Patent and IT Methods for Management(710 cases, 29.2%) in Multiple IPC Patent. The main points to be considered when organizing the curriculum of IoT are: ∇Emphasis on Digital Communication, ∇Expansion of Education related to IT Methods for Management(Including entrepreneurship and patent application), and ∇Consideration of subjects related to the Convergence of IoT. This research can contribute to the curriculum design of new industrial technologies such as AI and Fintech.

Extraction and classification of characteristic information of malicious code for an intelligent detection model (지능적 탐지 모델을 위한 악의적인 코드의 특징 정보 추출 및 분류)

  • Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.20 no.5
    • /
    • pp.61-68
    • /
    • 2022
  • In recent years, malicious codes are being produced using the developing information and communication technology, and it is insufficient to detect them with the existing detection system. In order to accurately and efficiently detect and respond to such intelligent malicious code, an intelligent detection model is required, and in order to maximize detection performance, it is important to train with the main characteristic information set of the malicious code. In this paper, we proposed a technique for designing an intelligent detection model and generating the data required for model training as a set of key feature information through transformation, dimensionality reduction, and feature selection steps. And based on this, the main characteristic information was classified by malicious code. In addition, based on the classified characteristic information, we derived common characteristic information that can be used to analyze and detect modified or newly emerging malicious codes. Since the proposed detection model detects malicious codes by learning with a limited number of characteristic information, the detection time and response are fast, so damage can be greatly reduced and Although the performance evaluation result value is slightly different depending on the learning algorithm, it was found through evaluation that most malicious codes can be detected.

Exposure Analysis and Selection of Representative High Exposure Tasks for Radiation Work in Domestic Nuclear Power Plants (국내 원자력발전소 방사선작업에 대한 피폭 분석 및 대표 고 피폭 작업 선정)

  • Chan Yang Lee;Young-Khi Lim;Kwang Pyo Kim
    • Journal of Radiation Industry
    • /
    • v.18 no.2
    • /
    • pp.117-126
    • /
    • 2024
  • This study aims to identify high exposure tasks among the tasks performed in domestic nuclear power plants as a basis for developing training programs to improve the efficiency of workers' work. To this end, we first analyzed the exposure status of radiation work in domestic nuclear power plants. Radiation tasks in nuclear power plants were categorized, collective doses were investigated, and the collective doses were calculated based on the collective doses, and representative high exposure tasks were identified. We found that the collective and individual doses in domestic nuclear power plants are continuously decreasing, but there is an imbalance of exposure among workers. In terms of work classification, nuclear power plants are managed in 236 work codes based on light water reactors and 181 work codes based on heavy water reactors, depending on the work equipment and location. Among the total work codes, 23 codes have an annual average dose exceeding 10 μSv, and based on this, 10 representative high exposure tasks were derived. The representative high exposure tasks were selected as S/G nozzle dam work, S/G debris removal work, nuclear instrumentation system, S/G eddy current detection work, and insulation work. The results of this study are expected to serve as an important basis for reducing the exposure of workers in nuclear power plants and improving work efficiency.

Design Improvement on Reactor Shutdown System in Nuclear Power Plant (원자로 보호 계통 설계 개선)

  • 박철주;김석남;오연우
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.19 no.38
    • /
    • pp.69-76
    • /
    • 1996
  • The Special safety systems are incorporated into the plant design to limit radioactive releases to the public in the event of accident. Wolsung 2 is better builted than Wolsung 1 by 84 design changes for new approval requirements, codes & standards changes and manufacturing changes etc. This paper analysed and discussed the design change items for nuclear reactor safety system and needs development of design engineering for digital protection system.

  • PDF