• Title/Summary/Keyword: TRACE code

Search Result 127, Processing Time 0.032 seconds

Tilted-Ring Modeling of Warped Spiral Galaxies

  • Bae, Hyun-Jin;Chung, Ae-Ree;Jozsa, Gyula I.G.;Kim, Sung-Soo;Yoon, Suk-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.2
    • /
    • pp.30.2-30.2
    • /
    • 2010
  • A direct tilted-ring fitting method allows us to investigate kinematic structure of spiral galaxies. By employing the method to high-resolution HI data cubes, we can more easily trace warp characteristics of spiral galaxies than ever. In this contribution, we make use of TiRiFiC to VLA HI data cube of spiral galaxies in Virgo cluster, and present our preliminary yet interesting results. The TiRiFiC (Tilted-Ring-Fitting-Code) is publicly available code that provides 'best-fit' tilted-ring parameters (i.e. position angle and inclination) via chi-square minimization technique. We also discuss possible biases (e.g., resolution dependency) and its effect on our conclusions.

  • PDF

RFID Adaptation Model for Postal Logistics Environment (우편 물류 환경에서의 RFID 적용 모델)

  • Park, Jeong-Hyun;Lee, Boo-Hyung;Kim, Hwang-Rae;Kim, Young-Chun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.119-120
    • /
    • 2006
  • In this paper, we suggest postal RFID adaptation model, tag data structure and code which can be used for real time trace and track of parcel processing and pallet management. This paper also shows postal RFID application system architecture and testbed based on the proposed tag data structure and code, and shows recognition performance of tag on parcel and pallet by speed and mounting tag material such as can, water, and paper using implemented postal RFID system for postal logistics. The contribution of this paper is to stimulate deployment of RFID technology for postal logistics service and SCM (Supply Chain Management).

  • PDF

A New Grid-Based Monte Carlo Code for Raman Scattered He II: Preliminary Results

  • Chang, Seok-Jun;Choi, Bo-Eun;Lee, Hee-Won
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.44 no.1
    • /
    • pp.85.2-85.2
    • /
    • 2019
  • We developed a new grid-based Monte Carlo code to trace far UV He II line photons that are incident on a thick H I region and subsequently transferred through Rayleigh and Raman scattering with atomic hydrogen. In particular, we consider a neutral region that is moving away from the He II emission source which is either monochromatic or is described by a Gaussian profile. The resultant Raman scattered He II line profiles from a monochromatic source are characterized by a double peaked core part with an extended Raman red tail that is attributed to multiple re-entry events. Complicated behaviors are observed in the case of a Gaussian He II source including the formation of a secondary red peak near the Balmer center dependent on the H I column density. A preliminary application of our results to the CFHT data of the planetary nebula IC 5117 is presented.

  • PDF

An Embedded System Design of Collusion Attack Prevention for Multimedia Content Protection on Ubiquitous Network Environment (유비쿼터스 네트워크 환경의 멀티미디어 콘텐츠 보호를 위한 공모공격 방지 임베디드 시스템 설계)

  • Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.1
    • /
    • pp.15-21
    • /
    • 2010
  • This paper proposes the multimedia fingerprinting code insertion algorithm when video content is distributed in P2P environment, and designs the collusion codebook SRP(Small RISC Processor) embedded system for the collusion attack prevention. In the implemented system, it is detecting the fingerprinting code inserted in the video content of the client user in which it requests an upload to the web server and in which if it is certified content then transmitted to the streaming server then the implemented system allowed to distribute in P2P network. On the contrary, if it detects the collusion code, than the implemented system blocks to transmit the video content to the streaming server and discontinues to distribute in P2P network. And also it traces the colluders who generate the collusion code and participates in the collusion attack. The collusion code of the averaging attack is generated with 10% of BIBD code v. Based on the generated collusion code, the codebook is designed. As a result, when the insert quantity of the fingerprinting code is 0.15% upper in bitplane 0~3 of the Y(luminance) element of I-frame at the video compression of ASF for a streaming service and MP4 for an offline offer of video content, the correlation coefficient of the inserted original code and the detected code is above 0.15. At the correlation coefficient is above 0.1 then the detection ratio of the collusion code is 38%, and is above 0.2 then the trace ratio of the colluder is 20%.

Application of Commercial FEM Code to Coupled Analysis of Casting Deformation (범용 구조해석 프로그램의 주물 열변형 해석에의 적용성)

  • Kim, Ki-Young;Kim, Jung-Tae;Choi, Jung-Gil
    • Journal of Korea Foundry Society
    • /
    • v.22 no.4
    • /
    • pp.192-199
    • /
    • 2002
  • Dimensional defects of castings are mainly due to the stresses and strains caused by a nonuniform temperature distribution and phase transformation during solidification and cooling, and by mechanical constraint between the mold and casting. It is, however, nearly impossible to trace movements of the casting and mold during solidification and cooling by experimental measurements for castings with complex shape. Two and three dimensional deformation analyses of the casting and the mold were performed using commercial finite element code, MARC. It was possible to calculate deformation and temperature distribution in the casting and mold simultaneously. Cooling curves of the casting obtained by calculation were close to that measured in the field since it was possible to treat latent heat evolution of the casting which could be divided into two parts, primary and eutectic parts. Mold bent inward just after pouring due to the temperature gradient across the mold thickness, and mold returned to its previous position with time. Plastic deformation occurred at the part of the casting where solidification was slow.

Design and Implementation of Framework for Static Execution Flow Trace of Binary Codes (이진 코드의 정적 실행 흐름 추적을 위한 프레임워크 설계 및 구현)

  • Baek, Yeong-Tae;Kim, Ki-Tae;Jun, Sang-Pyo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.6
    • /
    • pp.51-59
    • /
    • 2011
  • In domestic, the binary code analysis technology is insufficient. In general, an executable file that is installed on your computer without the source code into an executable binary files is given only the most dangerous, or because it is unknown if the action is to occur. In this paper, static program analysis at the binary level to perform the design and implementation framework. In this paper, we create a control flow graph. We use the graph of the function call and determine whether dangerous. Through Framework, analysis of binary files is easy.

An Adaptive FEC Code Control Algorithm for Mobile Sensor Networks (이동 센서 네트워크를 위한 적응적 FEC 코드 제어 알고리즘)

  • Lee Young-Su;Hong Seung-Wook;Ahn Jong-Suk
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07a
    • /
    • pp.400-402
    • /
    • 2005
  • 전파(propagation) 오류가 빈번한 무선 이동 네트워크에서는 전송 성능을 향상하기 위해 FEC(Forward Error Correction) 알고리즘을 채택한다. 그러나 정적인 FEC 코드 제어 방식은 연속적으로 변화하는 전파 오류율에 알맞은 정정 코드(check code)를 적용하지 못해 성능이 저하된다. 일례로 측정한 고 오류 무선 센서 네트워크에서는 초단위 평균 BER(Bit Error Rate) 또는 분단위 평균 BER이 0에서 최대 $10^{-3}$까지 연속적으로 변화한다. 이러한 무선 환경에서 전파 오류를 $100\%$ 복구하기 위한 정정 코드를 채택하는 경우에는, 불필요한 정정 코드량은 전체 데이터에 최대 $20\%$를 차지한다. 본 논문에서는 무선 채널의 BER을 직접 측정하지 않고 패킷 전송 성공 여부에 따라 정정 코드의 량, 즉 FEC단계를 동적으로 변화하는 AFECCC (Adaptive FEC Code Control) 알고리즘을 소개한다. AFECCC는 트레이스 기반(trace-driven) 시뮬레이션에서 정적 FEC 방식에 비해 최대 $5\%$ 이상, 또한 실제 센서 네트워크에서는 정적 FEC 알고리즘에 비해 최대 $15\%$ 성능이 향상되었다.

  • PDF

A Meta-data Generation Technique for Efficient and Secure Code Reuse Attack Detection with a Consideration on Two Types of Instruction Set (안전하고 효율적인 Code Reuse Attack 탐지를 위한 ARM 프로세서의 두 가지 명령어 세트를 고려한 Meta-data 생성 기술)

  • Heo, Ingeo;Han, Sangjun;Lee, Jinyong;Paek, Yunheung
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.443-446
    • /
    • 2014
  • Code reuse attack (CRA)는 기존의 코드 내에서 필요한 코드 조각들 (gadgets)을 모아 indirect branch 명령어들로 잇는 방식으로 공격자가 원하는 악성 프로그램을 구성할 수 있는 강력한 공격 방법이다. 공격자는 자신의 코드를 대상 시스템에 심는 대신 기존의 코드를 이용하기 때문에, 대부분의 범용 운영체제 (OS)가 강제하는 W^X protection 을 무력화할 수 있다. 이러한 CRA 에 대응하기 위하여 다수의 연구들에서 branch 의 trace 를 분석하여 CRA 고유의 특성을 찾아내는 Signature 기반 탐지 기술을 제안하였다. 본 논문에서는 ARM 프로세서 상에서의 CRA 를 대응하기 위한 Signature 기반 탐지 기술을 효율적으로 도울 수 있는 binary 분석 및 meta-data 생성 기술을 제안한다. 특히, 본 논문은 우리의 이전 논문에서 고려 되지 못했던 ARM 의 두 가지 명령어 세트의 특성을 고려하여, 공격자가 어느 명령어 세트를 이용하여 CRA 를 시도하더라도 막아낼 수 있도록 meta-data 를 두 가지 mode 에 대해서 생성하였다. 실험 결과, meta-data 는 본래 바이너리 코드 대비 20.8% 정도의 크기 증가를 일으키는 것으로 나타났다.

A Study on the Development of Automatic Ship Berthing System (선박 자동접안시스템 구축을 위한 기초연구)

  • Kim, Y.B.;Choi, Y.W.;Chae, G.H.
    • Journal of Power System Engineering
    • /
    • v.10 no.4
    • /
    • pp.139-146
    • /
    • 2006
  • In this paper vector code correlation(VCC) method and an algorithm to promote the image processing performance in building an effective measurement system using cameras are described for automatically berthing and controlling the ship equipped with side thrusters. In order to realize automatic ship berthing, it is indispensable that the berthing assistant system on the ship should continuously trace a target in the berth to measure the distance to the target and the ship attitude, such that we can make the ship move to the specified location. The considered system is made up of 4 apparatuses compounded from a CCD camera, a camera direction controller, a popular PC with a built in image processing board and a signal conversion unit connected to parallel port of the PC. The object of this paper is to reduce the image processing time so that the berthing system is able to ensure the safety schedule against risks during approaching to the berth. It could be achieved by composing the vector code image to utilize the gradient of an approximated plane found with the brightness of pixels forming a certain region in an image and verifying the effectiveness on a commonly used PC. From experimental results, it is clear that the proposed method can be applied to the measurement system for automatic ship berthing and has the image processing time of fourfold as compared with the typical template matching method.

  • PDF

Application case for phase III of UAM-LWR benchmark: Uncertainty propagation of thermal-hydraulic macroscopic parameters

  • Mesado, C.;Miro, R.;Verdu, G.
    • Nuclear Engineering and Technology
    • /
    • v.52 no.8
    • /
    • pp.1626-1637
    • /
    • 2020
  • This work covers an important point of the benchmark released by the expert group on Uncertainty Analysis in Modeling of Light Water Reactors. This ambitious benchmark aims to determine the uncertainty in light water reactors systems and processes in all stages of calculation, with emphasis on multi-physics (coupled) and multi-scale simulations. The Gesellschaft für Anlagen und Reaktorsicherheit methodology is used to propagate the thermal-hydraulic uncertainty of macroscopic parameters through TRACE5.0p3/PARCSv3.0 coupled code. The main innovative points achieved in this work are i) a new thermal-hydraulic model is developed with a highly-accurate 3D core discretization plus an iterative process is presented to adjust the 3D bypass flow, ii) a control rod insertion occurrence -which data is obtained from a real PWR test- is used as a transient simulation, iii) two approaches are used for the propagation process: maximum response where the uncertainty and sensitivity analysis is performed for the maximum absolute response and index dependent where the uncertainty and sensitivity analysis is performed at each time step, and iv) RESTING MATLAB code is developed to automate the model generation process and, then, propagate the thermal-hydraulic uncertainty. The input uncertainty information is found in related literature or, if not found, defined based on expert judgment. This paper, first, presents the Gesellschaft für Anlagen und Reaktorsicherheit methodology to propagate the uncertainty in thermal-hydraulic macroscopic parameters and, then, shows the results when the methodology is applied to a PWR reactor.