• Title/Summary/Keyword: US Code

Search Result 243, Processing Time 0.024 seconds

M-1-1 Cooperative Protocol Based on OSOC-SS to Improve Bandwidth Utilization in USN

  • Kong, Hyung-Yun;Hwang, Yun-Kyeong
    • Journal of electromagnetic engineering and science
    • /
    • v.8 no.2
    • /
    • pp.41-46
    • /
    • 2008
  • A bandwidth and power efficient high speed ubiquitous sensor network(USN) for realizing a ubiquitous society is a great challenge for researcher community. In this paper we incorporate a cooperative transmission protocol within a special type of multi-code modulation to meet these requirements. Multi-code(Mc) modulation has been developed for high-speed data transmission over wireless channels. We proposed a new class of orthogonal codes for multi-code modulation which is an orthogonal subset of orthogonal codes(OSOC). Our proposed OSOC structure allows us to use only one relay to cooperate M nodes that effectively reduces the bandwidth and power requirement. This protocol is similar to spread-spectrum(SS) technique that can reduce both broad and narrow band jamming.

2.5D Metaverse Game Engine using Java (자바를 이용한 2.5D 메타버스 게임 엔진 설계 및 구현)

  • Han, Seung Hoon;Kim, Eun Ju
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.260-268
    • /
    • 2007
  • The game was mainly developed using the C/C++ language and DirectX in the current computer and mobile field. But, if we use these limited language, we can suppress a diversity of game engine when we design various game engines. In this paper, we wanted to develop the game us ing the Java to use the limited game development language with some variety and designed and developed the airplane combat game, the metaverse game engine as the game for the reuse and the extensibility of the code in the game engine us ing the re-use of the code of the features in the Java.

  • PDF

GEANT4 characterization of the neutronic behavior of the active zone of the MEGAPIE spallation target

  • Lamrabet, Abdesslam;Maghnouj, Abdelmajid;Tajmouati, Jaouad;Bencheikh, Mohamed
    • Nuclear Engineering and Technology
    • /
    • v.53 no.10
    • /
    • pp.3164-3170
    • /
    • 2021
  • The increasing interest that GEANT4 is gaining nowadays, because of its special capabilities, prompted us to address its reliability in neutronic calculation for the realistic and complex spallation target MEGAPIE of the Paul Scherrer Institute of Switzerland. In this paper we have specifically addressed the neutronic characterization of the active zone of this target. Three physical quantities are evaluated: neutron flux spectra and total neutron fluxes on target's z-axis, and the neutron yield as a function of the target's altitude and radius. Comparison of the obtained results with those of the MCNPX reference code and some experimental measurements have confirmed the impact of the geometrical and proton beam models on the neutron fluxes. It has also allowed to reveal the intrinsic influence of the code type. The resulting differences reach a factor of ~2 for the beam model and 4-18% for the other parameters cumulated. The analysis of the neutron yield has led us to conclude that: 1) Increasing the productivity of the MEGAPIE target cannot be achieved simply by increasing the thickness of the target, if the irradiation parameters are not modified. 2) The size of the spallation area needs to be redefined more precisely.

A Program Similarity Check by Flow Graphs of Functional Programs (흐름 그래프 형태를 이용한 함수형 프로그램 유사성 비고)

  • Seo Sunae;Han Taisook
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.4
    • /
    • pp.290-299
    • /
    • 2005
  • Stealing the source code of a program is a serious problem not only in a moral sense but also in a legal sense. However, it is not clear whether the code of a program is copied from another or not. There was a program similarity checker detecting code-copy by comparing the syntax trees of programs. However this method has a limitation that it cannot detect the code-copy attacks when the attacker modifies the syntax of the program on purpose. We propose a program similarity check by program control graph, which reveals not only syntax information but also control dependancy. Our method can detect the code-copy attacks that do not change control dependancy Moreover, we define what code-copy means and establish the connection between code-copy and similarity of program control graph: we prove that two programs are related by copy congruence if and only if the program control graphs of these programs are equivalent. We implemented our method on a functional programming language, nML. The experimental results show us that the suggested method can detect code similarity that is not detected by the existing method.

Investigations on coefficient of variation of extreme wind speed

  • Xu, Fuyou;Cai, Chunsheng;Zhang, Zhe
    • Wind and Structures
    • /
    • v.18 no.6
    • /
    • pp.633-650
    • /
    • 2014
  • The uncertainty of extreme wind speeds is one key contributor to the uncertainty of wind loads and their effects on structures. The probability distribution of annual extreme wind speeds may be characterized using a classical Gumbel Type distribution. The expression that establishes the relationship between the extreme wind speeds at different recurrence periods and the corresponding coefficients of variation is formulated, and its efficacy is validated. The coefficients of variation are calibrated to be about 0.125 and 0.184 according to defined Chinese and US design specifications, respectively. Based on the wind data of 54 cities in China, 49 meteorological stations in the US, 3 stations in Singapore, the coefficients span intervals of (0.1, 0.35), (0.08, 0.20) and (0.06, 0.14), respectively. For hurricanes in the US, the coefficients range approximately from 0.3 to 0.4. This convenient technique is recommended as one alternative tool for coefficient of variation analyses in the future revisions of related codes. The sensitivities of coefficients of variation for 49 meteorological stations in the US are quantified and demonstrated. Some contradictions and incompatibilities can be clearly detected and illustrated by comparing the coefficients of variation obtained with different combinations of recurrence period wind data.

Automatic Generation Method of Proxy Client Code to Autonomic Quality Information (자율적인 웹 서비스 품질 정보 수집을 위한 프록시 클라이언트 코드의 자동 생성 방안)

  • Seo, Young-Jun;Han, Jung-Soo;Song, Young-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.228-235
    • /
    • 2008
  • This paper proposes automatic generation method of proxy client code to automation of web service selection process through a monitoring agent. The technique of this paper help service consumer to provide source code of proxy client as it bring an attribute value of specific element of WSDL document using template rule. Namely, a XSLT script file provide code frame of dynamic invocation interface model. The automatic code generation technique need to solving starvation status of selection architecture. It is required to creating request HTTP message for every service on the result of search. The created proxy client program code generate dummy message about services. The proposed client code generation method show us a possibility of application in the automatic generation programming domain.

A Study on the Pentium Code Generation using Retargetable Code Generation Technique from Bytecode (Bytecode로부터 재목적 코드 생성 기법을 이용한 Pentium 코드 생성에 관한 연구)

  • Jeong, Seong-Ok;Go, Gwang-Man;Lee, Seong-Ju
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.4
    • /
    • pp.1-8
    • /
    • 2000
  • The massive growth of the internet and the world-wide-web leads us to research the programming languages for the development of applications in heterogeneous, network-wide distributed environments. Java is an object-oriented language for such a environment and the Java programming language environment provides a portable, interpreted, high-performance, simple programming language. Bytecode is an intermediate code for Java language and it enables the development of applications on multiple platform in heterogeneous, distributed networks. But it takes much time to execute Bytecode because of using an interpretation method. In this paper, we design and implement a retargetable code generation system which can be systematically reconfigured to generate code for a variety of distinct target computers. From the system, we realize the code generation system which translates the Bytecode being produced by Java compiler into Pentium target code. We use ACK code generation system to do the work easily.

  • PDF

The Code of Medical Ethics for the Korean Academy of Child and Adolescent Psychiatry: Why Is It Important? (대한소아청소년정신의학회 의료윤리규정: 왜 필요한가?)

  • Koo, Young-Jin;Hwang, Jun-Won;Lee, Moon-Soo;Yang, Young-Hui;Bang, Soo-Young;Kang, Je-Wook;Lee, Dae-Hwan;Lee, Ju-Hyun;Kwack, Young-Sook;Kim, Seungtai Peter;Noh, Kyung Sun;Park, Sung-Sook;Bahn, Geon Ho;Song, Dong-Ho;Ahn, Dong Hyun;Lee, Young Sik;Lee, Jeong-Seop;Cho, Soo-Churl;Hong, Kang-E Michael
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.27 no.1
    • /
    • pp.2-30
    • /
    • 2016
  • This article provides an overview of the developmental history and rationale of medical ethics to establish the code of ethics and professional conduct of the Korean Academy of Child and Adolescent Psychiatry (KACAP). Most medical professional organizations have their own codes of ethics and conduct because they have continuous responsibility to regulate professional activities and conducts for their members. The Ethics and Award Committee of the KACAP appointed a Task-Force to establish the code of ethics and conduct in 2012. Because bioethics has become global, the Ethics Task Force examined global standards. Global standards in medical ethics and professional conduct adopted by the World Medical Association and the World Psychiatric Association have provided the basic framework for our KACAP's code of ethics and professional conduct. The Code of Ethics of the Americal Academy of Child and Adolescent Psychiatry has provided us additional specific clarifications required for child and adolescent patients. The code of ethics and professional conduct of the KACAP will be helpful to us in ethical clinical practice and will ensure our competence in recognizing ethical violations.

Application of a Wire code in Domestic Residential EMF Studies (국내 거주환경에서의 전자기장 노출평가를 위한 Wire code의 타당성에 관한 연구)

  • Tak, Sang-Woo;Kim, Hyun;Kim, Rohko
    • Journal of Environmental Health Sciences
    • /
    • v.26 no.3
    • /
    • pp.55-60
    • /
    • 2000
  • Wire codes, introduced by Wertheimer and Leeper, are interesting largely because several case-control studies have reported associations between them and certain types of cancers, including childhood leukemia. This paper is concerned with the reliability of wire codes as a surrogate for residential electric and magnetic field, divided into four categories based on the electrical wiring within 40m of homes. To examine the correlation between spot measurements and wire codes, EMF was measured by using HI-3604 and classified by wire codes. The correlation between long-transformed RMS of magnetic field and wire codes was 0.81. But the correlation between log-transformed RMS of electric field and wire codes was 0.27. The results led us to determine a four category from of the Wertheimer and Leeper code that 1) may be useful in domestic epidemiological studies and 2) is not suitable for electric field exposure. Thus, the critical point of exposure assessment in residential magnetic field is to classify a wire code precisely.

  • PDF

A study on the Means of Egress Codes for Interior Architecture in the United States - Focused on Evacuation Elements in the Interior Architectural Design - (미국의 실내건축 피난 규정에 관한 연구 - 실내건축계획에 있어 피난 요소를 중심으로 -)

  • Kim, Young-Sung;Cho, Sung-O
    • Korean Institute of Interior Design Journal
    • /
    • v.27 no.3
    • /
    • pp.24-32
    • /
    • 2018
  • The law reflects the situation of the times, understands the society, and shows the will of the state and the community. The Means of Egress should be maintained from design to construction, supervision, as well as use, in order to protect the lives and property of the residents as well as the safe use of the facilities. However, Interior Architects are think that evacuation and safety regulations are complex elements that change frequently and may inhibit the idea of design. The purpose of this study is to propose a design method for the use of safe facilities in the interior architectural design on the evacuation regulations affecting the actual design by the IBC(the International Building Code) and NFPA(National Fire Protection Association) LSC (Life Safety Code). The research method is to investigate and analyze the provisions related to the evacuation of interior architecture in the US and to understand the current regulations and the evacuation regulations. We suggest to design method to the details of the hallway, corridors, aisle accessway, door way, exit path, In particular, the design of furniture, tables and chairs layout that could be obstacles to evacuation situations is presented.