• Title/Summary/Keyword: code complexity

Search Result 596, Processing Time 0.021 seconds

NUMERICAL SIMULATION OF TWO-DIMENSIONAL MICROORGANISM LOCOMOTION USING THE IMMERSED BOUNDARY METHOD (가상경계법을 적용한 2차원 미생물 이동에 관한 수치연구)

  • Maniyeri, Ranjith;Suh, Yong-Kweon;Kang, Sang-Mo
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.164-169
    • /
    • 2009
  • Study on swimming of microorganisms like, sperm motility, cilia beating, bacterial flagellar propulsion has found immense significance in the field of biological fluiddynamics. Because of the complexity involved, it is challenging for the researchers to model such problems. Immersed boundary method has proved its efficacy in the field of biological fluiddynamics, The present work aims at performing a numerical study on the microorganism locomotion using the immersed boundary method proposed by Peskin[1]. A two-dimensional model of the microorganism is modeled as thin elastic filament described as a sine wave. The neutrally buoyant organism undergoing deformations is immersed in a viscous and incompressible fluid. The fluid quantities are described using Eulerian coordinates and the immersed body is represented by Lagrangian coordinates. The Eulerian and Lagrangian variables are connected by the Dirac delta function. The Navier-Stokes equations governing the fluid flow are solved using the fractional step method on a staggered Cartesian grid system. The developed numerical code in FORTRAN will be validated by comparing the numerical results with the available results.

  • PDF

Application of Machine Learning Techniques for the Classification of Source Code Vulnerability (소스코드 취약성 분류를 위한 기계학습 기법의 적용)

  • Lee, Won-Kyung;Lee, Min-Ju;Seo, DongSu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.735-743
    • /
    • 2020
  • Secure coding is a technique that detects malicious attack or unexpected errors to make software systems resilient against such circumstances. In many cases secure coding relies on static analysis tools to find vulnerable patterns and contaminated data in advance. However, secure coding has the disadvantage of being dependent on rule-sets, and accurate diagnosis is difficult as the complexity of static analysis tools increases. In order to support secure coding, we apply machine learning techniques, such as DNN, CNN and RNN to investigate into finding major weakness patterns shown in secure development coding guides and present machine learning models and experimental results. We believe that machine learning techniques can support detecting security weakness along with static analysis techniques.

Development of an Extraction Method of Cortical Surfaces from MR Images for Improvement in Efficiency and Accuracy (효율성과 정확도 향상을 위한 MR 영상에서의 뇌 외곽선 추출 기법 개발)

  • An, Kwang-Ok;Jung, Hyun-Kyo
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.4
    • /
    • pp.549-555
    • /
    • 2007
  • In order to study cortical properties in human, it is necessary to obtain an accurate and explicit representation of the cortical surface in individual subjects. Among many approaches, surface-based method that reconstructs a 3-D model from contour lines on cross-section images is widely used. In general, however, medical brain imaging has some problems such as the complexity of the images, non-linear gain artifacts and so on. Due these limitations, therefore, extracting anatomical structures from imaging data is very a complicated and time-consuming task. In this paper, we present an improved method for extracting contour lines of cortical surface from magnetic resonance images that simplifies procedures of a conventional method. The conventional method obtains contour lines through thinning and chain code process. On the other hand, the proposed method can extract contour lines from comparison between boundary data and labeling image without supplementary processes. The usefulness of the proposed method has been verified using brain image.

Numerical study on the effects of air staging on combustion in the three air stage heavy oil fired combustion system (삼단중유연소 버너에서 다단비가 연소현상에 미치는 영향에 대한 수치 연구)

  • Lee, Sung-Soo;Kim, Hyuck-Ju;Park, Byoung-Sik;Kim, Jong-Jin;Choi, Gyu-Sung
    • 한국연소학회:학술대회논문집
    • /
    • 2004.06a
    • /
    • pp.235-241
    • /
    • 2004
  • Computations were performed to investigate the effects of air staging on combustion in three stage heavy-oil fired combustion burner. The burner was designed for 3 MW. Different amounts of air are introduced into each 3 three stages by means of each dampers. The goal of the study is to understand combustion phenomena according to each air stage mass ratios through CFD. Air flow rates at three inlets are adjusted by dampers inside a burner. Here, injection conditions of liquid fuel are kept constant throughout all simulations. This assumption is made in order to limit the complexity of oil combustion though it may cause some disagreement. In case of cold flows, only longitudinal velocities arc considered, On the other hand, flow, temperature and NOx generations are taken into account for reactive flows. Simple parametric study was conducted by setting 1'st air stage mass ratio as a parameter. And an optimal operation condition was found. The computational study is based on k-e model, P-1 radiation model(WSGGM) and PDF, and is implemented on a commercial code, FLUENT.

  • PDF

Efficient Design of Structured LDPC Codes (구조적 LDPC 부호의 효율적인 설계)

  • Chung Bi-Woong;Kim Joon-Sung;Song Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.14-19
    • /
    • 2006
  • The high encoding complexity of LDPC codes can be solved by designing structured parity-check matrix. If the parity-check matrix of LDPC codes is composed of same type of blocks, decoder implementation can be simple, this structure allow structured decoding and required memory for storing the parity-check matrix can be reduced largely. In this parer, we propose a construction algorithm for short block length structured LDPC codes based on girth condition, PEG algorithm and variable node connectivity. The code designed by this algorithm shows similar performance to other codes without structured constraint in low SNR and better performance in high SNR than those by simulation

Energy Efficient Cooperative LEACH Protocol for Wireless Sensor Networks

  • Asaduzzaman, Asaduzzaman;Kong, Hyung-Yun
    • Journal of Communications and Networks
    • /
    • v.12 no.4
    • /
    • pp.358-365
    • /
    • 2010
  • We develop a low complexity cooperative diversity protocol for low energy adaptive clustering hierarchy (LEACH) based wireless sensor networks. A cross layer approach is used to obtain spatial diversity in the physical layer. In this paper, a simple modification in clustering algorithm of the LEACH protocol is proposed to exploit virtual multiple-input multiple-output (MIMO) based user cooperation. In lieu of selecting a single cluster-head at network layer, we proposed M cluster-heads in each cluster to obtain a diversity order of M in long distance communication. Due to the broadcast nature of wireless transmission, cluster-heads are able to receive data from sensor nodes at the same time. This fact ensures the synchronization required to implement a virtual MIMO based space time block code (STBC) in cluster-head to sink node transmission. An analytical method to evaluate the energy consumption based on BER curve is presented. Analysis and simulation results show that proposed cooperative LEACH protocol can save a huge amount of energy over LEACH protocol with same data rate, bit error rate, delay and bandwidth requirements. Moreover, this proposal can achieve higher order diversity with improved spectral efficiency compared to other virtual MIMO based protocols.

Walsh Coded Training Signal Aided Time Domain Channel Estimation Scheme In MIMO-OFDM Systems (MIMO-OFDM 시스템에서 Walsh 부호화된 훈련 신호를 이용한 시간 영역 채널 추정 방식)

  • Jeon, Hyoung-Goo;Jang, Jong-Wook;Song, Hyoung-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.3C
    • /
    • pp.331-337
    • /
    • 2007
  • In this paper, we propose a novel Walsh coded training signal design and Walsh decoding method to estimate the channel response in MIMO-OFDM systems. The Walsh coded training signals are designed to have orthogonal property in time domain. Using the orthogonal property, the Walsh decoding process makes it possible to separate the desired training signal from the received signal and to estimate the channel response. The computer simulation results show that the proposed method exhibits almost the same performance as Li's original method using the optimal training sequence, even though the proposed method has much lower complexity.

DEVELOPMENT OF GEOLGOCIAL SYMBOL MAPPING TOOL

  • Yeon, Young-Kwang;Han, Jong-Gyu;Chi, Kwang-Hoon
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.896-898
    • /
    • 2006
  • Geological symbols are used for describing geological information. But it's not ease to represent them in commercial GIS s/w, because of their complexity and diversity. This study aims at developing the geological symbol mapping tool for representing geological symbol on user's geological information. Geological symbol mapping too is a web application which can handle SHP format and map geological symbols based on user's requests. It manages geological symbols and mapping codes and symbols are mapped within the geological boundary according to the corresponding non-spatial field that is a mapping code. The system has functions to upload a user's GIS file, and download the converted image file which is mapped geological patterns. The system displays converted images to be check mapping results. Because the symbols are simple bitmap files, user(system manager) can design and apply them rapidly without considering specific commercial S/W. Thus, it is expected that this system plays an important role to disseminate geological standards such as geological symbols. And the results of this study can be used for developing global geological symbols and applying them easily

  • PDF

Performance of the Concatenated System of MTCM Codes with STBC on Fast Rayleigh Fading Channels (빠른 레일리 페이딩채널에서 MTCM 부호와 STBC를 결합한 시스템의 성능평가)

  • Jin, Ik-Soo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.6
    • /
    • pp.141-148
    • /
    • 2009
  • Space-time block codes (STBC) have no coding gain but they provide a full diversity gain with relatively low encoder/decoder complexity. Therefore, STBC should be concatenated with an outer code which provides an additional coding gain. In this paper, we consider the concatenation of multiple trellis-coded modulation (MTCM) codes with STBC for achieving significant coding gain with full antenna diversity. Using criteria of equal transmit power, spectral efficiency and the number of trellis states, the performance of concatenated scheme is compared to that of previously known space-time trellis codes (STTC) in terms of frame error rate (FER). Simulation results show that MTCM codes concatenated with STBC offer better performance on fast Rayleigh fading channels, than previously known STTC with two transmit antennas and one receive antenna.

  • PDF

Novel Multiple Access Schemes for IEEE 802.15.4a Low-rate Ultra-wide Band Systems

  • Zhang, Hong;Hui, Bing;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7A
    • /
    • pp.682-687
    • /
    • 2010
  • The IEEE 802.15.4a specification targets the low-rate (LR) Impulse-radio (IR) ultra-wideband (UWB) system which is now widely applied in the WPANs considering rather short distance communications with low complexity and power consumption. The physical (PHY) layer uses concatenated coding with mixed binary phase-shift keying and binary pulse-position modulation (BPSK-BPPM), and direct sequence spreading with time hopping in order that both coherent and non-coherent receiver architectures are supported. In this paper, the performances of multiple access schemes compliant with IEEE 802.15.4a specification are investigated with energy detection receiver, which allow avoiding the complex channel estimation needed by a coherent receiver. However, the performance of energy detection receiver is severely degraded by multi-user interference (MUI), which largely diminishes one of the most fascinating advantages of UWB, namely robustness to MUI as well as the possibility to allow parallel transmissions. So as to improve the performance of multiple access schemes, we propose to apply the novel TH sequences as well as to increase the number of TH positions. The simulation results show that our novel multiple access schemes significantly improve the performance against MUI.