• Title/Summary/Keyword: extended codes

Search Result 108, Processing Time 0.028 seconds

Extended OVSF for MIMO-CDMA System (HIMO-CDMA 시스템을 위한 확장 OVSF)

  • Lee, Kwank-Jae;Hou, Jia;Lee, Moon-Ho
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.9 s.100
    • /
    • pp.855-861
    • /
    • 2005
  • Two-dimensional orthogonal variable spreading codes are presented far multiplexing of forward link in direct sequence code division multiple access(DS-CDMA) multiple antennas system. The bit error rate(BER) performance under a multi-user environment fur the additive white Gaussian noise(AWGN) channel and Rayleigh fading MIMO channel are evaluated. The results demonstrate that the proposed scheme could provide flexible rates and lower peak correlation values.

A Dynamic Comprehension Syseem with Extended Semotaction Codes (은유적 표현과 의미의 범위확장)

  • 이창인;김상하
    • Korean Journal of Cognitive Science
    • /
    • v.4 no.2
    • /
    • pp.263-278
    • /
    • 1994
  • This paper proposes a way of decoding and translating some metaphorical use in a SL(Source Language). The process of metaphorical usage should be different from that of idiomatic expressions,which can be treated as a flat structure or chunks(cf.Lee(1985)[5],Yoon & Kim(1993)[7].The representation of metaphorical usage is approached with'M'in a separate dictionary with the extened meaning of property.

Cyberattack Tracing System Operational Architecture (사이버공격 추적시스템 운용아키텍처)

  • Ahn, Jae-hong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.26 no.2
    • /
    • pp.179-187
    • /
    • 2023
  • APT cyber attacks have been a problem for over a past decade, but still remain a challenge today as attackers use more sophisticated techniques and the number of objects to be protected increases. 'Cyberattack Tracing System' allows analysts to find undetected attack codes that penetrated and hid in enterprises, and to investigate their lateral movement propagation activities. The enterprise is characterized by multiple networks and mass hosts (PCs/servers). This paper presents a data processing procedure that collects event data, generates a temporally and spatially extended provenance graph and cyberattack tracing paths. In each data process procedure phases, system design considerations are suggested. With reflecting the data processing procedure and the characteristics of enterprise environment, an operational architecture for CyberAttack Tracing System is presented. The operational architecture will be lead to the detailed design of the system.

Design and Implementation of Circular Dot Pattern Code (CDPC) and Its Recognition Algorithm which is robust to Geometric Distortion and Noise (대화형 인쇄물 구현을 위한 기하변형과 잡음에 강인한 원형 점 패턴코드의 설계와 인식 알고리즘 구현)

  • Shim, Jae-Youn;Kim, Seong-Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.1166-1169
    • /
    • 2011
  • In this paper, we design a Circle dot Code, In our scheme, we design a dot patterns for increasing maximum capacity and also for increasing robustness to Affine Transformation. Our code Can be extended according number of data circle. We use three data circle vision code. In this type code, after acquiring camera images for the Circle dot Codes, and perform error correction decoding using four position symbols and six CRC symbols. We perform graph based dot code analysis which determines the topological distance between dot pixels. Our code can be bridged the real world and ubiquitous computing environment.

Eligibility of the affinity between alphabet codes and pronunciation drills

  • Kim, Hyoung-Youb
    • Lingua Humanitatis
    • /
    • v.8
    • /
    • pp.331-367
    • /
    • 2006
  • In this paper I attempted to investigate the matters related with the clarification of the close relationship between writing system and pronunciation. On the way of pursuing the research on the subject I found the fact that the same topic has been the main academic target in Korea. There have been some remarks about English alphabets and pronunciation. Nevertheless, the relation between alphabet codes and pronunciation tokens wasn't considered as the main key to master the English pronunciation correctly and completely. As the main target of this paper I argue that it is necessary to comprehend the connection. Then, we can recognize the significant role of alphabetic structure for understanding the gist of pronunciation exercise. This paper is classified into four parts. Each part consists of the material to affirm the fact that writing system should be the inevitable equivalent of sound system, and vice versa. In the first section I show that the development of the way of pronouncing English words is closely related with the endeavors of the scholars. While performing the survey of the studies about the alphabetic structure of the age many scholars found that the spelling construction was recorded without any common denominator. Thus, they not only sought to stage the bedrock for the standard written form of words but also to associate the alphabet letters with phonetic features. Secondly I mention the negative aspect of the 'only spelling based English pronunciation education' for the educational goal of 'Phonics methodology.' In this part I suggest the essentiality of phonemic properties with the phonetic prospect: phonemic awareness. Thirdly I refer to the standardization of the spelling system of English. As the realm of application of the language is extended toward the various professional areas such as commercial, scientific, and cultural spheres, it is quite natural to assume that the usage of the language will be transformed according to the areas in the world. Fourthly I introduce the first English-Korean grammar book with the section of 'the introduction to English pronunciation.' At the chapter the author explained the sound features of English based on the regulation of 'Scientific Alphabet' of U.S.A. In the transcribing system all the symbols were postulated on the basis of the English alphabet form instead of the separate phonetic signs of IPA.

  • PDF

Soft-Decision Decoding of the [23,12] Golay Code Using Covering Polynomials (커버링 다항식을 이용한 골레이 부호의 연판정 복호)

  • 성원진
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.3A
    • /
    • pp.180-187
    • /
    • 2002
  • The decoding method using covering polynomials is an extended form of error-trapping decoding, and is a simple and effective means to implement decoders for cyclic codes. Covering polynomials can be used for soft-decision decoding as well as for decoding beyond the bounded distance of the code. The implementation complexity is proportional to the number of covering polynomials employed. In this paper, the soft-decision decoding procedure using covering polynomials is described, and the procedure is applied to the [23,12] Golay code. A new set of covering polynomials is derived for the procedure, which is presented as a generalized closed-form solution. The set can be efficiently utilized for decoding a class of cyclic codes including the Golay code. Computer simulation of the described procedure is performed to show the trade-offs between the decoder performance and complexity. It is demonstrated that soft-decision decoding of the Golay code using the derived set of covering polynomials has less than 0.2dB deviation from the optimal performance of maximum-likelihood decoding, with a reduced complexity when compared to the Chase Algorithm 2 combined with hard-decision decoding that has nearly identical performance.

An Anti-Forensic Technique for Hiding Data in NTFS Index Record with a Unicode Transformation (유니코드 변환이 적용된 NTFS 인덱스 레코드에 데이터를 숨기기 위한 안티포렌식 기법)

  • Cho, Gyu-Sang
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.75-84
    • /
    • 2015
  • In an "NTFS Index Record Data Hiding" method messages are hidden by using file names. Windows NTFS file naming convention has some forbidden ASCII characters for a file name. When inputting Hangul with the Roman alphabet, if the forbidden characters for the file name and binary data are used, the codes are convert to a designated unicode point to avoid a file creation error due to unsuitable characters. In this paper, the problem of a file creation error due to non-admittable characters for the file name is fixed, which is used in the index record data hiding method. Using Hangul with Roman alphabet the characters cause a file creation error are converted to an arbitrary unicode point except Hangul and Roman alphabet area. When it comes to binary data, all 256 codes are converted to designated unicode area except an extended unicode(surrogate pairs) and ASCII code area. The results of the two cases, i.e. the Hangul with Roman alphabet case and the binary case, show the applicability of the proposed method.

Iterative Series Methods in 3-D EM Modeling (급수 전개법에 의한 3차원 전자탐사 모델링)

  • Cho In-Ky;Yong Hwan-Ho;Ahn Hee-Yoon
    • Geophysics and Geophysical Exploration
    • /
    • v.4 no.3
    • /
    • pp.70-79
    • /
    • 2001
  • The integral equation method is a powerful tool for numerical electromagnetic modeling. But the difficulty of this technique is the size of the linear equations, which demands excessive memory and calculation time to invert. This limitation of the integral equation method becomes critical in inverse problem. The conventional Born approximation, where the electric field in the anomalous body is approximated by the background field, is very rapid and easy to compute. However, the technique is inaccurate when the conductivity contrast between the body and the background medium is large. Quasi-linear, quasi-analytical and extended Born approximations are novel approaches to 3-D EM modeling based on the linearization of the integral equations for scattered EM field. These approximation methods are much less time consuming than full integral equation method and more accurate than conventional Born approximation. They we, however, still approximate methods for 3-D EM modeling. Iterative series methods such as modified Born, quasi-linear and quasi-analytical can be used to increase the accuracy of various approximation methods. Comparisons of numerical performance against a full integral equation and various approximation codes show that the iterative series methods are very accurate and almost always converge. Furthermore, they are very fast and easy to implement on a computer. In this study, extended Born series method is developed and it shows more accurate result than that of other series methods. Therefore, Iterative series methods, including extended Born series, open principally new possibilities for fast and accurate 3-D EM modeling and inversion.

  • PDF

Remote Versioning on the CoSpace Client for the CoSlide Collaborative System (CoSlide 협업시스템을 지원하는 CoSpace 클라이언트의 원격 버전 관리)

  • Park, Jong-Moon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.233-241
    • /
    • 2010
  • CoSlide is a collaborative system, extending the Jakarta Slide WebDAV server. The CoSlide server provides group workspaces for collaborators. CoSpace is a client which supports various collaborative authoring activities on the CoSlide server through the WebDAV protocol. CoSpace provides graphic user interfaces to support effective interaction among the collaborators, managing the shared resources for them. However, during collaboration, simultaneous modifications on the content of shared resources might cause conflicts among the content of the revisions made by the collaborators, leading to serious problems on project progress. In this paper, we describe an extension of the CoSpace client to solve the problem. The extended CoSpace client supports the remote version management facility through which the collaborators can manage the versions of the associated server resources in the distance. Also, to identify the changes of the text files such as program source codes, the extended client provides the facility for comparing two versions and displaying the differences in a visual manner. In addition, it provides the version management of a whole workspace and the removal of all the unnecessary versions of the designated resources.

A one-dimensional model for impact forces resulting from high mass, low velocity debris

  • Paczkowski, K.;Riggs, H.R.;Naito, C.J.;Lehmann, A.
    • Structural Engineering and Mechanics
    • /
    • v.42 no.6
    • /
    • pp.831-847
    • /
    • 2012
  • Impact from water-borne debris during tsunami and flood events pose a potential threat to structures. Debris impact forces specified by current codes and standards are based on rigid body dynamics, leading to forces that are dependent on total debris mass. However, shipping containers and other debris are unlikely to be rigid compared to the walls, columns and other structures that they impact. The application of a simple one-dimensional model to obtain impact force magnitude and duration, based on acoustic wave propagation in a flexible projectile, is explored. The focus herein is on in-air impact. Based on small-scale experiments, the applicability of the model to predict actual impact forces is investigated. The tests show that the force and duration are reasonably well represented by the simple model, but they also show how actual impact differs from the ideal model. A more detailed three-dimensional finite element model is also developed to understand more clearly the physical phenomena involved in the experimental tests. The tests and the FE results reveal important characteristics of actual impact, knowledge of which can be used to guide larger scale experiments and detailed modeling. The one-dimensional model is extended to consider water-driven debris as well. When fluid is used to propel the 1-D model, an estimate of the 'added mass' effect is possible. In this extended model the debris impact force depends on the wave propagation in the two media, and the conditions under which the fluid increases the impact force are discussed.