• Title/Summary/Keyword: one-one code

Search Result 2,572, Processing Time 0.031 seconds

A Numerical Analysis on Two-Dimensional Viscous Flowfield around a Steam Turbine Cascade (2차원 증기터어빈 익렬유동의 수치적 해석)

  • Kim Y. I.;Kim K. S.;Kim K. C.;Ha M. Y.;Park H. D.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.64-69
    • /
    • 1995
  • A computer code for solving the Reynolds averaged full Navier-Stokes equations has bent developed for analysis of gas and steam turbine cascade flows with the option of using one of two types of turbulence model. One is the Baldwin-Lomax model and the other is standard $k-{\varepsilon}$ model. The numerical integration is based on the explicit four stage Runge-Kutta scheme and finite volume method. To be verified, the resulting code is applied to VKI turbine cascade and compared with the previous experimental results. Finally, the flowfield around a steam turbine cascade is analyzed. Comparisons with experimental data show that present numerical scheme is an accurate Navier-Stokes solver and can give very good predictions for both gas and steam turbine cascade flow.

  • PDF

New Postprocessing Methods for Rejectin Out-of-Vocabulary Words

  • Song, Myung-Gyu
    • The Journal of the Acoustical Society of Korea
    • /
    • v.16 no.3E
    • /
    • pp.19-23
    • /
    • 1997
  • The goal of postprocessing in automatic speech recognition is to improve recognition performance by utterance verification at the output of recognition stage. It is focused on the effective rejection of out-of vocabulary words based on the confidence score of hypothesized candidate word. We present two methods for computing confidence scores. Both methods are based on the distance between each observation vector and the representative code vector, which is defined by the most likely code vector at each state. While the first method employs simple time normalization, the second one uses a normalization technique based on the concept of on-line garbage mode[1]. According to the speaker independent isolated words recognition experiment with discrete density HMM, the second method outperforms both the first one and conventional likelihood ratio scoring method[2].

  • PDF

The Security Framework Using ONE-TIME Execution Code in a Client/Server Environment (클라이언트/서버 환경에서 일회성 실행 코드를 이용한 보안 프레임워크)

  • Beak, Yeong-Tae;Lee, Se-Hoon;Shin, Young-Jin;Park, Jeon-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.33-36
    • /
    • 2011
  • 본 논문에서는 기존 클라이언트/서버 환경에서 이용되는 보안 방법에 대해 새로운 방식으로 접근하고 이를 통하여 전통적인 클라이언트/서버 환경의 정보시스템에서 클라이언트를 위조하거나 변조하는 등 해킹시도 및 해킹 여부를 판별하여 안전한 클라이언트 시스템이 작동될 수 있는 일회성 코드를 이용한 보안 프레임워크를 제안한다. 제안된 보안 프레임워크는 기업체의 정보시스템 뿐만 아니라 게임 분야 등에 매우 유용하게 활용될 수 있다.

  • PDF

Fatigue Evaluation on the Inside Surface of Reactor Coolant Pump Casing Weld

  • Kim, Seung-Tae;Park, Ki-Sung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1998.05b
    • /
    • pp.795-801
    • /
    • 1998
  • Metallic fatigue of Pressurized Water Reactor(PWR) materials is a generic safety issue for commercial nuclear power plants. It is very important to obtain the fatigue usage factor for component integrity and life extension. In this paper, fatigue usage was obtained at the inside surface of Kori unit 2, 3 and 4 RCP casing weld, based on the design transient. And it was intended to establish the procedure and the detailed method of fatigue evaluation in accordance with ASME Section III Code. According to this code rule, two methods to determine the stress cycle and the number of cycles could be applied. One method is the superposition of cycles of various design transients and the other is based on the assumption that a stress cycle correspond to only one design transient. Both method showed almost same fatigue usage in the RCP casing weld.

  • PDF

NUMERICAL SIMULATION OF FLOWS INDUCED BY WALL ADHESION (벽면흡착에 의해 야기되는 유동 수치해석)

  • Myong, H.K.
    • 한국전산유체공학회:학술대회논문집
    • /
    • 2011.05a
    • /
    • pp.2-5
    • /
    • 2011
  • This paper presents a numerical study on multiphase flows induced by wall adhesion The CSF(Continuum Surface Force} model is used for the calculation of the surface tension force and implemented in an in-house solution code(PowerCFD). The present method(code) employs an unstructured cell-centered method based on a conservative pressure-based finite-volume method with volume capturing method(CICSAM) in a volume of fluid(VOF) scheme for phase interface capturing As an application of the present method, the effects of wall adhesion are numerically simulated with the CSF model for a shallow pool of water located at the bottom of a cylindrical tank. Two different cases are computed, one in which the water wets the wall and one in which the water does not wet the wall. It is found that the present method simulates efficiently and accurately surface tension-dominant multiphase flows induced by wall adhesion.

  • PDF

A DPSK Demodulator of Direct Sequence Spread Spectrum using SAW Convolver (탄성표면파 콘벌버를 이용한 직접 시퀀스 대역 확산 통신에서의 DPSK 복조에 관한 연구)

  • Lee, Dong-Wook;Cho, Kwan;Whang, Keum-Chan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.6
    • /
    • pp.494-505
    • /
    • 1990
  • This paper reports on the development of a DPSK demodulator of DS spread spectrum communications that use one SAW convolver. The spreading code chip pattern is changed from bit to bit in data portion of packet. And code chip is PSK modulated. Compared with simulation, experiment shows that the DPSK signal spreaded can be demodulated by using only one SAW convolver. And the theoretical performance of this DPSK demudulator is equal to CSK demodulator wich uses two SAW convolvers.

  • PDF

System and Method For Security Using ONE-TIME Execution Code (일회용 실행 코드를 이용한 보안 시스템 및 보안방법)

  • Lee, Se-Hoon;Jeon, Sang-Pyo;Shin, Young-Jin;Park, Jeon-Jin
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.55-58
    • /
    • 2010
  • 본 논문에서는 기존 C/S 환경에서 이용되는 보안 방법에 대해 새로운 방식으로 접근하고 이를 통하여 전통적인 C/S 환경의 정보시스템에서 클라이언트를 위조하거나 변조하는 등 해킹시도 및 해킹 여부를 판별하여 안전한 클라이언트 시스템이 작동중임을 판별할 수 있도록 한다.

  • PDF

The Entropy of Recursively-Indexed Geometric Distribution

  • Sangsin Na;Kim, Young-Kil;Lee, Haing-Sei
    • Journal of Electrical Engineering and information Science
    • /
    • v.1 no.1
    • /
    • pp.91-97
    • /
    • 1996
  • This paper proves by straightforward computation an interesting property of a recursive indexing: it preserves the entropy of a geometrically-distributes stationary memoryless source. This result is a pleasant surprise because the recursive indexing though one-to-one, is a symbol-to-string mapping and the entropy is measured in terms of the source symbols. This preservation of the entropy implies that the minimum average number of bits needed to represent a geometric memoryless source by the recursive indexing followed by a good binary encoder of a finite imput alphabet remains the same as that by a good encoder of an infinite input alphabet. Therefore, the recursive indexing theoretically keeps coding optimality intact. For this reason recursive indexing can provide an interface for a binary code with a finite code book that performs reasonably well for a source with an infinite alphabet.

  • PDF

Secondary Code Determination and Signal Processing Results of GIOVE-B E5a (GIOVE-B 위성 E5a Secondary Code 결정 및 신호처리 결과)

  • Joo, In-One;Shin, Chun-Sik;Lee, Sang-Uk;Kim, Jae-Hoon
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.16 no.4
    • /
    • pp.12-19
    • /
    • 2008
  • GIOVE-B is the second experimental Galileo satellite for the Galileo In-Orbit Validation, which was launched by a Soyuz/Fregat rocket departing from the Baikonur cosmodrome in Kazakhstan on 27 April and now operated successfully. This paper presents the results obtained from processing of the E5a signal transmitted from the GIOVE-B. The acquisition and tracking of the data and pilot channels are performed by the E5a software receiver implemented by ETRI. Moreover, the paper suggests the GIOVE-B E5a-I/E5a-Q secondary code, which is determined by analyzing the correlation output of the primary correlator using the primary code.

  • PDF

A Study on the Process Control Language for Advanced Control Algorithms (고급 제어 알고리즘을 위한 공정 제어 언어에 관한 연구)

  • 김성우;서창준;김병국
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.32B no.6
    • /
    • pp.821-827
    • /
    • 1995
  • This paper presents a process control language for constructing multiloop control system. which include advanced control algorithms. In order to make controller, this language uses function blocks that do specific operations. Then, the total control algorithm is a set of function blocks, of which each block is represented as a function code. The function code is a line of simple ASCII codes denoting function, input, output, parameters. It is possible to use variables as input/output port of any block. Compared with other language using function block concept, the proposed one enables to use advanced control algorithms undefinitely, such as fuzzy, neural network, predictive controller, etc., because vector and matrix variables as input/output can be used freely in this language. To raise flexibility, we put an intermediate level, which is C-language code, between function code and target-dependent operation code.

  • PDF