• Title/Summary/Keyword: size code

Search Result 1,092, Processing Time 0.034 seconds

Partial Matched Filter for Low Power and Fast Code Acquisition of DSSS-CPFSK Signals

  • Park, Hyung-Chul
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.4 no.3
    • /
    • pp.204-209
    • /
    • 2004
  • A partial matched filter (PMF) for semi-coherent correlation code acquisition of the DSSS-CPFSK signal is proposed. It is a calculation-reduced structure of the hard-limited signal based FIR filter, yet its code acquisition time is equal to that of the hard-limited signal based FIR filter. The PMF eliminates duplicate calculations by utilizing the characteristic that the hard-limited DSSS-CPFSK signal has same value in several consecutive samples. For example, the PMF can achieve about 95% reduction in gate size, as compared to the hard-limited signal based FIR filter, when the modulation index of the DSSS-CPFSK signal is equal to 1.5 and the sample rate is equal to 40 sample/chip.

THE SMOOTHED PARTICLE HYDRODYNAMICS AND THE BINARY TREE COMBINED INTO BTSPH: PERFORMANCE TESTS

  • KIM W. -T.;HONG S. S.;YUN H. S.
    • Journal of The Korean Astronomical Society
    • /
    • v.27 no.1
    • /
    • pp.13-29
    • /
    • 1994
  • We have constructed a 3-dim hydrodynamics code called BTSPH. The fluid dynamics part of the code is based on the smoothed particle hydrodynamics (SPH), and for its Poisson solver the binary tree (BT) scheme is employed. We let the smoothing length in the SPH algorithm vary with space and time, so that resolution of the calculation is considerably enhanced over the version of SPH with fixed smoothing length. The binary tree scheme calculates the gravitational force at a point by collecting the monopole forces from neighboring particles and the multipole forces from aggregates of distant particles. The BTSPH is free from geometric constraints, does not rely on grids, and needs arrays of moderate size. With the code we have run the following set of test calculations: one-dim shock tube, adiabatic collapse of an isothermal cloud, small oscillation of an equilibrium polytrope of index 3/2, and tidal encounter of the polytrope and a point mass perturber. Results of the tests confirmed the code performance.

  • PDF

The Comparison of Acceptance Criteria and Flaw Size Measurement between ASME and RCC-M Code in Ultrasonic Examination (초음파검사시 ASME와 RCC-M CODE에 따른 결함 크기측정 및 허용기준 비교평가)

  • Kim, B.C.;Lim, H.T.;Lee, J.P.;Joo, Y.S.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.8 no.1
    • /
    • pp.6-11
    • /
    • 1988
  • The comparison and analysis of flaw detectability, flaw sizing methods and allowable criteria in accordance with the applicable codes, ASME and RCC-M Code, in ultrasonic examination of pressure vessel in nuclear power plants were studied. Accordding to the codes, calibration blocks were made. The artificial flaws such as disc and band types in test specimens were machined. They were detected and evaluated with etch code requirements and measured values were compared with the actual flaws.

  • PDF

Chain code based New Decision Technique of Edge Orientation (체인코드를 이용한 새로운 에지 방향 결정 기법)

  • Sung, Min-Chul;Lee, Sang-Hwa;Cho, Nam-Ik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.1
    • /
    • pp.101-106
    • /
    • 2007
  • In this paper, we propose chain code based decision technique of edge orientation. Edge Information is one of the most important information for handling image signals, and is applied to various civilian and military area, such as image surveillance for military reconnaissance, restoration of noised image signal, fingerprint recognition, and so on. The conventional methods to find edge orientations exploit a certain size of mask which weights for a certain direction, so they showed limitations in the case of diagonal edges except 45 degrees. We find edge orientations using chain code. According to the experiments, the proposed method shows better performance than the conventional approaches. The exact edge orientations including diagonal directions are well found.

길이가 16인 Z$_4$위의 Preparata 부호는 연쇄조건을 만족하지 않는다

  • Kyeongcheol Yang;Dooroo Lim
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1996.11a
    • /
    • pp.286-294
    • /
    • 1996
  • In a remarkable paper 〔3〕, Hammons et al. showed that, when properly defined, the binary nonlinear Preparata code can be considered as the Gray map of a linear code eve. Z$_4$, the so-called Preparata code eve. Z$_4$. Recently, Yang and Helleseth 〔12〕 considered the generalized Hamming weights d$\_$r/(m) for Preparata codes of length 2$\^$m/ over Z$_4$ and exactly determined d$\_$r/, for r = 0.5,1.0,1.5,2,2.5 and 3.0. In particular, they completely determined d$\_$r/(m) for any r in the case of m $\leq$ 6. In this paper we show that the Preparata code of length 16 over Z$_4$ does not satisfy the chain condition.

  • PDF

The design of quantization and inverse quantization unit (Q_IQ unit) module with video encoder (비디오 인코더용 양자화 및 역양자화기(Q_IQ unit) 모듈의 설계)

  • 김은원;조원경
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.11
    • /
    • pp.20-28
    • /
    • 1997
  • In this paper, quantization and inverse quantizatio unit, a sa component of MPEG-2 moving picture compression system, ar edesigned. In the processing of quantization, this design adopted newly designed arithmetic units in which quantization matrices and scale code was expressed with SD(signed-digit) code. In the arithmetic unit of inverse quantization, quantization scale code, which has 5-bits length, is splited into two pieces; 2-bits for control code, 3-bits for quantization data, and the method to devise quantization step size is proposed. The design was coded with VHDL and synthesis results in that it consumed about 6,110 gates, and operating speed is 52MHz.

  • PDF

A Tamper-Detection Scheme for BTC-Compressed Images with High-Quality Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Chung, Ting-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2005-2021
    • /
    • 2014
  • This paper proposes a novel image authentication scheme, aiming at tampering detection for block truncation coding (BTC) compressed image. The authentication code is generated by using the random number generator with a seed, and the size of the authentication code is based on the user's requirement, with each BTC-compressed image block being used to carry the authentication code using the data hiding method. In the proposed scheme, to obtain a high-quality embedded image, a reference table is used when the authentication code is embedded. The experimental results demonstrate that the proposed scheme achieves high-quality embedded images and guarantees the capability of tamper detection.

IMPLEMENTATION OF VELOCITY SLIP MODELS IN A FINITE ELEMENT NUMERICAL CODE FOR MICROSCALE FLUID SIMULATIONS (속도 슬립모델 적용을 통한 마이크로 유체 시뮬레이션용 FEM 수치 코드 개발)

  • Hoang, A.D.;Myong, R.S.
    • Journal of computational fluids engineering
    • /
    • v.14 no.2
    • /
    • pp.46-51
    • /
    • 2009
  • The slip effect from the molecular interaction between fluid particles and solid surface atoms plays a key role in microscale fluid transport and heat transfer since the relative importance of surface forces increases as the size of the system decreases to the microscale. There exist two models to describe the slip effect: the Maxwell slip model in which the slip correction is made on the basis of the degree of shear stress near the wall surface and the Langmuir slip model based on a theory of adsorption of gases on solids. In this study, as the first step towards developing a general purpose numerical code of the compressible Navier-Stokes equations for computational simulations of microscale fluid flow and heat transfer, two slip models are implemented into a finite element numerical code of a simplified equation. In addition, a pressure-driven gas flow in a microchannel is investigated by the numerical code in order to validate numerical results.

A Study on the Relationship between Social Network of Codeshare and Performances in Airline Industries (항공사 좌석공유 사회연결망과 경영성과간의 관계에 관한 연구)

  • Kwon, Byeung-Chun;Cho, Nam-Wook
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.2
    • /
    • pp.271-280
    • /
    • 2011
  • In this paper, the relationships between code-share networks and performances in airline industry were analyzed by using Social Network Analysis (SNA). We first analyzed the schedule data from OAG (Official Airline Guide) to obtain core-share information of airline industries. SNA was, then, applied to the code-share information. Finally, statistical analysis was conducted to analyze the relationships between code-share social networks and performances. The result shows that the size and out-degree centrality have relatively significant effects on the performance of airline industries, while in-degree and betweenness centrality has less significant effects.

A Study on Generic Unpacking to Prevent Zombie Client on Mobile Platform (좀비 클라이언트 차단을 위한 실행 압축 기술에 관한 연구)

  • Ko, Jong-Bin;Lee, Sang-Ha;Shon, Tae-Shik
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.5
    • /
    • pp.545-551
    • /
    • 2013
  • Packed technique makes difficult to respond quickly because the malicious-code is reduced size that easy to diffusion and changed code that make spend longer time for analysis. In this paper, we analysed the packing tool softwares and we proposed construction and detection methods of the packed technique for easy to analysis of the packed malicious code based on variation of entropy value.