• Title/Summary/Keyword: 내장 자체 테스트

Search Result 40, Processing Time 0.036 seconds

SRAM Reuse Design and Verification by Redundancy Memory (여분의 메모리를 이용한 SRAM 재사용 설계 및 검증)

  • Shim Eun sung;Chang Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4A
    • /
    • pp.328-335
    • /
    • 2005
  • bIn this paper, built-in self-repair(BISR) is proposed for semiconductor memories. BISR is consisted of BIST(Buit-in self-test) and BIRU(Built-In Remapping Uint). BIST circuits are required not oがy to detect the presence of faults but also to specify their locations for repair. The memory rows are virtually divided into row blocks and reconfiguration is performed at the row block level instead of the traditional row level. According to the experimental result, we can verify algorithm for replacement of faulty cell.

Development of GARP/GVRP for network switches based on Linux (리눅스 기반 네트워크 스위치를 위한 GARP/GVRP 개발)

  • 노윤정;이원석;김준우;강경태;김지현;신현식
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.04a
    • /
    • pp.211-213
    • /
    • 2003
  • 가상랜(VLAN:Virtual LAN) 기술은 멀티 캐스트 트래픽의 감소 효과가 크고, 효율적인 네트워크 보안 및 관리를 지원하므로, 대부분 최근의 상용 스위치는 가상랜 환경에서의 동작을 지원하고 있다. 가상랜 환경에서 동작하는 스위치에서 가상랜 정보를 주고받기 위하여 사용하는 프로토콜이 GARP/ GVRP(Generic Attribute Registration Protocol/GARP VALN Registration Protocol)이다. 이 프로토콜은 네트워크 환경에서 가상랜 정보가 바뀔 때마다 동적으로 각 스위치의 가상랜 정보를 설정해 줌으로써 네트워크 관리자의 수고를 덜어주며, 효율적으로 가상랜을 관리하는 방법을 지원하는 것이다. 따라서 가상랜 환경에서 동작하는 스위치는 대부분 GARP/GVRP를 내장하고 있으나, 범용 소스가 없이 생산업체 별로 자체 구현한 GARP/GVRP를 각각의 스위치에 탑재하고 있다. 본 논문은 이렇게 가상랜 환경을 지원하는 스위치에 필수적인 프로토콜인 GARP/GVRP를 리눅스 커널에 삽입 가능한 모듈 형태로 개발하였다. 또 개발한 모듈을 기가빗 이더넷 스위치(Gigabit Ethernet Switch)에 이식된 리눅스 커널에 삽입. 동작시키고 공인된 테스트 집합을 이용하여 프로토콜이 정확하게 동작함을 검증하였다.

  • PDF

MLC NAND-type Flash Memory Built-In Self Test for research (MLC NAND-형 Flash Memory 내장 자체 테스트에 대한 연구)

  • Kim, Jin-Wan;Kim, Tae-Hwan;Chang, Hoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.3
    • /
    • pp.61-71
    • /
    • 2014
  • As the occupancy rate of the flash memory increases in the storage media market for the embedded system and the semi-conductor industry grows, the demand and supply of flash memory is increasing by a big margin. They are especially used in large quantity in the smart phones, tablets, PC, SSD and Soc(System on Chip) etc. The flash memory is divided into the NOR type and NAND type according to the cell arrangement structure and the NAND type is divided into the SLC(Single Level Cell) and MLC(Multi Level Cell) according to the number of bits that can be stored in each cell. Many tests have been performed on NOR type such as BIST(Bulit-In Self Test) and BIRA(Bulit-In Redundancy Analysis) etc, but there is little study on the NAND type. For the case of the existing BIST, the test can be proceeded using external equipments like ATE of high price. However, this paper is an attempt for the improvement of credibility and harvest rate of the system by proposing the BIST for the MLC NAND type flash memory of Finite State Machine structure on which the pattern test can be performed without external equipment since the necessary patterns are embedded in the interior and which uses the MLC NAND March(x) algorithm and pattern which had been proposed for the MLC NAND type flash memory.

A Proposal for Matrix Shape Security Keypad for the Nintendo Switch (향상된 보안의 닌텐도 스위치 행렬 형태 보안 키패드 제안)

  • Kwon, Hyeok-dong;Kwon, Yong-bin;Choi, Seung-ju;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1152-1159
    • /
    • 2019
  • The Nintendo Switch(NSW), which appeared as an 8th generation console, has succeeded worldwide as a hybrid gaming console. The NSW has E-shop itself, users can sign in to their account and purchase games. The keypad built in the NSW is similar to QWERTY keyboard. In the password input field the input information is hidden, but it's possible to get the value entered from the keypad with shoulder surfing attack. Because of the NSW with many party or family games, there is a high probability that someone else is watching the screen nearby, which acts as a vulnerability in account security. Thus we designed the new keypad which improve from this issue. In this paper, we check the problem about the keypad which built in the NSW, we present the proposed keypad and the compared to the built in keypad by showing the test result of unspecified individuals use.

An user moving state discriminant algorithm using a smart-phone (스마트폰 기반의 사용자 이동상태 판별 알고리즘)

  • Ha, Dong-Soo;Ahn, Woo-Young;Koo, Kyung-Wan;Park, Sung-Jun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.237-240
    • /
    • 2010
  • 본 논문에서는 스마트폰 기반의 사용자 이동 형태 판별 알고리즘에 대해 제안한다. 이 알고리즘은 스마트폰의 자체 내장된 3 축 가속도 센서와 GPS센서의 데이터 정보를 기반으로 하여 현재 사용자의 이동 수단 및 위치를 판단하게 된다. 이때 GPS 센서을 이용해 사용자의 위치와 이동속도를 계산하여 사용자의 이동수단을 판별하는데 이용하게 되고 가속도 센서의 데이터를 분석하여 사용자의 세부적인 이동형태(걷기, 뛰기)를 판별하는데 이용된다. 본 논문에서는 스마트폰의 두 가지 응용 센서(GPS, 가속도계)를 이용하여 사용자 이동상태 판별 알고리즘을 구현하고 테스트를 수행하였다. 실험 내용은 GPS를 통해 받은 데이터를 이용하여 이동속도를 계산하고 가속도 센서의 변화 폭을 측정 이동형태를 판별할 수 있는 속도와 가속도 센서의 기준 값을 실험 데이터를 바탕으로 정의하였다. 실험결과 본 논문에서 제안하는 사용자 이동형태 판별 알고리즘를 이용하여 사용자의 이동형태를 판별 할 수 있었다.

  • PDF

An X-masking Scheme for Logic Built-In Self-Test Using a Phase-Shifting Network (위상천이 네트워크를 사용한 X-마스크 기법)

  • Song, Dong-Sup;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.2
    • /
    • pp.127-138
    • /
    • 2007
  • In this paper, we propose a new X-masking scheme for utilizing logic built-in self-test The new scheme exploits the phase-shifting network which is based on the shift-and-add property of maximum length pseudorandom binary sequences(m-sequences). The phase-shifting network generates mask-patterns to multiple scan chains by appropriately shifting the m-sequence of an LFSR. The number of shifts required to generate each scan chain mask pattern can be dynamically reconfigured during a test session. An iterative simulation procedure to synthesize the phase-shifting network is proposed. Because the number of candidates for phase-shifting that can generate a scan chain mask pattern are very large, the proposed X-masking scheme reduce the hardware overhead efficiently. Experimental results demonstrate that the proposed X-masking technique requires less storage and hardware overhead with the conventional methods.

Self-Powered Smart Jump-Rope to Transform an Intensive Physical Activity into Electricity-Generating Fun Experience (고강도의 줄넘기 운동을 지속 가능하고 즐거운 경험으로 만들기 위한 에너지 자립형 스마트 줄넘기)

  • Jo, Jonghyun;Yeo, Jungjin;Park, Heajeong;Ryu, Munho;Yang, Yoonseok
    • Journal of the HCI Society of Korea
    • /
    • v.9 no.2
    • /
    • pp.13-21
    • /
    • 2014
  • Jump-rope is a simple and effective exercise, but its intensive exercise load and monotonous pattern make it difficult to perform consistent workout. On the other hand, jumping rope accompanies large amount of kinetic energy which can be converted into electrical energy. In this study, we designed and implemented a self-powered jump-rope which can support the low-power embedded Bluetooth system inside it. The embedded system wirelessly transmits the acceleration data measured during jumping-rope exercise to a smartphone. We also developed a smartphone app which can count the number of jumps and provide real-time feedback with sound and animated graphic effects in a game context. Pilot test using the prototype smart jump-rope verified that it can be useful to motivation for the jump-rope exercise and make the exercise more effective by providing users with precise information about their exercise. We expect that the developed self-powered jump-rope will change the exercise from an intensive physical activity into electricity-generating fun experience combined with smartphone game, which maximize the benefit of the consistent jump-rope exercise.

Integration of Application Program for Dementia Diagnosis using Biometric Sensor and Oxygen Chamber (생체센서를 이용한 치매진단용 어플리케이션 프로그램과 산소챔버의 융합)

  • Cho, Myeon-Gyun;Choi, Hyo Sun;Kim, Hyeong-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.11
    • /
    • pp.5847-5855
    • /
    • 2013
  • The purpose of this research is to develop Dementia-diagnosis application program through inter-working between biometric sensors and smart phone with diagnostic programs. Receiving data from 2 biometric sensors, SpO2 and HRV(heart rate variability) with Bluetooth and adding scores from questionnaires and memory test game, smart phone can draw a final Dementia Index(DI). Simple clinical tests provided threshold for Dementia, and diagnosis was made by comparing the DI with the threshold. We performed testing on persons aged over 60 and found out the proposed application can be used to diagnose Dementia easily and quickly. Additionally, we have shown the potential of oxygen chamber combined with Dementia-diagnosis application as a medical equipment to ease or cure Dementia in its early stages.

Smart-Phone based User Movement State Identification Algorithm (스마트폰 기반의 사용자 이동상태 판별 알고리즘)

  • Ha, Dong-Soo;Park, Sung-June
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.167-174
    • /
    • 2011
  • This paper proposed a smart-phone based user movement state identification algorithm. Then movement state of the user is identified by calculating the location and moving speed using the GPS sensor, and detailed movement methods are identified by analyzing the data from the Orientation sensor. In this study, two sensors of the smart-phone were used to implement the user movement status identification algorithm and to perform tests. The reference values of the speed and orientation required for the identification of the movement type were defined based on the experimental data. The results of this study showed that the movement type of a smart-phone user can be identified using the user movement state identification algorithm.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.