• Title/Summary/Keyword: Access Patterns

Search Result 418, Processing Time 0.023 seconds

Design and Manufacture of U-shaped Antenna for WLAN/WiMAX Applications (WLAN/WiMAX 시스템에 적용 가능한 U-형 안테나 설계 및 제작)

  • Im, Dae-Soo;Choi, Young-Kyu;Yoon, Joong-Han
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.7
    • /
    • pp.827-834
    • /
    • 2014
  • In this paper, a triple-band U-shaped monopole antenna with T-shaped stub for WLAN(Wireless Local Area Networks)/WiMAX(World interoperability for Microwave Access) applications. The proposed antenna is based on a planar monopole design, and composed of U-shaped of radiating patch, T-shaped strip in U-shaped, for triple-band operation. To obtain the optimized parameters, we used the simulator, Ansoft's High Frequency Structure Simulator(HFSS) and found the parameters that greatly effect antenna characteristics. Using the obtained parameters, the antenna is fabricated. The numerical and experiment results demonstrated that the proposed antenna satisfied the -10 dB impedance bandwidth requirement while simultaneously covering the WLAN and WiMAX bands. And characteristics of gain and radiation patterns are determined for WLAN/WiMAX application.

Computing and Reducing Transient Error Propagation in Registers

  • Yan, Jun;Zhang, Wei
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.2
    • /
    • pp.121-130
    • /
    • 2011
  • Recent research indicates that transient errors will increasingly become a critical concern in microprocessor design. As embedded processors are widely used in reliability-critical or noisy environments, it is necessary to develop cost-effective fault-tolerant techniques to protect processors against transient errors. The register file is one of the critical components that can significantly affect microprocessor system reliability, since registers are typically accessed very frequently, and transient errors in registers can be easily propagated to functional units or the memory system, leading to silent data error (SDC) or system crash. This paper focuses on investigating the impact of register file soft errors on system reliability and developing cost-effective techniques to improve the register file immunity to soft errors. This paper proposes the register vulnerability factor (RVF) concept to characterize the probability that register transient errors can escape the register file and thus potentially affect system reliability. We propose an approach to compute the RVF based on register access patterns. In this paper, we also propose two compiler-directed techniques and a hybrid approach to improve register file reliability cost-effectively by lowering the RVF value. Our experiments indicate that on average, RVF can be reduced to 9.1% and 9.5% by the hyperblock-based instruction re-scheduling and the reliability-oriented register assignment respectively, which can potentially lower the reliability cost significantly, without sacrificing the register value integrity.

Iris Recognition Using Vector Summation Of Gradient Orientation Vectors (그래디언트 방향 벡터의 벡터합을 이용한 홍채 인식)

  • Choi, Chang-Soo;Yoo, Kwan-Hee;Jun, Byoung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.121-128
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, iris information is used in many fields such as access control and information security. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil. In this paper, we propose a novel method based on vector summation of gradient orientation vectors. Experimental results show that the proposed method reduces processing time with simple vector calculation, requires small feature space and has comparable performance to the well-known previous methods.

Kinematic Access For Generation of Realistic Behavior of Artificial Fish in Virtual Merine World (가상해저공간에서 Artificial Fish의 사실적인 행동 생성을 위한 운동학적 접근)

  • Kim, Chong-Han;Jung, Seung-Moon;Shin, Min-Woo;Kang, Im-Chul
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.1
    • /
    • pp.308-317
    • /
    • 2008
  • The objects real time rendered in the 3D cyber space can interact with each others according to the events which are happened when satisfying some conditions. But to representing the behaviors with these interactions, too many event conditions are considered because each behavior pattern and event must be corresponded in a one-to-one ratio. It leads to problems which increase the system complexity. So, in this paper, we try to physical method based on elasticity force for representing more realistic behaviors of AI fish and apply to the deformable multi-detection sensor, so we suggest the new method which can create the various behavior patterns responding to one evasion event.

Analysis of Prescriptions from Taepyeonghyeminhwajegukbang, Somunsunmyungronbang and Nansilbijang (『태평혜민화제국방(太平惠民和劑局方)』과 『소문선명론방(素問宣明論方)』과 『난실비장(蘭室秘藏)』의 방제구성 비교)

  • Wu, Yueh-Hwan;Kim, Ki-Wook;Lee, Byung-Wook;Kim, Eun-Ha
    • Journal of Korean Medical classics
    • /
    • v.27 no.4
    • /
    • pp.121-131
    • /
    • 2014
  • Objectives : The objectives of this study is to compare the differences in medical herbs combination of Taepyeonghyeminhwajegukbang, Somunsunmyungronbang and Nansilbijang. Methods : This study was proceeded by using Access 2007 and SQL Server and prescriptions of which herbal configuration could be indicated by weight unit were analysed from 765 prescriptions of Taepyeonghyeminhwajegukbang, 350 prescriptions of Somunsunmyungronbang and 277 prescriptions of Nansilbijang. Results : If more than 80% similarity, it is considered similar prescription. Only 6 Prescriptions of Nansilbijang similar to Prescriptions of Taepyeonghyeminhwajegukbang. And 20 Prescriptions of Somunsunmyungronbang similar to Prescriptions of Taepyeonghyeminhwajegukbang. Conclusions : Configuration patterns of Somunsunmyungronbang and Nansilbijang are different from Taepyeonghyeminhwajegukbang. So We can prove that theory of Somunsunmyungronbang and Nansilbijang are different from Taepyeonghyeminhwajegukbang.

Adaptive Writeback-aware Cache Management Policy for Lifetime Extension of Non-volatile Memory

  • Hwang, Sang-Ho;Choi, Ju Hee;Kwak, Jong Wook
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.4
    • /
    • pp.514-523
    • /
    • 2017
  • In this paper, we propose Adaptive Writeback-aware Cache management (AWC) to prolong the lifetime of non-volatile main memory systems by reducing the number of writebacks. The last-level cache in AWC is partitioned into Least Recently Used (LRU) segment and LRU using Dirty block Precedence (DP-LRU) segment. The DP-LRU segment evicts clean blocks first for giving reuse opportunity to dirty blocks. AWC can also determine the efficient size of DP-LRU segment for reducing the number of writebacks according to memory access patterns of programs. In the performance evaluation, we showed that AWC reduced the number of writebacks up to 29% and 46%, and saved the energy of a main memory system up to 23% and 49% in a single-core and multi-core, respectively. AWC also reduced the runtime by 1.5% and 3.2% on average compared to previous cache managements for non-volatile main memory systems, in a single-core and a multi-core, respectively.

A compact Monopole Antenna Design for WLAN/WiMAX Triple Band Operations (WLAN/WiMAX 삼중대역에서 동작하는 모노폴 안테나의 설계)

  • Yoon, Joong-Han;Jang, Yeon-Gil;Rhee, Young-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.3
    • /
    • pp.465-473
    • /
    • 2012
  • In this study, a novel dual band planar monopole antenna for wireless local area network (WLAN)/ Worldwide Interoperability of Microwave Access (WiMAX) application was designed, fabricated, and measured. The proposed antenna consists of two hook shaped strips, an asymmetric ground plane, and a rectangular slit in the ground plane. Acceptable agreements between the measured and simulated results are achieved. Numerical and experimental results demonstrate that the proposed antenna satisfies the 10 dB impedance bandwidth requirement while covering the WLAN and WiMAX bands simultaneously. This paper also presents and discusses the 2D radiation patterns and 3D gains according to the results of the experiment that was conducted.

Hybrid Web App Development for Eye movement at Mobile Devices (모바일 기기에서 눈 운동을 할 수 있는 하이브리드 웹앱 개발)

  • Seok, Hyun-Tack
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.249-254
    • /
    • 2013
  • This paper presented a mobile application program to help eye movement with mobile devices. It helps to strengthen ocular muscles and improve visual acuity. Users can easily access the program of eye movement type of app program in mobile devices. There were some papers which studied on the eye movement and showed efficient eye movement method for improvement of visual acuity. So here presents programming codes to help eye movement with some specific patterns from some papers and it was implemented by HTML, CSS and javascript. To convert web code to app code, appspresso tool was used.

Musical Identity Online: A "Netnographic" Perspective of Online Communities

  • Strubel, Jessica;Pookulangara, Sanjukta;Murray, Amber
    • International Journal of Costume and Fashion
    • /
    • v.13 no.2
    • /
    • pp.15-29
    • /
    • 2013
  • Today's technology enables consumers to trade millions of dollars, conduct online banking, access entertainment, and do countless other activities at the click of a button. Online social networks (OSN) have become a cultural phenomenon that allows for individualistic consumerism. Consumers are increasingly utilizing OSN to share ideas, build communities, and contact fellow consumers who are similar to themselves. The relevance of online communities to the music is immense especially because musicians are now using social media to build global audiences. Not only is information about music and performance disseminated online, but musical commodities are sold and traded online. Online music communities allow consumers to elect and create new identities online through the purchase of subcultural commodities. Given the growing economic importance of online music communities it is important to get a holistic view of subcultural communities online. This study utilized content analysis of online music community websites using the Netnography methodology as developed by Kozinet for data collection to analyze consumers' purchasing and consumption behavior of subcultural commodities online as related to the formation of subcultural identities. Findings showed that subcultural items are predominantly purchased online, especially digital music, and there is a need for more custom craft items. The authors presented a new conceptual taxonomy of online subcultural consumer classifications based on online behavior patterns.

Development of Firewall System for Automated Policy Rule Generation based on Machine learning (머신러닝 기반의 자동 정책 생성 방화벽 시스템 개발)

  • Han, Kyung-Hyun;Hwang, Seong-Oun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.29-37
    • /
    • 2020
  • Conventional firewalls cannot cope with attacks immediately. It is because security professionals or administrators need to analyze them and enter relevant policies to the firewalls. In addition, those policies may often block even normal accesses. Even though the packet themselves are normal, there exist many attacks that cause denial of service due to the inflow of a large amount of those packets. In this paper, we propose a method to block attacks such as Flooding, Spoofing and Scanning while allowing normal accesses based on whitelist policies which are automatedly generated by learning normal access patterns.