• Title/Summary/Keyword: Data Architectures

Search Result 358, Processing Time 0.026 seconds

Low Cost Endurance Test-pattern Generation for Multi-level Cell Flash Memory

  • Cha, Jaewon;Cho, Keewon;Yu, Seunggeon;Kang, Sungho
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.17 no.1
    • /
    • pp.147-155
    • /
    • 2017
  • A new endurance test-pattern generation on NAND-flash memory is proposed to improve test cost. We mainly focus on the correlation between the data-pattern and the device error-rate during endurance testing. The novelty is the development of testing method using quasi-random pattern based on device architectures in order to increase the test efficiency during time-consuming endurance testing. It has been proven by the experiments using the commercial 32 nm NAND flash-memory. Using the proposed method, the error-rate increases up to 18.6% compared to that of the conventional method which uses pseudo-random pattern. Endurance testing time using the proposed quasi-random pattern is faster than that of using the conventional pseudo-random pattern since it is possible to reach the target error rate quickly using the proposed one. Accordingly, the proposed method provides more low-cost testing solutions compared to the previous pseudo-random testing patterns.

A Study on Design Methods and the Composition Elements in Flexure Structure Systems (휨 구조시스템의 구조디자인적 구성요소와 디자인 조합 수법 분석)

  • Lee, Juna
    • Journal of Korean Association for Spatial Structures
    • /
    • v.16 no.1
    • /
    • pp.73-84
    • /
    • 2016
  • This study analyzes the four composition elements : profile, anchorage and connection, material and member rigidity, stability, as the main composition design elements of flexure structure systems, in order to explore possibilities for more various structure designs in architectures with flexure structure system. It also examines typical design methods that use the mentioned four composition elements. At the results, this research presents an understanding of the differences between funicular shape and non-funicular shape and mechanical features of the shapes in the profile element, regarding to the ratio of rise height to span length(f/l). Also, the typical design methods are presented for the designable usages of the hinge joints and the fix joints, and for the applications of member rigidity expressed by the index of the ratio of member depth to span length(d/l). And it was presented that connection styles, addition of brace members, placement of shear walls are the main design methods in the stability element. This data would be useful to architectural designs concerning integrated design with structures.

Location-based Advertisement Recommendation Model for Customer Relationship Management under the Mobile Communication Environment (이동통신 환경 하에서의 고객관계관리를 위한 지역광고 추천 모형)

  • Ahn, Hyun-Chul;Han, In-Goo;Kim, Kyoung-Jae
    • Asia pacific journal of information systems
    • /
    • v.16 no.4
    • /
    • pp.239-254
    • /
    • 2006
  • Location-based advertising or application has been one of the drivers of third-generation mobile operators' marketing efforts in the past few years. As a result, many studies on location-based marketing or advertising have been proposed for recent several years. However, these approaches have two common shortcomings. First. most of them just suggested the theoretical architectures, which were too abstract to apply it to the real-world cases. Second, many of these approaches only consider service provider (seller) rather than customers (buyers). Thus, the prior approaches fit to the automated sales or advertising rather than the implementation of CRM. To mitigate these limitations, this study presents a novel advertisement recommendation model for mobile users. We call our model MAR-CF (Mobile Advertisement Recommender using Collaborative Filtering). Our proposed model is based on traditional CF algorithm, but we adopt the multi-dimensional personalization model to conventional CF for enabling location-based advertising for mobile users. Thus, MAR-CF is designed to make recommendation results for mobile users by considering location, time, and needs type. To validate the usefulness of our recommendation model. we collect the real-world data for mobile advertisements, and perform an empirical validation. Experimental results show that MAR-CF generates more accurate prediction results than other comparative models.

Proposed Efficient Architectures and Design Choices in SoPC System for Speech Recognition

  • Trang, Hoang;Hoang, Tran Van
    • Journal of IKEEE
    • /
    • v.17 no.3
    • /
    • pp.241-247
    • /
    • 2013
  • This paper presents the design of a System on Programmable Chip (SoPC) based on Field Programmable Gate Array (FPGA) for speech recognition in which Mel-Frequency Cepstral Coefficients (MFCC) for speech feature extraction and Vector Quantization for recognition are used. The implementing process of the speech recognition system undergoes the following steps: feature extraction, training codebook, recognition. In the first step of feature extraction, the input voice data will be transformed into spectral components and extracted to get the main features by using MFCC algorithm. In the recognition step, the obtained spectral features from the first step will be processed and compared with the trained components. The Vector Quantization (VQ) is applied in this step. In our experiment, Altera's DE2 board with Cyclone II FPGA is used to implement the recognition system which can recognize 64 words. The execution speed of the blocks in the speech recognition system is surveyed by calculating the number of clock cycles while executing each block. The recognition accuracies are also measured in different parameters of the system. These results in execution speed and recognition accuracy could help the designer to choose the best configurations in speech recognition on SoPC.

Real-time Location Tracking System Using Ultrasonic Wireless Sensor Nodes (초음파 무선 센서노드를 이용한 실시간 위치 추적 시스템)

  • Park, Jong-Hyun;Choo, Young-Yeol
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.7
    • /
    • pp.711-717
    • /
    • 2007
  • Location information will become increasingly important for future Pervasive Computing applications. Location tracking system of a moving device can be classified into two types of architectures: an active mobile architecture and a passive mobile architecture. In the former, a mobile device actively transmits signals for estimating distances to listeners. In the latter, a mobile device listens signals from beacons passively. Although the passive architecture such as Cricket location system is inexpensive, easy to set up, and safe, it is less precise than the active one. In this paper, we present a passive location system using Cricket Mote sensors which use RF and ultrasonic signals to estimate distances. In order to improve accuracy of the passive system, the transmission speed of ultrasound was compensated according to air temperature at the moment. Upper and lower bounds of a distance estimation were set up through measuring minimum and maximum distances that ultrasonic signal can reach to. Distance estimations beyond the upper and the lower bounds were filtered off as errors in our scheme. With collecting distance estimation data at various locations and comparing each distance estimation with real distance respectively, we proposed an equation to compensate the deviation at each point. Equations for proposed algorithm were derived to calculate relative coordinates of a moving device. At indoor and outdoor tests, average location error and average location tracking period were 3.5 cm and 0.5 second, respectively, which outperformed Cricket location system of MIT.

Remote Monitoring with Hierarchical Network Architectures for Large-Scale Wind Power Farms

  • Ahmed, Mohamed A.;Song, Minho;Pan, Jae-Kyung;Kim, Young-Chon
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1319-1327
    • /
    • 2015
  • As wind power farm (WPF) installations continue to grow, monitoring and controlling large-scale WPFs presents new challenges. In this paper, a hierarchical network architecture is proposed in order to provide remote monitoring and control of large-scale WPFs. The network architecture consists of three levels, including the WPF comprised of wind turbines and meteorological towers, local control center (LCC) responsible for remote monitoring and control of wind turbines, and a central control center (CCC) that offers data collection and aggregation of many WPFs. Different scenarios are considered in order to evaluate the performance of the WPF communications network with its hierarchical architecture. The communications network within the WPF is regarded as the local area network (LAN) while the communication among the LCCs and the CCC happens through a wide area network (WAN). We develop a communications network model based on an OPNET modeler, and the network performance is evaluated with respect to the link bandwidth and the end-to-end delay measured for various applications. As a result, this work contributes to the design of communications networks for large-scale WPFs.

A Study on the Tracking Method for Solar Module to Derive Optimum Performance (최적 발전성능 도출을 위한 태양광모듈 추적방법에 관한 연구)

  • Kim, Yongjin;Lee, Jong Soo;Chung, Yu-Gun;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.12 no.1
    • /
    • pp.113-118
    • /
    • 2012
  • The photovoltaic is one of the most important sustainable technologies appliable to architectures. The power performance mainly depends on the installation conditions of them. This study aims to evaluate the power performance of photovoltaic system by the installation conditions, the tracking methods and reflecting mirrors. For the study, the Solar Pro computer simulations have been conducted on installation angles, solar azimuth and solar altitude. Also, the field mock-up tests are performed to of its application to verify the simulation results. Both the results of the experiment and the simulation have proved that the efficiency of 90-degree fixed angle method was higher than that of 30-degree fixed angle, the efficiency of altitude tracking was better than that of azimuth tracking method, and changing both the altitude and the azimuth together is more efficient rather than the shortened tracing way. In addition, the light-concentrating method in which the incidence angle of the sun is controlled by an adhered reflector has been analyzed to have better efficiency than the general method of tracing according to the orbit of the sun. Therefore, this thesis is expected to offer the basic data to set a more effective tracing-type of photovoltaic power generation system in the future. For this, more researches are to be conducted hereafter on a high efficiency drive motor and the establishment of an economic system.

Machine-to-Machine Communications: Architectures, Standards and Applications

  • Chen, Min;Wan, Jiafu;Li, Fang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.480-497
    • /
    • 2012
  • As a new business concept, machine-to-machine (M2M) communications are born from original telemetry technology with the intrinsic features of automatic data transmissions and measurement from remote sources typically by cable or radio. M2M includes a number of technologies that need to be combined in a compatible manner to enable its deployment over a broad market of consumer electronics. In order to provide better understanding for this emerging concept, the correlations among M2M, wireless sensor networks, cyber-physical systems (CPS), and internet of things are first analyzed in this paper. Then, the basic M2M architecture is introduced and the key elements of the architecture are presented. Furthermore, the progress of global M2M standardization is reviewed, and some representative applications (i.e., smart home, smart grid and health care) are given to show that the M2M technologies are gradually utilized to benefit people's life. Finally, a novel M2M system integrating intelligent road with unmanned vehicle is proposed in the form of CPS, and an example of cyber-transportation systems for improving road safety and efficiency are introduced.

An Anonymous Authentication with Key-Agreement Protocol for Multi-Server Architecture Based on Biometrics and Smartcards

  • Reddy, Alavalapati Goutham;Das, Ashok Kumar;Yoon, Eun-Jun;Yoo, Kee-Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3371-3396
    • /
    • 2016
  • Authentication protocols for multi-server architectures have gained momentum in recent times due to advancements in computing technologies and associated constraints. Lu et al. recently proposed a biometrics and smartcards-based authentication scheme for multi-server environment. The careful analysis of this paper demonstrates Lu et al.'s protocol is susceptible to user impersonation attacks and comprises insufficient data. In addition, this paper proposes an improved authentication with key-agreement protocol for multi-server architecture based on biometrics and smartcards. The formal security of the proposed protocol is verified using the widely accepted AVISPA (Automated Validation of Internet Security Protocols and Applications) tool to ensure that our protocol can withstand active and passive attacks. The formal and informal security analysis, and performance analysis sections determines that our protocol is robust and efficient compared to Lu et al.'s protocol and existing similar protocols.

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

  • Latif, Kashif;Aziz, Arshad;Mahboob, Athar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2388-2404
    • /
    • 2012
  • Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.