• Title/Summary/Keyword: Dummy Node

Search Result 11, Processing Time 0.009 seconds

The Effects of Alpha Particles on the Sense Amplifier in Memory Devices (알파 입자가 기억소자의 SENSE AMP에 미치는 영향)

  • 이성규;한민구
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.40 no.7
    • /
    • pp.675-683
    • /
    • 1991
  • When alpha particles are incident into the substrate, we have calculated the advanced current caused by collecting charges as a function of time, the energy of alpha particle, and the carrier concentration of the substrate. Employing SPICE, we have compared two circuits of which one has dummy cell and another has dummy line instead of dummy cell, and both are connected to the bit line node including sense amplifier and cell within the memory device. From the numerical analysis, (it may be conjectured that)the smaller energy of alpha particle and the lower concentration of the substrate, the more possibility of misoperation due to alpha particles. It may be also found that the effects of alpha particle are substantially reduced in the circuit without dummy cell.

  • PDF

Reconstitution of Compact Binary trie for the Efficient Retrieval of Hangul UniCODE Text (한글 유니코드 텍스트의 효율적인 탐색을 위한 컴팩트 바이너리 트라이의 재구성)

  • Jung, Kyu Cheol;Lee, Jong Chan;Park, Sang Joon;Kim, Byung Gi
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.2
    • /
    • pp.21-28
    • /
    • 2009
  • This paper proposes RCBT(Reduced Compact Binary trie) to correct faults of CBT (Compact Binary trie). First, in the case of CBT, a compact structure was tried for the first time, but as the amount of data was increasing, that of inputted data gained and much difficulty was experienced in insertion due to the dummy nodes used in balancing trees. On the other hand, if the HCBT realized hierarchically, given certain depth to prevent the map from increasing onthe right, reached the depth, the method for making new trees and connecting to them was used. Eventually, fast progress could be made in the inputting and searching speed, but this had a disadvantage of the storage space becoming bigger because of the use of dummy nods like CBT and of many tree links. In the case of RCBT in this thesis, a capacity is increased by about 60% by completely cutting down dummy nods.

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

Design of Subthreshold SRAM Array utilizing Advanced Memory Cell (개선된 메모리 셀을 활용한 문턱전압 이하 스태틱 램 어레이 설계)

  • Kim, Taehoon;Chung, Yeonbae
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.954-961
    • /
    • 2019
  • This paper suggests an advanced 8T SRAM which can operate properly in subthreshold voltage regime. The memory cell consists of symmetric 8 transistors, in which the latch storing data is controlled by a column-wise assistline. During the read, the data storage nodes are temporarily decoupled from the read path, thus eliminating the read disturbance. Additionally, the cell keeps the noise-vulnerable 'low' node close to the ground, thereby improving the dummy-read stability. In the write, the boosted wordline facilitates to change the contents of the memory bit. At 0.4 V supply, the advanced 8T cell achieves 65% higher dummy-read stability and 3.7 times better write-ability compared to the commercialized 8T cell. The proposed cell and circuit techniques have been verified in a 16-kbit SRAM array designed with an industrial 180-nm low-power CMOS process.

Concealing Communication Source and Destination in Wireless Sensor Networks (Part I) : Protocol Evaluation (무선 센서 네트워크에서의 통신 근원지 및 도착지 은닉(제2부) : 프로토콜 평가)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.3
    • /
    • pp.379-387
    • /
    • 2013
  • In large-scale wireless sensor networks, tremendous amount of dummy packets is usually accompanied by keeping location privacy of the communication source and destination against global eavesdropping. In our earlier work we designed a location privacy routing protocol, ELPR(End-node Location Privacy Routing) in which the generation of dummy packets at each idle time-slot while transferring data packets are restricted to only the nodes within certain areas of encompassing the source and destination, respectively. In this paper, it is given that ELPR provides various degrees of location privacy while PCM(Periodic Collection Method) allows the only fixed level. Simulation results show that as the number of nodes or data packets increases ELPR permits in terms of the number of generated packets more cost-effective location privacy than PCM.

On Concealing Data-Path Against Eavesdropping in Wireless Networks (무선망에서의 신호도청에 대응하는 데이터 경로 은닉에 관한 연구)

  • Tscha, Yeong-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.3
    • /
    • pp.433-438
    • /
    • 2020
  • Nodes on a data communication path in a wireless network emit electro-magnetic waves whenever they transmit packets; thus, the path can be exposed and identified with capturing and analyzing a sequence of the signals emitted there. One of countermeasures against a malicious eavesdropper is to let certain nodes mimic the nodes on the data path in sending dummy packets. In this paper we propose a packet transfer protocol which establishes the shortest path between source-destination pair a time and restricts heavy generation of dummy packets. We verify the location-privacy of a node on the communication paths through simulation.

An analysis of the farm silo supported by ground (地盤과 構造物사이의 相互作用을 考慮한 農業用 사이로의 解析에 관한 硏究(Ⅰ) - 第 1 報 模型 및 프로그램의 開發 -)

  • Cho, Jin-Goo;Cho, Hyun-Young
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.27 no.2
    • /
    • pp.38-46
    • /
    • 1985
  • The reinforced concrete farm silos on the elastic foundatin are widely used in agricultural engineering because of their superior structural performance, economy and attractive appearance. Various methods for the analysis and design of farm silo, such as the analytical method, the finite difference method, and the finite element methods, can be used. But the analytical procedure can not be applied for the intricate conditions in practice. Therefore lately the finite element method has been become in the structural mechanics. In this paper, a method of finite element analysis for the cylindrical farm silo on ffness matrix for the elastic foundation governed by winkler's assumption. A complete computer programs have been developed in this paper can be applicable not only to the shell structures on elastic foundation but also to the arbitrary three dimensional structures. Assuming the small deflection theory, the membrane and plate bending behaviours of flat plate element can be assumed mutually uncoupled. In this case, the element has 5 degrees of freedom per node when defined in the local coordinate system. However, when the element properties are transformed to the global coordinates for assembly, the 6th degree of freedom should be considered. A problem arises in this procedure the resultant stiffness in the 6th degree of freedom at this node will be zero. But this singularity of the stiffness matrix can be eliminated easily by merely replacing the zero diagonal by dummy stiffness.

  • PDF

Implementation of an Internet Telephony Service that Overcomes the Firewall Problem (방화벽 문제를 극복한 인터넷 전화 서비스의 구현)

  • 손주영
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.65-75
    • /
    • 2003
  • The internet telephony service is one of the successful internet application services. VoIP is the key technology for the service to come true. VoIP uses H.323 or SIP as the standard protocol for the distributed multimedia services over the internet environment, in which QoS is not guaranteed. VoIP carries the packetized voice by using the RTP/UDP/IP protocol stack. The UDP-based internet services cause the data transmission problem to the users behind the internet firewall. So does the internet telephony service. The users are not able to listen the voices of the counter-parts on the public internet or PSTN. It makes the problem more difficult that the internet telephony service addressed in this paper uses only one UDP port number to send the voice data of all sessions from gateway to terminal node. In this paper, two schemes including the usage of dummy UDP datagrams, and the protocol conversion are suggested. The implementation of one of the schemes, the protocol conversion, and the performance evaluation are described in detail.

A Korean Compound Noun Analysis Method for Effective Indexing (효율적인 색인어 추출을 위한 복합명사 분석 방법)

  • Jang, Dong-Hyun;Myaeng, Sung-Hyun
    • Annual Conference on Human and Language Technology
    • /
    • 1996.10a
    • /
    • pp.32-35
    • /
    • 1996
  • 정보 검색 기술은 적용 분야, 질의어, 데이터가 달라질 경우, 결과 또한 달라질 수 있음을 최근의 연구 결과로부터 알 수 있다. 사용되는 언어에 따라서도 고유한 문제가 제기될 수 있는데, 특히 한국어의 경우 복합명사는 명사끼리의 조합이 자유롭고 길이에 제한이 없기 때문에 이를 단위 명사로 분할하는 작업이 어렵다. 또한 영어와는 달리 복합명사가 문서 내에서 많은 부분을 차지하며 문서의 내용을 대표하는 경우가 많이 있기 때문에, 정보 검색 기술을 한국어에 적용하기 위해서는 수정, 보완하는 노력이 필요하다. 본 연구에서는 어휘에 관한 사전 및 코퍼스 정보를 트라이(trie)에 저장한 후 어휘들간의 공통 부분에 더미 노드(dummy node)를 삽입하여 복합명사를 단위 명사로 분할하는 기법을 제시하였다.

  • PDF

Three Dimensional Correction Factors for the Added Mass Moment of Inertia of Ships in Torsional Vibration (선체(船體)비틂진동(振動)에 있어서의 부가관성(附加慣性)모우멘트 3차원수정계수(次元修正係數))

  • K.C.,Kim;H.S.,Lee
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.11 no.2
    • /
    • pp.15-22
    • /
    • 1974
  • As for the added mass moment of inertia of ships in torsional vibration, it seems that the works by T. Kumai[1,2] are the only systematic one available currently. The work[1] is for the calculation of the two dimensional correction factors with finitely-long elliptic cylinders as the mathematic model. In this work the authors recalculated the above factors, $J_{\tau}$, with the same mathematic model and the same problem formulation, and presented the numerical results in Fig. 1. The reason why the reinvestigation was done was that in Kumai's work he obtained the solutions of the Mathieu equations, which was derived from the problem formulation for the velocity potential, under the assumption that the dummy constant q involved in the equations was always far less than unity, whereas in fact it takes values within the region of $0<q{\leq}{\infty}$ in sequence. As a result the authors found two remarkable differences in general features of $J_{\tau}$(refer to Fg.3); one that the authors' numerical results are considerably higher than the results given in [2], and the other that for a given number of node those have properties of decreasing monotonically with increase of the beam-draft ratio while these rapidly decrease from a maximum value of near at B/T=2.00 with B/T becoming greater or less than ratio. It seems that the latter trend was resulted from the fact that the assumption of $q{\ll}1$ employed in [2] was more closely satisfied in the vicinity of B/T=2.00.

  • PDF