• Title/Summary/Keyword: Frequency of Computer Use

Search Result 618, Processing Time 0.026 seconds

K-means clustering analysis and differential protection policy according to 3D NAND flash memory error rate to improve SSD reliability

  • Son, Seung-Woo;Kim, Jae-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.1-9
    • /
    • 2021
  • 3D-NAND flash memory provides high capacity per unit area by stacking 2D-NAND cells having a planar structure. However, due to the nature of the lamination process, there is a problem that the frequency of error occurrence may vary depending on each layer or physical cell location. This phenomenon becomes more pronounced as the number of write/erase(P/E) operations of the flash memory increases. Most flash-based storage devices such as SSDs use ECC for error correction. Since this method provides a fixed strength of data protection for all flash memory pages, it has limitations in 3D NAND flash memory, where the error rate varies depending on the physical location. Therefore, in this paper, pages and layers with different error rates are classified into clusters through the K-means machine learning algorithm, and differentiated data protection strength is applied to each cluster. We classify pages and layers based on the number of errors measured after endurance test, where the error rate varies significantly for each page and layer, and add parity data to stripes for areas vulnerable to errors to provides differentiate data protection strength. We show the possibility that this differentiated data protection policy can contribute to the improvement of reliability and lifespan of 3D NAND flash memory compared to the protection techniques using RAID-like or ECC alone.

Design and Fabrication of WLAN / UWB Antenna for Marine High Speed Communication Network System (해양 초고속 통신망 시스템을 위한 WLAN(Wireless Local Area Network) / UWB(Ultra Wide Band)용 안테나 설계 및 제작)

  • Hong, Yong-Pyo;Kang, Sung-Woon;Kim, Kab-Ki
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.24 no.4
    • /
    • pp.489-495
    • /
    • 2018
  • In this paper, we designed and fabricated WLAN / UWB communication antennas operating at 3.3 [GHz] and 5 [GHz] bands in order to effectively use the high-speed communication network system that improved antenna miniaturization, gain and radiation pattern. Microstrip patch antennas were chosen to improve the bandwidth. The slot width, length, and transmission line width were calculated using the theoretical formula for each step. Simulation results show that the return loss is -14.053 [dB] at 3.3 [GHz] and -13.118 [dB] at 5 [GHz]. The gain showed a value of 2.479 [dBi] at 3.3 [GHz] and a value of 3.317 [dBi] at 5 [GHz]. After optimizing it with the CST Microwave Studio 2014 program, which can be 3D-designed, Based on these results, we investigated the performance of antennas by measuring their characteristics. In recent years, WLAN, which is a variety of wireless technologies that are continuously developing, and UWB, which is a communication technology which is increasing in frequency band due to an increase in demand of the technology users, is used for a high speed wireless communication system. Communication seems to be possible.

An Enhanced Colorwave Reader Anti-collision Algorithm in RFID System (RFID 시스템에서의 Enhanced Colorwave 리더 충돌 방지 알고리즘)

  • Lee Su-Ryun;Lee Chae-Woo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.2 s.344
    • /
    • pp.27-38
    • /
    • 2006
  • When an RFID reader attempts to read tags, interference might occur if the neighboring readers also attempt to communicate with the same tag at the same time or the neighboring readers use the same frequency at the same time. These interferences cause the RFID reader collision. When the RFID reader collision occirs, either the command from the reader can not be transmitted to the tags or the response from the tags can not be received by the reader correctly. RFID reader anti-collision algorithms have been developed to reduce it. One of the best blown reader anti-collision algorithms is the Colorwave algorithm proposed by MIT. The Colorwave algorithm reduces the reader collisions by having the readers operate at different times. In Colorwave the time is divided into frames and a frame is divided into a number of slots. Each reader can access the tags using the slot time assigned to it. Depending on the probability of the interference, the colorwave adjusts the frame size to improve the efficiency. In this paper, we analyze the operations and the performance of the Colorwave algorithm and identify the problems of the algorithm. We also show that by adding some modifications to the algorithm the performance can be improved significantly.

Wavelet-Based Digital Watermarking Using Level-Adaptive Thresholding (레벨 적응적 이치화를 이용한 웨이블릿 기반의 디지털 워터마킹)

  • Kim, Jong-Ryul;Mun, Young-Shik
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.1
    • /
    • pp.1-10
    • /
    • 2000
  • In this paper, a new digital watermarking algorithm using wavelet transform is proposed. Wavelet transform is widely used for image processing, because of its multiresolution characteristic which conforms to the principles of the human visual system(HVS). It is also very efficient for localizing images in the spatial and frequency domain. Since wavelet coefficients can be characterized by the gaussian distribution, the proposed algorithm uses a gaussian distributed random vector as the watermark in order to achieve invisibility and robustness. After the original image is transformed using DWT(Discrete Wavelet Transform), the coefficients of all subbands including LL subband are utilized to equally embed the watermark to the whole image. To select perceptually significant coefficients for each subband, we use level-adaptive thresholding. The watermark is embedded to the selected coeffocoents, using different scale factors according to the wavelet characteristics. In the process of watermark detection, the similarity between the original watermark and the extracted watermark is calculated by using vector projection method. We analyze the performance of the proposed algorithm, compared with other transform-domain watermarking methods. The experimental results tested on various images show that the proposed watermark is less visible to human eyes and more robust to image compressions, image processings, geometric transformations and various noises, than the existing methods.

  • PDF

Color image segmentation by level set method (레벨셋 기법을 이용한 컬러 이미지 분할)

  • Yoo, Ju-Han;Jung, Moon-Ryul
    • Journal of the Korea Computer Graphics Society
    • /
    • v.18 no.2
    • /
    • pp.9-15
    • /
    • 2012
  • In this paper, we propose a method to segment a color image into several meaningful regions. We suppose that the meaningful region has a set of colors with high frequency in the color image. To find these colors, the color image is represented as several sets of color points in RGB space. And when we use the density of points defined in this method, color belonging to a dense region of color points in RGB space refers to the color that appeared frequently in the image. Eventually, we can find meaningful regions by looking for regions with high density of color points using our level set function in RGB space. However, if a meaningful region does not have a contiguous region of the sufficient size in the image, this is not a meaningful region but meaningless region. Thus, the pixels in the meaningless region are assigned to the biggest meaningful region belonging to its neighboring pixels in the color image. Our method divides the color image into meaningful regions by applying the density of color points to level set function in RGB space. This is different from the existing level set method that is defined only in 2D image.

Implant-supported fixed prostheses with high-performance polymer (PEKK) abutments in partial edentulous patients: A case report (부분 무치악 환자에서 고기능성 폴리머(PEKK) 지대주를 이용한 임플란트 고정성 보철물 수복 증례)

  • Ha, Seung-Ryong
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.1
    • /
    • pp.71-78
    • /
    • 2021
  • Implant treatment, which was first attempted in fully edentulous patients, is now widely used in partially edentulous, and a single tooth missing patients. Moreover, implant treatment has become an essential treatment modality in modern dentistry. The material of fabricating implant prostheses has also become more diverse than before, one of which is the use of high-performance polymers. The frequency of using high-performance polymers, which have been used in the medical field, is also increased in the dental field compared to the past. In the first case, a PEKK abutment and a PFG crown (cement-screw-retaining type) were fabricated in the lower left second premolar, and in the second case, a PEKK abutment and a monolithic zirconia crown (cement-screw-retaining type) were fabricated in the missing upper left first molar, and in the third case two PEKK abutments and a splinted PFM crowns (cement-screw-retaining type) were fabricated and connected to the upper right first and second molar implants. Through these procedures the patients obtained esthetically and functionally satisfactory results after 4 years of follow-up.

Factors Affecting the unexamined Oral Examination in Cancer Patients - The 7th Korea national health and nutrition examination survey

  • Jung, Yu Yeon;Chung, Kyung-Yi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.87-93
    • /
    • 2022
  • This study was conducted to use as basic data to increase the oral examination rate by analyzing Whether to undergo oral examination and the Factors Affecting the unexamined Oral Examination in Cancer Patients. These factors were analyzed using the results from 376 cancer patients in 7th Korea national health and nutrition examination survey. The data were analyzed complex sample frequency analysis and chi-square analysis, multiple logistic regression by using SPSS/WIN 26.0 program. 38% of cancer patients had oral examination and 62% did not. The Factors Affecting the unexamined Oral Examination increased by 3.641 times in over 70 years of age and by 3.928 times in graduating less than elementary school, by 3.740 times in the low-income group, 2.050 times in less than 2 brushing times a day, by 2.533 times in the chewing-problems group, by 2.746 times in speech problems group. The study results show that the oral examination rate of cancer patients was very low. It is necessary to to expand education on the importance of oral care and oral examination in consideration of oral complications and to actively introduce a customized oral health management program for cancer patients.

Dual-Band Array Antenna Using Modified Sierpinski Fractal Structure (변형된 Sierpinski 프랙탈 구조를 갖는 이중 대역 배열 안테나)

  • Oh, Kyung-hyun;Kim, Byoung-chul;Cheong, Chi-hyun;Kim, Kun-woo;Lee, Duk-young;Choo, Ho-sung;Park, Ik-mo
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.9
    • /
    • pp.921-932
    • /
    • 2010
  • This paper presents a dual-band array antenna based on a modified Sierpinski fractal structure. Array structure is mirror symmetric, and forms broadside radiation pattern for dual frequency band if the ports are fed with $180^{\circ}C$ phase difference between upper and lower $2{\times}1$ array. To use in-phase corporate feeding circuit, the phase inversion structure is designed by changing the position of patch and ground for upper and lower array. The dimensions of the array antenna is $28{\times}30{\times}5\;cm^3$ and the bandwidth of 855~1,380 MHz(47 %), 1,770~2,330 MHz(27 %) were achieved for -10 dB return loss. The measured gain is 9.06~12.44 dBi for the first band and 11.76~14.84 dBi for the second band. The half power beam width is $57^{\circ}$ for x-z plane and $46^{\circ}$ for y-z plane at 1,100 MHz and $43^{\circ}$ and $28^{\circ}$ at 2,050 MHz, respectively.

MATERIALS AND METHODS FOR TEACHING INTONATION

  • Ashby, Michael
    • Proceedings of the KSPS conference
    • /
    • 1997.07a
    • /
    • pp.228-229
    • /
    • 1997
  • 1 Intonation is important. It cannot be ignored. To convince students of the importance of intonation, we can use sentences with two very different interpretations according to intonation. Example: "I thought it would rain" with a fallon "rain" means it did not rain, but with a fall on "thought" and a rise on "rain" it means that it did rain. 2 Although complex, intonation is structured. For both teacher and student, the big job of tackling intonation is made simpler by remembering that intonation can be analysed into systems and units. There are three main systems in English intonation: Tonality (division into phrases) Tonicity (selection of accented syllables) Tone (the choice of pitch movements) Examples: Tonality: My brother who lives in London is a doctor. Tonicity: Hello. How ARE you. Hello. How are YOU. Tone: Ways to say "Thank you" 3 In deciding what to teach, we must distinguish what is universal from what is specifically English. This is where contrastive studies of intonation are very valuable. Usually, for instance, division into phrases (tonality) works in broadly similar ways across languages. Some uses of pitch are also similar across languages - for example, very high pitch may signal excitement or urgency. 4 Although most people think that intonation is mainly about pitch (the tone system), actually accent placement (tonicity) is probably the single most important aspect of English intonation. This is because it is connected with information focus, and the effects on interpretation are very clear-cut. Example: They asked for coffee, so I made them coffee. (The second occurrence of "coffee" must not be accented). 5 Ear-training is the beginning of intonation training in the VeL approach. First, students learn to identify fall vs rise vs fall-rise. To begin with, single words are used, then phrases and sentences. When learning tones, the fIrst words used should have unstressed syllables after the stressed syllable (Saturday) to make the pitch movement clearer. 6 In production drills, the fIrst thing is to establish simple neutral patterns. There should be no drama or really special meanings. Simple drills can be used to teach important patterns: Example: A: Peter likes football B: Yes JOHN likes football TOO A: Mary rides a bike B: Yes JENny rides a bike TOO 7 The teacher must be systematic and let learners KNOW what they are learning. It is no good using new patterns and hoping that students will "pick them up" without noticing. 8 Visual feedback of fundamental frequency with a computer display can help students learn correct patterns. The teacher can use the display to demonstrate patterns, or students can practise by themselves, imitating recorded models.

  • PDF

Technologies trend for Wireless LAN (무선 LAN 통신망의 기술 동향)

  • Gang, Yeong-Jin;Kim, Sung-Nam;Kang, Sin-Ill;Lee, Yeong-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.255-258
    • /
    • 2011
  • Wi-Fi is a rapidly spreading communications network with Smart phone's publication, the technology has become Ubiquitous-based core network which is connected to personal computers, laptops, and tablet PC. Wi-Fi can send currently a variety of data standard due to developed wireless LAN communications network. One of Wi-Fi standard protocols, which is IEEE 802.11n, use 2.4GHz and 5GHz band. 2.4GHz band is used for 802.11b/g protocol because wavelength is long, diffraction and receiving distance is enough to connect other device. 5GHz band has more available channels to use than 2.4GHz band, so there is no frequency interference of other wireless device such as Bluetooth, RFID. Moreover, there is low interference between channels due to small users in each bandwidth level. In the thesis, we are going to analyze 802.11a/b/g protocol which has used since the beginning of Wi-Fi protocol and 802.11n protocol which is used lately. Furthermore, we look into development and direction for standardization of the next generation wireless LANs which are 802.11ac and 802.11ad. In addition, we will consider for the security, vulnerabilities and its countermeasure in Wireless LAN.

  • PDF