• Title/Summary/Keyword: SPEC

Search Result 472, Processing Time 0.034 seconds

THE STUDY FOR SKEW DISC PLAYABILITY IMPROVEMENT (DVD 재생계 SKEW DISC 재생 성능에 관한 연구)

  • Park, Chan-Hu
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.316-316
    • /
    • 2007
  • DISC의 물리적 SPEC은 FLAT하나 실제 시장에 유통 되고 있는 디스크들은 대부분 그러하지 못하다. 특히 그중 SKEW DISC가 가장 많은 비중을 차지하여 이에 대한 재생 능력이 광 DISC 재생계 SERVO 성능을 판단하는데 중요한 척도로 자리 매김 하였다. SKEW DISC의 재생 능력을 향상시키는 방법은 광학계에 의한 향상, TILT SERVO에 의한 향상, TRACKING SERVO 보상 알고리즘에 의한 향상 등 여러 가지 방법이 있겠으나 몬 논문에서는 세 번째 방법에 대하여 논하였다.

  • PDF

A Study on Case Realization within DP

  • Hong, Sung-Shim
    • Language and Information
    • /
    • v.3 no.1
    • /
    • pp.97-111
    • /
    • 1999
  • This paper examines Case alternation within DP. Four previous accounts dealing with Case alternation within DP will be critically examined. We conclude that a phenomenon looking like Case alternation within Korean DPs is not an instance of Case alternation. We argue that the genitive subject within such DPs is actually in the Spec position of a Small Clause, which involves a verb movement into what is now called vP. From a cross-linguistic point of view, this analysis supports Harley & Noyer's(1997) argument that Gerunds are instances of Small Clauses.

  • PDF

The Development of Apparel Worksheet System Using PDM Functions (PDM 기능(機能)을 이용(利用)한 의류(衣類) 작업사양서(作業仕樣書) 시스템의 개발(開發))

  • Park, Joon-Hee;You, Jee-Sun
    • Journal of Fashion Business
    • /
    • v.7 no.5
    • /
    • pp.32-44
    • /
    • 2003
  • In apparel industry, the worksheet or product specification document has the function of products design. Drawing up worksheet exactly is important to quality control of apparel products. Every company needs to manage the product data of design-centric to establish TQM environment. In order to control the quality data of design-centric, an apparel worksheet system was developed by using the function of product data management system.

An Implement TLS Library for KCMVP (KCMVP를 준수하는 TLS Library의 구현)

  • Park, J.P
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2019.07a
    • /
    • pp.331-334
    • /
    • 2019
  • 본 논문에서는 국내 암호 알고리즘 검증제도(KCMVP)를 준수하는 TLS 1.2 응용 개발 툴(C Libaray)을 개발한다. 국내 암호응용 네트워크 장비들이 암호화용 대칭키를 교환하는 방법으로 대부분 TLS프로토콜을 사용하고 있으나 RFC표준에 국내알고리즘들이 등제 되지 않아 TLS 프로토콜을 사용 할 경우 알고리즘 검증제도를 준수하고 있지 못한 실정이다. 이에 본 논문에서는 TLS 1.2 표준의 cipher spec extension을 이용하여 국산 암호화 알고리즘의 TLS 적용을 구현한다.

  • PDF

IDEALS AND SUBMODULES OF MULTIPLICATION MODULES

  • LEE, SANG CHEOL;KIM, SUNAH;CHUNG, SANG-CHO
    • Journal of the Korean Mathematical Society
    • /
    • v.42 no.5
    • /
    • pp.933-948
    • /
    • 2005
  • Let R be a commutative ring with identity and let M be an R-module. Then M is called a multiplication module if for every submodule N of M there exists an ideal I of R such that N = 1M. Let M be a non-zero multiplication R-module. Then we prove the following: (1) there exists a bijection: N(M)$\bigcap$V(ann$\_{R}$(M))$\rightarrow$Spec$\_{R}$(M) and in particular, there exists a bijection: N(M)$\bigcap$Max(R)$\rightarrow$Max$\_{R}$(M), (2) N(M) $\bigcap$ V(ann$\_{R}$(M)) = Supp(M) $\bigcap$ V(ann$\_{R}$(M)), and (3) for every ideal I of R, The ideal $\theta$(M) = $\sum$$\_{m(Rm :R M) of R has proved useful in studying multiplication modules. We generalize this ideal to prove the following result: Let R be a commutative ring with identity, P $\in$ Spec(R), and M a non-zero R-module satisfying (1) M is a finitely generated multiplication module, (2) PM is a multiplication module, and (3) P$^{n}$M$\neq$P$^{n+1}$ for every positive integer n, then $\bigcap$$^{$\_{n=1}$(P$^{n}$ + ann$\_{R}$(M)) $\in$ V(ann$\_{R}$(M)) = Supp(M) $\subseteq$ N(M).

Instruction Queue Architecture for Low Power Microprocessors (마이크로프로세서 전력소모 절감을 위한 명령어 큐 구조)

  • Choi, Min;Maeng, Seung-Ryoul
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.11
    • /
    • pp.56-62
    • /
    • 2008
  • Modern microprocessors must deliver high application performance, while the design process should not subordinate power. In terms of performance and power tradeoff, the instructions window is particularly important. This is because a large instruction window leads to achieve high performance. However, naive scaling conventional instruction window can severely affect the complexity and power consumption. This paper explores an architecture level approach to reduce power dissipation. We propose a low power issue logic with an efficient tag translation. The direct lookup table (DTL) issue logic eliminates the associative wake-up of conventional instruction window. The tag translation scheme deals with data dependencies and resource conflicts by using bit-vector based structure. Experimental results show that, for SPEC2000 benchmarks, the proposed design reduces power consumption by 24.45% on average over conventional approach.

A Study on Characteristics of Fly and Bed Ash in Circulating Fluidized Bed Combustion Boiler According to Particle Size of Limestone (석회석 입도의 변화가 석탄회의 성상에 미치는 영향에 관한 연구)

  • Chung Jin-Do;Kim Jang-Woo;Ha Joon-Ho
    • Journal of Environmental Science International
    • /
    • v.15 no.6
    • /
    • pp.587-592
    • /
    • 2006
  • The advantage of CFBC(Circulating fluidized bed combustor) is that it can apply to various fuel sources including the lower rank fuel and remove SOx by means of direct supply of limestone to the combustor without additional desulfation facility. In this paper, we denote characteristics of fly and bed ash to reuse finer limestone usually abandoned(used spec[Coarse LS] 0.1mm under 25%, new spec[Fine LS] 0.1mm under 50%). According to the results, the chemical composition of fly ash was as follows; $SiO_2\;40.8%,\;Al_2O_3\;31.9%,\;CaO\;10.7%,\;K_2O\;4.46%$ in the case of coarse limestone and $SiO_2\;41.1%,\;Al_2O_3\;31.3%,\;CaO\;10.9%,\;K_2O\;4.66%$ in the case of fine limestone. The chemical composition of bed ash was as follows; $SiO_2\;54.2%,\;Al_2O_3\;33.1%,\;CaO\;1.56%,\;K_2O\;4.34%$ in the case of coarse limestone and $SiO_2\;53.8%,\;Al_2O_3\;32.6%,\;CaO\;2.21%,\;K_2O\;4.45%$ in the case of fine limestone. It showed that there was no significant change in chemical composition. And it is conformed that there was no significant change in particle size and shapes.

Analyzing Thermal Variations on a Multi-core Processor (멀티코아 프로세서의 온도변화 분석)

  • Lee, Sang-Jeong;Yew, Pen-Chung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.57-67
    • /
    • 2010
  • This paper studies thermal characteristics of a mix of CPU-intensive and memory-intensive application workloads on a multi-core processor. Especially, we focus on thermal variations during program execution because thermal variations are more critical than average temperatures and their ranges for thermal management. New metrics are proposed to quantify such thermal variations for a workload. We study the thermal variations using SPEC CPU2006 benchmarks with varying cooling conditions and frequencies on an Intel Core 2 Duo processor. The results show that applications have distinct thermal variations characteristics. Such variations are affected by cooling conditions,operating frequencies and multiprogramming workload. Also, there are distinct spatial thermal variations between cores. Our new metrics and their results from this study provide useful insight for future research on multi-core thermal management.

Indirect Branch Target Address Verification for Defense against Return-Oriented Programming Attacks (Return-Oriented Programming 공격 방어를 위한 간접 분기 목적 주소 검증 기법)

  • Park, Soohyun;Kim, Sunil
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.5
    • /
    • pp.217-222
    • /
    • 2013
  • Return-Oriented Programming(ROP) is an advanced code-reuse attack like a return-to-libc attack. ROP attacks combine gadgets in program code area and make functions like a Turing-complete language. Some of previous defense methods against ROP attacks show high performance overhead because of dynamic execution flow analysis and can defend against only certain types of ROP attacks. In this paper, we propose Indirect Branch Target Address Verification (IBTAV). IBTAV detects ROP attacks by checking if target addresses of indirect branches are valid. IBTAV can defends against almost all ROP attacks because it verifies a target address of every indirect branch instruction. Since IBTAV does not require dynamic execution flow analysis, the performance overhead of IBTAV is relatively low. Our evaluation of IBTAV on SPEC CPU 2006 shows less than 15% performance overhead.

A Study on the Analysis of 89Sr and 90Sr with Cerenkov Radiation and Liquid Scintillation Counting Method (첼렌코프광과 액체섬광계수법을 이용한 89Sr 및 90Sr 분석에 대한 연구)

  • Lee, Myung-Ho;Chung, Geun-Ho;Cho, Young-Hyun;Choi, Geun-Sik;Lee, Chang-Woo
    • Analytical Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.20-25
    • /
    • 2002
  • An accurate and simple analytical technique for $^{89}Sr$ and $^{90}Sr$, overcoming the demerits of the conventional method, has been developed with extraction chromatography and liquid scintillation counting. The Sr fraction was separated from hindrance elements with oxalate coprecipitation or cation exchange resin and purified with Sr-Spec column. With liquid scintillation counter, $^{89}Sr$ was measured by Cerenkov radiation method, and $^{90}Sr$ was measured by spectrum unfolding method. The developed radioactive strontium separation method was validated by application to the IAEA-reference material (IAEA-375, Soil) and radioactive waste samples.