• Title/Summary/Keyword: Side Information

Search Result 3,584, Processing Time 0.029 seconds

Rule-based OPC for Side-lobe Suppression in The AttPSM Metal Layer Lithography Process (AttPSM metal layer 리토그라피공정의 side-lobe억제를 위한 Rule-based OPC)

  • Lee, Mi-Young;Lee, Hoong-Joo;Seong, Young-Sub;Kim, Hoon
    • Proceedings of the IEEK Conference
    • /
    • 2002.06b
    • /
    • pp.209-212
    • /
    • 2002
  • As the mask design rules get smaller, the probability of the process failure becomes higher doc to the narrow overlay margin between the contact and metal interconnect layers. To obtain the minimum process margin, a tabbing and cutting method Is applied with the rule based optical\ulcorner proximity correction to the metal layer, so that the protection to bridge problems caused by the insufficient space margin between the metal layers can be accomplished. The side-lobe phenomenon from the attenuated phase shift mask with the tight design rule is analyzed through the aerial image simulation for test patterns with variation of the process parameters such as numerical aperture, transmission rate, and partial coherence. The corrected patterns are finally generated by the rules extracted from the side-lobe simulation.

  • PDF

An experimental study on the wake structure behind a van type vehicle (Van형 자동차의 후류구조에 대한 실험적 해석(와류 형성을 중심으로))

  • 성봉주;장병희
    • Journal of the korean Society of Automotive Engineers
    • /
    • v.10 no.3
    • /
    • pp.51-59
    • /
    • 1988
  • The wake structure behind a van type vehicle was studied experimentally with a 5-hole yawhead probe. Through an effective calibration method of the 5-hole yawhead probe, the flow properties such as velocity vector, total pressure and static pressure were obtained on two cross sections within the wake. These results combined with the surface flow visualization performed in the previous study, yielded some information about the wake structure. When the model was placed in a stream with zero yaw angle, two counter rotating vortices were observed behind the model which pull down the surface flow on each side of the model. With increasing the yaw angle, the surface flow on the windward side changed to divide the flow in two directions, one flows upward on the upper part and the other flows downward on the lower part of the windward side. Hence a new weak vortex was created on the upper windward side, which resulted 3 vortices within the wake. The size and the strength of the vortices increased with yaw angle.

  • PDF

Improving the Performance of a Fast Text Classifier with Document-side Feature Selection (문서측 자질선정을 이용한 고속 문서분류기의 성능향상에 관한 연구)

  • Lee, Jae-Yun
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.51-69
    • /
    • 2005
  • High-speed classification method becomes an important research issue in text categorization systems. A fast text categorization technique, named feature value voting, is introduced recently on the text categorization problems. But the classification accuracy of this technique is not good as its classification speed. We present a novel approach for feature selection, named document-side feature selection, and apply it to feature value voting method. In this approach, there is no feature selection process in learning phase; but realtime feature selection is executed in classification phase. Our results show that feature value voting with document-side feature selection can allow fast and accurate text classification system, which seems to be competitive in classification performance with Support Vector Machines, the state-of-the-art text categorization algorithms.

Are Negative Online Consumer Reviews Always Bad? A Two-Sided Message Perspective

  • Lee, Jumin;Park, Se-Bum;Lee, Sangwon
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.784-804
    • /
    • 2015
  • This study investigates the effects of a two-sided message on product attitude and purchase intention by using a message structure variable, such as attribute importance in the context of online consumer reviews (OCRs). Study 1 explains the previous inconsistent results of a two-side message by comparing a one-side message and a two-side message by using the attribute importance in negative reviews. Study 2 determines the reasons for the inconsistent results of a refutational two-sided message research by using the attribute importance in negative reviews and website trust. Two experiments are designed to test our hypotheses. The first experiment is a $2{\times}2$ factorial design with 84 participants. The second experiment uses a $2{\times}2{\times}2$ factorial design with 196 participants. In study 1, two-sided OCRs are more credible than one-sided OCRs, and two-sided OCRs that use low important attributes are more effective in making favorable product attitude/purchase intention. In study 2, refutational two-sided OCRs that use high attribute importance render positive effects on product attitudes in trustworthy websites. However, the refutation could negatively affect product attitude/purchase intention in low trustworthy websites.

Implementation of Instruction-Level Disassembler Based on Power Consumption Traces Using CNN (CNN을 이용한 소비 전력 파형 기반 명령어 수준 역어셈블러 구현)

  • Bae, Daehyeon;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.527-536
    • /
    • 2020
  • It has been found that an attacker can extract the secret key embedded in a security device and recover the operation instruction using power consumption traces which are some kind of side channel information. Many profiling-based side channel attacks based on a deep learning model such as MLP(Multi-Layer Perceptron) method are recently researched. In this paper, we implemented a disassembler for operation instruction set used in the micro-controller AVR XMEGA128-D4. After measuring the template traces on each instruction, we automatically made the pre-processing process and classified the operation instruction set using a deep learning model CNN. As an experimental result, we showed that all instructions are classified with 87.5% accuracy and some core instructions used frequently in device operation are with 99.6% respectively.

Experimental Verification on the Corrective Machining Algorithm for Improving the Motion Accuracy of Hydrostatic Bearing Tables

  • Park, Chun-Hong;Lee, Chan-Hong;Lee, Husang
    • International Journal of Precision Engineering and Manufacturing
    • /
    • v.5 no.3
    • /
    • pp.62-68
    • /
    • 2004
  • Effectiveness of a corrective machining algorithm, which can construct the proper machining information to improve motion errors utilizing measured motion errors, is verified experimentally in this paper, Corrective machining process is practically applied to single and double side hydrostatic bearing tables. Lapping process is applied as a machining method. The machining information is obtained from the measured motion errors by applying the algorithm, without any information on the rail profile. In the case of the single-side table, after 3 times of corrective remachining, linear and angular motion errors are improved up to 0.13 $\mu\textrm{m}$ and 1.40 arcsec from initial error of 1.04 $\mu\textrm{m}$ and 22.71 arcsec, respectively. In the case of the double-side table, linear and angular motion error are improved up to 0.07 /$\mu\textrm{m}$ and 1.42 arcsec from the initial error of 0.32 $\mu\textrm{m}$ and 4.14 arcsec. The practical machining process is performed by an unskilled person after he received a preliminary training in machining. Experimental results show that the corrective machining algorithm is very effective and easy to use to improve the accuracy of hydrostatic tables.

Threat Diagnosis and Security Verification of Services Using Server-Side Browsers (서버 측 브라우저를 활용한 서비스들의 보안 위협 진단 및 안전성 검증)

  • Min-sang Lee;Hyoung-kee Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.693-706
    • /
    • 2024
  • The browser is utilized to render web pages in programs that perform tasks such as data extraction, format conversion, and development testing on web pages. Online services that utilize browsers can cause security issues if browser information is exposed or used in an unsafe manner. This paper presents security requirements for the safe use of browsers and explains the security threats that arise if these requirements are not met. Through evaluation, the security verification of commercial web applications is conducted, and the vulnerabilities that allow browsers to be exploited as attack tools are analyzed.

A Study on the PAPR Reduction by Hybrid Algorithm Based on the PTS and GS Technique

  • Zhao Zi-Bin;Kim Young-Hwan;Kim Jae-Moung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.2A
    • /
    • pp.187-193
    • /
    • 2006
  • Multicarrier systems has major shortcomings due to the large numbers of subcarrier. One of the shortcomings is the high peak-to-average power ratio(PAPR), which causes nonlinearity distortion in the transmitter, and degrades the performance of the system significantly. Partial transmit sequence(PTS) is one of the best approaches that can significantly improve the statistics of the PAPR of an orthogonal frequency division multiplexing(OFDM) signal. Guided scrambling(GS) is an extension of self-synchronizing scrambling. It is also capable of guiding the scrambling process to produce a balanced encoded bit stream. In this paper, we propose a sub-optimal algorithm to optimize the phase factor in PTS. In addition, we integrate GS coding with this method. The proposed Hybrid algorithm can get much more PAPR reduction at the expense of incur a few error extension and do not require transmission of side information.

A Study on the Experimental Methods of the Power Analysis Attack in a Smartcard (스마트카드의 전력분석공격 실험 방법에 관한 연구)

  • 이훈재;장익훈;최희봉;박일환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.540-548
    • /
    • 2002
  • Attacks have been proposed that use side information as timing measurements, power consumption, electromagnetic emissions and faulty hardware. Elimination side-channel information or prevention it from being used to attack a secure system is an tractive ares of research. In this paper, differential power analysis techniques to attack the DES are experimented and analyzed. And we propose the prevention of DPA attack by software implementation technique.

Imaging a scene from experience given verbal experssions

  • Sakai, Y.;Kitazawa, M.;Takahashi, S.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1995.10a
    • /
    • pp.307-310
    • /
    • 1995
  • In the conventional systems, a human must have knowledge of machines and of their special language in communicating with machines. In one side, it is desirable for a human but in another side, it is true that achieving it is very elaborate and is also a significant cause of human error. To reduce this sort of human load, an intelligent man-machine interface is desirable to exist between a human operator and machines to be operated. In the ordinary human communication, not only linguistic information but also visual information is effective, compensating for each others defect. From this viewpoint, problem of translating verbal expressions to some visual image is discussed here in this paper. The location relation between any two objects in a visual scene is a key in translating verbal information to visual information, as is the case in Fig.l. The present translation system advances in knowledge with experience. It consists of Japanese Language processing, image processing, and Japanese-scene translation functions.

  • PDF