• Title/Summary/Keyword: Single domain model

Search Result 245, Processing Time 0.028 seconds

Wheastone-bridge type MR sensors of Si(001)/NiO($300{\AA}$)/NiFe bilayer system (휘스톤브리지형 MR 센서제작 및 특성)

  • Lee, Won-Jae;Min, Bok-Ki;Song, Jae-Sung;Park, Tae-Gone
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.260-263
    • /
    • 2002
  • There is great interest in developing magnetoresistance(MR) sensor, using ferromagnetic, electrically non-magnetic conducting and antiferromagnetic films, especially for the use in weak magnetic fields. Here, we report single and Wheatstone-bridge type of MR sensors made in Si(001)/NiO($300{\AA}$)/NiFe bilayers. Angular dependence of MR profiles was measured in Si(001)/NiO($300{\AA}$)/NiFe($450{\AA})$ films as a function of an angle between current and applied field direction, also, linearity was determined. AMR characteristics of single MR sensors was well explained with single domain model. Good linearity in $45^{\circ}$ Wheatstone-bridge type of MR sensors consisting of 4 single MR sensors made in Si(001)/NiO($300{\AA}$)/NiFe($450{\AA})$ was shown in the range of about ${\leq}{\pm}5$ Oe.

  • PDF

A cross-domain access control mechanism based on model migration and semantic reasoning

  • Ming Tan;Aodi Liu;Xiaohan Wang;Siyuan Shang;Na Wang;Xuehui Du
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.6
    • /
    • pp.1599-1618
    • /
    • 2024
  • Access control has always been one of the effective methods to protect data security. However, in new computing environments such as big data, data resources have the characteristics of distributed cross-domain sharing, massive and dynamic. Traditional access control mechanisms are difficult to meet the security needs. This paper proposes CACM-MMSR to solve distributed cross-domain access control problem for massive resources. The method uses blockchain and smart contracts as a link between different security domains. A permission decision model migration method based on access control logs is designed. It can realize the migration of historical policy to solve the problems of access control heterogeneity among different security domains and the updating of the old and new policies in the same security domain. Meanwhile, a semantic reasoning-based permission decision method for unstructured text data is designed. It can achieve a flexible permission decision by similarity thresholding. Experimental results show that the proposed method can reduce the decision time cost of distributed access control to less than 28.7% of a single node. The permission decision model migration method has a high decision accuracy of 97.4%. The semantic reasoning-based permission decision method is optimal to other reference methods in vectorization and index time cost.

Delay Measurement and Split-Step Time-Domain Analysis of Ring Resonator All-Pass Filters

  • Kim, Hyosuk;Ko, Yoonyoung;Moon, Hyunseung;Kim, Jaeseong;Chung, Youngchul
    • Journal of the Optical Society of Korea
    • /
    • v.18 no.6
    • /
    • pp.766-771
    • /
    • 2014
  • Single-ring all-pass filters with various coupling ratios are designed, fabricated, and characterized to assess the validity of the split-step time-domain modeling approach, which is considered for direct simulation of time-domain characteristics, such as optical delay, of various ring resonator devices. When the coupling ratio of the single-ring all-pass filter is 0.4 and 0.8, the delay time is measured to be about 145 and 42 ps respectively, which is comparable to the time-domain modeling results of 151 and 47 ps respectively. The measurements for two- and three-ring all-pass filters are also found to agree quite well with the simulation results. With these results it is confirmed that the split-step time-domain model could be efficiently incorporated into an optical-communication simulation module for ring resonator delay components in an all-optical packet switching system.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Comparison of structure, function and regulation of plant cold shock domain proteins to bacterial and animal cold shock domain proteins

  • Chaikam, Vijay;Karlson, Dale T.
    • BMB Reports
    • /
    • v.43 no.1
    • /
    • pp.1-8
    • /
    • 2010
  • The cold shock domain (CSD) is among the most ancient and well conserved nucleic acid binding domains from bacteria to higher animals and plants. The CSD facilitates binding to RNA, ssDNA and dsDNA and most functions attributed to cold shock domain proteins are mediated by this nucleic acid binding activity. In prokaryotes, cold shock domain proteins only contain a single CSD and are termed cold shock proteins (Csps). In animal model systems, various auxiliary domains are present in addition to the CSD and are commonly named Y-box proteins. Similar to animal CSPs, plant CSPs contain auxiliary C-terminal domains in addition to their N-terminal CSD. Cold shock domain proteins have been shown to play important roles in development and stress adaptation in wide variety of organisms. In this review, the structure, function and regulation of plant CSPs are compared and contrasted to the characteristics of bacterial and animal CSPs.

Multiple Fusion-based Deep Cross-domain Recommendation (다중 융합 기반 심층 교차 도메인 추천)

  • Hong, Minsung;Lee, WonJin
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.6
    • /
    • pp.819-832
    • /
    • 2022
  • Cross-domain recommender system transfers knowledge across different domains to improve the recommendation performance in a target domain that has a relatively sparse model. However, they suffer from the "negative transfer" in which transferred knowledge operates as noise. This paper proposes a novel Multiple Fusion-based Deep Cross-Domain Recommendation named MFDCR. We exploit Doc2Vec, one of the famous word embedding techniques, to fuse data user-wise and transfer knowledge across multi-domains. It alleviates the "negative transfer" problem. Additionally, we introduce a simple multi-layer perception to learn the user-item interactions and predict the possibility of preferring items by users. Extensive experiments with three domain datasets from one of the most famous services Amazon demonstrate that MFDCR outperforms recent single and cross-domain recommendation algorithms. Furthermore, experimental results show that MFDCR can address the problem of "negative transfer" and improve recommendation performance for multiple domains simultaneously. In addition, we show that our approach is efficient in extending toward more domains.

Chinese Multi-domain Task-oriented Dialogue System based on Paddle (Paddle 기반의 중국어 Multi-domain Task-oriented 대화 시스템)

  • Deng, Yuchen;Joe, Inwhee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.308-310
    • /
    • 2022
  • With the rise of the Al wave, task-oriented dialogue systems have become one of the popular research directions in academia and industry. Currently, task-oriented dialogue systems mainly adopt pipelined form, which mainly includes natural language understanding, dialogue state decision making, dialogue state tracking and natural language generation. However, pipelining is prone to error propagation, so many task-oriented dialogue systems in the market are only for single-round dialogues. Usually single- domain dialogues have relatively accurate semantic understanding, while they tend to perform poorly on multi-domain, multi-round dialogue datasets. To solve these issues, we developed a paddle-based multi-domain task-oriented Chinese dialogue system. It is based on NEZHA-base pre-training model and CrossWOZ dataset, and uses intention recognition module, dichotomous slot recognition module and NER recognition module to do DST and generate replies based on rules. Experiments show that the dialogue system not only makes good use of the context, but also effectively addresses long-term dependencies. In our approach, the DST of dialogue tracking state is improved, and our DST can identify multiple slotted key-value pairs involved in the discourse, which eliminates the need for manual tagging and thus greatly saves manpower.

Micromagnetic Analysis of Thermal Magnetization Fluctuations in Ferromagnetic Nanowires (미세자기 동역학을 이용한 강자성 나노선의 자기 잡음 연구)

  • Yoon, Jung-Bum;You, Chun-Yeol;Jo, Young-Hun;Park, Seung-Young;Jung, Myung-Hwa
    • Journal of the Korean Magnetics Society
    • /
    • v.20 no.1
    • /
    • pp.1-7
    • /
    • 2010
  • We investigate the spin dynamics of the magnetic domain wall using the magnetic noise in the magnetic nanowire structure by employing micromagnetic simulations. Magnetic noise due to the thermal fluctuations in ferromagnetic materials is related to magnetic susceptibility and resonance frequency, which are important physical quantities in the study of the spin dynamics. In this study, we present the magnetic noise of the single domain without magnetic domain wall, and with the magnetic domain wall between two magnetic domains in ferromagnetic nanowires. It is confirmed that the Kittel equation with simple ellipsoid model with demagnetizing factor well describe the resonance frequency due to magnetic noise of the single domain. Besides, we find that there is a distinguishable additional resonance frequency, when a magnetic domain wall exists. It is verified that the additional resonance frequency is originated from the magnetic domain wall, and it is lower than one of the single domain. It implies that the spins inside the domain wall have a different effective field.

Identity-Based Ring Signature Schemes for Multiple Domains

  • Ki, JuHee;Hwang, Jung Yeon;Lee, Dong Hoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2692-2707
    • /
    • 2012
  • A separable identity-based ring signature scheme has been constructed as a fundamental cryptographic primitive for protecting user privacy. Using the separability property, ring members can be selected from arbitrary domains, thereby, giving a signer a wide range of ways to control privacy. In this paper we propose a generic method to construct efficient identity-based ring signature schemes with various levels of separability. We first describe a method to efficiently construct an identity-based ring signature scheme for a single domain, in which a signer can select ring identities by choosing from identities defined only for the domain. Next, we present a generic method for linking ring signatures constructed for a single domain. Using this method, an identity-based ring signature scheme with a compact structure, supporting multiple arbitrary domains can be designed. We show that our method outperforms the best known schemes in terms of signature size and computational costs, and that the security model based on the separability of identity-based ring signatures, presented in this paper, is highly refined and effective by demonstrating the security of all of the proposed schemes, using a model with random oracles.