• Title/Summary/Keyword: Storage Scheme

Search Result 799, Processing Time 0.027 seconds

Effect of Surface Damage of Metal Substrate on LIBS Signal (금속 Substrate의 표면손상이 LIBS신호에 미치는 영향)

  • Jang, Sang-Ik;Kim, Kibum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.3
    • /
    • pp.1259-1264
    • /
    • 2014
  • Hydrogen is in the world limelight for future energy source, and it has been already used in various industry fields including aerospace. The extremely fine molecule of the hydrogen can be easily leaked from tiny size of the crack on the surface of transporting pipes or storage tanks, and it could bring on awfully terrible disaster. In this study, Laser-Induced Breakdown Spectroscopy (LIBS) was employed to develope a reliable detection scheme for a small quantity of hydrogen leakage. Effect of three different metal substrates (i.e. Al, Cu, SUS) on plasma generation and the intensity of the hydrogen atomic signal was investigated, and the surface damage of the substrates due to repetitive laser shots was observed using Scanning electron microscope. It was also evaluated how the surface damage could distort the atomic signal. The intensity of the atomic signal was found to be the strongest, and the signal distortion due to the surface damage was approximately $100W/m^2$ lower when Al was used for the substrate.

Dependent Quantization for Scalable Video Coding

  • Pranantha, Danu;Kim, Mun-Churl;Hahm, Sang-Jin;Lee, Keun-Sik;Park, Keun-Soo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.127-132
    • /
    • 2006
  • Quantization in video coding plays an important role in controlling the bit-rate of compressed video bit-streams. It has been used as an important control means to adjust the amount of bit-streams to at]owed bandwidth of delivery networks and storage. Due to the dependent nature of video coding, dependent quantization has been proposed and applied for MPEG-2 video coding to better maintain the quality of reconstructed frame for given constraints of target bit-rate. Since Scalable Video Coding (SVC) being currently standardized exhibits highly dependent coding nature not only between frames but also lower and higher scalability layers where the dependent quantization can be effectively applied, in this paper, we propose a dependent quantization scheme for SVC and compare its performance in visual qualities and bit-rates with the current JSVM reference software for SVC. The proposed technique exploits the frame dependences within each GOP of SVC scalability layers to formulate dependent quantization. We utilize Lagrange optimization, which is widely accepted in R-D (rate-distortion) based optimization, and construct trellis graph to find the optimal cost path in the trellis by minimizing the R-D cost. The optimal cost path in the trellis graph is the optimal set of quantization parameters (QP) for frames within a GOP. In order to reduce the complexity, we employ pruning procedure using monotonicity property in the trellis optimization and cut the frame dependency into one GOP to decrease dependency depth. The optimal Lagrange multiplier that is used for SVC is equal to H.264/AVC which is also used in the mode prediction of the JSVM reference software. The experimental result shows that the dependent quantization outperforms the current JSVM reference software encoder which actually takes a linear increasing QP in temporal scalability layers. The superiority of the dependent quantization is achieved up to 1.25 dB increment in PSNR values and 20% bits saving for the enhancement layer of SVC.

  • PDF

comparison of Numercal Methods for Obtaining 2-D Impurity Profile in Semiconductor (반도체 내에서의 2차원 불순물 분포를 얻기 위한 수치해법의 비교)

  • Yang, Yeong-Il;Gyeong, Jong-Min;O, Hyeong-Cheol
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.22 no.3
    • /
    • pp.95-102
    • /
    • 1985
  • An efficient numerical scheme for assessing the two-dimensional diffusion problem for modelling impurity profile in semiconductor is described. 4 unique combination of ADI (Al-ternating Direction Bmplicit) method and Gauss Elimination has resulted in a reduction of CPU time for most diffusion processes by a factor of 3, compared to other iteration schemes such as SOR (Successive Over-Relaxation) or Stone's iterative method without additional storage re-quirement. Various numerical schemes were compared for 2-D as well as 1-0 diffusion profile in terms of their CPU time while retaining the magnitude of relative error within 0.001%. good agree-ment between 1-D and 2-D simulation profile as well as between 1-D simulation profile and experiment has been obtained.

  • PDF

Storage I/O Subsystem for Guaranteeing Atomic Write in Database Systems (데이터베이스 시스템의 원자성 쓰기 보장을 위한 스토리지 I/O 서브시스템)

  • Han, Kyuhwa;Shin, Dongkun;Kim, Yongserk
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.169-176
    • /
    • 2015
  • The atomic write technique is a good solution to solve the problem of the double write buffer. The atomic write technique needs modified I/O subsystems (i.e., file system and I/O schedulers) and a special SSD that guarantees the atomicity of the write request. In this paper, we propose the writing unit aligned block allocation technique (for EXT4 file system) and the merge prevention of requests technique for the CFQ scheduler. We also propose an atomic write-supporting SSD which stores the atomicity information in the spare area of the flash memory page. We evaluate the performance of the proposed atomic write scheme in MariaDB using the tpcc-mysql and SysBench benchmarks. The experimental results show that the proposed atomic write technique shows a performance improvement of 1.4~1.5 times compared to the double write buffer technique.

Expression and Purification of a Functional Recombinant Aspartate Aminotransferase (AST) from Escherichia coli

  • Zou, Lihui;Zhao, Haijian;Wang, Daguang;Wang, Meng;Zhang, Chuanbao;Xiao, Fei
    • Journal of Microbiology and Biotechnology
    • /
    • v.24 no.7
    • /
    • pp.998-1003
    • /
    • 2014
  • Aspartate aminotransferase (AST; E.C. 2.6.1.1), a vitamin B6-dependent enzyme, preferentially promotes the mutual transformation of aspartate and ${\alpha}$-ketoglutarate to oxaloacetate and glutamate. It plays a key role in amino acid metabolism and has been widely recommended as a biomarker of liver and heart damage. Our study aimed to evaluate the extensive preparation of AST and its application in quality control in clinical laboratories. We describe a scheme to express and purify the 6His-AST fusion protein. An optimized sequence coding AST was synthesized and transformed into Escherichia coli BL21 (DE3) strain for protein expression. Ideally, the fusion protein has a volumetric productivity achieving 900 mg/l cultures. After affinity chromatography, the enzyme activity of purified AST reached 150,000 U/L. Commutability assessment between the engineered AST and standard AST from Roche suggested that the engineered AST was the better candidate for the reference material. Moreover, the AST showed high stability during long-term storage at $-20^{\circ}C$. In conclusion, the highly soluble 6His-tagged AST can become a convenient tool for supplying a much better and cheaper standard or reference material for the clinical laboratory.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

An LDPC Code Replication Scheme Suitable for Cloud Computing (클라우드 컴퓨팅에 적합한 LDPC 부호 복제 기법)

  • Kim, Se-Hoe;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.134-142
    • /
    • 2012
  • This paper analyze an LDPC code replication method suitable for cloud computing. First, we determine the number of blocks suitable for cloud computing through analysis of the performance for the file availability and storage overhead. Also we determine the type of LDPC code appropriate for cloud computing through the performance for three types of LDPC codes. Finally we present the graph random generation method and the comparing method of each generated LDPC code's performance by the iterative decoding process. By the simulation, we confirmed the best graph's regularity is left-regular or least left-regular. Also, we confirmed the best graph's total number of edges are minimum value or near the minimum value.

A System of Authentication and Security threat solution for N-screen services (N-스크린을 위한 인증 및 보안 위협 해결 시스템)

  • Hwang, Deuk-Young;Moon, Jeong-Kyung;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.775-781
    • /
    • 2013
  • N-screen is a Service that can be provide for One Service Multi Device. If the network is changed or if the device is changed after authentication the device fits seamlessly send footage. Security threats that occur here have a problem with user authentication. In this paper proposes available in a multi-device the authentication system. Homomorphic Encryption Algorithm of authentication scheme used. Among the authentication mechanism that already exists is a simple and lightweight authentication mechanism. In addition, N-screen service that uses multiple devices is simple authentication process of the device. Review the results of proposed authentication protocol, encryption algorithm to process a small storage capacity and is easy to work in low processor. And was suitable for use with multiple devices.

A High Image Compression for Computer Storage and Communication

  • Jang, Jong-Whan
    • The Journal of Natural Sciences
    • /
    • v.4
    • /
    • pp.191-220
    • /
    • 1991
  • A new texture segmentation-based image coding technique which performs segmentation based on roughness of textural regions and properties of the human visual system (HVS) is presented. This method solves the problems of a segmentation-based image coding technique with constant segments by proposing a methodology for segmenting an image texturally homogeneous regions with respect to the degree of roughness as perceived by the HVS. The fractal dimension is used to measure the roughness of the textural regions. The segmentation is accomplished by thresholding the fractal dimension so that textural regions are classified into three texture classes; perceived constant intensity, smooth texture, and rough texture. An image coding system with high compression and good image quality is achieved by developing an efficient coding technique for each segment boundary and each texture class. For the boundaries, a binary image representing all the boundaries is created. For regions belonging to perceived constant intensity, only the mean intensity values need to be transmitted. The smooth and rough texture regions are modeled first using polynomial functions, so only the coefficients characterizing the polynomial functions need to be transmitted. The bounda-ries, the means and the polynomial functions are then each encoded using an errorless coding scheme. Good quality reconstructed images are obtained with about 0.08 to 0.3 bit per pixel for three different types of imagery ; a head and shoulder image with little texture variation, a complex image with many edges, and a natural outdoor image with highly textured areas.

  • PDF