• Title/Summary/Keyword: Table speed

Search Result 541, Processing Time 0.024 seconds

EFFECT OF SALIVARY CONTAMINATION OF TEETH ON MICROTENSILE BOND STRENGTH OF VAR10US DENTIN BONDING SYSTEMS. (타액에 의한 오염이 상아질 접착제의 미세전단결합강도에 미치는 영향)

  • Choi, Kyoung-Kyu;Ryu, Gil-Joo
    • Restorative Dentistry and Endodontics
    • /
    • v.28 no.3
    • /
    • pp.203-208
    • /
    • 2003
  • The purpose of this study was to evaluate the effect of salivary contamination of teeth on bonding efficacy of self-priming and self-etching DBSs. The materials used were Single Bond(SB, self-priming system, 3M), Unifil Bond(UB, self-etching system, GC), and Scotchbond Multi-Purpose Plus(SM, 3M) as control. Forty five human molars randomly allocated to three groups as dentin bonding systems tested and embedded in epoxy resin. Then the specimens were wet-ground to expose flat buccal enamel surface or flat occlusal dentin surface and cut bucco-lingually to form two halves with slow speed diamond saw. One of them was used under non-contamination, other under contamination with saliva. The bonding procedure was according to the manufacturer's directions and resin composite(Z-100, 3M Dental Products, St. Paul, MN) was built-up on the bonded surface 5mm high. The specimens were ground carefully at the enamel-composite interface with fine finishing round diamond bur to create an hour-glass shape yielding bonded surface areas of $1.5{\pm}0.1\textrm{mm}^2$. The specimens were bonded to the modified microtensile testing apparatus with cyanoacrylate, attached to the universal testing machine and stressed in tension at a CHS of 1mm/min. The tensile force at failure was recorded and converted to a tensile stress(MPa). Mean values and standard deviations of the bond strength are listed in table. One-way ANOVA was used to determine significant difference at the 95% level. The bond strength of SBMP and SB were not affected by salivary contamination, but that of UB was significantly affected by salivary contamination. These results indicate that DBSs with total etch technique seems less likely affected by salivary contamination in bonding procedure.

Performance Comparison between Hardware & Software Cache Partitioning Techniques (하드웨어 캐시 파티셔닝과 소프트웨어 캐시 파티셔닝의 성능 비교)

  • Park, JiWoong;Yeom, HeonYoung;Eom, Hyeonsang
    • Journal of KIISE
    • /
    • v.42 no.2
    • /
    • pp.177-182
    • /
    • 2015
  • The era of multi-core processors has begun since the limit of the clock speed has been reached. These days, multi-core technology is used not only in desktops, servers, and table PCs, but also in smartphones. In this architecture, there is always interference between processes, because of the sharing of system resources. To address this problem, cache partitioning is used, which can be roughly divided into two types: software and hardware cache partitioning. When it comes to dynamic cache partitioning, hardware cache partitioning is superior to software cache partitioning, because it needs no page copy. In this paper, we compare the effectiveness of hardware and software cache partitioning on the AMD Opteron 6282 SE, which is the only commodity processor providing hardware cache partitioning, to see whether this technique can be effectively deployed in dynamic environments.

A Study of Golf Swing Errors of Amateur Golfer (아마추어골퍼들의 스윙 오류에 관한 연구)

  • Lim, Jung;Jeon, Chul-Woo;Chung, Chae-Wook
    • Korean Journal of Applied Biomechanics
    • /
    • v.16 no.2
    • /
    • pp.165-174
    • /
    • 2006
  • The purpose of this study was to review the relevant literature about coaching and thereupon, survey the coaching methods used for golfer lesson to reinterpret them and thereby, describe in view of kinetics the swing errors committed frequently by amateur golfers and suggest more scientific golfer coaching methods. For this purpose, kinetic elements were divided into precision and power ones and therewith, the variables affecting such elements were identified. On the other hand, swings were divided into address, take-back, back-swing, back-swing top, down-swing, impact and follow-through to determine 20 variables for each form and thereby, define their errors to determine the relations between their frequency and errors. For this study, a total of 60 amateur golfer were sampled, and their swing forms were photographed with two high-speed digital cameras, and the resultant images were analyzed to determine the errors of each form kinetically, which would be analyzed again with the program V1-5000. The results of this study can be summarized as follows; The kinetic elements could be identified as precision, power and precise power. Thus, setup and trajectory were classified into precision elements, while differences of inter-joint angles, cocking and delayed hitting. Lastly, timing and axial movement were classified into precise power elements. Three errors were identified in association with setup. The errors related with trajectory elements accounted for most (7) of the 20 errors. Three errors were determined for inter-joint angle differences, and one error was associated with cocking and delayed hitting. Lastly, one error was classified into timing error, while five errors were associated with axial movement. Finally, as a result of arranging the errors into a cross table, it was found that the errors were associated with each other between take-back and back-swing, take-back and follow-through, back-swing and back-swing top, and between back-swing and down-swing. Namely, an error would lead to other error repeatedly. So, it is more effective to identify all the errors for every form and correct them comprehensively rather than single out the errors and correct them one by one.

Parallel Architecture Design of H.264/AVC CAVLC for UD Video Realtime Processing (UD(Ultra Definition) 동영상 실시간 처리를 위한 H.264/AVC CAVLC 병렬 아키텍처 설계)

  • Ko, Byung Soo;Kong, Jin-Hyeung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.112-120
    • /
    • 2013
  • In this paper, we propose high-performance H.264/AVC CAVLC encoder for UD video real time processing. Statistical values are obtained in one cycle through the parallel arithmetic and logical operations, using non-zero bit stream which represents zero coefficient or non-zero coefficient. To encode codeword per one cycle, we remove recursive operation in level encoding through parallel comparison for coefficient and escape value. In oder to implement high-speed circuit, proposed CAVLC encoder is designed in two-stage {statical scan, codeword encoding} pipeline. Reducing the encoding table, the arithmetic unit is used to encode non-coefficient and to calculate the codeword. The proposed architecture was simulated in 0.13um standard cell library. The gate count is 33.4Kgates. The architecture can support Ultra Definition Video ($3840{\times}2160$) at 100 frames per second by running at 100MHz.

Two-Dimensional Binary Search on Length Using Bloom Filter for Packet Classification (블룸 필터를 사용한 길이에 대한 2차원 이진검색 패킷 분류 알고리즘)

  • Choe, Young-Ju;Lim, Hye-Sook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4B
    • /
    • pp.245-257
    • /
    • 2012
  • As one of the most challenging tasks in designing the Internet routers, packet classification is required to achieve the wire-speed processing for every incoming packet. Packet classification algorithm which applies binary search on trie levels to the area-based quad-trie is an efficient algorithm. However, it has a problem of unnecessary access to a hash table, even when there is no node in the corresponding level of the trie. In order to avoid the unnecessary off-chip memory access, we proposed an algorithm using Bloom filters along with the binary search on levels to multiple disjoint tries. For ACL, FW, IPC sets with about 1000, 5000, and 10000 rules, performance evaluation result shows that the search performance is improved by 21 to 33 percent by adding Bloom filters.

Application Performance Evaluation in Main Memory Database System (메인메모리 데이터베이스시스템에서의 어플리케이션 성능 평가)

  • Kim, Hee-Wan;Ahn, Yeon S.
    • Journal of Digital Contents Society
    • /
    • v.15 no.5
    • /
    • pp.631-642
    • /
    • 2014
  • The main memory DBMS is operated which the contents of the table that resides on a disk at the same time as the drive is in the memory. However, because the main memory DBMS stores the data and transaction log file using the disk file system, there are a limit to the speed at which the CPU accesses the memory. In this paper, I evaluated the performance through analysis of the application side difference the technology that has been implemented in Altibase system of main memory DBMS and Sybase of disk-based DBMS. When the application performance of main memory DBMS is in comparison with the disk-based DBMS, the performance of main memory DBMS was outperformed 1.24~3.36 times in the single soccer game, and was outperformed 1.29~7.9 times in the soccer game / special soccer. The result of sale transaction response time showed a fast response time of 1.78 ~ 6.09 times.

Development of Monte Carlo Simulation Code for the Dose Calculation of the Stereotactic Radiosurgery (뇌 정위 방사선수술의 선량 계산을 위한 몬테카를로 시뮬레이션 코드 개발)

  • Kang, Jeongku;Lee, Dong Joon
    • Progress in Medical Physics
    • /
    • v.23 no.4
    • /
    • pp.303-308
    • /
    • 2012
  • The Geant4 based Monte Carlo code for the application of stereotactic radiosurgery was developed. The probability density function and cumulative density function to determine the incident photon energy were calculated from pre-calculated energy spectrum for the linac by multiplying the weighting factors corresponding to the energy bins. The messenger class to transfer the various MLC fields generated by the planning system was used. The rotation matrix of rotateX and rotateY were used for simulating gantry and table rotation respectively. We construct accelerator world and phantom world in the main world coordinate to rotate accelerator and phantom world independently. We used dicomHandler class object to convert from the dicom binary file to the text file which contains the matrix number, pixel size, pixel's HU, bit size, padding value and high bits order. We reconstruct this class object to work fine. We also reconstruct the PrimaryGeneratorAction class to speed up the calculation time. because of the huge calculation time we discard search process of the ThitsMap and used direct access method from the first to the last element to produce the result files.

Minimum-Time Trajectory Control of Ships Using Neural Networks (신경회로망을 이용한 선박의 최단시간 궤적제어)

  • Choi, Young-Kiu;Park, Jin-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.117-126
    • /
    • 2013
  • A ship is intended to reach a specified target point in the minimum-time when it travels with a constant speed through a region of strong currents and its heading angle is the control variable. This is called the Zermelo's navigation problem. Its approximate solution for the minimum-time control may be found using the calculus of variation. However, the accuracy of its approximate solution is not high since the solution is based on a table form of inverse relations for some complicated nonlinear equations. To enhance the accuracy, this paper employs the neural network to represent the inverse relation of the complicated nonlinear equations. The accurate minimum-time control is possible with the interpolation property of the neural network. Through the computer simulation study we have found that the proposed method is superior to the conventional ones.

Implementation of Security Plan from .NET Remoting Environment (닷넷 리모팅 환경에서의 보안 방안 구현)

  • Kim, Young-Sear
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.4
    • /
    • pp.256-261
    • /
    • 2009
  • While .NET and J2EE bisects recent distributed environment, .NET displays "Remoting" as a technology to call remote object. Remoting is frequently used as a protocol in OLTP's WEB program development in form of RPC that exchange data in XML form under HTTP environment. Purpose of this research is to draw problems when applying security to .NET remoting technology that is recently used in web programming, and to find effective application plan by implementing. The main discussion is following. First, network layer security should be replaced to application layer security for better performance and flexibility. Second, the serialization procedure that is repeated in both remoting and encryption module should take place once. Lastly, implementation of "Surrogate" and "Compress" will be discussed that enables to eliminate unnecessary data(table relations, keys, etc) that is used in dataset object of .NET in order to reduce the size of data. It is possible to achieve improvement in speed by two times through immediate implementation in these cases. In order for easier use, component based framework should be supplied hereafter.

  • PDF

Development of a Time-Domain Simulation Tool for Offshore Wind Farms

  • Kim, Hyungyu;Kim, Kwansoo;Paek, Insu;Yoo, Neungsoo
    • Journal of Power Electronics
    • /
    • v.15 no.4
    • /
    • pp.1047-1053
    • /
    • 2015
  • A time-domain simulation tool to predict the dynamic power output of wind turbines in an offshore wind farm was developed in this study. A wind turbine model consisting of first or second order transfer functions of various wind turbine elements was combined with the Ainslie's eddy viscosity wake model to construct the simulation tool. The wind turbine model also includes an aerodynamic model that is a look up table of power and thrust coefficients with respect to the tip speed ratio and pitch angle of the wind turbine obtained by a commercial multi-body dynamics simulation tool. The wake model includes algorithms of superposition of multiple wakes and propagation based on Taylor's frozen turbulence assumption. Torque and pitch control algorithms were implemented in the simulation tool to perform max-Cp and power regulation control of the wind turbines. The simulation tool calculates wind speeds in the two-dimensional domain of the wind farm at the hub height of the wind turbines and yields power outputs from individual wind turbines. The NREL 5MW reference wind turbine was targeted as a wind turbine to obtain parameters for the simulation. To validate the simulation tool, a Danish offshore wind farm with 80 wind turbines was modelled and used to predict the power from the wind farm. A comparison of the prediction with the measured values available in literature showed that the results from the simulation program were fairly close to the measured results in literature except when the wind turbines are congruent with the wind direction.