• Title/Summary/Keyword: application sharing

Search Result 807, Processing Time 0.023 seconds

SOC Test Compression Scheme Sharing Free Variables in Embedded Deterministic Test Environment

  • Wang, Weizheng;Cai, Shuo;Xiang, Lingyun
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.3
    • /
    • pp.397-403
    • /
    • 2015
  • This paper presents a new SOC test compression scheme in Embedded Deterministic Test (EDT) compression environment. Compressed test data is brought over the TAM from the tester to the cores in SOC and decompressed in the cores. The proposed scheme allows cores tested at the same time to share some test channels. By sharing free variables in these channels across test cubes of different cores decompressed at the same time, high encoding efficiency is achieved. Moreover, no excess control data is required in this scheme. The ability to reuse excess free variables eliminates the need for high precision in matching the number of test channels with the number of care bits for every core. Experimental results obtained for some SOC designs illustrate effectiveness of the proposed test application scheme.

An Error Control on Multimedia Distance Education System with Synchronous and Asynchronous Mode (동기 및 비동기 모드의 멀티미디어 원격 교육 시스템에서 오류 제어)

  • Ko Eung-Nam
    • Journal of Digital Contents Society
    • /
    • v.4 no.2
    • /
    • pp.139-146
    • /
    • 2003
  • This paper explains the design and implementation of the ERA(Error Recovery Agent). ERA is a system that is suitable for detecting, sharing and recovering software error based on multimedia distance education system. This system consists of an ED, ES, and ER. ED detects an error by hooking techniques. ES is an agent which is an error sharing system for distributed multimedia distance education system. We propose how an error application can be treated and recovered as 'media' in a multimedia collaborative environment.

  • PDF

The manufacture and characteristic experiment of 220Vrms/100Apeak class superconducting fault current limiter (220rms/100Apeak급 초전도 사고전류제한기의 제작 및 특성실험)

  • 이상진;배준한;오윤상;고태국
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.45 no.1
    • /
    • pp.14-17
    • /
    • 1996
  • We analyzed the characteristics of a power system with superconducting fault current limiter and showed the possibility of the application of a superconducting fault current limiter to a real power system through manufacturing of and experiment about 220Vrms/100Apeak class superconducting fault current limiter. We experimentally confirmed that the overvoltage of superconducting fault current limiter increased as the rate of current sharing to the limiting coil grew. The fault current could be limited within a few milliseconds when it was applied to a power system in series. Therefore, we could confirm that superconducting fault current limiter was effective in protection of a substation or power plant at short-circuit fault. (author). 7 refs., 7 figs., 2 tabs.

  • PDF

Optimization Design Method for Inner Product Using CSHM Algorithm and its Application to 1-D DCT Processor (연산공유 승산 알고리즘을 이용한 내적의 최적화 및 이를 이용한 1차원 DCT 프로세서 설계)

  • 이태욱;조상복
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.53 no.2
    • /
    • pp.86-93
    • /
    • 2004
  • The DCT algorithm needs an efficient hardware architecture to compute inner product. The conventional design method, like ROM-based DA(Distributed Arithmetic), has large hardware complexity. Because of this reason, a CSHM(Computation Sharing Multiplication) was proposed for implementing inner product by Park. However, the Park's CSHM has inefficient hardware architecture in the precomputer and select units. Therefore it degrades the performance of the multiplier. In this paper, we presents the optimization design method for inner product using CSHM algorithm and applied it to implementation of 1-D DCT processor. The experimental results show that the proposed multiplier is more efficient than Park's when hardware architectures and logic synthesis results were compared. The designed 1-D DCT processor by using proposed design method is more high performance than typical methods.

A Study on the Profile Modification of Spur Gears for the Prevention of Gear Tooth Overlap by Deformation (평기어 치의 변형 후 치간섭 방지를 위한 치형 수정에 관한 연구)

  • Huh, Gyoung-Jae;Park, Su-Jin
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.16 no.3 s.96
    • /
    • pp.208-214
    • /
    • 1999
  • The purpose of this paper is to develop a profile modification technique of spur gears and its computer program for the prevention of gear tooth overlap. In the gear system, tooth overlap produces an impact at the initial contact of some tooth pairs. In this analysis, contact surface was assumed to be unbonded and frictionless under small deformation and stain. The problem is formulated by a variational statement with inequality constraint. Tooth load sharing is obtained by the application of contact theory, and overlap is known by the analysis of deformation. After carrying out the profile modification of gear tooth, we verified the reasonable results.

  • PDF

An Application of Blackboard Architecture for the Coordination among the Security Systems (보안 모델의 연동을 위한 블랙보드구조의 적용)

  • 서희석;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.4
    • /
    • pp.91-105
    • /
    • 2002
  • The attackers on Internet-connected systems we are seeing today are more serious and technically complex than those in the past. So it is beyond the scope of amy one system to deal with the intrusions. That the multiple IDSes (Intrusion Detection System) coordinate by sharing attacker's information for the effective detection of the intrusion is the effective method for improving the intrusion detection performance. The system which uses BBA (BlackBoard Architecture) for the information sharing can be easily expanded by adding new agents and increasing the number of BB (BlackBoard) levels. Moreover the subdivided levels of blackboard enhance the sensitivity of the intrusion detection. For the simulation, security models are constructed based on the DEVS (Discrete EVent system Specification) formalism. The intrusion detection agent uses the ES (Expert System). The intrusion detection system detects the intrusions using the blackboard and the firewall responses these detection information.

  • PDF

A Study of Software Product Line Engineering application for Data Link Software

  • Kim, Jin-Woo;Lee, Woo-Sin;Kim, Hack-Joon;Jin, So-Yeon;Jo, Se-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.65-72
    • /
    • 2018
  • In this paper, we have studied how to reuse common data link software by applying software product line engineering. Existing common data link software performed different stages of design, implementation, and testing without sharing the accumulated knowledge of different developers. In this situation, developers agreed that sharing the assets of each project and reusing the previously developed software would save human and time costs. Even with the initial difficulties, the common Data Link is a continually proposed project in the defense industry, so we decided to build a product line. The common data link software can be divided into two domains. Among them, the initial feature model for the GUI software was constructed, and the following procedure was studied. Through this, we propose a plan to build a product line for core assets and reuse them in newly developed projects.

Proposal of a Model for Co-processing of Real Estate Mortgage Registration in China's Internet Environment

  • Wang, Long;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.53-58
    • /
    • 2021
  • In this paper, based on the real estate registration model in the Chinese internet environment, we propose a model for the joint business of banking collateral registration. This is to increase the efficiency and service level of the real estate mortgage registration process. And it can solve the problems that in the process of registering a mortgage loan, difficulty of data sharing between the real estate registration agency and the bank, and ordinary users and bank clerks duplicate unnecessary work. In addition, it realizes joint processing and data sharing of real estate registration work with real estate registration agencies and banks, increases the efficiency and level of government affairs services, and offers an optimized solution to realize a one-stop service for real estate security registration. The results of this study are expected to provide theoretical support for the application and innovation of the Internet environment real estate registration model.

Calendar Application for Group-type Mutual Cooperation and Information Sharing (그룹형 상호 협력과 정보 공유를 위한 일정 관리 어플)

  • Han-won Lee;Am-Suk Oh
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.551-552
    • /
    • 2023
  • 구성원 간의 협업과 업무 공유는 원활한 업무 진행을 위해 반드시 필요하며 이메일, 메신저 프로그램으로 데이터들을 상호 주고 받고 업무를 공유 하는 경우도 있다. 그러나 데이터 전송 방법, 조회가 불편하고 또한 업무 이력 관리가 잘되지 않는 경우가 종종 발생하기 때문에 이문제 해결을 위한 대안을 찾게 된다. 따라서, 본 논문에서는 이러한 기능을 가진 그룹형 상호 협력과 정보 공유를 위한 일정 관리 어플에 대해 연구하고자 하며 캘린더 생성, 이벤트 추가 그리고 이벤트 리스트를 설계, 구축구하고자 한다. 아울러, 사용자의 정보와 그룹의 일정 내용들의 구축 및 저장을 위해 Firebase 기반의 데이터베이스도 활용하고자 한다.

  • PDF

Application of Geospatial Information Utilization System using Unmanned Aerial Image (무인항공 영상을 이용한 공간정보 응용 시스템 활용 방안)

  • Lee, Keun-Wang;Park, Joon-Kyu
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.201-206
    • /
    • 2019
  • Korea is constructing geospatial information application system for geospatial information utilization, but it is trying to establish a system for joint use of geospatial information system centering on Ministry of Land Transport and Transport due to the problem of sharing. The purpose of this study is to investigate and analyze the geospatial information application system operated by local governments, and to suggest the application of geospatial information application system using unmanned aerial images. As a result of the research, it was found that the functions of existing spatial information application system are concentrated on the public services and it is difficult to share and utilize data between administrative departments. In addition, the utilization of the system using unmanned aerial image has been suggested, and additional functions such as vector display, area calculation, and report generation have been derived to improve the usability of geospatial information application system. If additional functions of spatial information application system are added through further studies in the future, it will be possible to use it as a basic data of field survey and policy decision in related fields. And non-experts will be able to improve the efficiency of work by utilizing highly accurate geospatial information in various fields.