• Title/Summary/Keyword: memory protection

Search Result 157, Processing Time 0.027 seconds

Improve reliability of SSD through cluster analysis based on error rate of 3D-NAND flash memory and application of differentiated protection policy (3D-NAND 플래시 메모리의 오류율 기반 군집분석과 차별화된 보호정책 적용을 통한 SSD의 신뢰성 향상 방안)

  • Son, Seung woo;Oh, Min jin;Kim, Jaeho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.1-2
    • /
    • 2021
  • 3D NAND 플래시 메모리는 플래너(2D) NAND 셀을 적층하는 방식으로 단위 면적당 고용량을 제공한다. 하지만 적층 공정의 특성상 각 레이어별 또는 셀 위치에 따라 오류 발생 빈도가 달라질 수 있는 문제가 있다. 이와 같은 현상은 플래시 메모리의 쓰기/지우기(P/E) 횟수가 증가할 수록 두드러진다. SSD와 같은 대부분의 플래시 기반 저장장치는 오류 교정을 위하여 ECC를 사용한다. 이 방법은 모든 플래시 메모리 페이지에 대하여 고정된 보호 강도를 제공하므로 물리적 위치에 따라 에러 발생률이 각기 다르게 나타나는 3D NAND 플래시 메모리에서는 한계를 보인다. 따라서 본 논문에서는 오류 발생률 차이를 보이는 페이지와 레이어를 분류하여 각 영역별로 차별화된 보호강도를 적용한다. 우리는 페이지와 레이어별로 오류 발생률이 현저하게 달라지는 3K P/E 사이클에서 측정된 오류율을 바탕으로 페이지와 레이어를 분류하고 오류에 취약한 영역에 대해서는 패리티 데이터를 추가하여 차별화된 보호 강도를 제공한다. 오류 발생 횟수에 따른 영역 구분을 위하여 K-Means 머신러닝 알고리즘을 사용한다. 우리는 이와 같은 차별화된 보호정책이 3D NAND 플래시 메모리의 신뢰성과 수명향상에 기여할 수 있는 가능성을 보인다.

  • PDF

Mapping the Potential Distribution of Raccoon Dog Habitats: Spatial Statistics and Optimized Deep Learning Approaches

  • Liadira Kusuma Widya;Fatemah Rezaie;Saro Lee
    • Proceedings of the National Institute of Ecology of the Republic of Korea
    • /
    • v.4 no.4
    • /
    • pp.159-176
    • /
    • 2023
  • The conservation of the raccoon dog (Nyctereutes procyonoides) in South Korea requires the protection and preservation of natural habitats while additionally ensuring coexistence with human activities. Applying habitat map modeling techniques provides information regarding the distributional patterns of raccoon dogs and assists in the development of future conservation strategies. The purpose of this study is to generate potential habitat distribution maps for the raccoon dog in South Korea using geospatial technology-based models. These models include the frequency ratio (FR) as a bivariate statistical approach, the group method of data handling (GMDH) as a machine learning algorithm, and convolutional neural network (CNN) and long short-term memory (LSTM) as deep learning algorithms. Moreover, the imperialist competitive algorithm (ICA) is used to fine-tune the hyperparameters of the machine learning and deep learning models. Moreover, there are 14 habitat characteristics used for developing the models: elevation, slope, valley depth, topographic wetness index, terrain roughness index, slope height, surface area, slope length and steepness factor (LS factor), normalized difference vegetation index, normalized difference water index, distance to drainage, distance to roads, drainage density, and morphometric features. The accuracy of prediction is evaluated using the area under the receiver operating characteristic curve. The results indicate comparable performances of all models. However, the CNN demonstrates superior capacity for prediction, achieving accuracies of 76.3% and 75.7% for the training and validation processes, respectively. The maps of potential habitat distribution are generated for five different levels of potentiality: very low, low, moderate, high, and very high.

Development of Portable Memory Type Radiation Alarm Monitor (휴대용 메모리형 방사선 경보장치 개발)

  • Son, Jung-Kwon;Lee, Myung-Chan;Song, Myung-Jae
    • Journal of Radiation Protection and Research
    • /
    • v.22 no.4
    • /
    • pp.263-272
    • /
    • 1997
  • A Radiation Alarm Monitor has been developed and manufactured in order to protect radiation workers from over-exposure. A visual and audible alarm system has been attached to initiate evacuation when accident occurs such as an unexpected change of radiation level or an over-exposure. The Radiation Alarm Monitor installed with microprocessor can record the information of radiation field change between 90 min. before the alarm and 30 min. after the alarm and also provide the data to an IBM compatible computer to analyze the accidents and to set a counterplan. It features a wide detection range of radiation field(10 mR/h-100 R/h), radiation field data storage, portability, high precision (${\pm}5%$) due to self-calibration function, and adaption of a powerful alarm system. According to ANSI N42.17A, the most stringent test standards, performance tests were carried out under various conditions of temperature, humidity, vibration, and electromagnetic wave hindrance at Korea Research Institute of Standards & Science (KRISS). As a result, the Radiation Alarm Monitor passed all tests.

  • PDF

A Secure Technique Design for Privacy Protection in RFID System (RFID 시스템에서 프라이버시 보호를 위한 보안기법 설계)

  • Oh, Gi-Oug;Park, Mi-Og
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.8
    • /
    • pp.107-115
    • /
    • 2010
  • RFID (Radio Frequency IDentification) technology, automatic identification and data capture technologies in ubiquitous computing is an essential skill. Low-cost Radio Frequency Identification tags using memory and no physical contact due to the ease of use and maintenance of excellence are going to use expanded. However, it is possible to the illegal acquisition of the information between RFID tags and readers because RFID uses the RF signal, and the obtained information can be used for the purpose of location tracking and invasion of privacy. In this paper, we proposed the security scheme to protect against the illegal user location tracking and invasion of privacy. The security scheme proposed in this paper, using Gray Code and reduced the capacity of the calculation of the actual tags, However, it is impossible for the malicious attacker to track information because tag information transmitted from the reader is not fixed. Therefore, even if the tags information is obtained by a malicious way, our scheme provides more simple and safe user privacy than any other protection methods to protect user privacy, because not actual information but encrypted information is becoming exposed.

Identification of G Protein Coupled Receptors Expressed in Fat Body of Plutella Xylostella in Different Temperature Conditions (온도 차이에 따른 배추좀나방 유충 지방체에서 발현되는 G 단백질 연관 수용체의 동정)

  • Kim, Kwang Ho;Lee, Dae-Weon
    • Korean Journal of Environmental Agriculture
    • /
    • v.40 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • BACKGROUND: G protein-coupled receptors (GPCRs) are widely distributed in various organisms. Insect GPCRs shown as in vertebrate GPCRs are membrane receptors that coordinate or involve in various physiological processes such as learning/memory, development, locomotion, circadian rhythm, reproduction, etc. This study aimed to identify GPCRs expressed in fat body and compare the expression pattern of GPCRs in different temperature conditions. METHODS AND RESULTS: To identify GPCRs genes and compare their expression in different temperature conditions, total RNAs of fat body in Plutella xylostella larva were extracted and the transcriptomes have been analyzed via next generation sequencing method. From the fat body transcriptomes, genes that belong to GPCR Family A, B, and F were identified such as opsin, gonadotropin-releasing hormone receptor, neuropeptide F (NPF) receptor, muthuselah (Mth), diuretic hormone receptor, frizzled, etc. Under low temperature, expressions of GPCRs such as C-C chemokine receptor (CCR), opsin, prolactin-releasing peptide receptor, substance K receptor, Mth-like receptor, diuretic hormone receptor, frizzled and stan were higher than those at 25℃. They are involved in immunity, feeding, movement, odorant recognition, diuresis, and development. In contrast to the control (25℃), at high temperature GPCRs including CCR, gonadotropin-releasing hormone receptor, moody, NPF receptor, neuropeptide B1 receptor, frizzled and stan revealed higher expression whose biological functions are related to immunity, blood-brain barrier formation, feeding, learning, and reproduction. CONCLUSION: Transcriptome of fat body can provide understanding the pools of GPCRs. Identifications of fat body GPCRs may contribute to develop new targets for the control of insect pests.

Strategic construction of mRNA vaccine derived from conserved and experimentally validated epitopes of avian influenza type A virus: a reverse vaccinology approach

  • Leana Rich Herrera-Ong
    • Clinical and Experimental Vaccine Research
    • /
    • v.12 no.2
    • /
    • pp.156-171
    • /
    • 2023
  • Purpose: The development of vaccines that confer protection against multiple avian influenza A (AIA) virus strains is necessary to prevent the emergence of highly infectious strains that may result in more severe outbreaks. Thus, this study applied reverse vaccinology approach in strategically constructing messenger RNA (mRNA) vaccine construct against avian influenza A (mVAIA) to induce cross-protection while targeting diverse AIA virulence factors. Materials and Methods: Immunoinformatics tools and databases were utilized to identify conserved experimentally validated AIA epitopes. CD8+ epitopes were docked with dominant chicken major histocompatibility complexes (MHCs) to evaluate complex formation. Conserved epitopes were adjoined in the optimized mVAIA sequence for efficient expression in Gallus gallus. Signal sequence for targeted secretory expression was included. Physicochemical properties, antigenicity, toxicity, and potential cross-reactivity were assessed. The tertiary structure of its protein sequence was modeled and validated in silico to investigate the accessibility of adjoined B-cell epitope. Potential immune responses were also simulated in C-ImmSim. Results: Eighteen experimentally validated epitopes were found conserved (Shannon index <2.0) in the study. These include one B-cell (SLLTEVETPIRNEWGCR) and 17 CD8+ epitopes, adjoined in a single mRNA construct. The CD8+ epitopes docked favorably with MHC peptidebinding groove, which were further supported by the acceptable ∆Gbind (-28.45 to -40.59 kJ/mol) and Kd (<1.00) values. The incorporated Sec/SPI (secretory/signal peptidase I) cleavage site was also recognized with a high probability (0.964814). Adjoined B-cell epitope was found within the disordered and accessible regions of the vaccine. Immune simulation results projected cytokine production, lymphocyte activation, and memory cell generation after the 1st dose of mVAIA. Conclusion: Results suggest that mVAIA possesses stability, safety, and immunogenicity. In vitro and in vivo confirmation in subsequent studies are anticipated.

Expansion of the Value and Prospect of the Human Rights Documentary Heritage : Focusing on the 5·18 archives (인권기록유산 가치와 지평의 확산 5·18민주화운동기록물을 중심으로)

  • Lee, Jung Yeon
    • The Korean Journal of Archival Studies
    • /
    • no.45
    • /
    • pp.121-153
    • /
    • 2015
  • Struggles to gain acknowledgement of identity have a characteristic of movement to recover human dignity. Participants in this movement come to confirm themselves as the subject of rights and communicate one another, free from oppression. Being guaranteed the opportunity to participate in the public opinion formation process is an indispensable element of human rights. In 1980, though it was short and incomplete, Gwangju experienced communal autonomy under the condition that state power was temporarily stopped. The contents and memories of the Gwangju Democratization Movement that intended to protect autonomy of civil society, resisting pillage of state power, remain intact in the 1980 Archives for the May 18th. The 5.18 archives were registered in UNESCO's Memory of the World in 2011, with its value of human rights and protection of democracy being acknowledged. The 5.18 archives have memories of resistance and struggles for justice, and sacrifices and pains of citizens under oppressive political authority in Gwangju, 1980. Thus, these archives are related to the historical struggles for democracy, and suggest a lesson on the transition process towards democracy to us. Preservation and utilization of the documentary heritage constantly lead the memories of historical events to the present, and enable exchanges of experiences and ideas between the present and the future. This study, through the process of UNESCO's Memory of the World registration and post-registration process, beyond the value of archives, tries to examine how historical events are led to the present, through the archives and to discuss the other values of archives.

The Possibilities and Prospects of Mathematics Education as Older Adult's Education (노인교육으로서의 수학교육의 가능성 재고)

  • Ko, Ho-Kyoung
    • Journal of the Korean School Mathematics Society
    • /
    • v.10 no.2
    • /
    • pp.173-185
    • /
    • 2007
  • It is the importance of Lifelong Education that is gradually more and more increased and publicly mentioned as the population of current society is aging even very rapidly. Especially the vivid activity of human being's brain is emphasized rather than before for the protection of senile dementia as people consider the sound life worth. This paper suggests mathematical education that is applicable and suitable for the emotional and cognitive level of the aged as the way of new method. I suggest the 'silver math' that may strengthen memory, thinking power and logical power of the aged, further cause the interest through games with mathematics, finally uplift the self-perception and pride. Thus, several basic elements are proposed here in this paper, that can be the foundation for the systematic and specific research of 'silver math'.

  • PDF

Improving Reliability of the Last Level Cache with Low Energy and Low Area Overhead (낮은 에너지 소모와 공간 오버헤드의 Last Level Cache 신뢰성 향상 기법)

  • Kim, Young-Ung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.35-41
    • /
    • 2012
  • Due to the technology scaling, more transistors can be placed on a cache memories of a processor. However, processors become more vulnerable to the soft error because of the highly integrated transistors, and consequently, the reliability of the cache memory must consider seriously at the design space level. In this paper, we propose the reliability improving technique which can be achieved with low energy and low area overheads. The simulation experiments of the proposed scheme shows over 95.4% of protection rate against the soft error with only 0.26% of performance degradations. Also, It requires only 2.96% of extra energy consumption.

RFID Information Protection using Biometric Information (생체정보를 이용한 RFID 정보보호)

  • Ahn, Hyo-Chang;Rhee, Sang-Burm
    • Journal of the Korea Computer Industry Society
    • /
    • v.7 no.5
    • /
    • pp.545-554
    • /
    • 2006
  • RFID could be applied in the various fields such as distribution beside, circulation, traffic and environment on information communication outside. So this can speak as point of ubiquitous computing's next generation technology. However, it is discussed problem of RFID security recently, so we must prepare thoroughly about RFID security for secure information. In this paper, we proposed a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. Our method which is improved linear discriminant analysis has reduced dimension of feature information which has large size of data. Therefore, we can sore face feature information in small memory field of RFID tag. Our propose d algorithm has shown 92% recognition rate in experimental results and can be applied to entrance control management system, digital identification card and others.

  • PDF