• Title/Summary/Keyword: paper-electronics

Search Result 31,367, Processing Time 0.052 seconds

High-Performance Multiplier Using Modified m-GDI(: modified Gate-Diffusion Input) Compressor (m-GDI 압축 회로를 이용한 고성능 곱셈기)

  • Si-Eun Lee;Jeong-Beom Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.2
    • /
    • pp.285-290
    • /
    • 2023
  • Compressors are widely used in high-speed electronic systems and are used to reduce the number of operands in multiplier. The proposed compressor is constructed based on the m-GDI(: modified gate diffusion input) to reduce the propagation delay time. This paper is compared the performance of compressors by applying 4-2, 5-2 and 6-2 m-GDI compressors to the multiplier, respectively. As a simulation results, compared to the 8-bit Dadda multiplier using the 4-2 and 6-2 compressor, the multiplier using the 5-2 compressor is reduced propagation delay time 13.99% and 16.26%, respectively. Also, the multiplier using the 5-2 compressor is reduced PDP(: Power Delay Product) 4.99%, 28.95% compared to 4-2 and 6-2 compressor, respectively. However, the multiplier using the 5-2 compression circuit is increased power consumption by 10.46% compared to the multiplier using the 4-2 compression circuit. In conclusion, the 8-bit Dadda multiplier using the 5-2 compressor is superior to the multipliers using the 4-2 and 6-2 compressors. The proposed circuit is implemented using TSMC 65nm CMOS process and its feasibility is verified through SPECTRE simulation.

A Study on Web accessibility situation of Public Institution and Major IT Companies Institutions (공공기관 및 IT 대기업의 웹 접근성 현황에 관한 연구)

  • Joo, Heon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.10
    • /
    • pp.175-187
    • /
    • 2009
  • This paper shows trends in domestic and foreign web accessibility. To disclose the web accessibility observance rate, seven central adminstration institutions and another seven north-eastern cities in Gyeong gi-Do and seven major IT companies were evaluated. KADO-WAH 2.0 was used for showing the observance rate. The evaluation criteria was that of Internet Web contents accessibility Guidelines 1.0. The evaluation was limited to Guideline 1 and Guideline 2 of non-text contents and the restricted frame usage and the keyboard-only operation. The average points for three items are as follows: 65.56% for North-Eastern cities in Gyeong gi-Do and 43.71% for Central adminstration institutions and the average 29.33% for major IT companies. The observance rate was highest by 99.3% in Human-rights committee among the central administration institutions. With the observance rate of 98%, Namyang-ju city came first in Gyeong gi-Do area. Samsung electronics was the highest with 63.66% in observance rate. The Central adminstration got lowered from the average 82.14% in 2006 to the average 54.28% in 2009, with the result of 27.86% down. Accordingly, the urgent improvement for Central adminstration and Local adminstration in web accessibility is asked for. The same is true with major IT companies in web accessibility.

A Study on Test Set to prevent illegal films searches (불법촬영물 검색 방지를 위한 시험 세트 방안 연구)

  • Yong-Nyuo Shin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.3
    • /
    • pp.27-33
    • /
    • 2023
  • Countries around the world are calling for stronger law enforcement to combat the production and distribution of child sexual exploitation images, such as child grooming. Given the scale and importance of this social problem, it requires extensive cooperation between law enforcement, government, industry, and government organizations. In the wake of the Nth Room Case, there have been some amendments to the Enforcement Decree of the Telecommunications Business Act regarding additional telecommunications services provided by precautionary operators in Korea. While Naver and others in Korea use Electronics and Telecommunications Research Institute's own technology to filter illegal images, Microsoft uses its own PhotoDNA technology. Microsoft's PhotoDNA is so good at comparing and identifying illegal images that major global operators such as Twitter are using it to detect and filter images. In order to meet the Korean government's testing standards, Microsoft has conducted more than 16 performance tests on "PhotoDNA for Video 2.0A," which is being applied to the Bing service, in cooperation with the Korea Communications Commission and Telecommunications Technology Association. In this paper, we analyze the cases that did not pass the standards and derive improvement measures related to adding logos. In addition, we propose to use three video datasets for the performance test of filtering against illegal videos.

Design and Implementation of Mediterranean Electronic Cultural Atlas(MECA) for Researchers (연구자 중심의 지중해전자문화지도(MECA) 설계 및 구현)

  • Kang, Ji-Hoon;Lee, Dong-Yul;Yu, Young-Jung;Moon, Sang-Ho
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.1
    • /
    • pp.57-66
    • /
    • 2016
  • Electronics cultural atlas is a typical methodology for the Digital Humanities. Since electronic cultural atlas could visualize various cultural information based on electronic atlas, that is an information visualization, users are able to make intuitive understanding on specific areas. Therefore, it can be effectively utilized in Area Studies and also helps users to understand comprehensively information on historic event in particular area with time information, because electronic cultural atlas represents a particular subject and time information with geographical information based on map. In other words, electronic cultural atlas may be considered as a specialized system of Digital Humanities for studying the Humanities and Area Studies. In this paper, we design and implement mediterranean electronic cultural atlas(MECA) for researchers of the Mediterranean area that has cultural hybridity formed the exchange of various aspects such as civilization, religion, race and language. In detail, a 'Digital Humanities Research Support System' is constructed to visualize research outcomes related to the Mediterranean area on Electronic Cultural Atlas and to use for researches.

Efficient Implementation of NIST LWC SPARKLE on 64-Bit ARMv8 (ARMv8 환경에서 NIST LWC SPARKLE 효율적 구현)

  • Hanbeom Shin;Gyusang Kim;Myeonghoon Lee;Insung Kim;Sunyeop Kim;Donggeun Kwon;Seonggyeom Kim;Seogchung Seo;Seokhie Hong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.401-410
    • /
    • 2023
  • In this paper, we propose optimization methods for implementing SPARKLE, one of the NIST LWC finalists, on a 64-bit ARMv8 processor. The proposed methods consist of two approaches: an implementation using ARM A64 instructions and another using NEON ASIMD instructions. The A64-based implementation is optimized by performing register scheduling to efficiently utilize the available registers on the ARMv8 architecture. By utilizing the optimized A64-based implementation, we can achieve speeds that are 1.69 to 1.81 times faster than the C reference implementation on a Raspberry Pi 4B. The ASIMD-based implementation, on the other hand, optimizes data by parallelizing the ARX-boxes to perform more than three of them concurrently through a single vector instruction. While the general speed of the optimized ASIMD-based implementation is lower than that of the A64-based implementation, it only slows down by 1.2 times compared to the 2.1 times slowdown observed in the A64-based implementation as the block size increases from SPARKLE256 to SPARKLE512. This is an advantage of the ASIMD-based implementation. Therefore, the ASIMD-based implementation is more efficient for SPARKLE variant block cipher or permutation designs with larger block sizes than the original SPARKLE, making it a useful resource.

Market in Medical Devices of Blockchain-Based IoT and Recent Cyberattacks

  • Shih-Shuan WANG;Hung-Pu (Hong-fu) CHOU;Aleksander IZEMSKI ;Alexandru DINU;Eugen-Silviu VRAJITORU;Zsolt TOTH;Mircea BOSCOIANU
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.39-44
    • /
    • 2023
  • The creativity of thesis is that the significance of cyber security challenges in blockchain. The variety of enterprises, including those in the medical market, are the targets of cyberattacks. Hospitals and clinics are only two examples of medical facilities that are easy targets for cybercriminals, along with IoT-based medical devices like pacemakers. Cyberattacks in the medical field not only put patients' lives in danger but also have the potential to expose private and sensitive information. Reviewing and looking at the present and historical flaws and vulnerabilities in the blockchain-based IoT and medical institutions' equipment is crucial as they are sensitive, relevant, and of a medical character. This study aims to investigate recent and current weaknesses in medical equipment, of blockchain-based IoT, and institutions. Medical security systems are becoming increasingly crucial in blockchain-based IoT medical devices and digital adoption more broadly. It is gaining importance as a standalone medical device. Currently the use of software in medical market is growing exponentially and many countries have already set guidelines for quality control. The achievements of the thesis are medical equipment of blockchain-based IoT no longer exist in a vacuum, thanks to technical improvements and the emergence of electronic health records (EHRs). Increased EHR use among providers, as well as the demand for integration and connection technologies to improve clinical workflow, patient care solutions, and overall hospital operations, will fuel significant growth in the blockchain-based IoT market for linked medical devices. The need for blockchain technology and IoT-based medical device to enhance their health IT infrastructure and design and development techniques will only get louder in the future. Blockchain technology will be essential in the future of cybersecurity, because blockchain technology can be significantly improved with the cybersecurity adoption of IoT devices, i.e., via remote monitoring, reducing waiting time for emergency rooms, track assets, etc. This paper sheds the light on the benefits of the blockchain-based IoT market.

Hierarchical Circuit Visualization for Large-Scale Quantum Computing (대규모 양자컴퓨팅 회로에 대한 계층적 시각화 기법)

  • Kim, JuHwan;Choi, Byung-Soo;Jo, Dongsik
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.611-613
    • /
    • 2021
  • Recently, research and development of quantum computers, which exceed the limits of classical computers, have been actively carried out in various fields. Quantum computers, which use quantum mechanics principles in a way different from the electrical signal processing of classical computers, have various quantum mechanical phenomena such as quantum superposition and quantum entanglement. It goes through a very complicated calculation process compared to the calculation of a classical computer for performing an operation using its characteristics. In order to utilize each element efficiently and accurately, it is necessary to visualize the data before driving the actual quantum computer and perform error verification, optimization, reliability, and verification. However, when visualizing all the data of various elements configured inside the quantum computer, it is difficult to intuitively grasp the necessary data, so it is necessary to visualize the data selectively. In this paper, we visualize the data of various elements that make up a quantum computer, and hierarchically visualize the internal circuit components of a quantum computer that are complicatedly configured so that the data can be observed and utilized intuitively.

  • PDF

Current status of brominated flame retardants (BFR) and polybrominated dibenzo-p-dioxins and furans (PBDDs/PBDFs) (브롬화난연제 및 브롬화다이옥신류의 연구동향)

  • Kwon, Myung-Hee;Song, Ki-Bong;Kang, Yung-Ryul;Hwang, Seung-Ryu;Shin, Sun Kyoung;Kim, Kum-Hee;Park, Jin Soo;Kim, Sue-Jin;Lee, Su-Yung;Kim, Dong-Hoon;Jung, Kwang-Yong
    • Analytical Science and Technology
    • /
    • v.21 no.6
    • /
    • pp.443-458
    • /
    • 2008
  • Brominated flame retardants (BFRs) are chemical compounds that inhibit the combustion of organic materials by scavenging free radicals that would otherwise encourage the spread of flames. These compounds are found in a wide variety of materials including paints, plastics, textiles, furniture and electronics. Mounting evidence, however, suggests that the non-reactive BFRs can easily leach into the environment and pose significant environmental and health concerns. PBDDs/PBDFs are often formed in the process of manufacturing brominated flame retardants and from the combustion of waste products containing flame retardants BFR. Therefore, this paper describes the general characteristics, management status, residual concentration in environments and analytical method.

Analysis of Passing Word Line Induced Leakage of BCAT Structure in DRAM (BCAT구조 DRAM의 패싱 워드 라인 유도 누설전류 분석)

  • Su Yeon, Kim;Dong Yeong Kim;Je Won Park;Shin Wook Kim;Chae Hyuk Lim;So won Kim;Hyeona Seo;Ju Won Kim;Hye Rin Lee;Jeong Hyeon Yun;Young-Woo Lee;Hyoung-Jin Joe;Myoung Jin Lee
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.644-649
    • /
    • 2023
  • As the cell spacing decreases during the scaling process of DRAM(Dynamic Random Access Memory), the reduction in STI(Shallow Trench Isolation) thickness leads to an increase in sub-threshold leakage due to the passing word line effect. The increase in sub-threshold leakage current caused by the voltage applied to adjacent passing word lines affects the data retention time and increases the number of refresh operations, thereby contributing to higher power consumption in DRAM. In this paper, we identify the causes of the passing word line effect through TCAD Simulation. As a result, we confirm the DRAM operational conditions under which the passing word line effect occurs, and observe that this effect alters the proportion of the total leakage current attributable to different causes. Through this, we recognize the necessity to consider not only leakage currents due to GIDL(Gate Induced Drain Leakage) but also sub-threshold leakage currents, providing guidance for improving DRAM structure.

Effect of forearm length applied on empirical models of maximum endurance time during isometric elbow flexion (등척성 팔굽 굽힘시 최대근지구력시간의 실증적 모델에 적용한 전완길이의 영향)

  • Sang-Sik Lee;Kiyoung Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.16 no.5
    • /
    • pp.338-346
    • /
    • 2023
  • During isometric elbow flexion, forearm length should be an important factor to determine not only joint torque but also maximum endurance time (MET), when the forearm is perpendicular to the direction of the force. The purpose of this paper is to examine the effect of forearm length as an additional factor on empirical models of MET such as an exponential model and a power model during isometric elbow flexion. Thirty volunteers participated in our experiment to measure factor variables such as circumferences and lengths of their upper and lower arms. Their METs were measured according to the percent of maximum voluntary contraction intensity (%MVC). For the multiple linear regression model of ln(MET) using these measurements, significant variables could be observed in %MVC and forearm lengths (P<0.05). The empirical models were assessed by these models using forearm length as the additional factor. Mean absolute deviations (MAD) between the measured METs amd the two empirical models were about 19.4 [s], but MAD using models applied forearm lengths were reduced to about 16.2 [s]. The correlation coefficients and intraclass correlation coefficients were about 0.87, but those applied forearm lengths were increased to about 0.91. These results demonstrated that forearm length was a significant additional factor to the empirical model.