• 제목/요약/키워드: Operation layer

Search Result 1,096, Processing Time 0.544 seconds

HISTOPATHOLOGICAL EVALUATION OF PULP CAPPING AGENTS ON RATS MOLARS (치수복조제가 백서치수조직에 미치는 영향에 대한 병리조직학적 연구)

  • Kim, Gil-Tae
    • Restorative Dentistry and Endodontics
    • /
    • v.7 no.1
    • /
    • pp.107-115
    • /
    • 1981
  • The purpose of this investigation was to study histopathological chronology and differences of the proprietary pulpcapping agents. One hundred eighty molars from thrity rats (Srague-Dawley species), weighing about 130gm, were divided into six groups. Cavities were prepared in their maxillary molars under intraperitoneal anesthesia with Secobarbital. The cavities in the right first and second molars were filled with Dycal$^{(R)}$ and the left ones were with Cavitec$^{(R)}$. Each group of rats were sacrificed at the intervals of 1, 3, 5, 7, 14 and 21 days following operation. The rats were decapituated, and the jaws were fixed in 10% neutral buffered formalin. Then the specimens were decalcified, embedded in paraffin or celloid, and sectioned at 6-8 ${\mu}$ in thickness through the cavities included and pulp mesiodistally. They were stained with Hematoxylin-Eosin and examined by lightmicroscope. The results were as follow: 1. The pattern of pulp healing was dependent upon the presence and character of the pulpcapping agents above. 2. Dentin bridge formation as a sign of pulp healing occurred in the 14 days after operation. 3. Dycal$^{(R)}$ reparation appeared to favor pulp bealing rather than Cavitec$^{(R)}$ preparation. 4. In the odontoblastic layer and pulp tissue specific vaculoes were showed at the 3, 5 and 7 days of the Dycal filling.

  • PDF

Accuracy Improvement Method for 1-Bit Convolutional Neural Network (1-Bit 합성곱 신경망을 위한 정확도 향상 기법)

  • Im, Sung-Hoon;Lee, Jae-Heung
    • Journal of IKEEE
    • /
    • v.22 no.4
    • /
    • pp.1115-1122
    • /
    • 2018
  • In this paper, we analyze the performance degradation of previous 1-Bit convolutional neural network method and introduce ways to mitigate it. Previous work applies 32-Bit operation to first and last layers. But our method applies 32-Bit operation to second layer too. We also show that nonlinear activation function can be removed after binarizing inputs and weights. In order to verify the method proposed in this paper, we experiment the object detection neural network for korean license plate detection. Our method results in 96.1% accuracy, but the existing method results in 74% accuracy.

Overview of CSNS tantalum cladded tungsten solid Target-1 and Target-2

  • Wei, Shaohong;Zhang, Ruiqiang;Ji, Quan;Li, Changfeng;Zhou, Bin;Lu, Youlian;Xu, Jun;Zhou, Ke;Zhao, Chongguang;He, Ning;Yin, Wen;Liang, Tianjiao
    • Nuclear Engineering and Technology
    • /
    • v.54 no.5
    • /
    • pp.1535-1540
    • /
    • 2022
  • A solid tungsten target was used at the China Spallation Neutron Source (CSNS) with 100 kW proton beam power. To improve the lifetime, hot isostatic pressing (HIP) process was selected to bond tantalum cladding with tungsten plates. Radioactive isotope 182Ta, an activation product of tantalum, was found in the cooling water after a period of operation, however, no radioactive isotopes of 187W was found, which shows the tantalum layer remained mostly intact. The CSNS Target-1 had been operating safely for three years and was replaced by Target-2 in August 2020.

A Hierarchical Bilateral-Diffusion Architecture for Color Image Encryption

  • Wu, Menglong;Li, Yan;Liu, Wenkai
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.59-74
    • /
    • 2022
  • During the last decade, the security of digital images has received considerable attention in various multimedia transmission schemes. However, many current cryptosystems tend to adopt a single-layer permutation or diffusion algorithm, resulting in inadequate security. A hierarchical bilateral diffusion architecture for color image encryption is proposed in response to this issue, based on a hyperchaotic system and DNA sequence operation. Primarily, two hyperchaotic systems are adopted and combined with cipher matrixes generation algorithm to overcome exhaustive attacks. Further, the proposed architecture involves designing pixelpermutation, pixel-diffusion, and DNA (deoxyribonucleic acid) based block-diffusion algorithm, considering system security and transmission efficiency. The pixel-permutation aims to reduce the correlation of adjacent pixels and provide excellent initial conditions for subsequent diffusion procedures, while the diffusion architecture confuses the image matrix in a bilateral direction with ultra-low power consumption. The proposed system achieves preferable number of pixel change rate (NPCR) and unified average changing intensity (UACI) of 99.61% and 33.46%, and a lower encryption time of 3.30 seconds, which performs better than some current image encryption algorithms. The simulated results and security analysis demonstrate that the proposed mechanism can resist various potential attacks with comparatively low computational time consumption.

Investigation of Draw-bead Free Die Design to Prevent Wrinkles for Stainless Steel Basket-bowl Production (무비드 성형 조건에서 스테인리스 강 Basket-bowl의 주름 방지를 위한 금형 설계 연구)

  • S. Lee;C. H. Jeon;S. Park;G. Lee;S. Choi;W. Lee;D. Kim
    • Transactions of Materials Processing
    • /
    • v.32 no.4
    • /
    • pp.199-207
    • /
    • 2023
  • The stainless steel basket-bowl, a critical component of washing machines, is characterized by its unique two-tiered circular shape. This study explores the potential of a draw-bead free die design to address tearing concerns in the prospective plastic layer during the drawing operation. In order to prevent wrinkles that may arise from the absence of a draw-bead, a two-stage punch configuration is proposed. The influence of the blank holder force on wrinkle reduction is also examined. Finite element analysis is employed to evaluate the proposed die design by analyzing the wrinkle shape and strain mode. The results confirm that the stainless steel basket-bowl can be successfully drawn without wrinkles utilizing the proposed two-stage punch without a draw-bead on the blank holder. These findings contribute to the development of more efficient and reliable manufacturing processes for the stainless steel basket-bowl production.

Study on the Fabrication of Tunnel Type $E^2PROM$ and Its Characteristics (터널링형 $E^2PROM$ 제작 및 그 특성에 관한 연구)

  • Kim, Jong Dae;Kim, Sung Ihl;Kim, Bo Woo;Lee, Jin Hyo
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.23 no.1
    • /
    • pp.65-73
    • /
    • 1986
  • Experiment have been conducted about thin oxide characteristics according to O2/N2 ratio needed for EEPROM cell fabrication. As a result, we think that there is no problem even if we grow oxide layer with large O2/N2 ratio and short exidation time and when the water is implated by As before oxidation, the oxide breakdown field is about IMV/cm lower than that is not implanted. Especially, the thin oxide characteristic seems to be affected largely by wafer cleaning and oxidation in air. On the basis of these, tunnel type EEPROM cell is fabricated by 3um CMOS process and its characteristic is studied. Tunnel oxide thickness(100\ulcorner is chosen to allow Fowler-Nordheim tunneling to charge the floating gate at the desired programming voltage and tunnel area(2x2um\ulcorneris chosen to increase capacitive coupling ratio. For program operation, high voltage (20-22V) is applied to the control gate, while both drain and source are gdrounded. The drain voltage for erase is 16V. It is shown that charge retention characteristics is not limited by leakage in the oxide and program/erase endurance is over 10E4 cycles of program erase operation.

  • PDF

A Unified ARIA-AES Cryptographic Processor Supporting Four Modes of Operation and 128/256-bit Key Lengths (4가지 운영모드와 128/256-비트 키 길이를 지원하는 ARIA-AES 통합 암호 프로세서)

  • Kim, Ki-Bbeum;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.795-803
    • /
    • 2017
  • This paper describes a dual-standard cryptographic processor that efficiently integrates two block ciphers ARIA and AES into a unified hardware. The ARIA-AES crypto-processor was designed to support 128-b and 256-b key sizes, as well as four modes of operation including ECB, CBC, OFB, and CTR. Based on the common characteristics of ARIA and AES algorithms, our design was optimized by sharing hardware resources in substitution layer and in diffusion layer. It has on-the-fly key scheduler to process consecutive blocks of plaintext/ciphertext without reloading key. The ARIA-AES crypto-processor that was implemented with a $0.18{\mu}m$ CMOS cell library occupies 54,658 gate equivalents (GEs), and it can operate up to 95 MHz clock frequency. The estimated throughputs at 80 MHz clock frequency are 787 Mbps, 602 Mbps for ARIA with key size of 128-b, 256-b, respectively. In AES mode, it has throughputs of 930 Mbps, 682 Mbps for key size of 128-b, 256-b, respectively. The dual-standard crypto-processor was verified by FPGA implementation using Virtex5 device.

Impact of Seawater Inflow by the Operation of Sluice Gates on the D.O and pH in the Lake Shihwa, Korea (시화호 배수갑문 운용에 따른 용존산소와 pH 변화)

  • Choi, Jung-Hoon;Kim, Mi-Ock
    • Journal of the Korean earth science society
    • /
    • v.22 no.3
    • /
    • pp.195-207
    • /
    • 2001
  • The variations of D.O and pH due to the inflow of seawater by sluice gates operation were observed in the Lake Shihwa, Korea. The distributions of D.O and pH were investigated at 11 stations during Feburary 1997 to July 1998. The concentration of D.O before gate operation was 10 mg/l or more all over the watershed, yet 5 mg/l or less in the water layers of 11 m or below from March to June 1997. Anoxic layer appeared in June 1997 and expanded during rainy season. The anoxic layer in the lake depleted the oxygen in seawater as seawater was inflowed. It may be interpreted that the phenomenon comes from the contact of seawater to lower fresh water. The contact of seawater in pH 7.8 to 8.2 to lower water less than pH 7.4 enhanced to oxidize. After January 1998, D.O of the lake increased over 10 mg/l and the stratification was weakened. As a result, it may be concluded that the best way to improve the water qualities is to increase the amount of seawater inflow and outflow so as not to be generated pycnocline in summer.

  • PDF

Analysis of Membrane Fouling Reduction by Natural Convection Instability Flow in Membrane Filtration of Colloidal Solution: Application of Blocking Filtration Model (콜로이드 용액의 막여과에서 자연대류 불안정 흐름의 막오염 저감 효과 해석: 막힘여과 모델의 적용)

  • Kim, Ye-Ji;Youm, Kyung-Ho
    • Membrane Journal
    • /
    • v.29 no.6
    • /
    • pp.329-338
    • /
    • 2019
  • The constant-pressure and constant-flux membrane filtration experiments of alumina colloidal solution are performed to investigate defouling effect of the natural convection instability flow (NCIF) induced in membrane module. The permeate flux at constant-pressure and the transmembrane pressure (TMP) at constant-flux experiments are measured by changes the inclined angle (0, 90 and 180°) of membrane module to the gravity, and flux results are analyzed by using the blocking filtration model. NCIF are more induced as the inclined angles increased from 0° to 180°, and the maximum induced NCIF at 180° angle enhances flux to 2.8 times and reduces TMP to 85% after two-hour operation. As a result of analyzing flux data by applying the blocking filtration model, it is more reasonable to analyze them by using the intermediate blocking model within 15-minute operation time and then thereafter times by using the cake filtration model. The induced NCIF at 180° angle reduces the intermediate blocking fouling at 52% in the early operation time of 15-minute and thereafter the cake layer fouling at 93%. The main membrane fouling control mechanism of NCIF induced in membrane module is evaluated as suppressing the formation of the cake layer of particulate colloidal materials on membrane surface.

Design and Implementation of B-Tree on Flash Memory (플래시 메모리 상에서 B-트리 설계 및 구현)

  • Nam, Jung-Hyun;Park, Dong-Joo
    • Journal of KIISE:Databases
    • /
    • v.34 no.2
    • /
    • pp.109-118
    • /
    • 2007
  • Recently, flash memory is used to store data in mobile computing devices such as PDAs, SmartCards, mobile phones and MP3 players. These devices need index structures like the B-tree to efficiently support some operations like insertion, deletion and search. The BFTL(B-tree Flash Translation Layer) technique was first introduced which is for implementing the B-tree on flash memory. Flash memory has characteristics that a write operation is more costly than a read operation and an overwrite operation is impossible. Therefore, the BFTL method focuses on minimizing the number of write operations resulting from building the B-tree. However, we indicate in this paper that there are many rooms of improving the performance of the I/O cost in building the B-tree using this method and it is not practical since it increases highly the usage of the SRAM memory storage. In this paper, we propose a BOF(the B-tree On Flash memory) approach for implementing the B-tree on flash memory efficiently. The core of this approach is to store index units belonging to the same B-tree node to the same sector on flash memory in case of the replacement of the buffer used to build the B-tree. In this paper, we show that our BOF technique outperforms the BFTL or other techniques.