• Title/Summary/Keyword: Scan Design

Search Result 510, Processing Time 0.027 seconds

Efficient Delay Test Algorithm for Sequential Circuits with a New Scan Design (순차 회로의 효율적인 지연 고장 검출을 위한 새로운 테스트 알고리듬 및 스캔 구조)

  • Huh, Kyung-Hoi;Kang, Yong-Seok;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.11
    • /
    • pp.105-114
    • /
    • 2000
  • Delay testing is essential for assurance of digital circuits as the speed and the density of the circuits improve greatly. However, delay faults in sequential circuits cannot be detected easily due to the existence of state registers. To overcome this difficulty a new test method and algorithm are devised which can be used for both stuck-at testing and delay testing. To apply the new test method, a new scan flip-flop is implemented. Experimental results on ISCAS 89 benchmark circuits show that the number of testable paths can be increased drastically over conventional scan techniques.

  • PDF

A Study on the Design of OMCR(Optical Mark and Character Reader) System based on Image Processing (영상처리방식에 의한 OMCR 시스템 설계에 관한 연구)

  • 이기돈;김우성
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.9
    • /
    • pp.1358-1367
    • /
    • 1993
  • In this paper, OMR system based on image processing is developed which improve the performance of conventional OMR system based on line-scan method. Based on this OMR system, real-time OCR system which recognizes alphanumerics is also developed. We propose the OMCR system which recognize the mark and numerals at the same time. Besides, we improve the input system using constrained 7-segment type handwritten numeral instead of mark to solve the problem caused by miswriting the mark. In summary, we verified the reai-time recognition performance of developed OMCR system using application form for admission, answer sheet for college entrance examination and receipt sheet.

  • PDF

A Secure Communication Framework for the Detection System of Network Vulnerability Scan Attacks (네트워크 취약점 검색공격 탐지 시스템을 위한 안전한 통신 프레임워크 설계)

  • You, Il-Sun;Kim, Jong-Eun;Cho, Kyung-San
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.1-10
    • /
    • 2003
  • In this paper, we propose a secure communication framework for interaction and information sharing between a server and agents in DS-NVSA(Detection System of Network Vulnerability Scan Attacks) proposed in〔1〕. For the scalability and interoperability with other detection systems, we design the proposed IDMEF and IAP that have been drafted by IDWG. We adapt IDMEF and IAP to the proposed framework and provide SKTLS(Symmetric Key based Transport Layer Security Protocol) for the network environment that cannot afford to support public-key infrastructure. Our framework provides the reusability of heterogeneous intrusion detection systems and enables the scope of intrusion detection to be extended. Also it can be used as a framework for ESM(Enterprise Security Management) system.

Design and Implementation of Low-power CSD Considering Beacon Period and Channel Scan Time (비컨 주기와 채널 탐색기간을 고려한 저전력 CSD의 설계 및 구현)

  • Kim, Taek-Hyun;Park, Se-Young;Choi, Hoon;Baek, Yun-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.50-54
    • /
    • 2010
  • A Container Security Device (CSD) which is different existing RFID Tag strengthens the physical security as mounted inside the container and the information security as encrypts doubly a data. CSD must use the resources efficiently in order to operate with the battery. Therefore, it needs low-power mechanism which repeats the sleep period and channel scan period. However, by adjusting these periods, the trade-off occurs between energy efficiency and network connectivity. In this paper, we implement low-power CSD and resolve this problem by adjusting beacon period and channel scan time. As a result, We guarantee the network connectivity 95% or more and maximum life up to 16 days using common AA batteries.

Design of Scan Conversion Processor for 3-Dimensional Mobile Graphics Application (3차원 모바일 그래픽 응용을 위한 스캔 변환 프로세서의 설계)

  • Choi, Byeong-Yoon;Ha, Chang-Soo;Salcic, Zoran
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.11
    • /
    • pp.2107-2115
    • /
    • 2007
  • In this paper, the scan conversion processor which converts the triangle represented by three vertices into pixel-level screen coordinates, depth coordinate, and color data is designed. The processor adopts scan-line algorithm which decomposes triangle into horizontal spans and then transforms the span into pixel data. By supporting top-left filling convention, it ensures that triangles that share an edge do not produce any dropouts or overlaps between adjacent polygons. It consists of about 21,400 gates and its maximum operating frequency is about 80 Mhz under 0.35um CMOS technology. Because its maximum pixel rate is about 80 Mpixels/sec, it can be applicable to mobile graphics application.

Comparison of Avatar Posture Formation According to 3D Virtual Garment Modeling Programs -Focusing on Cycling Movements of High-School Male Cyclist-

  • Park, Hyunjeong;Do, Wolhee
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.45 no.6
    • /
    • pp.965-977
    • /
    • 2021
  • The study aimed to analyze the functional differences in 3D virtual garment programs and compare body scan data with the corresponding 3D virtual models. We selected 3D virtual garment programs, formed virtual models in a representative size for high-school male cyclists, and analyzed them using the Design-X program. The results were as follows. In the 3D virtual garment programs, the anthropometric items for virtual model forming differed significantly from the standard anthropometric items suggested by Size Korea. Comparing the lower body scan data and virtual models formed by the 3D virtual garment programs, the biggest difference was in the shapes of the waist and hips, i.e., the flatness values of the waist and hips were different for each program in the cross-section view. In the lower body, a data-input-based program was needed for changing the exact measurement position of the waist circumference and hips' shape in detail. If a 3D virtual garment program provides functions for the virtual model's joint angle input and free motion transformation, it is expected to be widely used in the sportswear industry.

Application of Systematic Digital Diagnosis to Create Dental Virtual Patients with Dynamic Occlusion for Esthetic Restoration of Anterior Teeth: A Case Report

  • Jeong-Min Ham;Yu-Sung Choi;Jong-Hyuk Lee;Seung-Ryong Ha
    • Journal of Korean Dental Science
    • /
    • v.17 no.3
    • /
    • pp.121-137
    • /
    • 2024
  • It is possible to design dental prosthesis in harmony with the patient's face and functional pathway using virtual patient created by integrating 3D diagnostic data such as intraoral scan, facial scan and jaw motion data. Also, esthetic teeth-gingiva relationship can be obtained, and post-surgical gingival outline can be predicted by using CAD software designed 3D surgical template during gingivectomy procedure. In this case report, 3D diagnostic data was collected from patients in need of esthetic anterior restoration, integrated on CAD software and applied to virtual articulator. Treatment outcome was simulated by creating virtual patient with dynamic occlusion. Esthetic anterior fixed restoration was fabricated by applying 3D surgical template designed on CAD software to gingivectomy procedure. To make sure that anterior guidance was formed in harmony with the patient's function pathway, occlusion was assessed following every step. The results were both functionally and esthetically satisfying.

Cathodic Electrochemical Deposition of Highly Ordered Mesoporous Manganese Oxide for Supercapacitor Electrodes via Surfactant Templating

  • Lim, Dongwook;Park, Taesoon;Choi, Yeji;Oh, Euntaek;Shim, Snag Eun;Baeck, Sung-Hyeon
    • Journal of Electrochemical Science and Technology
    • /
    • v.11 no.2
    • /
    • pp.148-154
    • /
    • 2020
  • Highly ordered mesoporous manganese oxide films were electrodeposited onto indium tin oxide coated (ITO) glass using sodium dodecyl sulfate (SDS) and ethylene glycol (EG) which were used as a templating agent and stabilizer for the formation of micelle, respectively. The manganese oxide films synthesized with surfactant templating exhibited a highly mesoporous structure with a long-range order, which was confirmed by SAXRD and TEM analysis. The unique porous structure offers a more favorable diffusion pathway for electrolyte transportation and excellent ionic conductivity. Among the synthesized samples, Mn2O3-SDS+EG exhibited the best electrochemical performance for a supercapacitor in the wide range of scan rate, which was attributed to the well-developed mesoporous structure. The Mn2O3 prepared with SDS and EG displayed an outstanding capacitance of 72.04 F g-1, which outperform non-porous Mn2O3 (32.13 F g-1) at a scan rate of 10 mV s-1.

Design and Implementation of a System to Detect Intrusion and Generate Detection Rule against Scan-based Internet Worms (스캔 기반의 인터넷 웜 공격 탐지 및 탐지룰 생성 시스템 설계 및 구현)

  • Kim Ik-Su;Jo Hyuk;Kim Myung Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.2 s.98
    • /
    • pp.191-200
    • /
    • 2005
  • The brilliant achievements in computers and the internet technology make it easy for users to get useful information. But at the same time, the damages caused by intrusions and denial of service attacks are getting more worse. Specially because denial of service attacks by internet worm incapacitate computers and networks, we should draw up a disposal plan against it. So far many rule-based intrusion detection systems have been developed, but these have the limits of these ability to detect new internet worms. In this paper, we propose a system to detect intrusion and generate detection rule against scan-based internet worm, paying attention to the fact that internet worms scan network to infect hosts. The system detects internet worms using detection rule. And if it detects traffic causing by a new scan-based internet worm, it generates new detection nile using traffic information that is gathered. Therefore it can response to new internet worms early. Because the system gathers packet payload, when it is being necessary only, it can reduce system's overhead and disk space that is required.