• Title/Summary/Keyword: Single Time Schemes

Search Result 137, Processing Time 0.022 seconds

Efficient Use of Unused Spare Columns for Reducing Memory Miscorrections

  • Jung, Ji-Hun;Ishaq, Umair;Song, Jae-Hoon;Park, Sung-Ju
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.12 no.3
    • /
    • pp.331-340
    • /
    • 2012
  • In the deep sub-micron ICs, growing amounts of on-die memory and scaling effects make embedded memories increasingly vulnerable to reliability and yield problems. Spare columns are often included in memories to repair defective cells or bit lines during production test. In many cases, the repair process will not use all spare columns. Schemes have been proposed to exploit these unused spare columns to store additional check bits which can be used to reduce the miscorrection probability for triple errors in single error correction-double error detection (SEC-DED). These additional check bits increase the dimensions of the parity check matrix (H-matrix) requiring extra area overhead. A method is proposed in this paper to efficiently fill the extra rows of the H-matrix on the basis of similarity of logic between the other rows. Optimization of the whole H-matrix is accomplished through logic sharing within a feasible operating time resulting in reduced area overhead. A detailed implementation using fuse technology is also proposed in this paper.

A Study on the Electronic Payment and Settlement System in EU (유럽의 전자결제제도에 관한 연구)

  • CHOI, Byoung-Kwon
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.67
    • /
    • pp.69-95
    • /
    • 2015
  • The main purpose of this study is to analyse what are the key financial innovations in the euro area electronic payment systems. TARGET2 is the RTGS-system provided through the Eurosystem. It is used for settling central bank operations, for large interbank transfers in euro and also for other euro-denominated transfers. The specific features of TARGET2 include processing in real time, settlement in central bank money and immediate finality. In addition, the SEPA is a payment-integration initiative of the European Union for simplification of bank transfers denominated in euro. In particular, the main innovations consist of the completion of the phased migration to the TARGET2 infrastructure, and the introduction of a single retail payment market in euro - the SEPA and its products, schemes and frameworks. As the study analyse, the key innovations consist of the TARGET2 introduction, SEPA establishment and migration towards the T2S system. These innovations will lead to a better understanding of the payment and settlement systems' behavior in stress situations and to enhance the stability of the euro area financial system. Moreover, the successful integration of the European payment and settlement infrastructures will further contribute to the integration of the European financial markets, as well as to their higher competitiveness.

  • PDF

A Genetic Algorithm Based Source Encoding Scheme for Distinguishing Incoming Signals in Large-scale Space-invariant Optical Networks

  • Hongki Sung;Yoonkeon Moon;Lee, Hagyu
    • Journal of Electrical Engineering and information Science
    • /
    • v.3 no.2
    • /
    • pp.151-157
    • /
    • 1998
  • Free-space optical interconnection networks can be classified into two types, space variant and space invariant, according to the degree of space variance. In terms of physical implementations, the degree of space variance can be interpreted as the degree of sharing beam steering optics among the nodes of a given network. This implies that all nodes in a totally space-invariant network can share a single beam steering optics to realize the given network topology, whereas, in a totally space variant network, each node requires a distinct beam steering optics. However, space invariant networks require mechanisms for distinguishing the origins of incoming signals detected at the node since several signals may arrive at the same time if the node degree of the network is greater than one. This paper presents a signal source encoding scheme for distinguishing incoming signals efficiently, in terms of the number of detectors at each node or the number of unique wavelengths. The proposed scheme is solved by developing a new parallel genetic algorithm called distributed asynchronous genetic algorithm (DAGA). Using the DAGA, we solved signal distinction schemes for various network sizes of several topologies such as hypercube, the mesh, and the de Brujin.

  • PDF

Performance Analysis of MIMO-OFDM System Applying AMC and SFC Schemes (AMC와 SFC기법을 적용한 MIMO-OFDM 시스템의 성능 분석)

  • Lee, Yun-Ho;Kim, Hyung-Jung;Jo, G.D.;Kim, Kyung-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.4
    • /
    • pp.55-62
    • /
    • 2008
  • Adaptive modulation and Coding(AMC) scheme is promising technique to support the demands for high data rates and wideband proposed for 4G mobile communication system standards. In this paper, adaptive modulation and coding(AMC) based on OFDM system is analyzed through simulation for single user case and compared with SISO-OFDM and SFBC(Space frequency block coding)-OFDM. The performance analysis in terms of capacity for downlink system environments with different values of constellation size under multipath fading channel is done. The adaptive modulation and coding technique is based on perfect estimation channel. It has been observed that SFBC(Space-frequency block coding)-OFDM system gives better performance in terms of capacity.

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Comparative Analysis of Routing Protocols for Wireless Sensor Networks (무선 센서 네트워크의 라우팅 프로토콜 비교 분석)

  • Gautam, Navin;Pyun, Jae-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.373-376
    • /
    • 2008
  • Wireless sensor networks consist of thousands of sensor nodes that have low power, low footprint and low computational capacities. So the burning issues in the design and deployment of these sensor nodes in the practical application areas include the energy conservation and network lifetime. Efficient routing schemes can help reduce the energy consumption and thus increase the network lifetime. This paper deals with the comparative analysis of popular routing protocols such as LEACH, LEACH-C, MTE, and PEGASIS. The protocols are compared by using performance me tries such as system lifetime, the time for first node death, and total system energy.

  • PDF

Transition Repression Architecture for scan CEll (TRACE) in a BIST environment (BIST 환경에서의 천이 억제 스캔 셀 구조)

  • Kim In-Cheol;Song Dong-Sup;Kim You-Bean;Kim Ki-Cheol;Kang Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.6 s.348
    • /
    • pp.30-37
    • /
    • 2006
  • This paper presents a modified scan cell architecture to reduce the power dissipation during testing. It not only eliminates switching activities in the combinational logic during scan shifting but also reduces switching activities in the scan chain during the time. Furthermore, it limits the transitions on capture cycles. It can be made for test-per-scan BIST and employed in both single scan style and multiple scan style. Experimental results demonstrate that the proposed structure achieves the same fault coverage with lower power consumption compared to other existing BIST schemes.

Nonlinear Analysis of Dynamic Response of Jacket Type Offshore Structures (Jacket형 해양구조물(海洋構造物)의 비선형(非線形) 동적응답해석(動的應答解析))

  • Y.C.,Kim;I.S.,Nho;S.W.,Park
    • Bulletin of the Society of Naval Architects of Korea
    • /
    • v.23 no.2
    • /
    • pp.33-45
    • /
    • 1986
  • In the present paper, the nonlinear analysis of dynamic response of the jacket type offshore structures subject to nonlinear fluid force is performed. Furthermore, several analysis methods, such as quasi-static analysis, Newmark-$\beta$ method and state vector time integration technique, and described and compared with each others in order to investigate the efficiency numerical of the schemes for this kind of nonlinear structural analysis. In the problem formulation, various environmental forces acting on the jacket type offshore structure have been studied and calculated. Particularly, hydrodynamic forces are calculated by using the Morison type formula, which contains the interaction effect between the motion of the structure and the velocity of fluid particles. Also, Stokes' 5th order wave theory and Airy's linear wave theory are used to predict the velocity distribution of the fluid particles. Finally, the nonlinear equation of motion of the structure is obtained by using three-dimensional finite element formulation. Based on the above procedures, two examples, i.e. a single pile and a typical offshore jacket platform, are studied in details.

  • PDF

Protection Switching Methods for Point-to-Multipoint Connections in Packet Transport Networks

  • Kim, Dae-Ub;Ryoo, Jeong-dong;Lee, Jong Hyun;Kim, Byung Chul;Lee, Jae Yong
    • ETRI Journal
    • /
    • v.38 no.1
    • /
    • pp.18-29
    • /
    • 2016
  • In this paper, we discuss the issues of providing protection for point-to-multipoint connections in both Ethernet and MPLS-TP-based packet transport networks. We introduce two types of per-leaf protection-linear and ring. Neither of the two types requires that modifications to existing standards be made. Their performances can be improved by a collective signal fail mechanism proposed in this paper. In addition, two schemes - tree protection and hybrid protection - are newly proposed to reduce the service recovery time when a single failure leads to multiple signal fail events, which in turn places a significant amount of processing burden upon a root node. The behavior of the tree protection protocol is designed with minimal modifications to existing standards. The hybrid protection scheme is devised to maximize the benefits of per-leaf protection and tree protection. To observe how well each scheme achieves an efficient traffic recovery, we evaluate their performances using a test bed as well as computer simulation based on the formulae found in this paper.

Improvement of the Link Reliability for Ship Ad-Hoc Network by Employing Multiple Antennas

  • Su, Xin;Hui, Bing;Chang, KyungHi;Kim, SeungGeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37A no.12
    • /
    • pp.1065-1075
    • /
    • 2012
  • For the purpose of providing high data rate real-time services, radio transmission technologies (RTT) for ship ad-hoc network (SANET) based on the Recommendation ITU-R 1842-1 are designed. Physical layer parameters of SANET are contrived to meet the requirements of the specification. In order to improve the link reliability for SANET, in this paper, we investigate the performance of the SANET with the multiple antennas, where receive combining (RC), transmit diversity (TD), and beamforming (BF) are employed, respectively. Based on the analysis of the packet error rate (PER) under the highly correlated maritime wireless channel model, we select the efficient multiple antenna schemes for SANET to improve the link reliability. In addition, the optimal MCS levels for the single-carrier (SC) SANET with the bandwidth of 25 kHz, and the multi-carrier (MC) SANET with the bandwidth of 50 kHz and 100 kHz are finalized.