• Title/Summary/Keyword: Write pattern

Search Result 63, Processing Time 0.03 seconds

Magnetic & Crystallographic Properties of Patterned Media Fabricated by Nanoimprint Lithography and Co-Pt Electroplating (나노임프린트 패터닝과 자성박막도금을 이용하여 제작한 패턴드미디어용 자기패턴의 자기적 및 결정구조특성에 관한 연구)

  • Lee, B.K.;Lee, D.H.;Lee, M.B.;Kim, H.S.;Cho, E.H.;Sohn, J.S.;Lee, C.H.;Jeong, G.H.;Suh, S.J.
    • Journal of the Korean Magnetics Society
    • /
    • v.18 no.2
    • /
    • pp.49-53
    • /
    • 2008
  • Magnetic and crystallographic properties of patterned media fabricated by nanoimprint lithography and Co-Pt electroplating were studied. Thin films of Ru(20 nm)/Ta(5 nm)/$SiO_2$(100 nm) were deposited on Si(100) wafer and then 25 nm hole pattern was fabricated by nanoimprint lithography on substrate. The electroplated Co-Pt nano-dots have the diameter of 35 nm and the height of 27 nm. Magnetic dot patterns of Co-Pt alloy were created using electroplated Co-Pt alloy and then their properties were measured by MFM, SQUID, SEM, TEM and AFM. We observed single domain with perendicular anisotropy for each dot and achieved optimum coercivity of 2900 Oe. These results mean that patterned media fabricated by nanoimprint lithography and electroplating have good properties in view of extending superparamagnetic limit while satisfying the writability requirements with the present write heads.

An Analysis of Pattern Activities of a Finding Rules Unit in Government-Authorized Mathematics Curricular Materials for Fourth Graders (4학년 수학 검정 교과용 도서의 규칙 찾기 단원에 제시된 패턴 활동의 지도 방안 분석)

  • Pang, JeongSuk;Lee, Soojin
    • Education of Primary School Mathematics
    • /
    • v.26 no.1
    • /
    • pp.45-63
    • /
    • 2023
  • The activity of finding rules is useful for enhancing the algebraic thinking of elementary school students. This study analyzed the pattern activities of a finding rules unit in 10 different government-authorized mathematics curricular materials for fourth graders aligned to the 2015 revised national mathematics curriculum. The analytic elements included three main activities: (a) activities of analyzing the structure of patterns, (b) activities of finding a specific term by finding a rule, and (c) activities of representing the rule. The three activities were mainly presented regarding growing numeric patterns, growing geometric patterns, and computational patterns. The activities of analyzing the structure of patterns were presented when dealing mainly with growing geometric patterns and focused on finding the number of models constituting the pattern. The activities of finding a specific term by finding a rule were evenly presented across the three patterns and the specific term tended to be close to the terms presented in the given task. The activities of representing the rule usually encouraged students to talk about or write down the rule using their own words. Based on the results of these analyses, this study provides specific implications on how to develop subsequent mathematics curricular materials regarding pattern activities to enhance elementary school students' algebraic thinking.

A Study on the Pattern of usage of Problem Solving Strategy according to Its Presentation (협력 학습을 통한 문제 해결에서 해결 전략의 사용형태에 관한 대화 분석)

  • 정민수;신현성
    • Journal of the Korean School Mathematics Society
    • /
    • v.4 no.2
    • /
    • pp.135-142
    • /
    • 2001
  • The selected questions for this study was their conversation in problem solving way of working together. To achieve its purpose researcher I chose more detail questions for this study as follows. $\circled1$ What is the difference of strategy according to its level \ulcorner $\circled2$ What is the mathematical ability difference in problem solving process concerning its level \ulcorner This is the result of the study $\circled1$ Difference in the strategy of each class of students. High class-high class students found rules with trial and error strategy, simplified them and restated them in uncertain framed problems, and write a formula with recalling their theorem and definition and solved them. High class-middle class students' knowledge and understanding of the problem, yet middle class students tended to rely on high class students' problem solving ability, using trial and error strategy. However, middle class-middle class students had difficulties in finding rules to solve the problem and relied upon guessing the answers through illogical way instead of using the strategy of writing a formula. $\circled2$ Mathematical ability difference in problem solving process of each class. There was not much difference between high class-high class and high class-middle class, but with middle class-middle class was very distinctive. High class-high class students were quick in understanding and they chose the right strategy to solve the problem High class-middle class students tried to solve the problem based upon the high class students' ideas and were better than middle class-middle class students in calculating ability to solve the problem. High class-high class students took the process of resection to make the answer, but high class-middle class students relied on high class students' guessing to reconsider other ways of problem-solving. Middle class-middle class students made variables, without knowing how to use them, and solved the problem illogically. Also the accuracy was relatively low and they had difficulties in understanding the definition.

  • PDF

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Low-Power IoT Microcontroller Code Memory Interface using Binary Code Inversion Technique Based on Hot-Spot Access Region Detection (핫스팟 접근영역 인식에 기반한 바이너리 코드 역전 기법을 사용한 저전력 IoT MCU 코드 메모리 인터페이스 구조 연구)

  • Park, Daejin
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.11 no.2
    • /
    • pp.97-105
    • /
    • 2016
  • Microcontrollers (MCUs) for endpoint smart sensor devices of internet-of-thing (IoT) are being implemented as system-on-chip (SoC) with on-chip instruction flash memory, in which user firmware is embedded. MCUs directly fetch binary code-based instructions through bit-line sense amplifier (S/A) integrated with on-chip flash memory. The S/A compares bit cell current with reference current to identify which data are programmed. The S/A in reading '0' (erased) cell data consumes a large sink current, which is greater than off-current for '1' (programmed) cell data. The main motivation of our approach is to reduce the number of accesses of erased cells by binary code level transformation. This paper proposes a built-in write/read path architecture using binary code inversion method based on hot-spot region detection of instruction code access to reduce sensing current in S/A. From the profiling result of instruction access patterns, hot-spot region of an original compiled binary code is conditionally inverted with the proposed bit-inversion techniques. The de-inversion hardware only consumes small logic current instead of analog sink current in S/A and it is integrated with the conventional S/A to restore original binary instructions. The proposed techniques are applied to the fully-custom designed MCU with ARM Cortex-M0$^{TM}$ using 0.18um Magnachip Flash-embedded CMOS process and the benefits in terms of power consumption reduction are evaluated for Dhrystone$^{TM}$ benchmark. The profiling environment of instruction code executions is implemented by extending commercial ARM KEIL$^{TM}$ MDK (MCU Development Kit) with our custom-designed access analyzer.

Block Associativity Limit Scheme for Efficient Flash Translation Layer (효율적인 플래시 변환 계층을 위한 블록 연관성 제한 기법)

  • Ok, Dong-Seok;Lee, Tae-Hoon;Chung, Ki-Dong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.6
    • /
    • pp.673-677
    • /
    • 2010
  • Recently, NAND flash memory has been widely used in embedded systems, personal computers, and server systems because of its attractive features, such as non-volatility, fast access speed, shock resistance, and low power consumption. Due to its hardware characteristics, specifically its 'erase-before-write' feature, Flash Translation Layer is required for using flash memory like hard disk drive. Many FTL schemes have been proposed, but conventional FTL schemes have problems such as block thrashing and block associativity problem. The KAST scheme tried to solve these problems by limiting the number of associations between data block and log block to K. But it has also block thrashing problem in random access I/O pattern. In this paper, we proposed a new FTL scheme, UDA-LBAST. Like KAST, the proposed scheme also limits the log block association, but does not limit data block association. So we could minimize the cost of merge operations, and reduce merge costs by using a new block reclaim scheme, log block garbage collection.

Development of Auto-generation Algorithm for Korean Crossword Puzzle (한글 크로스워드 퍼즐 자동 생성을 위한 알고리즘 개발)

  • Lee Seung-Hee;Kwon Hyuk-Chul;Cho Hwan-Gue
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.1_2
    • /
    • pp.52-61
    • /
    • 2006
  • A crossword puzzle is one of the popular word games around the world in which you work out the answers and write them in the white squares of a pattern of small black and white squares. As the technology of computers develops, some people worked about making and solving crossword puzzle games, which led them to a commercial use. However, almost all of these commercial programs are ones where you do ready-made puzzles with a fixed size because it is very difficult to make puzzles in a certain size, picking up some among a great number of words to fit for them. Furthermore, these programs are only for a very few languages, such as English, French, not for Korean. Accordingly, ore took a look at what should be considered to make an automatic puzzle-generating program for Korean, and in this paper we implemented Korizzle, a system making the puzzles automatically. We introduce the algorithm used for Korizzle and evaluate the its performance.

A Study of Interception for a Spam Attack of VoIP Service (VoIP서비스의 스팸 공격에 대한 차단 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.241-250
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among weakness of VoIP service at these papers study. Write scenario of a spam attack regarding VoIP service, and execute Call spam, Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove, and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN, and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Adaptive Garbage Collection Technique for Hybrid Flash Memory (하이브리드 플래시 메모리를 위한 적응적 가비지 컬렉션 기법)

  • Im, Soo-Jun;Shin, Dong-Kun
    • The KIPS Transactions:PartA
    • /
    • v.15A no.6
    • /
    • pp.335-344
    • /
    • 2008
  • We propose an adaptive garbage collection technique for hybrid flash memory which has both SLC and MLC. Since SLC area is fast and MLC area has low cost, the proposed scheme utilizes the SLC area as log buffer and the MLC area as data block. Considering the high write cost of MLC flash, the garbage collection for the SLC log buffer moves a page into the MLC data block only when the page is cold or the page migration invokes a small cost. The other pages are moved within the SLC log buffer. Also it adjusts the parameter values which determine the operation of garbage collection adaptively considering I/O pattern. From the experiments, we can know that the proposed scheme provides better performance compared with the previous flash management schemes for the hybrid flash and finds the parameter values of garbage collection close to the optimal values.

A Study on Korea Comics Industry Policy (한국의 만화산업 발전 정책에 관한 연구)

  • Kim, Byong-Soo;Yoon, Ki-Heon
    • Cartoon and Animation Studies
    • /
    • s.12
    • /
    • pp.1-12
    • /
    • 2007
  • The long-term stagnation in the country involving missing it is starting from the late 1990s accumulated on the common vision. The government has, since 2002, cartoon comics industry nurture long-term industrial development of five-year plan, 346.7. During that period of unprecedented material support to the government's sweeping received. Upcoming in 2008 is the second long-term development plan will be effective. The temperature inside and outside the government, however, various tax and go to feel quite differently. The first plan is merely a period of enforced projects listed are only fit for Panathinaikos has endorsed this general trend, yirugo diagnosis. But fundamentally, the exact diagnosis is necessary for the long-term stagnation. Children's Learning Results cartoon wepmanhwawa not thrive households. Comics readers about the consumption pattern is changing. Therefore, long-term plan for the development of cartoon industry only a few government budget plan is not the government write 73 gala, companies and the private sector are coming together to plan and worry that the plan should be a comprehensive and bevels. In addition, through the selection and concentration to increase efficiency. You will probably need to strengthen the capabilities of our private organizations, it is a priority. Furthermore, the government's financial and policy support for the lobbying power also lead to an increase in betting. It features a think tank to study the policy framework for the establishment and promotion assume the ultimate proposal includes a cartoon film cozy confines of the legislation that parallels activities in the various proposals.

  • PDF