• Title/Summary/Keyword: computer-based technology

Search Result 8,967, Processing Time 0.046 seconds

Region-based Pattern Generating System for Maskless Photolithography

  • Jin, Young-Hun;Park, Ki-Won;Choi, Jae-Man;Kim, Sang-Jin;An, Chang-Geun;Seo, Man-Seung
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.389-392
    • /
    • 2005
  • In the maskless photolithography based on the Digital Micromirror Device (DMD) by Texas Instruments Inc. (TI), the micromirror array works as a virtual photomask to write patterns directly onto Flat Panel Display (FPD) at high speed with low cost. However, it is neither simple to generate region-based patterns for the micromirror array nor easy to deliver sequences of patterns for the micromirror controller. Moreover, the quality of lithography yields the precise synchronization between generating sequence of patterns and irradiation rate off micromirrors. In this study, the region-based pattern generating system for maskless photolithography is devised. To verify salient features of devised functionalities, the prototype system is implemented and the system is evaluated with actual DMD based photolithography. The results show that proposed pattern generating method is proper and reliable. Moreover, the devised region-based pattern generating system is robust and precise enough to handle any possible user specified mandate and to achieve the quality of photolithography required by FPD manufacturer.

  • PDF

An Extended UTAUT2 model to Explain the Adoption of Virtual Reality Technology in Health Centers: An Empirical Study Based in Riyadh

  • Algahtani, Manar;Altameem, Abdullah;Baig, Abdul Rauf
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.219-228
    • /
    • 2021
  • The adoption of new technology in any organization will represent change, and such change needs user acceptance for its successful implementation. Saudi Arabian health centers are no exception; therefore, the current study will investigate the adoption of new technology, namely that of virtual reality (VR), within health centers in Saudi Arabia and specifically in Riyadh City. This study explores the current state of VR technology adoption, factors that influence such adoption, and the extent of this technology's efficiency when it is used for vaccinating children. The data were collected from two samples: workers in vaccination clinics who responded to a survey and a group of children who participated in the VR technology experiment. The current study proposed a model based on the unified theory of acceptance and use of technology 2 (UTAUT2), with the addition of two variables: personal innovativeness and satisfaction. The results indicated that the respondents' perceptions regarding the health centers' infrastructure in terms of adopting VR were moderate. Among the factors affecting VR adoption, satisfaction, personal innovativeness, and behavioral intention were identified as vastly influential factors. From the eight hypotheses, six were found to be supported, with their factors significantly influencing behavioral intention with regard to VR technology adoption. Besides, the experiment concerning the use of VR technology on children verified the technique's high efficiency in terms of providing pain management and fear removal. These findings support the continuity of VR technology use, expand its future application fields, and integrate this study into the literature on technology acceptance models for VR adoption, as limited studies have covered this topic; consequently, this will benefit future research in this field.

A Study on Access Control Through SSL VPN-Based Behavioral and Sequential Patterns (SSL VPN기반의 행위.순서패턴을 활용한 접근제어에 관한 연구)

  • Jang, Eun-Gyeom;Cho, Min-Hee;Park, Young-Shin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.125-136
    • /
    • 2013
  • In this paper, we proposed SSL VPN-based network access control technology which can verify user authentication and integrity of user terminal. Using this technology, user can carry out a safety test to check security services such as security patch and virus vaccine for user authentication and user terminal, during the VPN-based access to an internal network. Moreover, this system protects a system from external security threats, by detecting malicious codes, based on behavioral patterns from user terminal's window API information, and comparing the similarity of sequential patterns to improve the reliability of detection.

Event-Based Ontologies: A Comparison Review

  • Ashour Ali;Shahrul Azman Mohd Noah;Lailatul Qadri Zakaria
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.212-220
    • /
    • 2023
  • Ontologies are knowledge containers in which information about a specified domain can be shared and reused. An event happens within a specific time and place and in which some actors engage and show specific action features. The fact is that several ontology models are based on events called Event-Based Models, where the event is an individual entity or concept connected with other entities to describe the underlying ontology because the event can be composed of spatiotemporal extents. However, current event-based ontologies are inadequate to bridge the gap between spatiotemporal extents and participants to describe a specific domain event. This paper reviews, describes, and compares the existing event-based ontologies. The paper compares and contrasts various ways of representing the events and how they have been modelled, constructed, and integrated with the ontologies. The primary criterion for comparison is based on the events' ability to represent spatial and temporal extent and the participants in the event.

A Method for Generation of Grinding Map based on Automatic Mold Measurement (금형 자동측정에 의한 사상맵 생성)

  • Jeoung, Nam-Yeoung;Cho, Jin-Hyung;Oh, Hyun-Seung;Lee, Sae-Jae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.248-255
    • /
    • 2018
  • Ensuring the quality of molds is one of the major issues in mass production. In general, securing the quality of the molds is achieved by repeating grinding and die spotting after machining the molds based on engineer's decision. However, this heuristic method is affected by the engineer's skill and working environment. Therefore, a lot of time and resources are needed in order to ensure quality. In this study, ensuring the quality of molds using grinding map which is generated using automatic measurement is proposed. An automatic measuring system based on CMM (Coordinate Measuring Machine) is developed for measuring the molds. This system generates the measurement path automatically using the 3D CAD model of products. CAD (ComputerAided-Design), CAM (Computer-Aided-Manufacturing), and CAQ (Computer-Aided-Quality) technology is integrated using DMIS (Dimensional Measuring Interface Standard) format in the automatic measuring system. After measuring the molds, a grinding map is generated using the gap between the CAD model and measured values of mold. The grinding map displays the machining tendency and the required amount of grinding with values on a 3D map. Therefore, the quality of molds can be ensured with exactness and quickness based on the grinding map. This study shows that integrating the planning, measuring, and analyzing based on computer technology can solve the problem of quality assurance of mold using the proposed method, therefore the productivity can be increased.

Buffer Policy based on High-capacity Hybrid Memories for Latency Reduction of Read/Write Operations in High-performance SSD Systems

  • Kim, Sungho;Hwang, Sang-Ho;Lee, Myungsub;Kwak, Jong Wook;Park, Chang-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.1-8
    • /
    • 2019
  • Recently, an SSD with hybrid buffer memories is actively researching to reduce the overall latency in server computing systems. However, existing hybrid buffer policies caused many swapping operations in pages because it did not consider the overall latency such as read/write operations of flash chips in the SSD. This paper proposes the clock with hybrid buffer memories (CLOCK-HBM) for a new hybrid buffer policy in the SSD with server computing systems. The CLOCK-HBM constructs new policies based on unique characteristics in both DRAM buffer and NVMs buffer for reducing the number of swapping operations in the SSD. In experimental results, the CLOCK-HBM reduced the number of swapping operations in the SSD by 43.5% on average, compared with LRU, CLOCK, and CLOCK-DNV.

WAVELET-BASED DIGITAL WATERMARKING USING HUMAN VISUAL SYSTEM FOR COPYRIGHT PROTECTION

  • Sombun, Anuwat;Pinngern, Quen;Kimpan, Chom
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.800-803
    • /
    • 2004
  • This paper presents a wavelet-based digital watermarking technique for still images. The digital watermarking considering human visual system (HVS) to increase the robustness and perceptual invisibility of digital watermark. The watermarking embedding is modified discrete wavelet transform (DWT) coefficients of the subbands of the images. The human visual system is number of factors that effect the noise sensitivity of human eyes that is considered to increase the robustness and perceptual invisibility of digital watermark. The watermark detection is blind watermark ( original image is not required ). Experimental results successful against attacks by image processing such as add noise, cropping, filtering, JPEG and JPEG2000 compression.

  • PDF

High-Performance Q-Band MMIC Phase Shifters Using InGaAs PIN Diodes

  • Kim, Mun-Ho;Yang, Jung-Gil;Yang, Kyoung-Hoon
    • Journal of electromagnetic engineering and science
    • /
    • v.9 no.3
    • /
    • pp.159-163
    • /
    • 2009
  • This paper presents the design and implementation of Q-band MMIC phase shifters using InGaAs PIN diodes. The topology using a thin-film microstrip line(TFMS) has been proposed to achieve the desired phase-shift as well as good loss characteristics. Five single-bit MMIC phase shifters have been implemented by using a developed BCB(benzocyclobutene)-based multi-layer fabrication technology. The developed phase shifters have less than 3.4 dB of insertion loss and better than 11 dB of input and output return loss in the frequency range of 43 to 47 GHz. To the authors' knowledge, this is the first demonstration of high-performance InGaAs PIN diode-based MMIC phase shifters operating at Q-band frequencies.

An Adaptive MAC Protocol for Wireless LANs

  • Jamali, Amin;Hemami, Seyed Mostafa Safavi;Berenjkoub, Mehdi;Saidi, Hossein
    • Journal of Communications and Networks
    • /
    • v.16 no.3
    • /
    • pp.311-321
    • /
    • 2014
  • This paper focuses on contention-based medium access control (MAC) protocols used in wireless local area networks. We propose a novel MAC protocol called adaptive backoff tuning MAC (ABTMAC) based on IEEE 802.11 distributed coordination function (DCF). In our proposed MAC protocol, we utilize a fixed transmission attempt rate and each node dynamically adjusts its backoff window size considering the current network status. We determined the appropriate transmission attempt rate for both cases where the request-to-send/clear-to-send mechanism was and was not employed. Robustness against performance degradation caused by the difference between desired and actual values of the attempt rate parameter is considered when setting it. The performance of the protocol is evaluated analytically and through simulations. These results indicate that a wireless network utilizing ABTMAC performs better than one using IEEE 802.11 DCF.

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.3
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.