• Title/Summary/Keyword: read

Search Result 2,789, Processing Time 0.034 seconds

Design of line memory with low-temperature poly-silicon(LTPS) thin-film transistor (TFT) for system-on-glass (SoG)

  • Choi, Jin-Yong;Min, Kyung-Youl;Yoo, Chang-Sik
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.417-420
    • /
    • 2007
  • A 12k-bit SRAM has been developed for line memory of system-on-glass (SoG) with lowtemperature poly-silicon (LTPS) thin film transistor (TFT). For accurate sensing even with the large variation and mismatches in the characteristics of LTPS TFT, mismatch immune sense amplifier is developed. The SRAM shows 30ns read access time with 7V supply voltage while dissipating 4.05mW and 1.75mW for write and read operation, respectively

  • PDF

Multilevel Security Management for Global Transactions

  • Jeong, Hyun-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.735-738
    • /
    • 2000
  • The most important issue in database security is correct concurrency control under the restrictive security policy. The goal of secure transaction management is to keep security and provide many concurrent users with the high availability of database. In this paper, we consider the security environment of multidatabase system with replicated data. The read-from relationship in the existed serializability is improper in security environment. So, we define new read-from relationship and propose new secure 1-copy quasi-seriailzability by utilizing this relationship and display some examples. This security environment requires both the existed local autonomy and the security autonomy as newly defined restriction. To solve covert channel problem is the most difficult issue in developing secure scheduling scheme. The proposed secure 1-copy quasi-serializability is very proper for global transactions in that this serializability not violates security autonomy and prevents covert channel between global transactions.

  • PDF

ANALYSIS OF THE MUTUAL SELF-BIASED SHIELDED MAGNETO-RESISTIVE HEAD WITH TRANSMISSION-LINE MODEL(I)

  • Zhang, H.W.;Kim, H.J.
    • Journal of the Korean Magnetics Society
    • /
    • v.5 no.4
    • /
    • pp.294-298
    • /
    • 1995
  • A shielded magnetoresistive (SMR) head which has double MR films and linearizes each other has been designed and studied by applying the transmission-line model. We have analyzed the yoke efficiency, bias efficiency and read efficiency of the SMR head. The read efficiency strongly depends on the height of the sensor and slightly on the other geometric parameters. The yoke and bias efficiencies vary with gap length, insulated layer thickness and relative permeability. A quasi-index reduction in the signal flux is observed when the displacement moves away from the medium.

  • PDF

Image interpretation errors often observed in a dental clinic (임상에서 흔히 관찰되는 영상판독 오류)

  • Park, In-Woo
    • The Journal of the Korean dental association
    • /
    • v.54 no.9
    • /
    • pp.712-728
    • /
    • 2016
  • These days, the clinical course of dental imaging sector has done a lot of implant-related imaging courses, including cone beam CT. In contrast, the general image reading course is not given a lot of opportunities to learn. Therefore, it is imperative that we talk about the general image interpretation that can be read easily applied in a dental clinic. When we see a strange radiographic finding of our patient in the dental clinic, we should first check whether the radiographic finding is a normal finding or a morbidity. If the finding is diagnosed as a morbidity, you should make plans for the appropriate therapy. The most important step is classification between normal state and morbidity. Some lesions may occur without any clinical symptoms. Therefore, we should read all the parts of radiographs, even the patient does not have clinical symptoms.

  • PDF

A Design of RAID-1 Storage using Hard Disk Drive and Flash Memory Drive (하드 디스크 드라이브와 플래시 메모리 드라이브를 활용한 레이드-1 저장장치의 설계)

  • Byun, Si-Woo
    • Transactions of the Society of Information Storage Systems
    • /
    • v.6 no.2
    • /
    • pp.41-46
    • /
    • 2010
  • Recently, Flash Memory Drives are one of the best media to support portable and desktop computers' storage devices. Their features include non-volatility, low power consumption, and fast access time for read operations, which are sufficient to present flash memories as major database storage components for desktop and server computers. However, we need to improve traditional storage management schemes based on HDD(Hard Disk Drive) and RAID(Redundant Array of Independent Disks) due to the relatively slow or freezing characteristics of write operations of SSDs, as compared to fast read operations. In order to achieve this goal, we propose a new storage management scheme called Hetero-Mirroring based on traditional HDD mirroring scheme. Hetero-Mirroring-based storage management improves RAID-1 operation performance by balancing write-workloads and delaying write operations to avoid SSD freezing.

Mirror-Switching Scheme for High-Speed Embedded Storage Systems (고속 임베디드 저장 시스템을 위한 복제전환 기법)

  • Byun, Si-Woo;Jang, Seok-Woo
    • Transactions of the Society of Information Storage Systems
    • /
    • v.7 no.1
    • /
    • pp.7-12
    • /
    • 2011
  • The flash memory has been remarked as the next generation media of portable and desktop computers' storage devices. Their features include non-volatility, low power consumption, and fast access time for read operations, which are sufficient to present flash memories as major data storage components for desktop and servers. The purpose of our study is to upgrade a traditional mirroring scheme based on SSD storages due to the relatively slow or freezing characteristics of write operations, as compared to fast read operations. For this work, we propose a new storage management scheme called Memory Mirror-Switching based on traditional mirroring scheme. Our Mirror-Switching scheme improves flash operation performance by switching write-workloads from flash memory to RAM and delaying write operations to avoid freezing. Our test results show that our scheme significantly reduces the write operation delay and storage freezing.

Buffer Policy based on High-capacity Hybrid Memories for Latency Reduction of Read/Write Operations in High-performance SSD Systems

  • Kim, Sungho;Hwang, Sang-Ho;Lee, Myungsub;Kwak, Jong Wook;Park, Chang-Hyeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.7
    • /
    • pp.1-8
    • /
    • 2019
  • Recently, an SSD with hybrid buffer memories is actively researching to reduce the overall latency in server computing systems. However, existing hybrid buffer policies caused many swapping operations in pages because it did not consider the overall latency such as read/write operations of flash chips in the SSD. This paper proposes the clock with hybrid buffer memories (CLOCK-HBM) for a new hybrid buffer policy in the SSD with server computing systems. The CLOCK-HBM constructs new policies based on unique characteristics in both DRAM buffer and NVMs buffer for reducing the number of swapping operations in the SSD. In experimental results, the CLOCK-HBM reduced the number of swapping operations in the SSD by 43.5% on average, compared with LRU, CLOCK, and CLOCK-DNV.

The Voice of the Imperial in an Anti-Imperialist Tone: George Orwell's Burmese Days

  • DONMEZ, Basak AGIN
    • Cross-Cultural Studies
    • /
    • v.28
    • /
    • pp.5-16
    • /
    • 2012
  • First published in 1934, George Orwell's Burmese Days, which can be read as an example of both descriptive realism and fictional realism, is considered to be a colonial example of British literature because of its publication date. However, based on the personal experience of the author as an imperial officer in Burma, the novel has an anti-imperialist tone, which can also make it possible to read it through postcolonial eyes. As a result, the novel stands as an example of ambivalence since it has both the colonial and the postcolonial perspective; both the colonizer and the colonized are portrayed with their own flaws, adding to the impact of what can be called "Third Space." This is why the voice of the imperial is heard in an anti-imperialist tone in Burmese Days, through which Orwell presents a critique of colonialism with a from-within approach.

A Study of the Use of Step by Processing for the Reading Letters Using Terahertz (테라헤르츠를 이용하여 글자를 읽어내기 위한 전처리 과정에 대한 연구)

  • Park, Inho;Kim, Seongyoon;Kim, Youngseop;Lee, Yonghwan
    • Journal of the Semiconductor & Display Technology
    • /
    • v.16 no.2
    • /
    • pp.106-109
    • /
    • 2017
  • Recently, ancient documents are actively studied and discussed. However, ancient documents has a few problems on interpretation. The antique documents are too fragile to hand over. So, some studies have been carried out using terahertz to read ancient documents without damaging them. Three techniques are necessary to read letters using terahertz. First, PPEX algorithm, which distinguishes pages. Second, TGSI technique, which distinguishes text from paper on a page. Third, CCSC algorithm, which transforms signals to letters. In this paper, we will describe the preprocessing process to facilitate the recognition of letters before applying the post processing as we mentioned above. Histogram equalization, Histogram stretching and the Sobel filter were applied to the preprocessing.

  • PDF

Definition of Security Requirement in Encryption (암호화에서 보안 요건 정의)

  • Shin, Seong-Yoon;Kim, Chang-Ho;Jang, Dai-Hyun;Lee, Hyun Chang;Rhee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.187-188
    • /
    • 2014
  • Encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption doesn't prevent hacking but it reduces the likelihood that the hacker will be able to read the data that is encrypted. Important information (data) information during transmission or storage of the confidentiality, integrity should be guaranteed. Encryption is one-way and two-way encryption is applied. The encryption key must be guaranteed safety.

  • PDF