- Advanced Data Storage Technologies
- Internet of Things and Social Network Interactions
- Advanced Multi-Objective Optimization Algorithms
- Network Security and Intrusion Detection
- Advanced Malware Detection Techniques
- Semiconductor materials and devices
- Innovation in Digital Healthcare Systems
- Probabilistic and Robust Engineering Design
- Energy and Environmental Systems
- Caching and Content Delivery
- Digital and Cyber Forensics
- Opportunistic and Delay-Tolerant Networks
- Topology Optimization in Engineering
- Optimal Experimental Design Methods
- Metaheuristic Optimization Algorithms Research
- Peer-to-Peer Network Technologies
- Wireless Communication Networks Research
- Context-Aware Activity Recognition Systems
- Video Coding and Compression Technologies
- Software Testing and Debugging Techniques
- Algorithms and Data Compression
- Telecommunications and Broadcasting Technologies
- Thin-Film Transistor Technologies
- Internet Traffic Analysis and Secure E-voting
- Advancements in Semiconductor Devices and Circuit Design
Seoul National University
2003-2021
Korea University
2019
Samsung (South Korea)
1998-2019
Daegu Gyeongbuk Institute of Science and Technology
2014-2018
Daejeon University
2017
National Information Society Agency
2015
Mokpo National University
2008-2015
Hokkaido University
2015
Korea Railroad Research Institute
2013-2014
SK Group (South Korea)
2012
A novel 3-dimensional Dual Control-gate with Surrounding Floating-gate (DC-SF) NAND flash cell has been successfully developed, for the first time. The DC-SF consists of a surrounding floating gate stacked dual control gate. With this structure, high coupling ratio, low voltage operation (program: 15V and erase: -11V), wide P/E window (9.2V) can be obtained. Moreover, negligible FG-FG interference (12mV/V) is achieved due to shield effect. Then we propose 3D as most promising candidate 1Tb...
The malicious botnets are evaluated as the serious threat of Internet society in future. As more clever and artful, detection is not easy. Recently evolve into HTTP out typical IRC it difficult to response effectively with existing methods which using DNS traffic. In this paper, we show relations clients servers, propose method search by degree periodic repeatability.
Malicious botnet is evolving very quickly and using the many ways to evade detection system. The change of protocol most important part malicious botnet's evolution evasion techniques. initial was IRC for communication between command contorl server zombie After that they use HTTP on firewall-friendly P2P escape a Client/Server architecture. Because Many researchers studied or detection, began distorted method called HTTP2P. In this paper, we study HTTP2P botnet, will give help by analyzing...
We developed a compact model for program transient simulation of 3-D charge-trap NAND flash on bitline (BL) string level. By implanting the trapped charge parameters and solutions obtained from modified 1-D Poisson equation into our unit cell model, we suggest that shows better accuracy compared to existing model. After fitting measured incremental step pulse programming (ISPP) data with best accuracy, investigated dependence relevant electron tunneling/capture/emission channel scaling....
This paper introduces the world's first programmable video-processing platform for enhancement of video quality 8K (7680 x 4320) Ultra High Definition (UHD) TV that operates at a maximum rate 60 frames per second. To support massive computational load and memory bandwidth video, several key features have been implemented in proposed such as symmetric multi-cluster architecture data partitioning, ring-data path between clusters to pipelining, on-the-fly processing reduction DDR bandwidth,...
A globally convergent and efficient algorithm for min–max dynamic response optimization using the ALM method is presented. This employs an approximate augmented Lagrangian line searches, exact finding search directions. composed of linearized cost constraint functions projected on direction. It noted that penalty term has same Hessian as Gauss–Newton method. makes to have almost second-order accuracy near optimum. In unconstrained process proposed method, some modifications are also...
This paper presents several algorithms to predict collisions among vehicles at intersection, where the information about movement of within interesting region is exchanged via sensor network and local broadcasting. We additionally propose access road, which important as well. Experiments show that these give very accurate results with 0.5 average false warnings road on highway. In comparison they relatively more warning reports intersection
This article consists of one slide from the authors' conference presentation. The Samsung Reconfigurable Processor is Samsung's proprietary DSP processor since 2005.
We present the comprehensive analysis and compact modeling methodology of fast electron detrapping from bandgap engineered tunneling oxide (BE-TOX) in 3-D NAND flash memories. To this end, we develop a physics-based model considering detailed dynamics BE-TOX various emission paths mechanism. By aid carrier density rates accurately calibrated model, find that major path charge loss can be direct (DT) or trap-to-band (TBT) depending on temperature nitride layer position BE-TOX. In addition,...
In this paper, we propose the EDCA-TM, a new architecture which tunes enhanced distributed channel access (EDCA) for multi-hop networks. suggest module dynamic category adaptation (DACA) over existing mechanism such as EDCA. It processes received data packets assigning an appropriate categories (AC) to provide delay and rate guarantee QoS traffic. addition, adopt earliest deadline first queuing (EDF) scheme reschedule buffered in AC queues according their urgency actual transmission. We have...
Recently, various organizations are confronting a grater attack surface, the growing proliferation of malware and number malicious codes has been consistently for several years.To respond actively against these codes, analysts employ automated investigation tools on malware.However, there advent employing techniques to avoid detection SandBox, which makes hard identify adversarial behaviors samples codes.In this paper, we propose efficient methods trigger from sample during virtual execution...
In this article, we present an appropriate compact model of spacer (SP) region for static characteristics 3-D NAND flash memories. Though many studies on have focused the intrinsic part, they not considered analysis SP with gate-surrounded structure which is inevitable string due to punch-and-plug process. We focus electrostatics and suggest a concept bias ratio (BR) can evaluate average influence fringing electric field parasitic part efficient implantation model. First, introduce modeling...
This study presents the DFSS optimization for dynamic responses of a paper feeding mechanism. The flexible is idealized as series rigid bars connected by revolute joints and rotational spring dampers. In this mechanism, fed contact friction mechanism on rollers or guides. design objective to minimize slip amounts between mechanisms satisfy 6-sigma constraint nip forces rollers. order avoid difficulty sensitivity analysis overcome numerical noise, meta-model based employed. approach, first,...
In this paper, we propose a scheme to improve the performance of subspace learning by using pattern (data) selection method as preprocessing. Generally, training set for contains irrelevant or unreliable samples, and removing these samples can performance. For purpose, use preprocessing which discriminates decision boundary/non-boundary patterns class information neighborhood property, removes boundary patterns. Performance improvement is investigated classification visual tracking problems,...
The rapid growth of online social networks (OSNs) has brought a revolutionary change in the way geographically dispersed people interact and cooperate with each other towards achieving some common goals. Recently, new ways ad-hoc cooperation have been demonstrated during hurricane Irene
In this paper, we analysed performance for on-wafer GaN HEMT using load-pull in X-band, and studied optimum impedance point based on analysis result. We suggested method of device by solid state condition before packaging. The measured is gate length 0.25um, width 400um, 800um. 400um performed =33.16dBm, PAE=67.36%, Gain=15.16dBm, 800um =35.91dBm, PAE=69.23%, Gain=14.87dBm.
This paper proposes a novel blind adaptive algorithm for computing the weight vector of an antenna array system. The new technique utilizes phase update to obtain maximizing SINR (signal interference plus noise ratio) received signal. It is observed that proposed generates suboptimal with linear computational load(O(6N+8)). From various simulations, it confirmed that, when signal environment becomes adverse, outperforms conventional one in terms communication capacity by about 3 times....
In this paper, we developed a BSIM-CMG compact model for read operation of 3D NAND string and verified the through result TCAD simulation. First extracted parameters unit cell with macaroni channel. For purpose accuracy, in 3 steps took effects each step (mobility degradation factor, short channel so on) into account. Then by connecting modeled cells, characteristics such as g <sub xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">m</sub> variation...
In this paper, a new method for constrained optimization of noisy functions is proposed. approximate using response surface methods, if constraints have severe noise, the feasible region defined by apt to include some infeasible actual constraints. This can cause optimum converge into region. proposed method, performed with shifted their deviations, which are calculated diagonal quadratic method. prevent from converging To fit objective and models, we select center 4 additional points along...