Zobrazeno 1 - 10
of 34
pro vyhledávání: '"Jun-Jin Kong"'
Autor:
Sung-Gi Ahn, Yong-ki Kim, Ryu Ye-Sin, Kyomin Sohn, Ki-Chul Chun, Dong Hak Shin, Byung-Kyu Ho, Jae-Won Park, Ji-Hye Kim, Chi Sung Oh, Byoung Mo Moon, Jae-Seung Jeong, Nam Sung Kim, S.J. Ahn, Jun Jin Kong, Seong-Jin Cho, Jun Gyu Lee, Jung-Bae Lee, So-Young Kim, Young Yong Byun, Seouk-Kyu Choi, Jae-Hoon Lee, Woo Seunghan, Soo-Young Kim, Min-Sang Park, Beomyong Kil
Publikováno v:
IEEE Journal of Solid-State Circuits. 56:199-211
Circuit and design techniques are presented for enhancing the performance and reliability of a 3-D-stacked high bandwidth memory-2 extension (HBM2E). A data-bus window extension technique is implemented to cope with reduced clock cycle time ranging f
Autor:
Jin-Guk Kim, Kijun Lee, Junyong Noh, Seungseob Lee, Jung-Bae Lee, Seung-Duk Baek, Jungyu Lee, Sin-Ho Kim, Soo-Young Kim, Hye-In Choi, Ki-Chul Chun, Beomyong Kil, Sanguhn Cha, So-Young Kim, Jae-Won Park, Ryu Ye-Sin, Jun Jin Kong, Dong-Hak Shin, Byung-Kyu Ho, Hyuk-Jun Kwon, Baekmin Lim, Park Yong-Sik, Seouk-Kyu Choi, Chi-Sung Oh, Kyomin Sohn, Myungkyu Lee, Kwang-Il Park, Young-Yong Byun, Jae-Wook Lee, Bo-Tak Lim, Seong-Jin Cho, Jong-Pil Son, Yong-ki Kim, Nam Sung Kim, S.J. Ahn
Publikováno v:
ISSCC
Rapidly evolving artificial intelligence (Al) technology, such as deep learning, has been successfully deployed in various applications: such as image recognition, health care, and autonomous driving. Such rapid evolution and successful deployment of
Publikováno v:
Journal of Communications and Networks. 20:345-353
Block turbo codes (BTCs) under iterative decoding are product codes showing excellent performance with reasonable complexity, whose component codes are conventionally decoded in two stages. The Chase algorithm is employed in the first stage to make a
Autor:
Keshab K. Parhi, Jun Jin Kong
Publikováno v:
IEEE Transactions on Very Large Scale Integration (VLSI) Systems. 12:642-651
In this paper, a novel K-nested layered look-ahead method and its corresponding architecture, which combine K-trellis steps into one trellis step (where K is the encoder constraint length), are proposed for implementing low-latency high-throughput ra
Autor:
Hong-rak Son, Jaejin Lee, Kyoung Lae Cho, Jaehong Kim, Jun Jin Kong, Yongjune Kim, B. V. K. Vijaya Kumar
Publikováno v:
ICNC
The aggressive scaling down of flash memories has threatened data reliability since the scaling down of cell sizes gives rise to more serious degradation mechanisms such as cell-to-cell interference and lateral charge spreading. The effect of these m
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::89f897eb9024b32bf772d3784a357280
http://arxiv.org/abs/1304.4811
http://arxiv.org/abs/1304.4811
Publikováno v:
ISCAS
With the rapid advances in the area of memory product, it has become more and more important to maintain its reliability while increasing the density and speed performance. Particularly, flash memory products have inherent difficulties in lengthening
Publikováno v:
ISCAS
A novel CSI-aided demapping method for dual-carrier modulation (DCM) is proposed for multiband-OFDM systems. The proposed method utilizes the channel state information (CSI) to calculate the soft decision values, which are given by the approximate lo
Autor:
Keshab K. Parhi, Jun Jin Kong
Publikováno v:
Conference Record of the Thirty-Eighth Asilomar Conference on Signals, Systems and Computers, 2004..
In this paper, design of quantum convolutional codes and their encoder architectures have been investigated. We claim that rate-1/(n+1) quantum systematic convolutional codes can be constructed from rate-1/n classical nonsystematic convolutional code
Autor:
Keshab K. Parhi, Jun Jin Kong
Publikováno v:
The Thrity-Seventh Asilomar Conference on Signals, Systems & Computers, 2003.
In this paper, we investigate interleaved cyclic redundancy check (CRC) code. The interleaved CRC can be obtained by merging independent small message blocks into one large block (merged interleaving) or by dividing the original message block into in
Autor:
Keshab K. Parhi, Jun Jin Kong
Publikováno v:
2003 IEEE Workshop on Signal Processing Systems (IEEE Cat. No.03TH8682).
A novel K-nested layered look-ahead method and its corresponding architectures, which pack K trellis steps into one step (where K is the encoder constraint length) and combine two look-ahead sub-trellises in a layered manner, are proposed for a high