• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Zhao Xiaogang, Wang Haiwei, and Xie Changsheng. A Novel Method Containing the Radial Error Propagation in Self-Servowriting in Hard Disk[J]. Journal of Computer Research and Development, 2009, 46(8): 1399-1407.
Citation: Zhao Xiaogang, Wang Haiwei, and Xie Changsheng. A Novel Method Containing the Radial Error Propagation in Self-Servowriting in Hard Disk[J]. Journal of Computer Research and Development, 2009, 46(8): 1399-1407.

A Novel Method Containing the Radial Error Propagation in Self-Servowriting in Hard Disk

More Information
  • Published Date: August 14, 2009
  • Servo information can be used to tell the relative position of the magnetic head and data track. So it must be written in the manufacture process of hard disk drive (HDD). But traditional servo information writing process needs the help of servo track writer and the use of clean room. These cost a lot to HDD manufacture. The rapid increasing track density also compacts much to the servo information writing process. Self-servowriting process can use the equipments of HDD to implement the process of writing servo information. It can improve the productive efficiency of HDD manufacture. The process of self-servowriting and the problem that is critical to self-servowriting are discussed. The principle of self-servowriting and the phenomenon of radial error propagation are analyzed. Radial error propagation is caused by noise disturbance, “seed” track defect and deep reliance on last track shape. Then two different methods which could contain the error propagation are compared and their shortcomings are also discussed. Next, a new weighted correction signal method is described in details. Its effectiveness and advantage are proved in theory and in simulation test. The simulation shows it could decrease track absolute radial error and relative radial error simultaneously.
  • Related Articles

    [1]Wu Jian, Fu Yinjin, Fang Yanmei, Liu Yao, Fu Wei, Cao Xiaochun, Xiao Nong. A Review on Encrypted Data Deduplication Attacks and Countermeasures in Cloud Storage[J]. Journal of Computer Research and Development. DOI: 10.7544/issn1000-1239.202440379
    [2]Li Haobo, Li Mohan, Chen Peng, Sun Yanbin, Tian Zhihong. A Corruption-resistant Data Identification Technology Based on Dataset Honeypoint[J]. Journal of Computer Research and Development, 2024, 61(10): 2417-2432. DOI: 10.7544/issn1000-1239.202440496
    [3]Kuang Boyu, Li Yuze, Gu Fangming, Su Mang, Fu Anmin. Review of Internet of Vehicle Security Research: Threats, Countermeasures, and Future Prospects[J]. Journal of Computer Research and Development, 2023, 60(10): 2304-2321. DOI: 10.7544/issn1000-1239.202330464
    [4]Wang Chong, Wei Shuai, Zhang Fan, Song Ke. A Survey of Cache-Based Side Channel Countermeasure[J]. Journal of Computer Research and Development, 2021, 58(4): 794-810. DOI: 10.7544/issn1000-1239.2021.20200500
    [5]Ji Zhong, Nie Linhong. Texture Image Classification with Noise-Tolerant Local Binary Pattern[J]. Journal of Computer Research and Development, 2016, 53(5): 1128-1135. DOI: 10.7544/issn1000-1239.2016.20148320
    [6]Wang Yonggang, Yan Hanbing, Xu Junfeng, Hu Jianbin, Chen Zhong. Research on Countermeasures Against Tag Spam[J]. Journal of Computer Research and Development, 2013, 50(10): 2029-2043.
    [7]Yue Daheng, Qi Shubo, Li Shaoqing, and Zhang Minxuan. A DPA Resistant Technology Based on Register Switching Time Randomization[J]. Journal of Computer Research and Development, 2012, 49(3): 491-498.
    [8]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. Quantitative Evaluation of the Cryptographic Block’s Resistibility to Power Analysis Attack at Different Design Level[J]. Journal of Computer Research and Development, 2009, 46(6): 940-947.
    [9]Tong Yuanman, Wang Zhiying, Dai Kui, and Lu Hongyi. A DPA and HO-DPA Resistant Implementation of AES[J]. Journal of Computer Research and Development, 2009, 46(3): 377-383.
    [10]Zhao Jia, Zeng Xiaoyang, Han Jun, Wang Jing, and Chen Jun. VLSI Implementation of an AES Algorithm Resistant to Differential Power Analysis Attack[J]. Journal of Computer Research and Development, 2007, 44(3).

Catalog

    Article views (612) PDF downloads (344) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return