• Title/Summary/Keyword: Device Network

Search Result 2,401, Processing Time 0.03 seconds

Fabrication and Characteristic of C-doped Base AlGaAs/GaAs HBT using Carbontetrachloride $CCI_4$ ($CCI_4$ 를 사용하여 베이스를 탄소도핑한 AlGaAs/GaAs HBT의 제작 및 특성)

  • 손정환;김동욱;홍성철;권영세
    • Journal of the Korean Institute of Telematics and Electronics A
    • /
    • v.30A no.12
    • /
    • pp.51-59
    • /
    • 1993
  • A 4${\times}10^{19}cm^{3}$ carbon-doped base AlGaAs/GaAs HBY was grown using carbontetracholoride(CCl$_4$) by atmospheric pressure MOCVD. Abruptness of emitter-base junction was characterized by SIMS(secondary ion mass spectorscopy) and the doping concentration of base layer was confirmed by DXRD(double crystal X-ray diffractometry). Mesa-type HBTs were fabricated using wet etching and lift-off technique. The base sheet resistance of R$_{sheet}$=550${\Omega}$/square was measured using TLM(transmission line model) method. The fabricated transistor achieved a collector-base junction breakdown voltage of BV$_{CBO}$=25V and a critical collector current density of J$_{O}$=40kA/cm$^2$ at V$_{CE}$=2V. The 50$\times$100$\mu$$^2$ emitter transistor showed a common emitter DC current gain of h$_{FE}$=30 at a collector current density of JS1CT=5kA/cm$^2$ and a base current ideality factor of ηS1EBT=1.4. The high frequency characterization of 5$\times$50$\mu$m$^2$ emitter transistor was carried out by on-wafer S-parameter measurement at 0.1~18.1GHz. Current gain cutoff frequency of f$_{T}$=27GHz and maximum oscillation frequency of f$_{max}$=16GHz were obtained from the measured Sparameter and device parameters of small-signal lumped-element equivalent network were extracted using Libra software. The fabricated HBT was proved to be useful to high speed and power spplications.

  • PDF

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

A Method to Improve Energy Efficiency for IoT Using SSL/TLS on Wireless Network (무선 환경에서 SSL/TLS를 사용하는 IoT의 에너지 효율성 향상을 위한 기법)

  • Chung, Jin Hee;Cho, Tae Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.661-666
    • /
    • 2016
  • The Internet of Things (IoT) is an infrastructure of physical objects that could be connected to the Internet. Most of these are low performance to ensure a reasonable cost for the smart physical objects. Thus, these devices usually use a lightweight messaging protocol: message queue telemetry transport with SSL/TLS. Cipher suites in device are fixed by default and selected based on preference in SSL/TLS. However, the selected cipher suite provides high security level more than expected. This limitation causes energy waste and overhead of devices. In order to counter this problem, we proposed fuzzy logic based cipher suite decision method to improve energy efficiency. Our proposed method saved 36.03% energy.

Efficient ID-Based Authentication and Key Exchange Protocol (효율적인 ID 기반 인증 및 키 교환 프로토콜)

  • Eom, Jieun;Seo, Minhye;Park, Jong Hwan;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1387-1399
    • /
    • 2016
  • In a hyper-connected society realized through IoT-enabled technology, a large amount of data is collected by various devices and is processed to provide new services to users. While communicating through a network, it is essential for devices to execute mutual authentication since users' privacy can be infringed by malicious attackers. ID-based signature enables authentication and key exchange with a unique ID of a device. However, most of the previous ID-based signature schemes based on RSA require an additional step to share parameters for key exchange so that they are not suitable for resource-constrained devices in terms of efficiency. In this paper, we design an efficient ID-based signature and thereby propose an efficient ID-based authentication and key exchange protocol in which sessions for both an authentication and a key exchange are executed simultaneously. In addition, we prove the security of our scheme under the RSA onewayness problem and analyze the efficiency by comparing with the previous schemes.

Dynamic Gesture Recognition for the Remote Camera Robot Control (원격 카메라 로봇 제어를 위한 동적 제스처 인식)

  • Lee Ju-Won;Lee Byung-Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.7
    • /
    • pp.1480-1487
    • /
    • 2004
  • This study is proposed the novel gesture recognition method for the remote camera robot control. To recognize the dynamics gesture, the preprocessing step is the image segmentation. The conventional methods for the effectively object segmentation has need a lot of the cole. information about the object(hand) image. And these methods in the recognition step have need a lot of the features with the each object. To improve the problems of the conventional methods, this study proposed the novel method to recognize the dynamic hand gesture such as the MMS(Max-Min Search) method to segment the object image, MSM(Mean Space Mapping) method and COG(Conte. Of Gravity) method to extract the features of image, and the structure of recognition MLPNN(Multi Layer Perceptron Neural Network) to recognize the dynamic gestures. In the results of experiment, the recognition rate of the proposed method appeared more than 90[%], and this result is shown that is available by HCI(Human Computer Interface) device for .emote robot control.

Multiple Dimension User Motion Detection System base on Wireless Sensors (무선센서 기반 다차원 사용자 움직임 탐지 시스템)

  • Kim, Jeong-Rae;Jeong, In-Bum
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.700-712
    • /
    • 2011
  • Due to recently advanced electrical devices, human can access computer network regardless of working location or time restriction. However, currently widely used mouse, joystick, and trackball input system are not easy to carry and they bound user hands exclusively within working space. Those make user inconvenient in Ubiquitous environments.. In this paper, we propose multiple dimension human motion detection system based on wireless sensor networks. It is a portable input device and provides easy installation process and unbinds user hands during input processing stages. Our implemented system is comprised of three components. One is input unit that senses user motions and transmits collected data to receiver. Second is receiver that conveys the received data to application, which runs on server computer. Third is application that performs command operations according to received data. Experiments shows that proposed system accurately detect the characteristics of user arm motions and fully support corresponding input requests.

VR Theme Park Activation Issues (VR 테마파크 활성화 이슈)

  • Song, Seung-Keun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.122-123
    • /
    • 2018
  • The purpose of this study is to investigate the problem of installing VR theme park in Korea and to find a solution for it. VR is expected to play a leading role in the fourth industrial revolution as a new industry, but it is a reality that it is hard to feel its value in actual field. This is a reality that can not move one step further because it is trapped in the existing legal network rather than the essence of VR because it sees VR from the existing law frame. Because VR is regarded as an amusement device in the amusement facility and is regarded as a game, the former is applied to the Tourism Promotion Law and the latter is applied to the game industry law. When one content and hardware are applied to both laws at the same time and other regulations are applied to it, it is practically impossible to operate VR properly. In order to solve this problem, it is necessary to revise each law little by little in each law and amend the law that can apply VR itself. This study is expected to contribute to the revitalization of VR industry by presenting the ultimate problems and solutions in creating VR theme parks in Korea.

  • PDF

Comparison of Efficiency for Voltage Source and Current Source Based Converters in 5MW PMSG Wind Turbine Systems (전압형 및 전류형 컨버터를 적용한 5MW PMSG 풍력발전시스템의 효율 비교)

  • Kang, Tahyun;Kang, Taewon;Chae, Beomseok;Lee, Kihyun;Suh, Yongsug
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.20 no.5
    • /
    • pp.410-420
    • /
    • 2015
  • This paper provides a comparison of power converter loss and thermal description for voltage source and current source type 5 MW-class medium-voltage topologies of wind turbines. Neutral-point clamped three-level converter is adopted for a voltage source type topology, whereas a two-level converter is employed for current source type topology, considering the popularity in the industry. To match the required voltage level of 4160 V with the same switching device of IGCT as in the voltage source converter, two active switches are connected in series for the case of current source converter. Transient thermal modeling of a four-layer Foster network for heat transfer is done to better estimate the transient junction and case temperature of power semiconductors during various operating conditions in wind turbines. The loss analysis is confirmed through PLECS simulations. Comparison result shows that the VSC-based wind turbine system has higher efficiency than the CSC under the rated operating conditions.

Analysis of Disk Array Architecture as a Storage Server of a Small-Sacle VOD Server (소규모 VOD 시스템의 저장 서버로서 디스크 배열 구조의 분석)

  • Go, Jeong-Guk;Kim, Gil-Yong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.811-820
    • /
    • 1997
  • Disk arrays are using to enhance data trandfer rate and I/O performance in multimedia applications which need a high-performance storage device with large storage capacity and high-speed network.As performance varies with configuration and data layout scheme,disk array characteristic variables must be approrpriately deter-mined in desibning disk array archetecture for a speciffic applicatoin. In this paper,in order to design a disk array architecturte as a storage server of a small-scale VOD system,we evaluate performance of a disk array to chose the number of disks in the array,disk array cinfiguration,a degree of declustering for a given data block size of continous media file system and I/D request size through simulation.Simulation result shows that RAID level 5 with 5 disks ios a suitable candidate for the disk array architecture which privides MPEG-2 files with a rate of 6 Mbps,Moreover,we whow that stripe unit is 64 KB and a layout scheme is contigous placement.

  • PDF

Visual Monitoring System of Multi-Hosts Behavior for Trustworthiness with Mobile Cloud

  • Song, Eun-Ha;Kim, Hyun-Woo;Jeong, Young-Sik
    • Journal of Information Processing Systems
    • /
    • v.8 no.2
    • /
    • pp.347-358
    • /
    • 2012
  • Recently, security researches have been processed on the method to cover a broader range of hacking attacks at the low level in the perspective of hardware. This system security applies not only to individuals' computer systems but also to cloud environments. "Cloud" concerns operations on the web. Therefore it is exposed to a lot of risks and the security of its spaces where data is stored is vulnerable. Accordingly, in order to reduce threat factors to security, the TCG proposed a highly reliable platform based on a semiconductor-chip, the TPM. However, there have been no technologies up to date that enables a real-time visual monitoring of the security status of a PC that is operated based on the TPM. And the TPB has provided the function in a visual method to monitor system status and resources only for the system behavior of a single host. Therefore, this paper will propose a m-TMS (Mobile Trusted Monitoring System) that monitors the trusted state of a computing environment in which a TPM chip-based TPB is mounted and the current status of its system resources in a mobile device environment resulting from the development of network service technology. The m-TMS is provided to users so that system resources of CPU, RAM, and process, which are the monitoring objects in a computer system, may be monitored. Moreover, converting and detouring single entities like a PC or target addresses, which are attack pattern methods that pose a threat to the computer system security, are combined. The branch instruction trace function is monitored using a BiT Profiling tool through which processes attacked or those suspected of being attacked may be traced, thereby enabling users to actively respond.