• Title/Summary/Keyword: Electronic devices

Search Result 4,580, Processing Time 0.035 seconds

Improvement of ITSM IT Service Efficiency in Military Electronic Service

  • Woo, Hanchul;Jeong, Suk-Jae;Huh, Jun-Ho
    • Journal of Information Processing Systems
    • /
    • v.16 no.2
    • /
    • pp.246-260
    • /
    • 2020
  • IT Service Management (ITSM) achieves consolidated management for the IT services supporting the acquisition system, and no outside connections can be established with such ITSM. Issues pertaining to the D2B can be addressed to System Q&A or a Call Center for problem-solving. In other words, internal staff can take the necessary measures for problems by directly connecting with ITSM. Currently, diverse innovative technologies are being used in electronics and ubiquitous computing environments. This allows us to create a better world by providing the backbone for remarkable development in our human society in the fields of electronics, devices, computer science, and engineering. Following the expansion of IT services in the military acquisition sector such as Defense Electronic Procurement, military export/import support system, etc., customers' dependence on IT for conducting business with the military or related companies is increasing, including the military's dependence on the same technology for services to the public. Nonetheless, issues pertaining to the simplified/integrated management of complex IT service management systems, including slow system recovery, lack of integrated customer service window, and insufficient information sharing, have become the priority problems that IT managers are required to solve. Therefore, this study conducted research on the integrated management of IT services provided by Korea's national defense acquisition system, which was developed based on the existing system IT Infrastructure Library (ITIL) v2, and investigated the level of satisfaction with services with focus on ensuring that it can be used for understanding the necessity of the system and its advancement in the future.

Degradation of electrical characteristics in Bio-FET devices by O2 plasma surface treatment and improving by heat treatment (O2 플라즈마 표면처리에 의한 Bio-FET 소자의 특성 열화 및 후속 열처리에 의한 특성 개선)

  • Oh, Se-Man;Jung, Myung-Ho;Cho, Won-Ju
    • Journal of the Korean Vacuum Society
    • /
    • v.17 no.3
    • /
    • pp.199-203
    • /
    • 2008
  • The effects of surface treatment by $O_2$ plasma on the Bio-FETs were investigated by using the pseudo-MOSFETs on the SOI substrates. After a surface treatment by $O_2$ plasma with different RF powers, the current-voltage and field effect mobility of pseudo-MOSFETs were measured by applying back gate bias. The subthreshold characteristics of pseudo-MOSFETs were significantly degraded with increase of RF power. Additionally, a forming gas anneal process in 2 % diluted $H_2/N_2$ ambient was developed to recover the plasma process induced surface damages. A considerable improvement of the subthreshold characteristics was achieved by the forming gas anneal. Therefore, it is concluded that the pseudo-MOSFETs are a powerful tool for monitoring the surface treatment of Bio-FETs and the forming gas anneal process is effective for improving the electrical characteristics of Bio-FETs.

Quantum Hall Effect of CVD Graphene

  • Kim, Young-Soo;Park, Su-Beom;Bae, Su-Kang;Choi, Kyoung-Jun;Park, Myung-Jin;Son, Su-Yeon;Lee, Bo-Ra;Kim, Dong-Sung;Hong, Byung-Hee
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2011.02a
    • /
    • pp.454-454
    • /
    • 2011
  • Graphene shows unusual electronic properties, such as carrier mobility as high as 10,000 $cm^2$/Vs at room temperature and quantum electronic transport, due to its electronic structure. Carrier mobility of graphene is ten times higher than that of Silicon device. On the one hand, quantum mechanical studies have continued on graphene. One of them is quantum Hall effect which is observed in graphene when high magnetic field is applied under low temperature. This is why two dimension electron gases can be formed on Graphene surface. Moreover, quantum Hall effect can be observed in room temperature under high magnetic field and shows fractional quantization values. Quantum Hall effect is important because quantized Hall resistances always have fundamental value of h/$e^2$ ~ 25,812 Ohm and it can confirm the quantum mechanical behaviors. The value of the quantized Hall resistance is extremely stable and reproducible. Therefore, it can be used for SI unit. We study to measure quantum Hall effect in CVD graphene. Graphene devices are made by using conventional E-beam lithography and RIE. We measure quantum Hall effect under high magnetic field at low temperature by using He4 gas closed loop cryostat.

  • PDF

Lightweight Multicast Routing Based on Stable Core for MANETs

  • Al-Hemyari, Abdulmalek;Ismail, Mahamod;Hassan, Rosilah;Saeed, Sabri
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4411-4431
    • /
    • 2014
  • Mobile ad hoc networks (MANETs) have recently gained increased interest due to the widespread use of smart mobile devices. Group communication applications, serving for better cooperation between subsets of business members, become more significant in the context of MANETs. Multicast routing mechanisms are very useful communication techniques for such group-oriented applications. This paper deals with multicast routing problems in terms of stability and scalability, using the concept of stable core. We propose LMRSC (Lightweight Multicast Routing Based on Stable Core), a lightweight multicast routing technique for MANETs, in order to avoid periodic flooding of the source messages throughout the network, and to increase the duration of multicast routes. LMRSC establishes and maintains mesh architecture for each multicast group member by dividing the network into several zones, where each zone elects the most stable node as its core. Node residual energy and node velocity are used to calculate the node stability factor. The proposed algorithm is simulated by using NS-2 simulation, and is compared with other multicast routing mechanisms: ODMRP and PUMA. Packet delivery ratio, multicast route lifetime, and control packet overhead are used as performance metrics. These metrics are measured by gradual increase of the node mobility, the number of sources, the group size and the number of groups. The simulation performance results indicate that the proposed algorithm outperforms other mechanisms in terms of routes stability and network density.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

The Microwave Dielectric Properties of Bi0.97Tm0.03NbO4 Doped with V2O5 (마이크로파 유전체 Bi0.97Tm0.03NbO4의 V2O5 첨가에 따른 유전특성)

  • 황창규;장건익;윤대호
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.16 no.11
    • /
    • pp.975-978
    • /
    • 2003
  • The microwave dielectric properties and the microstructures on B $i_{0.97}$T $m_{0.03}$Nb $O_4$ doped with $V_2$ $O_{5}$ were systematically investigated. B $i_{0.97}$T $m_{0.03}$Nb $O_4$ ceramics sintered at 920-96$0^{\circ}C$ were mainly consisted of orthorhombic and triclinic phases after addition of $V_2$ $O_{5}$. The apparent density increased slightly with increasing the $V_2$ $O_{5}$ addition. The dielectric constants($\varepsilon$$_{r}$) also increased with $V_2$ $O_{5}$ addition(30-45). The Q${\times}$ $f_{0}$ values measured on B $i_{0.97}$T $m_{0.03}$Nb $O_4$ ceramics doped with $V_2$ $O_{5}$ were between 2,000 and 12,000[GHz] when the sintering temperatures were in the range of 920-960[$^{\circ}C$]. It was confirmed that the temperature coefficient of the resonant frequency($\tau$$_{f}$) can be adjusted from a positive value of +10ppm/$^{\circ}C$ to a negative value of -15ppm/$^{\circ}C$ by increasing the amount of $V_2$ $O_{5}$ Based on our experimental results, the B $i_{0.97}$T $m_{0.03}$Nb $O_4$(added $V_2$ $O_{5}$) ceramics can be applied to multilayer microwave devices at low sintering temperatures.ng temperatures.emperatures.ratures.

The microwave dielectric properties of $Bi_{0.97}Tm_{0.03}NbO_{4}$ doped with $V_{2}O_{5}$ (마이크로파 유전체 $Bi_{0.97}Tm_{0.03}NbO_{4}$$V_{2}O_{5}$ 첨가에 따른 유전특성)

  • Hwang, Chang-Gyu;Jang, Gun-Eik
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.350-353
    • /
    • 2002
  • The microwave dielectric properties and the microstructures on $Bi_{0.97}Nb_{0.03}O_{4}$doped with $V_{2}O_{5}$ were systematically investigated. $Bi_{0.97}Tm_{0.03}Nb_{0.03}O_{4}$ ceramics sintered at $920-960^{\circ}C$were mainly consisted of orthorhombic and triclinic phases after addition of $V_{2}O_{5}$. The apparent density increased slightly with increasing the $V_{2}O_{5}$ addition. The dielectric $constants(\varepsilon_r)$ also increased with $V_{2}O_{5}$ addition(30-45). The $Q{\times}f_0$ values measured on $Bi_{0.97}Tm_{0.03}NbO_4$ ceramics doped with $V_{2}O_{5}$ were between 2,000 and 12,000[GHz] when the sintering temperatures are in the range of $920-960[^{\circ}C]$. It was confirmed the temperature coefficient of the resonant $frequency(\tau_f)$ can be adjusted from a positive value of $+10[ppm/^{\circ}C]$ to a negative value of $-15ppm/^{\circ}C$ by increasing the amount of $V_{2}O_{5}$. Based on our experimental results, the Bi0.97Tm0.03NbO4(added V2O5) ceramics can be applied to multilayer microwave devices at low sintering temperatures.

  • PDF

A Musical Symbol recognition By Using Graphical Distance Measures (그래프간 유사도 측정에 의한 음악 기호 인식)

  • Jun, Jung-Woo;Jang, Kyung-Shik;Heo, Gyeong-Yong;Kim, Jai-Hie
    • The Journal of the Acoustical Society of Korea
    • /
    • v.15 no.1
    • /
    • pp.54-60
    • /
    • 1996
  • In most pattern recognition and image understanding applications, images are degraded by noise and other distortions. Therefore, it is more relevant to decide how similar two objects are rather than to decide whether the two are exactly the same. In this paper, we propose a method for recognizing degraded symbols using a distance measure between two graphs representing the symbols. a symbol is represented as a graph consisting of nodes and edges based on the run graph concept. The graph is then transformed into a reference model graph with production rule containing the embedding transform. The symbols are recognized by using the distance measure which is estimated by using the number of production rules used and the structural homomorphism between a transformed graph and a model graph. the proposed approach is applies to the recognition of non-note musical symbols and the result are given.

  • PDF

Feasibility Study for Device-to-Device Communications Using Unlicensed Bands in a Cellular Network (셀룰러 네트워크에서 비면허 대역을 활용한 단말 간 직접통신 타당성 연구)

  • Kim, Hyeon-Min;Kang, Gil-Mo;Shin, Oh-Soon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.2
    • /
    • pp.208-211
    • /
    • 2016
  • Device-to-Device communication(D2D) enables devices in proximity to communicate directly without going through the network infrastructure. In particular, D2D communications in a cellular network can improve the spectral efficiency by allowing the reuse of cellular resources. However, it is not easy to maintain the channel quality of the D2D links and to protect the cellular links from the D2D interferences, since the resource allocations for the cellular users will change with time due to the time-varying nature of the cellular channels. To mitigate the performance degradation of D2D links, we propose to exploit unlicensed bands as auxiliary resources when the D2D links share the uplink cellular resources. The effectiveness of the proposed scheme is verified through simulations.

Implementation of 2.4 GHz Wireless Keyboard and Mouse Electromagnetic Signal Analysis and Manipulate Systems (2.4 GHz 무선 키보드/마우스 전자파 신호 분석 및 조작 시스템 구축)

  • Kim, Sang-Su;Oh, Seung-Sub;Na, In-Seok
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.27 no.12
    • /
    • pp.1075-1083
    • /
    • 2016
  • Nowadays, the use of wireless input devices has been increasing on the basis of high convenience and portability. In particular the most widely used wireless keyboard and the mouse to use the 2.4 GHz frequency band, but due to the third party receives the electromagnetic wave from leaking when the radio equipment it is easy to obtain the personal information and the vulnerability is also being reported consistently. In this paper, implement a system to analyze and manipulate the packets of 2.4 GHz wireless keyboard and mouse using USRP device and GNU Radio package for verify the vulnerability of 2.4 GHz wireless keyboard and mouse. Using the construction system has attained a equipment specific address and key information by analyzing the communication protocol and the packet structure of the device was proved that a user can operate the PC to send the random key from long distance.