• Title/Summary/Keyword: Folder

Search Result 103, Processing Time 0.624 seconds

The Design and SAR Analysis of the Broadband Printed Monopole Antenna with Z-patch (Z자형 패치를 갖는 광대역 평판형 모노폴 안테나 설계 및 SAR 해석)

  • Lee, Ho-Min;Lee, Seung-Woo;Kim, Nam
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.18 no.12
    • /
    • pp.1391-1401
    • /
    • 2007
  • This paper proposed a novel broadband printed monopole antenna for PCS/IMT-2000/WLAN terminals. Frequency characteristics are optimized with various design parameters. Two Z-shaped patchs were utilized in order to improve the characteristics of a printed monopole antenna which usually has a narrow bandwidth. The bandwidth of the realized antenna is $1.590{\sim}2.614$ GHz(48.43 %) below the return loss of -10 dB which contain the required bandwidth of PCS/IMT-2000/WLAN band. The simulated and measured values of 1 g and 10 g averaged peak SAR on human head caused by the proposed antenna on folder-type phone were analyzed and discussed. As a result, the measured 1 g peak SAR value is 0.794 W/kg and 10 g peak SAR value is 0.368 W/kg at 1.8 GHz. The results are smaller than the reference SAR limit values that are respectively 1.6 W/kg and 2 W/kg on 1 g and 10 g averaged SAR values.

Development of a Model to Evaluate RF Exposure Level from Cellular Phone using a Neural Network (신경망을 이용한 휴대전화에 의한 RF 노출 평가 모델의 개발)

  • Kim Soo-Chan;Nam Ki-Chang;Ahn Seon-Hui;Kim Deok-Won
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.15 no.10 s.89
    • /
    • pp.969-976
    • /
    • 2004
  • The wide and growing use of cellular phones has raised the question about the possible health risks associated with radio-frequency electromagnetic fields. It would be helpful for phone users to blow the exposure levels during cellular phone use. But it is very difficult to recognize the amount of exposure, because measuring accurate level of RF is a difficult matter. In this study, we developed a model to estimate the exposure level and the individual risk of exposure by utilizing the available informations that we can get. We used such parameters as usage time a day, total using period, distance between cellular phone and head, slope of cellular phone, hands-free usage, antenna pulled out or not SAR(Specific Absorption Rate) of cellular phone, and flip or folder type. We proposed a model presenting individual risk of RF exposure from level 0 to 10 by using a neural network.

A 250MS/s 8 Bit CMOS folding and Interpolating AD Converter with 2 Stage Architecture (2단 구조를 사용한 250MS/s 8비트 CMOS 폴딩-인터폴레이팅 AD 변환기)

  • 이돈섭;곽계달
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.826-832
    • /
    • 2004
  • A CMOS 8 bit folding and interpolating ADC for an embedded system inside VLSI is presented in this paper. This folding ADC uses the 2 stage architecture for improving of nonlinearity. repeating the folding and interpolating twice. At a proposed structure, a transistor differential pair operates on the second folder. A ADC with 2 stage architecture reduces the number of comparators and resisters. So it is possible to provide small chip size, low power consumption and high operating speed. The design technology is based on fully standard 0.25m double-Poly 2 metal n-well CMOS Process. The simulated Power consumption is 45mW with an applied voltage of 2.5V and sampling frequency of 250MHz. The INL and DNL are within <ㅆㄸㅌ>$\pm$0.2LSB, respectively. The SNDR is approximately 45dB for input frequency of 10MHz.

Heterologous Expression of Rhizopus Oryzae CYP509C12 Gene in Rhizopus Nigricans Enhances Reactive Oxygen Species Production and 11α-Hydroxylation Rate of 16α, 17-Epoxyprogesterone

  • Shen, Chaohui;Gao, Xiyang;Li, Tao;Zhang, Jun;Gao, Yuqian;Qiu, Liyou;Zhang, Guang
    • Mycobiology
    • /
    • v.47 no.3
    • /
    • pp.301-307
    • /
    • 2019
  • The $11{\alpha}$-hydroxylation of $16{\alpha}$, 17-epoxyprogesterone (EP) catalyzed by Rhizopus nigricans is crucial for the steroid industry. However, lower conversion rate of the biohydroxylation restricts its potential industrial application. The $11{\alpha}$-steroid hydroxylase CYP509C12 from R. oryzae were reported to play a crucial role in the $11{\alpha}$-hydroxylation in recombinant fission yeast. In the present study, the CYP509C12 of R. oryzae (RoCYP) was introduced into R. nigricans using the liposome-mediated mycelial transformation. Heterologous expression of RoCYP resulted in increased fungal growth and improved intracellular reactive oxygen species content in R. nigricans. The $H_2O_2$ levels in RoCYP transformants were approximately 2-folder that of the R. nigricans wild type (RnWT) strain, with the superoxide dismutase activities increased approximately 45% and catalase activities decreased approximately 68%. Furthermore, the $11{\alpha}$-hydroxylation rates of EP in RoCYP transformants (C4, C6 and C9) were 39.7%, 38.3% and 38.7%, which were 12.1%, 8.2% and 9.4% higher than the rate of the RnWT strain, respectively. This paper investigated the effect of heterologous expression of RoCYP in R. nigricans, providing an effective genetic method to construct the engineered strains for steroid industry.

A study on application plan of access control requirements in ERMS Standard (ERMS 표준에 나타난 접근통제 요건의 적용방안에 관한 연구)

  • Cheon, Kwon-Ju
    • The Korean Journal of Archival Studies
    • /
    • no.18
    • /
    • pp.179-220
    • /
    • 2008
  • Under the physical records management system, both the records and users could be controlled and secured by closing the door of Archives or using permitted records which is used only approved users. According to the electronic records management system and the concept of service on the basis of users, we have to give up the classical manner. As an alternative, we have to consider the electronic access control system. To accomplish this purpose, functional requirements of ERMS that is issued by UK, EU, U.S and Australia must be compared and analyzed. On the basis of U.K ERMS which is more detailed, 'common access control functional requirements' are arranged. As the access control functional requirements is applied in the records classification scheme, we could find out how the access control is executed in ERMS.

Design and Implementation of Scheduler Applications for Efficient Daily Management (효율적 일상 관리를 위한 일정관리 어플리케이션의 설계와 구현)

  • Park, Eunju;Han, Seungjun;Yoon, Jimin;Lim, Hankyu
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.41-50
    • /
    • 2021
  • According to the progress of IT and data processing technology, the usage of internet increased rapidly and various smart devices are appearing. As such, modern people use smartphone to acquire informations they wish and also on daily life including leisure activity free of place. This study has designed and implemented schedule managing application that can help effective managing of our daily life, such as taking note of schedule and sharing appointments. The schedule managing application in this study offers diary taking, sharing the registrated schedule with other users on kakaotalk, saving the deleted schedule or diary to certain folder when users delete file, continuous alarm of daily schedule function together with schedule registration function. The application which is differentiated to other applications and raised usage is expected to effectively manage the busy everyday life.

Analysis of Malicious Behavior Towards Android Storage Vulnerability and Defense Technique Based on Trusted Execution Environment (안드로이드 저장소 취약점을 이용한 악성 행위 분석 및 신뢰실행환경 기반의 방어 기법)

  • Kim, Minkyu;Park, Jungsoo;Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.73-81
    • /
    • 2021
  • When downloading files using an app or web-based application on the user's mobile phone, the path is set to be saved in the pre-defined default directory. Many applications requiring access to storage, including file managers, require a write or read permission of storage to provide numerous functions and services. This means that the application will have direct access to the download folder where the numerous files downloaded. In this paper, to prove our feasibility of attack using the security vulnerabilities mentioned above, we developed a file hacking function disguised as an encryption function in the file management application. The file that encrypted will be sent to hackers via E-mail simultaneously on the background. The developed application was evaluated from VirusTotal, a malicious analysis engine, was not detected as a malicious application in all 74 engines. Finally, in this paper, we propose a defense technique and an algorithm based on the Trusted Execution Environment (TEE) to supplement these storage vulnerabilities.

Fault Diagnosis of Bearing Based on Convolutional Neural Network Using Multi-Domain Features

  • Shao, Xiaorui;Wang, Lijiang;Kim, Chang Soo;Ra, Ilkyeun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.5
    • /
    • pp.1610-1629
    • /
    • 2021
  • Failures frequently occurred in manufacturing machines due to complex and changeable manufacturing environments, increasing the downtime and maintenance costs. This manuscript develops a novel deep learning-based method named Multi-Domain Convolutional Neural Network (MDCNN) to deal with this challenging task with vibration signals. The proposed MDCNN consists of time-domain, frequency-domain, and statistical-domain feature channels. The Time-domain channel is to model the hidden patterns of signals in the time domain. The frequency-domain channel uses Discrete Wavelet Transformation (DWT) to obtain the rich feature representations of signals in the frequency domain. The statistic-domain channel contains six statistical variables, which is to reflect the signals' macro statistical-domain features, respectively. Firstly, in the proposed MDCNN, time-domain and frequency-domain channels are processed by CNN individually with various filters. Secondly, the CNN extracted features from time, and frequency domains are merged as time-frequency features. Lastly, time-frequency domain features are fused with six statistical variables as the comprehensive features for identifying the fault. Thereby, the proposed method could make full use of those three domain-features for fault diagnosis while keeping high distinguishability due to CNN's utilization. The authors designed massive experiments with 10-folder cross-validation technology to validate the proposed method's effectiveness on the CWRU bearing data set. The experimental results are calculated by ten-time averaged accuracy. They have confirmed that the proposed MDCNN could intelligently, accurately, and timely detect the fault under the complex manufacturing environments, whose accuracy is nearly 100%.

Appraisal Method for Similarity of Large File Transfer Software (대용량 파일 전송 소프트웨어의 동일성 감정 방법)

  • Chun, Byung-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.1
    • /
    • pp.11-16
    • /
    • 2021
  • The importance of software is increasing due to the development of information and communication, and software copyright disputes are also increasing. In this paper, the source of the submitted programs and the files necessary for the execution of the program were taken as the scope of analysis. The large-capacity file transfer solution program to be analyzed provides additional functions such as confidentiality, integrity, user authentication, and non-repudiation functions through digital signature and encryption of data.In this paper, we analyze the program A, program B, and the program C. In order to calculate the program similarity rate, the following contents are analyzed. Analyze the similarity of the package structure, package name, source file name in each package, variable name in source file, function name, function implementation source code, and product environment variable information. It also calculates the overall similarity rate of the program. In order to check the degree of agreement between the package structure and the package name, the similarity was determined by comparing the folder structure. It also analyzes the extent to which the package structure and package name match and the extent to which the source file (class) name within each package matches.

Development of Mobile Cloud Computing Client UI/UX based on Open Source SPICE (오픈소스 SPICE 기반의 모바일 클라우드 컴퓨팅 클라이언트 UI/UX 개발)

  • Jo, Seungwan;Oh, Hoon;Shim, Kyusung;Shim, Kyuhyun;Lee, Jongmyung;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.8
    • /
    • pp.85-92
    • /
    • 2016
  • Mobile cloud computing (MCC) is not just extensions of cloud concepts into mobile environments, but the service technologies that all mobile devices including smartphone can use the desired services by using cloud technology without the constraints of time and space. Currently, a lot of works on mobile cloud computing have been actively researching, whereas user interfaces are not so much researched. The main features and contributions of this paper are as follows. First, develop UI considering UX that is different from conventional interfaces supported by SPICE. Second, combine two button interface into one button interface when keyboard is used in mobile cloud computing clients. Third, develop a mouse interface suitable for mobile cloud computing clients. Fourth, in mobile cloud computing client, solve a problem that the selection of button/files/folder has at the corner. Finally, in mobile cloud computing clients we change mouse scroll mapping functions from volume button to scroll interface in touch-screen. The results of performance evaluation shows that users can input easily with the increased and fixed mouse interface. Since shortcut keys instead of the complex button keys of keyboard are provided, the input with 3-6 steps is reduced into 1 step, which can simply support complex keys and mouse input for users.