• Title/Summary/Keyword: HIT

Search Result 1,318, Processing Time 0.028 seconds

스퍼터링법으로 증착한 실리콘 태양전지 전극용 Indium Tin Oxide 박막의 전기적 및 광학적 물성

  • Sim, Seong-Min;Chu, Dong-Il;Lee, Dong-Uk;Kim, Eun-Gyu
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2013.08a
    • /
    • pp.211.2-211.2
    • /
    • 2013
  • ITO (indium tin oxide)는 스마트폰을 비롯한 여러전자제품의 터치패널 투명전극으로 가장 많이 쓰이고 있는 물질이다. 산화 인듐(In2O3)과 산화 주석(SnO2)의 화합물로 우수한 전기적 특성과 광학적 특성을 지녀 태양전지 분야에서도 그 활용가능성이 높다. 또한 최근 고효율 태양전지인 HIT (heterojunction with intrinsic thin layer) solar cell의 경우 Si 기판의 두께가 얇고, 소자의 양면에서 태양광을 흡수하여 효율을 증가 시키데, 특히 투명 전극의 물리적 특성들과 계면의 트랩의 상태가 효율에 영향을 미친다. 본 연구에서는 HIT Si 기판의 태양전지 구조에 전극으로 쓰일 ITO 박막을 sputtering 방법으로 증착하여 물리적 특성을 연구하였다. ITO 타겟을 활용한 radio frequency magnetron sputtering 방법으로 Si 기판에 ITO 박막을 증착하였다. 50W의 방전전력과 Ar 10 sccm 분위기에서 성장시킨 ITO 박막을 Transmission Electron Microscope 로 측정하였다. X-ray Diffraction 측정으로 ITO 결정의 방향성을 확인하고 Photoluminescence 측정으로 성장된 ITO 박막의 밴드갭 에너지를 확인하였다. $100^{\circ}C$, $200^{\circ}C$, $300^{\circ}C$, $400^{\circ}C$에서 후열처리한박막의 광 투과율, 비저항, 이동도를 측정 비교하여 적절한 후열처리 온도를 찾는 연구를 진행하였다. Sputtering 방법으로 성장시킨 ITO 박막의 전기적, 광학적 특성을 측정하여 HIT solar cell에 활용될 가능성을 확인하였다.

  • PDF

Study of the Bomb Hit Indication of Moving Target Using Weapon Data Link Message (무장데이터링크 메시지를 이용한 기동표적 타격평가 연구)

  • Baek, Inhye;Woo, Sang Hyo;Kim, Ki Bum
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.2
    • /
    • pp.187-196
    • /
    • 2021
  • The Network-Centric warfare over weapon data link networks has been developed for the recent decade. Since the US navy had begun to develop tactical digital information chain, it has gradually transformed into weapon data link technology. As data link network system and its protocol have been advanced into high-technology, focusing and targeting on moving targets become possible in net-enabled environments. However, it is difficult to identify the primary information from numerous battlefields and understanding approaches to damage a target in a timely manner. In this paper, to better understand the targeting assessment, we suggest a specific solution: Bomb Hit Indication(BHI) using information in weapon data link messages. In order to prove our suggestion, we implement the BHI solution and apply it into the weapon data link integrating system.

Distributed Construction of the Recrystallization Topology and Efficient Searching in the Unstructured Peer-to-Peer Network (재결정 위상의 분산적 구성과 비구조적 피어투피어 망에서의 효율적 검색)

  • Park, Jae-Hyun
    • Journal of KIISE:Information Networking
    • /
    • v.35 no.4
    • /
    • pp.251-267
    • /
    • 2008
  • In this paper, we present a distributed topology control algorithm for constructing an optimized topology having a minimal search-time in unstructured peer-to-peer network. According to the proposed algorithm, each node selects the best nodes having higher hit-ratio than other nodes as many as the number being exponentially proportional to the hit-ratio of the node itself, and then it connects to them. The ensemble behavior of the proposed algorithm is very similar to the recrystrallizing phenomenon that is observed in nature. There is a partial order relationship among the hit-ratios of most nodes of constructed topology. Therefore once query message visits a node, it has a higher hit-ratio than the node that was visited last by the message. The query message even sent from freeloader can escape to the node having high hit-ratio by one hop forwarding, and it never revisits any freeloader again. Thus the search can be completed within a limited search time. We also propose the Chain-reactive search scheme using the constructed topology. Such a controlled multicasting reduces the query messages by 43 percent compared to that of the naive Gnutella using broadcasting, while it saves the search time by 94 percent. The search success rate of the proposed scheme is 99 percent.

Collaboration and Node Migration Method of Multi-Agent Using Metadata of Naming-Agent (네이밍 에이전트의 메타데이터를 이용한 멀티 에이전트의 협력 및 노드 이주 기법)

  • Kim, Kwang-Jong;Lee, Yon-Sik
    • The KIPS Transactions:PartD
    • /
    • v.11D no.1
    • /
    • pp.105-114
    • /
    • 2004
  • In this paper, we propose a collaboration method of diverse agents each others in multi-agent model and describe a node migration algorithm of Mobile-Agent (MA) using by the metadata of Naming-Agent (NA). Collaboration work of multi-agent assures stability of agent system and provides reliability of information retrieval on the distributed environment. NA, an important part of multi-agent, identifies each agents and series the unique name of each agents, and each agent references the specified object using by its name. Also, NA integrates and manages naming service by agents classification such as Client-Push-Agent (CPA), Server-Push-Agent (SPA), and System-Monitoring-Agent (SMA) based on its characteristic. And, NA provides the location list of mobile nodes to specified MA. Therefore, when MA does move through the nodes, it is needed to improve the efficiency of node migration by specified priority according to hit_count, hit_ratio, node processing and network traffic time. Therefore, in this paper, for the integrated naming service, we design Naming Agent and show the structure of metadata which constructed with fields such as hit_count, hit_ratio, total_count of documents, and so on. And, this paper presents the flow of creation and updating of metadata and the method of node migration with hit_count through the collaboration of multi-agent.

A study of estimating the hit probability and confidence level considering the characteristic of Precision Guided Missile (정밀유도무기 특성을 고려한 명중률 및 신뢰수준 산정방안)

  • Seo, Bo-Gil;Hong, Seok-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.193-197
    • /
    • 2016
  • The performance of Precision Guided Missiles is estimated by using hit probability only, which is calculated by hits against total amounts of fires in current domestic live-fire tests. It has a limitation in judging the performance of all produced Precision Guided Missiles by using the calculated hit probability according to the result of live-fire test, because the overall characteristics of the produced Precision Guided Missiles are not considered. In other words, a method is needed to estimate the confidence level which is more reliable than simply calculated hit probability according to the result of live-fire test for guaranteeing the hit probability of Precision Guided Missiles by certain level, which is already being operated or produced. This paper introduces a method to estimate the confidence level of Precision Guided Missiles by minimum live-fire tests using Hypergeometric distribution and Bayes' rule suitable for the characteristics of Precision Guided Missiles, which are small production, high costs and unable to check whether the missile hits the target or not before the live-fire tests. Also, this paper suggests a reasonable confidence level for showing the performance of the Precision Guided Missiles using the results of live-fire tests and domestic and foreign literature, when the result of live-fire tests will be decided.

Preference-Based Segment Buffer Replacement in Cluster VOD Servers (클러스터 VOD서버에서 선호도 기반 세그먼트 버퍼 대체 기법)

  • Seo, Dong-Mahn;Lee, Joa-Hyoung;Bang, Cheol-Seok;Lim, Dong-Sun;Jung, In-Bum;Kim, Yoon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.11
    • /
    • pp.797-809
    • /
    • 2006
  • To support the QoS streams for large scale clients, the internal resources of VOD servers should be utilized based on the characteristics of the streaming media service. Among the various resources in the server, the main memory is used for the buffer space to the media data loaded from the disks and the buffer hit ratio has a great impact upon the server performance. However, if the buffer data with high hit ratio are replaced for the new media data as a result of the number of clients and the required movie titles are increased, the negative impact on the scalability of server performance is occurred. To address this problem, the buffer replacement policy considers the intrinsic characteristics of the streaming media such as the sequential access to large volume data and the highly disproportionate preference to specific movies. In this paper, the preference-based segment buffer replacement policy is proposed in the cluster-based VOD server to exploit the characteristics of the streaming media. Since the proposed method reflects both the temporal locality by the clients' preference and the spatial locality by the sequential access to media data, the buffer hit ratio would be improved as compared to the existing buffer replacement policy. The enhanced buffer hit ratio causes the fact that the performance scalability of the cluster-based VOD server is linearly improved as the number of cluster nodes is increased.

Adaptive Migration Path Technique of Mobile Agent Using the Metadata of Naming Agent (네이밍 에이전트의 메타데이터를 이용한 이동 에이전트의 적응적 이주 경로 기법)

  • Kim, Kwang-Jong;Ko, Hyun;Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.165-175
    • /
    • 2007
  • The mobile agent executes a given task by which the agent code moves to the server directly. Therefore, node migration method becomes an important factor which impact on the whole performance of distributed system. In this paper, we propose an adaptive migration path technique of mobile agent using the metadata of naming agent. In this proposed technique, node selection for migration depends on the content of referenced metadata, and the reliability of migrated information is determined by the metadata updating method and cooperative operations of individual agents in multi-agents system. For these, we design the metadata using by the number of hit documents, hit ratio, node processing time and network delay time, and describe the methods for creating, using and updating metadata for which determine the adaptive node migration path of mobile agent according to the cooperation of individual agents and number of hit documents using by designed metadata. And results of evaluated performance for proposed adaptive migration path technique through the proper experiment and analysis gain rate of high effective information earning, because of high hit ratio(72%) about of fathered documents by case of applying metadata move to the 13 nodes. But, in case of non-applying metadata is hit ratio(46%) of gathered documents and rate of effective information earning about of 26 nodes is 36.8%.

  • PDF

The comparison of the BAD and the BCD methods in a P300-based concealed information test (P300 숨긴정보검사에서 BAD 방법과 BCD 방법의 비교)

  • Eom, Jin-Sup
    • Korean Journal of Forensic Psychology
    • /
    • v.12 no.2
    • /
    • pp.151-169
    • /
    • 2021
  • In the P300-based concealed information test, most commonly used methods to detect whether a subject is lying are the bootstrapped amplitude difference (BAD) and the bootstrap correlation difference (BCD). Previous studies comparing the accuracy of the two methods reported inconsistent results. Most studies showed that the BAD is more accurate than the BCD, but some studies found that the BCD had a higher accuracy rate than the BAD. The purpose of the study is to identify conditions where the each method has higher accuracy compared to the other. In the result of Monte Carlo study, the false alarm rate of the BAD was generally higher than that of the BCD, and the hit rate of the BAD was higher than that of the BCD. Compared to the condition where the P300 latencies of probe and irrelevant were similar, the hit rate of the BCD was decreased when the P300 latency of probe was about 100 ms faster, and the hit rate of the BCD was increased when the P300 latency of probe was about 100 ms slower. When the P300 amplitude of the probe was slightly larger than that of the irrelevant and the P300 latency of probe was longer than that of target, the hit rate of the BCD was higher than that of the BAD. The reason why the false alarm rate of the BAD is higher than that of BCD and why the hit rate of the BCD is affected by the P300 latency of the probe were discussed.

A New Item Recommendation Procedure Using Preference Boundary

  • Kim, Hyea-Kyeong;Jang, Moon-Kyoung;Kim, Jae-Kyeong;Cho, Yoon-Ho
    • Asia pacific journal of information systems
    • /
    • v.20 no.1
    • /
    • pp.81-99
    • /
    • 2010
  • Lately, in consumers' markets the number of new items is rapidly increasing at an overwhelming rate while consumers have limited access to information about those new products in making a sensible, well-informed purchase. Therefore, item providers and customers need a system which recommends right items to right customers. Also, whenever new items are released, for instance, the recommender system specializing in new items can help item providers locate and identify potential customers. Currently, new items are being added to an existing system without being specially noted to consumers, making it difficult for consumers to identify and evaluate new products introduced in the markets. Most of previous approaches for recommender systems have to rely on the usage history of customers. For new items, this content-based (CB) approach is simply not available for the system to recommend those new items to potential consumers. Although collaborative filtering (CF) approach is not directly applicable to solve the new item problem, it would be a good idea to use the basic principle of CF which identifies similar customers, i,e. neighbors, and recommend items to those customers who have liked the similar items in the past. This research aims to suggest a hybrid recommendation procedure based on the preference boundary of target customer. We suggest the hybrid recommendation procedure using the preference boundary in the feature space for recommending new items only. The basic principle is that if a new item belongs within the preference boundary of a target customer, then it is evaluated to be preferred by the customer. Customers' preferences and characteristics of items including new items are represented in a feature space, and the scope or boundary of the target customer's preference is extended to those of neighbors'. The new item recommendation procedure consists of three steps. The first step is analyzing the profile of items, which are represented as k-dimensional feature values. The second step is to determine the representative point of the target customer's preference boundary, the centroid, based on a personal information set. To determine the centroid of preference boundary of a target customer, three algorithms are developed in this research: one is using the centroid of a target customer only (TC), the other is using centroid of a (dummy) big target customer that is composed of a target customer and his/her neighbors (BC), and another is using centroids of a target customer and his/her neighbors (NC). The third step is to determine the range of the preference boundary, the radius. The suggested algorithm Is using the average distance (AD) between the centroid and all purchased items. We test whether the CF-based approach to determine the centroid of the preference boundary improves the recommendation quality or not. For this purpose, we develop two hybrid algorithms, BC and NC, which use neighbors when deciding centroid of the preference boundary. To test the validity of hybrid algorithms, BC and NC, we developed CB-algorithm, TC, which uses target customers only. We measured effectiveness scores of suggested algorithms and compared them through a series of experiments with a set of real mobile image transaction data. We spilt the period between 1st June 2004 and 31st July and the period between 1st August and 31st August 2004 as a training set and a test set, respectively. The training set Is used to make the preference boundary, and the test set is used to evaluate the performance of the suggested hybrid recommendation procedure. The main aim of this research Is to compare the hybrid recommendation algorithm with the CB algorithm. To evaluate the performance of each algorithm, we compare the purchased new item list in test period with the recommended item list which is recommended by suggested algorithms. So we employ the evaluation metric to hit the ratio for evaluating our algorithms. The hit ratio is defined as the ratio of the hit set size to the recommended set size. The hit set size means the number of success of recommendations in our experiment, and the test set size means the number of purchased items during the test period. Experimental test result shows the hit ratio of BC and NC is bigger than that of TC. This means using neighbors Is more effective to recommend new items. That is hybrid algorithm using CF is more effective when recommending to consumers new items than the algorithm using only CB. The reason of the smaller hit ratio of BC than that of NC is that BC is defined as a dummy or virtual customer who purchased all items of target customers' and neighbors'. That is centroid of BC often shifts from that of TC, so it tends to reflect skewed characters of target customer. So the recommendation algorithm using NC shows the best hit ratio, because NC has sufficient information about target customers and their neighbors without damaging the information about the target customers.