• Title/Summary/Keyword: Protect Device

Search Result 385, Processing Time 0.023 seconds

A Radiation-hardened Model Design of CMOS Digital Logic Circuit for Nuclear Power Plant IC and its Total Radiation Damage Analysis (원전용 IC를 위한 CMOS 디지털 논리회로의 내방사선 모델 설계 및 누적방사선 손상 분석)

  • Lee, Min-Woong;Lee, Nam-Ho;Kim, Jong-Yeol;Cho, Seong-Ik
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.6
    • /
    • pp.745-752
    • /
    • 2018
  • ICs(Integrated circuits) for nuclear power plant exposed to radiation environment occur malfunctions and data errors by the TID(Total ionizing dose) effects among radiation-damage phenomenons. In order to protect ICs from the TID effects, this paper proposes a radiation-hardening of the logic circuit(D-latch) which used for the data synchronization and the clock division in the ICs design. The radiation-hardening technology in the logic device(NAND) that constitutes the proposed RH(Radiation-hardened) D-latch is structurally more advantageous than the conventional technologies in that it keeps the device characteristics of the commercial process. Because of this, the unit cell based design of the RH logic device is possible, which makes it easier to design RH ICs, including digital logic circuits, and reduce the time and cost required in RH circuit design. In this paper, we design and modeling the structure of RH D-latch based on commercial $0.35{\mu}m$ CMOS process using Silvaco's TCAD 3D tool. As a result of verifying the radiation characteristics by applying the radiation-damage M&S (Modeling&Simulation) technique, we have confirmed the radiation-damage of the standard D-latch and the RH performance of the proposed D-latch by the TID effects.

A Study on Establishment of Essential Performance Evaluation Criteria for C-arm Computed Tomography (C-arm CT의 필수 성능평가 기준 마련을 위한 연구)

  • Kim, Eun-Hye;Park, Hye-Min;Kim, Jung-Min
    • Journal of radiological science and technology
    • /
    • v.45 no.2
    • /
    • pp.127-134
    • /
    • 2022
  • In order to overcome the image quality limitations of the conventional C-arm, a flat panel detector (FPD) is used to enhance spatial resolution, detective quantum efficiency, frame rate, and dynamic range. Three-dimensional (3D) visualized information can be obtained from C-arm computed tomography (CT) equipped with an FPD, which can reduce patient discomfort and provide various medical information to health care providers by conducting procedures in the interventional procedure room without moving the patient to the CT scan room. Unlike a conventional C-arm device, a C-arm CT requires different basic safety and essential performance evaluation criteria; therefore, in this study, basic safety and essential performance evaluation criteria to protect patients, medical staff, and radiologists were derived based on International Electrotechnical Commission (IEC) standards, the Ministry of Food and Drug Safety (MFDS) standards in Korea, and the rules on the installation and operation of special medical equipment in Korea. As a result of the study, six basic safety evaluation criteria related to electrical and mechanical radiation safety (leakage current, collision protection, emergency stopping device, overheating, recovery management, and ingress of water or particulate matter into medical electrical (ME) equipment and ME systems: footswitches) and 14 essential performance evaluation criteria (accuracy of tube voltage, accuracy of tube current, accuracy of loading time, accuracy of current time product, reproducibility of radiation output, linearity and consistency in radiography, half layer value in X-ray equipment, focal size and collimator, relationship between X-ray field and image reception area, consistency of light irradiation versus X-ray irradiation, performance of the mechanical device, focal spot to skin distance accuracy, image quality evaluation, and technical characteristic of cone-beam computed tomography) were selected for a total of 20 criteria.

Message Security Level Integration with IoTES: A Design Dependent Encryption Selection Model for IoT Devices

  • Saleh, Matasem;Jhanjhi, NZ;Abdullah, Azween;Saher, Raazia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.328-342
    • /
    • 2022
  • The Internet of Things (IoT) is a technology that offers lucrative services in various industries to facilitate human communities. Important information on people and their surroundings has been gathered to ensure the availability of these services. This data is vulnerable to cybersecurity since it is sent over the internet and kept in third-party databases. Implementation of data encryption is an integral approach for IoT device designers to protect IoT data. For a variety of reasons, IoT device designers have been unable to discover appropriate encryption to use. The static support provided by research and concerned organizations to assist designers in picking appropriate encryption costs a significant amount of time and effort. IoTES is a web app that uses machine language to address a lack of support from researchers and organizations, as ML has been shown to improve data-driven human decision-making. IoTES still has some weaknesses, which are highlighted in this research. To improve the support, these shortcomings must be addressed. This study proposes the "IoTES with Security" model by adding support for the security level provided by the encryption algorithm to the traditional IoTES model. We evaluated our technique for encryption algorithms with available security levels and compared the accuracy of our model with traditional IoTES. Our model improves IoTES by helping users make security-oriented decisions while choosing the appropriate algorithm for their IoT data.

Electromagnetic and Thermal Information Utilization System to Improve The Success Rate of Laser Fault Injection Attack (레이저 오류 주입 공격 성공률 향상을 위한 전자파 및 열 정보 활용 시스템)

  • Mun, HyeWon;Ji, Jae-deok;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.965-973
    • /
    • 2022
  • As IoT(Internet of Things) devices become common, many algorithms have been developed to protect users' personal information. The laser fault injection attack that threatens those algorithms is a side-channel analysis that intentionally injects a laser beam to the outside of a device to acquire confidential information or abnormal privileges of the system. There are many studies to determine the timing of fault injection to reduce the number of necessary fault injections, but the location to inject faults is only repeatedly searched for the entire area of the device. However, when fault injection is performed in an algorithm-independent area, the attacker cannot obtain the intended faulted statement or attempt to bypass authentication, so finding areas vulnerable to fault injection and performing an attack is an important consideration in achieving a high attack success rate. In this paper, we show that a 100% attack success rate can be achieved by determining the vulnerable areas for fault injection by using electromagnetic and thermal information generated from the device's chip. Based on this, we propose an efficient fault injection attack system.

Resource Allocation Scheme for Multiple Device-to-Device Communications in a Multicell Network (다중 셀 네트워크에서 다중 D2D 통신 자원할당 기법)

  • Kim, Hyeon-Min;Kang, Gil-Mo;Shin, Oh-Soon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.18-25
    • /
    • 2016
  • In D2D communications underlaying a multicell network, it is of primary importance to ensure coexistence of cellular links and D2D links with minimal interference. Therefore, resource allocation scheme for D2D links should be designed to limit the interference between cellular links and D2D links. In this paper, we propose an effective resource allocation scheme for multiple D2D links which share the uplink spectrum resource with cellular users in a multicell network. Under the assumption that the locations of users are known to the base station, the proposed scheme allocates cellular resources to D2D links, such that the interference between a cellular link and multiple D2D links is minimized. In particular, we compute two constants from the path loss model and then use the constants to protect both cellular and D2D links. Simulation results are provided to verify the performance of the proposed scheme.

Low-k Polymer Composite Ink Applied to Transmission Line (전송선로에 적용한 Low-k 고분자 복합 잉크 개발)

  • Nam, Hyun Jin;Jung, Jae-Woong;Seo, Deokjin;Kim, Jisoo;Ryu, Jong-In;Park, Se-Hoon
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.29 no.2
    • /
    • pp.99-105
    • /
    • 2022
  • As the chip size gets smaller, the width of the electrode line is also fine, and the density of interconnections is increasing. As a result, RC delay is becoming a problem due to the difference in resistance between the capacitor layer and the electrical conductivity layer. To solve this problem, the development of electrodes with high electrical conductivity and dielectric materials with low dielectric constant is required. In this study, we developed low dielectric ink by mixing commercial PSR which protect PCB's circuits from external factors and PI with excellent thermal property and low-k characteristics. As a result, the ink mixture of PSR and PI 10:3 showed the best results, with a dielectric constant of about 2.6 and 2.37 at 20 GHz and 28 GHz, respectively, and dielectric dissipation was measured at about 0.022 and 0.016. In order to verify the applicability of future applications, various line-width transmission lines produced on Teflon were evaluated, and as a result, the loss of transmission lines using low dielectric ink mixed with PI was 0.12 dB less on average in S21 than when only PSR was used.

Door Control Unit Create Provision for PID Control DB (도어제어장치(DCU)의 PID Control DB 생성장치)

  • Kim, Jin-Heon;Kwon, Young-Hyun;Seong, Chang-Yong;Kwon, Min-Jeong;Lee, Han-Su
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.3065-3072
    • /
    • 2011
  • PID Control Data Base creation device of DCU is safety operation technology of train door. For keeping the normal condition of door, measured value of regular condition and unusual(trouble detected) condition should be recorded by encoding. The door should be measured itself as this value is compared with standard vale. If it's condition of the door and for reaching the datum point and ot does self-diagnosis. This aim for Technical Realization is that carry out safety train operation by using the Estimation Data Base and protect before door-trouble.

  • PDF

Nanocomposites for microelectronic packaging

  • Lee, Sang-Hyeon
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.99.1-99.1
    • /
    • 2016
  • The materials for an electronic packaging provide diverse important functions including electrical contact to transfer signals from devices, isolation to protect from the environment and a path for heat conduction away from the devices. The packaging materials composed of metals, ceramics, polymers or combinations are crucial to the device operating properly and reliably. The demand of effective charge and heat transfer continuous to be challenge for the high-speed and high-power devices. Nanomaterials including graphene, carbon nanotube and boron nitride, have been designed for the purpose of exploiting the high thermal, electrical and mechanical properties by combining in the matrix of metal or polymer. In addition, considering the inherent electrical and surface properties of graphene, it is expected that graphene would be a good candidate for the surface layer of a template in the electroforming process. In this talk, I will present recent our on-going works in nanomaterials for microelectronic packaging: 1) porous graphene/Cu for heat dissipations, 2) carbon-metal composites for interconnects and 3) nanomaterials-epoxy composites as a thermal interface materials for electronic packaging.

  • PDF

Currant Source GTO Inverter with Double Recovery Path of Commutation Energy by LCD (수동소자에 의한 축적에너지 2중 궤환방식 전류형 GTO 인버터의 입.출력 특성)

  • Kim, Jin-Pyo;Choi, Sang-Won;Lee, Jong-Ha
    • Proceedings of the KIEE Conference
    • /
    • 1997.07f
    • /
    • pp.2104-2106
    • /
    • 1997
  • In order to develop the three phase GTO CSI with double recovery path of commutation energy by passive devices (LCD), we studied the clamping circuit to protect switching device and energy recovery circuit to recover absorbed energy of capacitor and DC inductor. In this paper, we investigated how DC input power is increased or decreased according to energy recovery path with or not in the three phase GTO current source inverter, we used a induction motor as inverter load, and controlled a induction motor with v/f constant control. Experimental results show that dissipated DC power is decreased in $9{\sim}14%$ by double recovery path. We also confirmed that the characteristics is met as compare simulation results with experimental results according to each frequency.

  • PDF

The Switching Surge Reduction Device of High Voltage motor (고압전동기(高壓電動機) SWITCHING SURGE 저감방안(低減方案))

  • Kim, Jong-Kyeom;Lee, Eun-Woong;Kim, Il-Jung
    • Proceedings of the KIEE Conference
    • /
    • 1991.07a
    • /
    • pp.86-89
    • /
    • 1991
  • In recent years, Vacuum Circuit Breaker(VCB) has been widely used to enhance the confidence and at the same time to ease maintenance of waterworks requipment as the power supply breaker of high voltage motor. When making and breaking the sources as VCB the powerful surge voltage, repetitive reignition phenomenon resulted from exceeding inter-pole endurance voltage of CB, has occured. It has transmitted to the winding of motor stator through the cable, and this surge voltage is repeated over and over again before finishing making and breaking action of CB according to cumulation of repetitive reignition surge, motor has become burned in the end. This paper describes surge voltage occuring in making and breaking of VCB as circuit parameters by transient phenonenon and examines closely the variance of peak values, wavefront-length, wavetail-length, when changing inductance and capacitance of a cable. Finally we will expect to protect motor winding breakdown from surge voltage through parallel connection of suitable-size in the motor.

  • PDF