• Title/Summary/Keyword: Research Information Systems

Search Result 12,224, Processing Time 0.048 seconds

Extraction of Effective Carrier Velocity and Observation of Velocity Overshoot in Sub-40 nm MOSFETs

  • Kim, Jun-Soo;Lee, Jae-Hong;Yun, Yeo-Nam;Park, Byung-Gook;Lee, Jong-Duk;Shin, Hyung-Cheol
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.8 no.2
    • /
    • pp.115-120
    • /
    • 2008
  • Carrier velocity in the MOSFET channel is the main driving force for improved transistor performance with scaling. We report measurements of the drift velocity of electrons and holes in silicon inversion layers. A technique for extracting effective carrier velocity which is a more accurate extraction method based on the actual inversion charge measurement is used. This method gives more accurate result over the whole range of $V_{ds}$, because it does not assume a linear approximation to obtain the inversion charge and it does not limit the range of applicable $V_{ds}$. For a very short channel length device, the electron velocity overshoot is observed at room temperature in 37 nm MOSFETs while no hole velocity overshoot is observed down to 36 nm. The electron velocity of short channel device was found to be strongly dependent on the longitudinal field.

Why Your Manuscripts Were Rejected or Required a Major Revision: An Analysis of Asia Pacific Journal if Information Systems (MIS 논문의 '게재 불가' 및 '수정 후 재심사' 사유: Asia Pacific Journal of Information Systems 심사소견서 분석)

  • Lee, Choong-C.;Yun, Hae-Jung;Hwang, Seong-Hoon
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.179-193
    • /
    • 2009
  • As the common saying attests, a publish-or-perish world, publishing is absolutely critical for academic researchers' successful careers. It is the most objectively-accepted academic performance criteria and the most viable way to attain public and academic recognition. Asia Pacific Journal of Information Systems(APJIS) has been recognized as the most influential domestic journal in Korean MIS field since July, 1991. Therefore, publishing in APJIS means your research is original, valid, and contributive. While most researchers learn how to publish an article in APJIS through a repetitive review process, thereby improving their chance of the' accepted' through their personal trial and error experiences, such valuable lessons and know-how tend to be kept personally and rarely shared. However, useful insights into research and publication skills could be also gained from sharing others' errors, neglect, and misjudgments which are equally critical in improving researchers' knowledge in the field (Murthy and Wiggins, 2002). For this reason, other academic disciplines make systematic efforts to examine the paper review process of major journals and share the findings from these studies with the rest of the research community members (Beyer et al., 1995; Cummings et al, 1985; Daft, 1995; Jauch and Wall, 1989; Murthy and Wiggins, 2002). Recognizing the urgent need to provide such type of information to MIS research community in Korea, we have chosen the most influential academic journal, APJIS with an intention to share the answer to the following research question: "What are the common problems found in the manuscripts either 'rejected' or 'required a major revision' by APJIS reviewers?" This study analyzes the review results of manuscripts submitted to APJIS (from January, 2006 to October, 2008), particularly those that were 'rejected' or required a 'major revision' at the first round. Based on Daft's(1995) study, twelve most-likelihood problems were defined and used to analyze the reviews. The twelve criteria for classification, or "twelve problems", are as follows: No theory, Concepts and operationalization not in alignment, Insufficient definition--theory, Insufficient rationale--design, Macrostructure--organization and flow, Amateur style and tone, Inadequate research design, Not relevant to the field, Overengineering, Conclusions not in alignment, Cutting up the data, and Poor editorial practice. Upon the approval of the editorial board of APJIS, the total 252 reviews, including 11 cases of 2005 and 241 cases from July, 2006 to October, 2008, were received without any information about manuscripts, authors, or reviewers. Eleven cases of 2005 were used in the pilot test because the data of 2005 were not in complete enumeration, and the 241 reviews (113 cases of 'rejection' and 128 ones of 'major revision') of 2006, 2007, and 2008 were examined in this study. Our findings show that insufficient rationale-design(20.25%), no theory(18.45%), and insufficient definition--theory(15.69%) were the three leading reasons of 'rejection' and 'major revision.' Between these two results, the former followed the same order of three major reasons as an overall analysis (insufficient rationale-design, no theory, and insufficient definition-theory), but the latter followed the order of insufficient rationale--design, insufficient definition--theory, and no theory. Using Daft's three major skills-- 'theory skills', 'design skills', and 'communication skills'-- twelve criteria were reclassified into 'theory problems', 'design problems', and 'communication problems' to derive more practical implications of our findings. Our findings show that 'theory problems' occupied 43.48%, 'design problems' were 30.86%, and 'communication problems' were 25.86%. In general, the APJIS reviewers weigh each of these three problem areas almost equally. Comparing to other disciplines like management field shown in Daft's study, the portion of 'design problems' and 'communication problems' are much higher in manuscripts submitted to the APJIS than in those of Administrative Science Quarterly and Academy of Management Journal even though 'theory problems' are the most predominant in both disciplines.

Research on Managing Underground Facilities for an Intelligent City

  • Kim, Jung-Hoon;Lee, Jae-Yong
    • Spatial Information Research
    • /
    • v.16 no.4
    • /
    • pp.421-439
    • /
    • 2008
  • The objective of this project is to construct the intelligent underground facility management system based on UFSN (Underground Facility Sensor Network). Total project duration is 6-year. And first two years' project has been finished. First two years' project focused on water supply and sewage facilities among 7 underground facilities and investigated the fundamental construction technology for the underground facilities management system. To contribute the development of systematic and scientific management of underground facilities, KRIHS implemented 3 researches for 'Underground facilities management system for an intelligent city' like followings: (1) to investigate an integration plan for current water supply and sewage management systems, (2) to derivate of water supply and sewage monitoring items for the monitoring technology development, and (3) to implement a basic research for sensor installation plans on different types of current and new underground facility systems. This research paper contains the first two years' outcome of researches from KRIHS (Korea Research Institute for Human Settlements).

  • PDF

A Study on the Improvement of Research Support System for National R&D Projects Using Blockchain (블록체인을 활용한 국가연구개발사업 연구지원시스템 개선 방안 연구)

  • Donghwan Lee;Seungwook Park
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.2
    • /
    • pp.47-60
    • /
    • 2023
  • This study proposed to adopt consortium blockchain for the database in the research support system of national R&D projects in order to increase efficiency, to reduce administrative burden, and to promote transparent research environment focusing on servicing researchers. Specifically, storage methods were classified according to data characteristics. First, data that requires integrity and transparency is stored in the blockchain, Second, confidentiality and data that require modification and deletion are stored in the database, Third, data that requires confidentiality, integrity, and transparency at the same time stores the original in the database, and the hash value of the data is separately stored in the blockchain. If research support system adopts blockchain, it is possible to operate the system stably, to share quick exchange of information between research institutes, to reduce administrative burden, to improve transparency of process, to resolve asymmetry of information, and to secure integrity, confidentiality, and availability of data.

The IPSec Systems on TOE for Gigabit Network (기가비트 네트워크 지원을 위한 TOE 기반 IPSec 시스템)

  • Shin, Chi-Hoon;Kim, Sun-Wook;Park, Kyoung;Kim, Sung-Woon
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1035-1038
    • /
    • 2005
  • This paper describes the designs and the implementations of two H/W IPSec Systems, look-aside and inline, on TOE (Transport Offloading Engine). These systems aim for guaranteeing the security of datagram networks while preserving the bandwidth of gigabit networks. The TOE offloads a host CPU from network burdens, so that it makes the gigabit wire speed possible, and then deeper level security architecture of the IPSec guarantees the security of gigabit service network dominated by datagram packets. The focus of this paper is to minimize the TOE's performance degradation caused by the computation-oriented IPSec. The look-aside IPSec system provides a significant improvement in the CPU offload of the IPSec cryptography loads. However, the inline system completely offloads the host CPU from whole IPSec loads, providing significant additional cost saving compared to the look-aside system. In this paper, the implementations of TOE cards including commercial IPSec processors are presented. As the result of performance evaluation with the protocol analyzer, we can get the fact that the inline IPSec system is 8 times faster than the S/W system and 2 times faster than the look-aside system.

  • PDF

Laboratory Environment Monitoring: Implementation Experience and Field Study in a Tertiary General Hospital

  • Kang, Seungjin;Baek, Hyunyoung;Jun, Sunhee;Choi, Soonhee;Hwang, Hee;Yoo, Sooyoung
    • Healthcare Informatics Research
    • /
    • v.24 no.4
    • /
    • pp.371-375
    • /
    • 2018
  • Objectives: To successfully introduce an Internet of Things (IoT) system in the hospital environment, this study aimed to identify issues that should be considered while implementing an IoT based on a user demand survey and practical experiences in implementing IoT environment monitoring systems. Methods: In a field test, two types of IoT monitoring systems (on-premises and cloud) were used in Department of Laboratory Medicine and tested for approximately 10 months from June 16, 2016 to April 30, 2017. Information was collected regarding the issues that arose during the implementation process. Results: A total of five issues were identified: sensing and measuring, transmission method, power supply, sensor module shape, and accessibility. Conclusions: It is expected that, with sufficient consideration of the various issues derived from this study, IoT monitoring systems can be applied to other areas, such as device interconnection, remote patient monitoring, and equipment/environmental monitoring.

A Fair Radio Resource Allocation Algorithm for Uplink of FBMC Based CR Systems

  • Jamal, Hosseinali;Ghorashi, Seyed Ali;Sadough, Seyed Mohammad-Sajad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1479-1495
    • /
    • 2012
  • Spectrum scarcity seems to be the most challenging issue to be solved in new wireless telecommunication services. It is shown that spectrum unavailability is mainly due to spectrum inefficient utilization and inappropriate physical layer execution rather than spectrum shortage. Daily increasing demand for new wireless services with higher data rate and QoS level makes the upgrade of the physical layer modulation techniques inevitable. Orthogonal Frequency Division Multiple Access (OFDMA) which utilizes multicarrier modulation to provide higher data rates with the capability of flexible resource allocation, although has widely been used in current wireless systems and standards, seems not to be the best candidate for cognitive radio systems. Filter Bank based Multi-Carrier (FBMC) is an evolutionary scheme with some advantages over the widely-used OFDM multicarrier technique. In this paper, we focus on the total throughput improvement of a cognitive radio network using FBMC modulation. Along with this modulation scheme, we propose a novel uplink radio resource allocation algorithm in which fairness issue is also considered. Moreover, the average throughput of the proposed FBMC based cognitive radio is compared to a conventional OFDM system in order to illustrate the efficiency of using FBMC in future cognitive radio systems. Simulation results show that in comparison with the state of the art two algorithms (namely, Shaat and Wang) our proposed algorithm achieves higher throughputs and a better fairness for cognitive radio applications.

A Study on the design of Database for photograph of Road Facilities (도로시설물 관리를 위한 Photo Database 설계에 관한 연구)

  • 엄우학;정동훈;김정현;김병국
    • Spatial Information Research
    • /
    • v.11 no.1
    • /
    • pp.33-40
    • /
    • 2003
  • For effective management of information about establishment and repair of road and road facilities, we built GPS-Van mapping system that CCD Cameras, GPS receivers and INS are integrated and using it surveyed test area. Suggested a scheme that possible put acquired data into photo database systematically. Prototype of road facilities management system using the database shows us that extraction of qualitative information and management are possible through relation attribute information. And it raise cognitive faculty of user about objects using field photographs.

  • PDF

The Effects of Training for Computer Skills on Outcome Expectations, Ease of Use, Self-Efficacy and Perceived Behavioral Control

  • Lee, Min-Hwa
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1996.11a
    • /
    • pp.29-48
    • /
    • 1996
  • Previous studies on user training have largely focused on assessing models which describe the determinants of information technology usage or examined the effects of training on user satisfaction, productivity, performance, and so on. Scant research efforts have been made, however, to examine those effects of training by using theoretical models. This study presented a conceptual model to predict intention to use information technology and conducted an experiment to understand how training for computer skill acquisition affects primary variables of the model. The data were obtained from 32 student subjects of an experimental group and 31 students of a control group, and the information technology employed for this study was a university's electronic mail system. The study results revealed that attitude toward usage and perceived behavioral control helped to predict user intentions; outcome expectations were positively related to attitude toward usage; and self - efficacy and perceived behavioral control. The changes in those variables suggest more causal effects of user training than other survey studies.

  • PDF

Mitigating Threats and Security Metrics in Cloud Computing

  • Kar, Jayaprakash;Mishra, Manoj Ranjan
    • Journal of Information Processing Systems
    • /
    • v.12 no.2
    • /
    • pp.226-233
    • /
    • 2016
  • Cloud computing is a distributed computing model that has lot of drawbacks and faces difficulties. Many new innovative and emerging techniques take advantage of its features. In this paper, we explore the security threats to and Risk Assessments for cloud computing, attack mitigation frameworks, and the risk-based dynamic access control for cloud computing. Common security threats to cloud computing have been explored and these threats are addressed through acceptable measures via governance and effective risk management using a tailored Security Risk Approach. Most existing Threat and Risk Assessment (TRA) schemes for cloud services use a converse thinking approach to develop theoretical solutions for minimizing the risk of security breaches at a minimal cost. In our study, we propose an improved Attack-Defense Tree mechanism designated as iADTree, for solving the TRA problem in cloud computing environments.