• Title/Summary/Keyword: Threshold Point

Search Result 507, Processing Time 0.031 seconds

3-D Characterizing Analysis of Buried-Channel MOSFETs (매몰공핍형 MOS 트랜지스터의 3차원 특성 분석)

  • Kim, M. H.
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2000.08a
    • /
    • pp.162-163
    • /
    • 2000
  • We have observed the short-channel effect, narrow-channel effect and small-geometry effect in terms of a variation of the threshold voltage. For a short-channel effect the threshold voltage was largely determined by the DIBL effect which stimulates more carrier injection in the channel by reducing the potential barrier between the source and channel. The effect becomes more significant for a shorter-channel device. However, the potential, field and current density distributions in the channel along the transverse direction showed a better uniformity for shorter-channel devices under the same voltage conditions. The uniformity of the current density distribution near the drain on the potential minimum point becomes worse with increasing the drain voltage due to the enhanced DIBL effect. This means that considerations for channel-width effect should be given due to the variation of the channel distributions for short-channel devices. For CCDs which are always operated at a pinch-off state the channel uniformity thus becomes significant since they often use a device structure with a channel length of > 4 ${\mu}{\textrm}{m}$ and a very high drain (or diffusion) voltage. (omitted)

  • PDF

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

An Enhancement of Image Segmentation Using Modified Watershed Algorithm

  • Kwon, Dong-Jin
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.81-87
    • /
    • 2022
  • In this paper, we propose a watershed algorithm that applies a high-frequency enhancement filter to emphasize the boundary and a local adaptive threshold to search for minimum points. The previous method causes the problem of over-segmentation, and over- segmentation appears around the boundary of the object, creating an inaccurate boundary of the region. The proposed method applies a high-frequency enhancement filter that emphasizes the high-frequency region while preserving the low-frequency region, and performs a minimum point search to consider local characteristics. When merging regions, a fixed threshold is applied. As a result of the experiment, the proposed method reduced the number of segmented regions by about 58% while preserving the boundaries of the regions compared to when high frequency emphasis filters were not used.

Basic Study on in-Process Monitoring of B.U.E. Using Force Sensor (Force Sensor를 이용한 구성인선의 In-Process 감시에 관한 기초 연구)

  • Won, Jong-Sik;Oh, Min-Seok;Jung, Youn-Gyo
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.14 no.7
    • /
    • pp.67-72
    • /
    • 1997
  • Recently, in order to achieve high flexibility of manufacture, monitoring and control strategies of a new type have been developed. Since the generation of built-up edge on the cutting tool damages the surface finish of the workpiece, the monitoring system of built-up edge is an important process monitoring. In this study, the analyzing methods of cutting force signal to detect the built-up edge during cutting process are described. The cutting force signals are analyzed using the mean, standard deviation and mean to standard deviation of this cutting signals. We can obtain the guide to detect the built-up edge during turning process.

  • PDF

Retrospective analyses of the bottleneck in purification of eukaryotic proteins from Escherichia coli as affected by molecular weight, cysteine content and isoelectric point

  • Jeon, Won-Bae
    • BMB Reports
    • /
    • v.43 no.5
    • /
    • pp.319-324
    • /
    • 2010
  • Experimental bioinformatics data obtained from an E. coli cell-based eukaryotic protein purification experiment were analyzed in order to identify any bottleneck as well as the factors affecting the target purification. All targets were expressed as His-tagged maltose-binding protein (MBP) fusion constructs and were initially purified by immobilized metal affinity chromatography (IMAC). The targets were subsequently separated from the His-tagged MBP through TEV protease cleavage followed by a second IMAC isolation. Of the 743 total purification trials, 342 yielded more than 3 mg of target proteins for structural studies. The major reason for failure of target purification was poor TEV proteolysis. The overall success rate for target purification decreased linearly as cysteine content or isoelectric point (pI) of the target increased. This pattern of pI versus overall success rate strongly suggests that pI should be incorporated into target scoring criteria with a threshold value.

Fabrication and characterization of a carbon nanotube-based point electron source

  • Choi, Ha-Kyu;Kim, G.Y.;Song, Y.I.;Jeong, H.J.;Lim, S.C.;Lee, Y.H.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2005.07b
    • /
    • pp.1536-1537
    • /
    • 2005
  • We have made point electron sources using carbon nanotubes (CNTs). For the fabrication of point electron sources, CNTs were dispersed in a solution and attached on electrochemically etched W tips using electrophoresis. In our study, we have utilized various CNTs such as single-walled CNT (SWCNT), multiwalled CNT (MWCNT), and thin-MWCNT and threshold current, turn-on voltage, filed enhancement factor of each emitter have been studied upon a tube/bundle diameter and length. In addition, fieldemitted electron energy distribution of various CNT emitters is characterized.

  • PDF

A Study on Determination of Frontal QRS Electrical Axis by Minnesota Coding Method (MINNESOTA CODE 분류방식에 의한 전면 QRS 전기축 판정에 관한 연구)

  • Park, Dong-Chan;Lee, Myoung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1989.11a
    • /
    • pp.421-425
    • /
    • 1989
  • This paper present a algorithm for determination of the frontal QRS axis. Determination of electrical QRS axis helps In the differential diagnosis of wide QRS tachycardia and of hemiblock and In the localization of an accessory pathway. At first detecting R-point data and S-point data and two data is sumed and this data is determind such as positive or negative. Reference data is calculated by 9-point derivertives that is less affected by noise. Secondly, using data of lead2 calculate a morphology, this value is threshold for executing determination algorithm. This process is main body of this algorithm. As this algorithm have a six pattern of the axis that coded by minnesota ending method, the axis is determined more precisely than any other algorithm using 3 leads and affirm a relation of a axis and hemiblock and tachycardia.

  • PDF

A New Algorithm for P_wave Detection in the ECG signal (심전도 신호 P파 검출 알고리즘에 관한 연구)

  • Joang, Hee-Kyo;Kim, Kwang-Keun;Hwang, Sun-Chul;Lee, Myoung-Ho
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1989 no.05
    • /
    • pp.15-18
    • /
    • 1989
  • This paper presents a new algorithm for P-wave detection in the ECG signal. We detect the peak and valley point using significant point extraction algorithm with 9-point derivative. Because P-wave duration is changed according to heart-rates, we search for the R-peak and calculate the R-R interval time prior to the determination of P-wave duration threshold values in order to actively adapt to the change of P duration. We determine the parameters for P-wave detection and then P-peak, P-onset and P-offset are detected by these parameters. The results obtained from the proposed algorithm have detected successively P-wave almost more than 90%.

  • PDF

A Probabilistic Algorithm for Multi-aircraft Collision Detection and Resolution in 3-D

  • Kim, Kwang-Yeon;Park, Jung-Woo;Tahk, Min-Jea
    • International Journal of Aeronautical and Space Sciences
    • /
    • v.9 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • This paper presents a real-time algorithm for collision detection, collision avoidance and guidance. Three-dimensional point-mass aircraft models are used. For collision detection, conflict probability is calculated by using the Monte-Carlo Simulation. Time at the closest point of approach(CPA) and distance at CPA are needed to determine the collision probability, being compared to certain threshold values. For collision avoidance, one of possible maneuver options is chosen to minimize the collision probability. For guidance to a designated way-point, proportional navigation guidance law is used. Two scenarios on encounter situation are studied to demonstrate the performance of proposed algorithm.

Correction of Text Character Skeleton for Effective Trajectory Recovery

  • Vu, Hoai Nam;Na, In Seop;Kim, Soo Hyung
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • One of the biggest problems of skeletonization is the occurrence of distortions at the junction point of the final binary image. At the junction area, a single point usually becomes a small stroke, and the corresponding trajectory task, as well as the OCR, consequently becomes more complicated. We therefore propose an adaptive post-processing method that uses an adaptive threshold technique to correct the distortions. Our proposed method transforms the distorted segments into a single point so that they are as similar to the original image as possible, and this improves the static handwriting images after the skeletonization process. Further, we attained promising results regarding the usage of the enhanced skeletonized images in other applications, thereby proving the expediency and efficiency of the proposed method.