• Title/Summary/Keyword: information & telecommunications

Search Result 4,263, Processing Time 0.035 seconds

Preparation and characterization of Mn doped copper nitride films with high photocurrent response

  • Yu, Aiai;Hu, Ruiyuan;Liu, Wei;Zhang, Rui;Zhang, Jian;Pu, Yong;Chu, Liang;Yang, Jianping;Li, Xing'ao
    • Current Applied Physics
    • /
    • v.18 no.11
    • /
    • pp.1306-1312
    • /
    • 2018
  • The Mn-doped copper nitride ($Cu_3N$) films with Mn concentration of 2.0 at. % have high crystallinity and uniform surface morphology. We found that the as-synthesized Mn-doped $Cu_3N$ films show suitable optical absorption in the visible region and the band gap is ~1.48 eV. A simple photodetector based on Mn doped $Cu_3N$ films was firstly fabricated via magnetron sputtering method. The fabricated device with doping of Mn demonstrated high photocurrent response and fast response shorter than 0.1 s both for rise and decay time superior to the pure $Cu_3N$. Furthermore, the energy levels of Mn-doped Cu3N matched well with ITO and Ag electrode. The excellent photoelectric properties reflect a good balance between sensitivities and response rate. Our investigation reveals the excellent potential of Mn-doped $Cu_3N$ films for application of photodetectors.

Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining

  • Liu, Weixin;Zheng, Kangfeng;Wu, Bin;Wu, Chunhua;Niu, Xinxin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2781-2800
    • /
    • 2016
  • Emerging attacks aim to access proprietary assets and steal data for business or political motives, such as Operation Aurora and Operation Shady RAT. Skilled Intruders would likely remove their traces on targeted hosts, but their network movements, which are continuously recorded by network devices, cannot be easily eliminated by themselves. However, without complete knowledge about both inbound/outbound and internal traffic, it is difficult for security team to unveil hidden traces of intruders. In this paper, we propose an autonomous anomaly detection system based on behavior profiling and relation mining. The single-hop access profiling model employ a novel linear grouping algorithm PSOLGA to create behavior profiles for each individual server application discovered automatically in historical flow analysis. Besides that, the double-hop access relation model utilizes in-memory graph to mine time-sequenced access relations between different server applications. Using the behavior profiles and relation rules, this approach is able to detect possible anomalies and violations in real-time detection. Finally, the experimental results demonstrate that the designed models are promising in terms of accuracy and computational efficiency.

Analysis of Energy Consumption and Sleeping Protocols in PHY-MAC for UWB Networks

  • Khan, M.A.;Parvez, A.Al;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1028-1036
    • /
    • 2006
  • Energy conservation is an important issue in wireless networks, especially for self-organized, low power, low data-rate impulse-radio ultra-wideband (IR-UWB) networks, where every node is a battery-driven device. To conserve energy, it is necessary to turn node into sleep state when no data exist. This paper addresses the energy consumption analysis of Direct-Sequence (DS) versus Time-Hopping (TH) multiple accesses and two kinds of sleeping protocols (slotted and unslotted) in PHY-MAC for Un networks. We introduce an analytical model for energy consumption or a node in both TH and DS multiple accesses and evaluate the energy consumption comparison between them and also the performance of the proposed sleeping protocols. Simulation results show that the energy consumption per packet of DS case is less than TH case and for slotted sleeping is less than that of unslotted one for bursty load case, but with respect to the load access delay unslotted one consumes less energy, that maximize node lifetime.

Cross-layer Design of Private MAC with TH-BPPM and TH-BPAM in UWB Ad-hoc Networks

  • Parvez, A.Al;Khan, M.A.;Hoque, M.E.;An, Xizhi;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12A
    • /
    • pp.1189-1197
    • /
    • 2006
  • Ultra-wideband(UWB) is a killer technology for short-range wireless communications. In the past, most of the UWB research focused on physical layer but the unique characteristics of UWB make it different to design the upper layer protocols than conventional narrow band systems. Cross-layer protocols have received high attention for UWB networks. In this paper, we investigate the performance of two physical layer schemes: Time Hopping Binary Pulse Position Modulation(TH-BPPM) and Time Hopping Binary Pulse Amplitude Modulation (TH-BPAM) with proposed private MAC protocol for UWB ad-hoc networks. From pulse level to packet level simulation is done in network simulator ns-2 with realistic network environments for varying traffic load, mobility and network density. Our simulation result shows TH-BPAM outperforms TH-BPPM in high traffic load, mobility and dense network cases but in a low traffic load case identical performance is achieved.

Defense Strategy of Network Security based on Dynamic Classification

  • Wei, Jinxia;Zhang, Ru;Liu, Jianyi;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5116-5134
    • /
    • 2015
  • In this paper, due to the network security defense is mainly static defense, a dynamic classification network security defense strategy model is proposed by analyzing the security situation of complex computer network. According to the network security impact parameters, eight security elements and classification standard are obtained. At the same time, the dynamic classification algorithm based on fuzzy theory is also presented. The experimental analysis results show that the proposed model and algorithm are feasible and effective. The model is a good way to solve a safety problem that the static defense cannot cope with tactics and lack of dynamic change.

Route Determination Service for the Open LBS (개방형 LBS 를 위한 경로탐색 서비스)

  • Kim, Sung-Soo;Kim, Jae-Chul;Kim, Kwang-Soo;Park, Jong-Hyun;Lee, Jong-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.713-716
    • /
    • 2003
  • 현재 국내 LBS 가 중요한 서비스로 널리 확산되기 위해서는 서비스간의 상호운용성이 제공되어야 한다. 본 논문에서는 LBS 서비스간 상호운용성을 제공하는 개방형 LBS 를 위한 경로탐색 서비스에 대한 설계 및 구현기법을 제시한다. 최단경로문제(Shortest Path Problem)는 통신망 및 교통망의 분석, 생산라인의 품질 관리 등의 다양한 분야 등의 네트워크 흐름 최적화 문제 중에서 가장 많이 연구되고 있는 문제다. 도로 교통망에서는 교차로상에서의 회전 제약 문제 등의 제한조건이 존재한다. 본 논문에서 경로탐색은 듀얼 그래프(dual graph)를 이용하여 회전제약조건을 만족하는 경로를 구할 수 있었고, 사용자 경로탐색 기준에 따른 탐색기법도 제시한다. 또한, 구현된 서비스는OpenLS의 표준화된 인터페이스를 구현하여 상호운용성(interoperability)을 지원하며, 자바를 이용한 웹서비스로 구현되어 이식성, 운영체제 및 프로그래밍 언어 독립성을 제공할 수 있는 장점이 있다.

  • PDF

Novel Schemes to Optimize Sampling Rate for Compressed Sensing

  • Zhang, Yifan;Fu, Xuan;Zhang, Qixun;Feng, Zhiyong;Liu, Xiaomin
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.517-524
    • /
    • 2015
  • The fast and accurate spectrum sensing over an ultra-wide bandwidth is a big challenge for the radio environment cognition. Considering sparse signal feature, two novel compressed sensing schemes are proposed, which can reduce compressed sampling rate in contrast to the traditional scheme. One algorithm is dynamically adjusting compression ratio based on modulation recognition and identification of symbol rate, which can reduce compression ratio. Furthermore, without priori information of the modulation and symbol rate, another improved algorithm is proposed with the application potential in practice, which does not need to reconstruct the signals. The improved algorithm is divided into two stages, which are the approaching stage and the monitoring stage. The overall sampling rate can be dramatically reduced without the performance deterioration of the spectrum detection compared to the conventional static compressed sampling rate algorithm. Numerous results show that the proposed compressed sensing technique can reduce sampling rate by 35%, with an acceptable detection probability over 0.9.

Mobile Digital Identity Wallet (모바일 전자 ID 지갑 시스템)

  • Soo-Hyung Kim;Seung-Hyun Kim;Deok-Jin Kim;Kawn-Soo Jung;Seung-Hun Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.11a
    • /
    • pp.1489-1492
    • /
    • 2008
  • 전자 ID 지갑은 일상생활에서 사용하는 지갑처럼 인터넷 상에서 사용되는 사이버 지갑으로, 사용자의 개인정보(주소, 전화번호 등), 인증정보, 지불정보 등과 같은 사용자의 Identity 정보를 보관하고 있다가 필요한 시점에 저장된 정보를 사용자의 통제 하에 자유롭게 이용할 수 있는 서비스 시스템이다. 모바일 전자 ID 지갑 시스템은 전자 ID 지갑 시스템의 구성 요소 중 하나로 개인의 모바일 단말장치에서 운영될 수 있는 소프트웨어로 구현되었으며, 사용자 인터페이스가 빈약한 모바일 단말장치에서도 사용자의 불편 없이 모바일 인터넷을 보다 안전하게 이용할 수 있는 방법들을 제공한다. 논문에서는 안전하고 신뢰할 수 있는 인터넷 환경 구축을 위해 개발된 기술들 중 하나인 모바일 전자 ID 지갑 시스템을 소개하고자 한다.