• Title/Summary/Keyword: information Protection

Search Result 4,493, Processing Time 0.032 seconds

Design and Fabrication of the Ka-Band Receive Module for Millimeter Wave Seeker (밀리미터파 탐색기를 위한 Ka-대역 수신기 모듈의 설계 및 제작)

  • Yang, Seong-Sik;Lim, Ju-Hyun;Song, Sung-Chan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.49 no.1
    • /
    • pp.78-84
    • /
    • 2012
  • In this paper, we introduced the design technique about a Ka band receive module for millimeter wave seekers. The receiver module consists of a waveguide, circulator and transition for antenna connection, and a limiter and gain control amplifier for receiver protection. This module is comprised of a sum, azimuth and elevation channel for receiving monopules signal, and a SLB channel for the acquisition of jamming signal. In this paper, receiver gain and range of gain control dependent on ADC nonlinear characteristic was analyzed and designed for wide dynamic range receive. In the test result of the fabricated Ka-band receive, the frequency band is 1 GHz, the noise figure is as low as 8.2 dB, the gain is $56{\pm}2dB$, the dynamic range is 135 dB, the gain congtrol is more than 86 dB, the channel isolation is more than 35 dB.

Comparative Study of surface passivation for Metamorphic HEMT using low-k Benzocyclobutene(BCB) (Metamorphic HEMT에서 low-k Benzocyclobutene(BCB)를 이용한 표면 passivation 비교 연구)

  • Baek, Yong-Hyun;Oh, Jung-Hun;Han, Min;Choi, Seok-Gyu;Lee, Bok-Hyung;Lee, Seong-Dae;Rhee, Jin-Koo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.4
    • /
    • pp.80-85
    • /
    • 2007
  • The passivation is one of the important technologies for protection of the devies from damage. In this paper, we fabricated $0.1{\mu}m\;{\Gamma}$--gate InAIAs/InGaAs metamorphic high electron mobility transistors (MHEMTs) on a GaAs substrate. And then the wafer with MHEMTs was divided into two pieces; one for passivation and another for without passivation experiments. The passivations were done by using both low-k BCB and Si3N4 thin films. DC and RF performances were measured and the results are compared. The MHEMTs with BCB passivation show lower degradation than ones with Si3N4 passivation.

Arc Fault Circuit Interrupter Design using Microprocessor (마이크로프로세서를 이용한 아크결함 차단기 설계)

  • Yoon, Kwang-Ho;Ban, Gi-Jong;Lee, Hyo-Jik;Park, Byung-Suk;Nam, Moon-Hyon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.1
    • /
    • pp.12-18
    • /
    • 2007
  • As an arc fault interrupter, the AFCI mentioned in this paper has been designed to detect and interrupt arc faults due to wire deterioration, insulation, wire damage, loose connection, and excessive mechanical damage. Since AFCI is digital and uses mechanical and electric stress, the length of interruption against overload and over-current is much shorter than the current bi-metal method. Therefore, the risk of electrical fires has been reduced.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Perception and Practices on Screening and Vaccination for Carcinoma Cervix among Female Healthcare Professional in Tertiary Care Hospitals in Bangalore, India

  • Swapnajaswanth, M.;Suman, G.;Suryanarayana, S.P.;Murthy, N.S.
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.15
    • /
    • pp.6095-6098
    • /
    • 2014
  • Background:Cervical cancer is potentially the most preventable and treatable cancer. Despite the known efficacy of cervical screening, a significant number of women do not avail themselves of the procedure due to lack of awareness. Objectives: This study was conducted to elicit information on the knowledge, attitude and practice (KAP) regarding screening (Pap test) and vaccination for carcinoma cervix among female doctors and nurses in a tertiary care hospital in Bangalore and to assess barriers to acceptance of the Pap test. Materials and Methods: A cross-sectional, descriptive study was conducted with semi-structured, self-administered questionnaire among female health professionals. The study subjects were interviewed for KAP regarding risk factors for cancer cervix, Pap test and HPV vaccination for protection against carcinoma cervix. Results: Higher proportion of doctors 45 (78.9%) had very good knowledge as compared to only 13 (13.3%) of the nurses, about risk factors for cancer cervix and Pap test (p=0.001). As many as 138(89.6%) of the study subjects had favorable attitude towards Pap test and vaccination, but 114 (73.6%) of the study subjects never had a Pap test and the most common reason 35 (31%) for not practicing was absence of disease symptoms. Conclusions: In spite of good knowledge and attitudes towards cancer cervix and Pap test being good, practice remained low among the study subjects and most common reasons for not undergoing Pap test was absence of disease symptoms. The independent predictors of ever having a Pap test done was found to be the occupation and duration of married life above 9yrs. Hence there is a strong need to improve uptake of Pap test by health professionals by demystifying the barriers.

Design and Implementation of a Network Packet Scanner based on Multi-Platform (멀티 플랫폼 기반의 네트워크 패킷 스캐너 설계 및 구현)

  • Lee, Woo-In;Yang, Hae-Sool
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.3
    • /
    • pp.101-112
    • /
    • 2010
  • The recent trend of the hacking deals with all the IT infrastructure related to the profit of the companies. Presently, they attack the service itself, the source of the profit, while they tried to access to the service infrastructure through the non-service port in the past. Although they affect the service directly, it is difficult to block them with the old security solution or the old system and they threaten more and more companies with the demand of money menacing the protection of customers and the sustainable management. This paper aims to design and implement multi-platform network packet scanner targeting the exception handling network intrusion detection system which determines normal, abnormal by traffic. Linux and unix have the various network intrusion detection and packet management tools like ngrep, snort, TCPdump, but most of them are based on CUI (Character based User Interface) giving users discomfort who are not used to it. The proposed system is implemented based on GUI(Graphical User Interface) to support the intuitive and easy-to-use interface to users, and using Qt(c++) language that supports multi-platform to run on any operating system.

GBAS Ground Testing and Performance Analysis at Gimpo International Airport (김포국제공항의 GBAS 지상시험 및 성능 분석)

  • Jeong, Myeong-Sook;Choi, Yunjung;Yun, Youngsun;Bae, Joongwon;Jun, Hyang-Sig;Lee, Young Jae
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.1
    • /
    • pp.22-32
    • /
    • 2015
  • Ground based augmentation system (GBAS) is a next generation radio navigation aids to support precision approach of aircraft. Recently, airports installing GBAS and providing GBAS service are increasing all over the world. For the first time in Korea, SLS-4000 which is the GBAS ground equipment of Honeywell had been installed at Gimpo International Airport in 2013, and evaluated its functionality and performance of through the ground testing. This paper introduces a ground test and evaluation criteria on the CAT-I GBAS system, and describes testing methods for GBAS ground testing of Gimpo International Airport. In addition, detail testing methods and analysis results on major five of 12 ground test items are described.

Subcutaneous Injection Contrast Media Extravasation: 3D CT Appearance (전산화단층검사에서 조영제의 피하 정맥 혈관외유출 환자의 3D영상)

  • Kweon Dae Cheol;Kim Tae Hyung;Yang Sung Hwan;Yoo Beong Gyu;Kim Myeong Goo;Park Peom
    • Progress in Medical Physics
    • /
    • v.16 no.1
    • /
    • pp.47-51
    • /
    • 2005
  • We report a case of an accidental extravasation of contrast material. A large-volume extravasation occurred in an adult during spiral contrast-enhanced CT. The amount of contrast material extravasated was 47 ml. The patient had a swelling of the dorsum right hand. The extravasation injury site was determined by CT scanning. The extavasation case was examined using five separate display techniques: axial, multi planar reformation (MPR), maximum intensity projection (MIP), volume rendering, and shaded-surfaced display (SSD). This paper introduces extravasation with the CT and the three-dimensional appearance.

  • PDF

A Study on the World Geodetic System Transformation of Cadastral Record Using by Three parameters (3변수를 이용한 지적공부의 세계측지계 변환 연구)

  • Jung, Wan-Suk;Kang, Sang-Gu
    • Journal of Cadastre & Land InformatiX
    • /
    • v.44 no.2
    • /
    • pp.139-153
    • /
    • 2014
  • The world geodetic system transformation of cadastral record have to minimize differences of boundary and area being in cadastral record according to transformation for that is direct connected with the land owner and property protection. However it is very difficult to accurately maintain the before and after transformation because coordinate transformation is generally using a mathematical conversion formula. At present, Helmert model by using 4-parameter is official coordinate transformation model for Cadastral Resurvey Project but scale factor is most sensitive to changes of area and relative position in the same parcel. In this study, it was proposed 3-parameter method using by scale factor fixing through the application of a Helmert in order to avoid changing the area difference and keeping the error within the tolerance range of the boundary which is related to the boundary point coordinate region.

A Design of Secure Mobile Agent Systems Employing ID based Digital Multi-Signature Scheme (ID기반 디지털 다중 서명 기술을 적용한 안전한 이동 에이전트 시스템의 설계)

  • Yoo, Seong-Jin;Kim, Seong-Yeol;Lee, Ok-Bin;Chung, Il-Yong
    • The KIPS Transactions:PartC
    • /
    • v.10C no.1
    • /
    • pp.17-26
    • /
    • 2003
  • Mobile agent system comes into the spotlight since it contributes largely to mobile computing on distributed network environment. However, this system has a number of significant security Problems. In this Paper, we analyze suity attacks to mobile agent system Presented by NIST[3]. In order to protect this system from them, we suggest a security protocol for mobile agent system by employing R based key distribution and digital multi-signature scheme. To solve these problems described in NIST, securities for mobile agent and agent platform shouid be accomplished. Comparing with other protocols, our protocol performs both of these securities, while other protocols mentioned only one of them. Proposed Protocol satisfies simplicity of key management, providing security service such as confidentiality, integrity, authentication and preventing reputation, liveness guarantee, protection of excution-result data and preventing replay attack. Furthermore, it is designed to detect message modification immediately by verifying each step of agent execution at a corresponding server.