• Title/Summary/Keyword: information layer

Search Result 5,632, Processing Time 0.034 seconds

Improved Carrier Tunneling and Recombination in Tandem Solar Cell with p-type Nanocrystalline Si Intermediate Layer

  • Park, Jinjoo;Kim, Sangho;Phong, Pham duy;Lee, Sunwha;Yi, Junsin
    • Current Photovoltaic Research
    • /
    • v.8 no.1
    • /
    • pp.6-11
    • /
    • 2020
  • The power conversion efficiency (PCE) of a two-terminal tandem solar cell depends upon the tunnel-recombination junction (TRJ) between the top and bottom sub-cells. An optimized TRJ in a tandem cell helps improve its open-circuit voltage (Voc), short-circuit current density (Jsc), fill factor (FF), and efficiency (PCE). One of the parameters that affect the TRJ is the buffer layer thickness. Therefore, we investigated various TRJs by varying the thickness of the buffer or intermediate layer (TRJ-buffer) in between the highly doped p-type and n-type layers of the TRJ. The TRJ-buffer layer was p-type nc-Si:H, with a doping of 0.06%, an activation energy (Ea) of 43 meV, an optical gap (Eg) of 2.04 eV, and its thickness was varied from 0 nm to 125 nm. The tandem solar cells we investigated were a combination of a heterojunction with intrinsic thin layer (HIT) bottom sub-cell and an a-Si:H (amorphous silicon) top sub-cell. The initial cell efficiency without the TRJ buffer was 7.65% while with an optimized buffer layer, its efficiency improved to 11.74%, i.e., an improvement in efficiency by a factor of 1.53.

Analysis of Local Correlation between Shear Wave Velocity and Geo-layer in Korea (국내 지역성을 고려한 전단파속도와 대표지층의 상관관계 분석)

  • Kim, Han-Saem;Choi, Seung-Ho;Chung, Choong-Ki
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2010.03a
    • /
    • pp.687-698
    • /
    • 2010
  • Borehole drilled depend on the point is bound to be limited to obtain the 2-D or 3-D layer information for entire targer area. On the other hand, SASW and MASW provide the sectional form of layer information through the shear wave velocity($V_s$). Therefore the useful information of the target area can be derived from SASW, MASW and borehole data. In this research, the correlation reflected locality and nationwide between sectional geo-layer and $V_s$ was investigated and analyzed. The target areas are westside of Pyeongtaek and Incheon. The shear wave velocity($V_s$) obtained from SASW, MASW and borehole data conducted within the scope of crossline for survey was utilized in each region. In the 2D distribution of $V_s$ from SASW, MASW, $V_s$ tend to continually increase deeper and deeper. By the target area, the depth of each representative geo-layer was nested on the sectional distribution map of $V_s$ to suggest the range of $V_s$ in accordance of strata by using borehole data. The 2D sectional geo-layer distribution map is presented based on the range of $V_s$. In addition the correlation between measured and calculated $V_s$ according to the empirical equation was analyzed.

  • PDF

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

A Layer-by-Layer Learning Algorithm using Correlation Coefficient for Multilayer Perceptrons (상관 계수를 이용한 다층퍼셉트론의 계층별 학습)

  • Kwak, Young-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.39-47
    • /
    • 2011
  • Ergezinger's method, one of the layer-by-layer algorithms used for multilyer perceptrons, consists of an output node and can make premature saturations in the output's weight because of using linear least squared method in the output layer. These saturations are obstacles to learning time and covergence. Therefore, this paper expands Ergezinger's method to be able to use an output vector instead of an output node and introduces a learning rate to improve learning time and convergence. The learning rate is a variable rate that reflects the correlation coefficient between new weight and previous weight while updating hidden's weight. To compare the proposed method with Ergezinger's method, we tested iris recognition and nonlinear approximation. It was found that the proposed method showed better results than Ergezinger's method in learning convergence. In the CPU time considering correlation coefficient computation, the proposed method saved about 35% time than the previous method.

An Effective Tangential Cutting Algorithm for Rapid Prototyping

  • Kong, Yong-Hae;Chun, In-Cook;Ahn, Deog-Sang
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.168-171
    • /
    • 2002
  • For laser-cutting rapid prototyping systems that fabricate objects with layers having a certain degree of thickness, it is necessary both to minimize surface distortion and to generate dynamically feasible laser cutting trajectories. An effective tangential layer cutting algorithm is developed for this requirements. An energy function is defined in terms of tangential line lengths and their distances. And the energy is minimized for the tangential lines to closely describe a layer suffice. Our method is applied to 3D model samples and the generated tangential lines effectively approximate layer surface and make laser trajectory smooth.

  • PDF

Improving Physical-Layer Security for Full-duplex Radio aided Two-Way Relay Networks

  • Zhai, Shenghua;An, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.562-576
    • /
    • 2020
  • The power allocation optimization problem is investigated for improving the physical-layer security in two-way relaying networks, where a full-duplex relay based half-jamming protocol (HJP-FDR) is considered. Specially, by introducing a power splitter factor, HJP-FDR divides the relay's power into two parts: one for forwarding the sources' signals, the other for jamming. An optimization problem for power split factor is first developed, which is proved to be concave and closed-form solution is achieved. Moreover, we formulate a power allocation problem to determine the sources' power subject to the total power constraint. Applying the achieved closed-form solutions to the above-mentioned problems, a two-stage strategy is proposed to implement the overall power allocation. Simulation results highlight the effectiveness of our proposed algorithm and indicate the necessity of optimal power allocation.

A new crystallization method using a patterned $CeO_2$ seed layer on the plastic substrate

  • Shim, Myung-Suk;Kim, Do-Young;Seo, Chang-Ki;Yi, Jun-Sin;Park, Young-Soo
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1007-1010
    • /
    • 2004
  • We report crystallization of a-Si using XeCl excimer laser annealing [1] on the plastic substrate. We tried to obtain higher crystallinity as the effect of $CeO_2$ seed layer patterned. Also, we tried to control the direction of crystallization growth of silicon layer for lateral growth as the type of $CeO_2$ pattern. This crystallization method plays an important role in low temperature poly-Si (LTPS) [2] process and flexible display.

  • PDF

Design of a Multi-Network Selector for Multiband Maritime Networks

  • Cho, A-Ra;Yun, Chang-Ho;Park, Jong-Won;Chung, Han-Na;Lim, Yong-Kon
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.523-529
    • /
    • 2011
  • In this paper an inter-layer protocol, referred to as a Multi-Network Selector (MNS) is proposed for multiband maritime networks. A MNS is located between the data-link layer and the network layer and performs vertical handover when a ship moves another radio network. In order to provide seamless data transfer to different radio networks, the MNS uses received signal strength (RSS) and ship's location information as decision parameters for vertical handover, which can avoid ping-pong effect and reduces handover latency. In addition, we present related issues in order to implement the MNS for a multiband maritime network.

Organic Thin-Film Transistors with Screen Printed Silver Source/Drain Electrodes

  • Kim, Sam-Soo;Kim, Min-Soo;Choi, Gyu-Seok;Kim, Heon-Gon;Kim, Yong-Bae;Lee, Dong-Gu;Roh, Jae-Seong
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2007.08b
    • /
    • pp.1305-1307
    • /
    • 2007
  • We show that the electrical properties of organic thinfilm transistors(OTFTs) can be enhanced by controlling the morphology of interface between screen printed electrodes and gate dielectrics. Modified surface of the insulator layer($SiO_2$) affect on the interface energy of electrode on $SiO_2$ layer. Contact angle measurement and FT-IR spectrum shows that the interface is properly modified. OTFTs device with high efficiency has been realized through modification of interface layer.

  • PDF

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.