• 제목/요약/키워드: paper-electronics

Search Result 31,398, Processing Time 0.055 seconds

Human Safety Assessment for a 4 × 8 Array Antenna Used for Wireless Power Transfer at 2.4 GHz (2.4 GHz의 무선전력전송에 사용되는 4 × 8 배열 안테나에 대한 인체안전성평가)

  • Ju, Young Jun;Kim, Jun Hee;Lee, Yu-ri;Gimm, Yoon-Myoung;Lim, Yong Seok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.338-341
    • /
    • 2018
  • Wireless Power Transfer(WPT) of array antenna applied to beam-forming techniques enables highly efficient WPT when transmitters and receivers are not contacting and even when they are separated. However, this WPT method is possible to use only when human safety restriction by distance between the transmitters and the receivers is satisfied. In the paper, a $4{\times}8$ array antenna for 2.4 GHz is modeled by simulation, then electric field intensity and 10 gram average head SAR(Specific Absorption Rate) by distance away from the array antenna inputted 1 W of 2.4 GHz sinusoidal wave at each single antenna of the array antenna for 2.4 GHz were obtained. And they were compared with human safety restriction of draft of 2018 ICNIRP(International Commission on Non-Ionizing Radiation Protection) guidelines. As the result, power density of far field derived from the electric field intensity was $33.257W/m^2$, which satisfied with occupational human safety restriction but exceeded public's. In addition, the 10 gram average head SAR exceeded the human safety restriction.

  • PDF

Scheduling Method of Real-Time Mobile Transaction Manager considering Value of Transactions and Validity of Real-Time Data (트랜잭션의 중요도와 데이터의 유효성을 고려한 실시간 이동 트랜잭션 관리자의 스케줄링 기법)

  • Jo, Suk-Gyeong;Kim, Gyeong-Bae;Lee, Sun-Jo;Bae, Hae-Yeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.533-542
    • /
    • 2001
  • In this paper, we present a scheduling method for real-time mobile transaction manager in mobile computing environment. The proposed method checks whether a transaction is executable or not. It is able to by considering not only the deadline of real-time data in mobile hosts. And then, it schedules the real-time mobile transactions by making optimal execution window based on the priority queue, while considering transaction value and deadline. Disconnection with mobile hosts is monitored in selecting the transaction for execution. Using the proposed method reduces the number of restarting times after transaction aborts which is caused by the violation of the validity constraints of real-time data. And in has merits of maximizing the sum of values of real-time mobile transactions which meet the deadline. The performance evaluation demonstrates that the number of committed real-time transactions within the deadline is improved by 20%. This method can be used in real-time mobile transaction manager is such environments as cellular communications, emergency medicine information system and so on.

  • PDF

Implementation of Audit Trail Service System for EDI Security (EDI 보안 감사 추적 서비스 시스템 구현)

  • Jeong, Gyeong-Ja;Kim, Gi-Jung;Seo, Gyeong-Ran;Ryu, Geun-Ho;Gang, Chang-Gu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.3
    • /
    • pp.754-766
    • /
    • 1997
  • In this paper,we implement the Audit Trail Service Sydtem for the EDI Security.It has solved a law dispute between enterprises by informations that have generated by the EDI serice systrm.The audit trail service sys-tem implemented for EDI security satisfied the requirements of audit and the protocol of the security serive of X.435 and X.400.The EDI Security Audit System consists of the event discrimiator,the audit recirder,the audit archiver,and the provider of audit services .The event discriminator classified the reansmitted data from the EDI network ot audit sercices.The audit recorder constructs an index that has combined time information wiht audit unformations which are classified by the event discriminator.ZThe audit archiver performas the vacumming of added audit imformations by passing time by passing time.The audit provider is a module that carries out the audit trail servies by using stored audit informations. The audit provider suports audit servies,which are non-requdiation,proof and probe,controller of security,and accesing infrimation.The audit trail service system for EDI security constructs audit information by using index that is combining time imfromation,so it supports especially fast accesing audit information.

  • PDF

Computational study of orientation effects on thermal performance of natural convection cooled lightweight high performance hollow hybrid fin heat sinks (자연대류 냉각되는 경량고성능 할로우 하이브리드 휜 히트싱크의 열성능에 대한 방향 영향의 전산연구)

  • Effendi, Nico Setiawan;Kim, Kyoung-Joon
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.786-790
    • /
    • 2016
  • This paper discusses numerically explored orientation effects on the thermal performance of hollow hybrid fin heat sinks (HHFHSs) under natural convection. A HHFHS consists of an array of hollow pin fins concatenated with plate fins and having perforations near the fin bases. Orientation effects on the footprint-based and mass-based thermal performance of the HHFHS were numerically studied for orientation angles ranging from $0^{\circ}$ to $180^{\circ}$. The performance of the HHFHS was compared with that of a pin fin heat sink (PFHS) having similar physical parameters. The results show that the thermal resistance of the HHFHS did not vary considerably from $0^{\circ}$ to $45^{\circ}$. The thermal resistance increased from $45^{\circ}$ to $90^{\circ}$, reached its maximum at $90^{\circ}$, and decreased consistently from $90^{\circ}$ to $180^{\circ}$. Dissimilar behaviors of the thermal resistance of the HHFHS vs. the PFHS resulted mainly from the effect of heat pumping induced by the internal flows of the hollow fins. Despite various orientations, the mass-based thermal resistance of the HHFHS was found to be nearly 30% smaller than that of the PFHS. This result shows the feasibility of the HHFHS for the lightweight thermal management of electronics under natural convection.

Channel characteristics of multi-path power line using a contactless inductive coupling unit (비접촉식 유도성 결합기를 이용한 다중경로 전력선 채널 특성)

  • Kim, Hyun-Sik;Sohn, Kyung-Rak
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.799-804
    • /
    • 2016
  • Broadband powerline communication (BPLC) uses distribution lines as a medium for achieving effective bidirectional data communication along with electric current flow. As the material characteristics of power lines are not good at the communication channel, the development of power line communication (PLC) systems for internet, voice, and data services requires measurement-based models of the transfer characteristics of the network suitable for performance analysis by simulation. In this paper, an analytic model describing a complex transfer function is presented to obtain the attenuation and path parameters for a multipath power line model. The calculated results demonstrated frequency-selective fading in multipath channels and signal attenuation with frequency, and were in good agreement with the experimental results. Inductive coupling units are used as couplers for coupling the signal to the power line to avoid physical connections to the distribution line. The inductance of the ferrite core, which depends on the frequency, determines the cut-off frequency of the inductive coupler. Coupling loss can be minimized by increasing the number of windings around the coupler. Coupling efficiency was improved by more than 6 dB with three windings compared to the results obtained with one winding.

Design and Analysis of a Laser Lift-Off System using an Excimer Laser (엑시머 레이저를 사용한 LLO 시스템 설계 및 분석)

  • Kim, Bo Young;Kim, Joon Ha;Byeon, Jin A;Lee, Jun Ho;Seo, Jong Hyun;Lee, Jong Moo
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.5
    • /
    • pp.224-230
    • /
    • 2013
  • Laser Lift-Off (LLO) is a process that removes a GaN or AIN thin layer from a sapphire wafer to manufacture vertical-type LEDs. It consists of a light source, an attenuator, a mask, a projection lens and a beam homogenizer. In this paper, we design an attenuator and a projection lens. We use the 'ZEMAX' optical design software for analysis of depth of focus and for a projection lens design which makes $7{\times}7mm^2$ beam size by projecting a beam on a wafer. Using the 'LightTools' lighting design software, we analyze the size and uniformity of the beam projected by the projection lens on the wafer. The performance analysis found that the size of the square-shaped beam is $6.97{\times}6.96mm^2$, with 91.8 % uniformity and ${\pm}30{\mu}m$ focus depth. In addition, this study performs dielectric coating using the 'Essential Macleod' to increase the transmittance of an attenuator. As a result, for 23 layers of thin films, the transmittance total has 10-96% at angle of incidence $45-60^{\circ}$ in S-polarization.

Design of a CMOS Tx RF/IF Single Chip for PCS Band Applications (PCS 대역 송신용 CMOS RF/IF 단일 칩 설계)

  • Moon, Yo-Sup;Kwon, Duck-Ki;Kim, Keo-Sung;Park, Jong-Tae;Yu, Chong-Gun
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.236-244
    • /
    • 2003
  • In this paper, RF and IF circuits for mobile terminals which have usually been implemented using expensive BiCMOS processes are designed using CMOS circuits, and a Tx CMOS RF/IF single chip for PCS applications is designed. The designed circuit consists of an IF block including an IF PLL frequency synthesizer, an IF mixer, and a VGA and an RF block including a SSB RF mixer and a driver amplifier, and performs all transmit signal processing functions required between digital baseband and the power amplifier. The phase noise level of the designed IF PLL frequency synthesizer is -114dBc/Hz@100kHz and the lock time is less than $300{\mu}s$. It consumes 5.3mA from a 3V power supply. The conversion gain and OIP3 of the IF mixer block are 3.6dB and -11.3dBm. It consumes 5.3mA. The 3dB frequencies of the VGA are greater than 250MHz for all gain settings. The designed VGA consumes 10mA. The designed RF block exhibits a gain of 14.93dB and an OIP3 of 6.97dBm. The image and carrier suppressions are 35dBc and 31dBc, respectively. It consumes 63.4mA. The designed circuits are under fabrication using a $0.35{\mu}m$ CMOS process. The designed entire chip consumes 84mA from a 3V supply, and its area is $1.6㎜{\times}3.5㎜$.

  • PDF

Design of Unified Inverse Transformer for HEVC and VP9 (HEVC 및 VP9 겸용 통합 역변환기의 설계)

  • Jung, Seulkee;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.19 no.4
    • /
    • pp.596-602
    • /
    • 2015
  • In this paper, a unified inverse transformer is designed for HEVC and VP9. The proposed architecture performs all modes of HEVC and VP9 in the unified inverser transformer, such as $4{\times}4{\sim}32{\times}32$ HEVC IDCT, $4{\times}4$ HEVC IDST, $4{\times}4{\sim}32{\times}32$ VP9 IDCT, $4{\times}4{\sim}16{\times}16$ VP9 IADST and $4{\times}4$ IWHT. Same computations are used in HEVC IDCT and VP9 IDCT, except for the scales of the coefficients. Similarly, same computations are used in HEVC $4{\times}4$ IDST and VP9 $4{\times}4$ IADST, except for the scales of the coefficients. Furthermore, HEVC IDCT, VP9 IDCT, and VP9 IADST are the subsets of upper level IDCTs. The proposed architecture reuses multipliers when the computation is identical. Also it shares adders and butterfly structures even when the multiplier coefficients are different. So it reduces the hardware size significantly. Synthesized in 0.18 um technology, the gate count is 456,442 gates. which achieved 22.6% reduction compared to conventional architectures.

Smartphone Addiction Detection Based Emotion Detection Result Using Random Forest (랜덤 포레스트를 이용한 감정인식 결과를 바탕으로 스마트폰 중독군 검출)

  • Lee, Jin-Kyu;Kang, Hyeon-Woo;Kang, Hang-Bong
    • Journal of IKEEE
    • /
    • v.19 no.2
    • /
    • pp.237-243
    • /
    • 2015
  • Recently, eight out of ten people have smartphone in Korea. Also, many applications of smartphone have increased. So, smartphone addiction has become a social issue. Especially, many people in smartphone addiction can't control themselves. Sometimes they don't realize that they are smartphone addiction. Many studies, mostly surveys, have been conducted to diagnose smartphone addiction, e.g. S-measure. In this paper, we suggest how to detect smartphone addiction based on ECG and Eye Gaze. We measure the signals of ECG from the Shimmer and the signals of Eye Gaze from the smart eye when the subjects see the emotional video. In addition, we extract features from the S-transform of ECG. Using Eye Gaze signals(pupil diameter, Gaze distance, Eye blinking), we extract 12 features. The classifier is trained using Random Forest. The classifiers detect the smartphone addiction using the ECG and Eye Gaze signals. We compared the detection results with S-measure results that surveyed before test. It showed 87.89% accuracy in ECG and 60.25% accuracy in Eye Gaze.

The Capacity of Multi-Valued Single Layer CoreNet(Neural Network) and Precalculation of its Weight Values (단층 코어넷 다단입력 인공신경망회로의 처리용량과 사전 무게값 계산에 관한 연구)

  • Park, Jong-Joon
    • Journal of IKEEE
    • /
    • v.15 no.4
    • /
    • pp.354-362
    • /
    • 2011
  • One of the unsolved problems in Artificial Neural Networks is related to the capacity of a neural network. This paper presents a CoreNet which has a multi-leveled input and a multi-leveled output as a 2-layered artificial neural network. I have suggested an equation for calculating the capacity of the CoreNet, which has a p-leveled input and a q-leveled output, as $a_{p,q}=\frac{1}{2}p(p-1)q^2-\frac{1}{2}(p-2)(3p-1)q+(p-1)(p-2)$. With an odd value of p and an even value of q, (p-1)(p-2)(q-2)/2 needs to be subtracted further from the above equation. The simulation model 1(3)-1(6) has 3 levels of an input and 6 levels of an output with no hidden layer. The simulation result of this model gives, out of 216 possible functions, 80 convergences for the number of implementable function using the cot(x) input leveling method. I have also shown that, from the simulation result, the two diverged functions become implementable by precalculating the weight values. The simulation result and the precalculation of the weight values give the same result as the above equation in the total number of implementable functions.