• Title/Summary/Keyword: Asymmetric key

Search Result 171, Processing Time 0.027 seconds

Strain-induced enhancement of thermal stability of Ag metallization with Ni/Ag multi-layer structure

  • Son, Jun-Ho;Song, Yang-Hui;Kim, Beom-Jun;Lee, Jong-Ram
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.08a
    • /
    • pp.157-157
    • /
    • 2010
  • Vertical-structure light-emitting diodes (V-LEDs) by laser lift-off (LLO) have been exploited for high-efficiency GaN-based LEDs of solid-state lightings. In V-LEDs, emitted light from active regions is reflected-up from reflective ohmic contacts on p-GaN. Therefore, silver (Ag) is very suitable for reflective contacts due to its high reflectance (>95%) and surface plasmon coupling to visible light emissions. In addition, low contact resistivity has been obtained from Ag-based ohmic contacts annealed in oxygen ambient. However, annealing in oxygen ambient causes Ag to be oxidized and/or agglomerated, leading to degradation in both electrical and optical properties. Therefore, preventing Ag from oxidation and/or agglomeration is a key aspect for high-performance V-LEDs. In this work, we demonstrate the enhanced thermal stability of Ag-based Ohmic contact to p-GaN by reducing the thermal compressive stress. The thermal compressive stress due to the large difference in CTE between GaN ($5.6{\times}10^{-6}/^{\circ}C$) and Ag ($18.9{\times}10^{-6}/^{\circ}C$) accelerate the diffusion of Ag atoms, leading to Ag agglomeration. Therefore, by increasing the additional residual tensile stress in Ag film, the thermal compressive stress could be reduced, resulting in the enhancement of Ag agglomeration resistance. We employ the thin Ni layer in Ag film to form Ni/Ag mutli-layer structure, because the lattice constant of NiO ($4.176\;{\AA}$ is larger than that of Ag ($4.086\;{\AA}$). High-resolution symmetric and asymmetric X-ray diffraction was used to measure the in-plane strain of Ag films. Due to the expansion of lattice constant by oxidation of Ni into NiO layer, Ag layer in Ni/Ag multi-layer structure was tensilely strained after annealing. Based on experimental results, it could be concluded that the reduction of thermal compressive stress by additional tensile stress in Ag film plays a critical role to enhance the thermal stability of Ag-based Ohmic contact to p-GaN.

  • PDF

Efficient Enantioselective Synthesis of (R)-[3,5-Bis(trifluoromethyl)phenyl] Ethanol by Leifsonia xyli CCTCC M 2010241 Using Isopropanol as Co- Substrate

  • Ouyang, Qi;Wang, Pu;Huang, Jin;Cai, Jinbo;He, Junyao
    • Journal of Microbiology and Biotechnology
    • /
    • v.23 no.3
    • /
    • pp.343-350
    • /
    • 2013
  • (R)-[3,5-Bis(trifluoromethyl)phenyl] ethanol is a key chiral intermediate for the synthesis of aprepitant. In this paper, an efficient synthetic process for (R)-[3,5- bis(trifluoromethyl)phenyl] ethanol was developed via the asymmetric reduction of 3,5-bis(trifluoromethyl) acetophenone, catalyzed by Leifsonia xyli CCTCC M 2010241 cells using isopropanol as the co-substrate for cofactor recycling. Firstly, the substrate and product solubility and cell membrane permeability of biocatalysts were evaluated with different co-substrate additions into the reaction system, in which isopropanol manifested as the best hydrogen donor of coupled NADH regeneration during the bioreduction of 3,5-bis(trifluoromethyl) acetophenone. Subsequently, the optimization of parameters for the bioreduction were undertaken to improve the effectiveness of the process. The determined efficient reaction system contained 200mM of 3,5-bis(trifluoromethyl) acetophenone, 20% (v/v) of isopropanol, and 300 g/l of wet cells. The bioreduction was executed at $30^{\circ}C$ and 200 rpm for 30 h, and 91.8% of product yield with 99.9% of enantiometric excess (e.e.) was obtained. The established bioreduction reaction system could tolerate higher substrate concentrations of 3,5- bis(trifluoromethyl) acetophenone, and afforded a satisfactory yield and excellent product e.e. for the desired (R)-chiral alcohol, thus providing an alternative to the chemical synthesis of (R)-[3,5-bis(trifluoromethyl)phenyl] ethanol.

Auction Design Strategies for Radio Spectrum Rights : Theory and Experience (주파수 재산권 경매방식의 설계 전략 : 이론과 경험)

  • 조성하
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.3
    • /
    • pp.485-499
    • /
    • 1999
  • Auctions are appealing market-type mechanisms because they can be deployed to solve the twin problems of resources pricing and allocation. Nonetheless the effectiveness of an auction mechanism in radio spectrum property rights should not be taken for granted. Policymakers need to be aware of the complexity of introducing market discipline in an area where none existed before. Auction design is critical to the success of the allocation process. However, a poorly designed auction mechanism can have detrimental effects on the spectrum rights allocation process. This study discusses some of the key elements and issues of auction design of radio spectrum rights for its efficient allocation. Particularly this study discusses, based on the existing auction theory and other countries' experiences, such issues as bidding rule, value interdependency and sequence of auction, information structure and asymmetric bidder, and wealth constraints and imperfect capital market.

  • PDF

A Study on Vulnerability of Cyber Electronic Warfare and Analysis of Countermeasures for swarm flight of the NBC Reconnaissance Drones (화생방 정찰 드론의 군집비행 시 사이버전자전 취약점 및 대응방안 분석)

  • Kim, Jee-won;Park, Sang-jun;Lee, Kwang-ho;Jung, Chan-gi
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.133-139
    • /
    • 2018
  • The 5 Game changer means the concepts of the army's operation against the enemy's asymmetric threats so that minimize damage to the public and leads to victory in war in the shortest time. A study of network architecture of Dronebot operation is a key study to carry out integrated operation with integrated C4I system by organically linking several drones battle groups through ICT. The NBC reconnaissance drones can be used instead of vehicles and humans to detect NBC materials and share situations quickly. However, there is still a lack of research on the swarm flight of the NBC reconnaissance drones and the weaknesses of cyber electronic warfare. In this study, we present weaknesses and countermeasures of CBRNs in swarm flight operations and provide a basis for future research.

  • PDF

A novel design method for improving collapse resistances of multi-story steel frames with unequal spans using steel braces

  • Zheng Tan;Wei-hui Zhong;Bao Meng;Shi-chao Duan;Hong-chen Wang;Xing-You Yao;Yu-hui Zheng
    • Steel and Composite Structures
    • /
    • v.47 no.2
    • /
    • pp.253-267
    • /
    • 2023
  • The bearing capacities resisted by the two-bay beams of multi-story planar frames with unequal spans under column removal scenarios differ considerably owing to the asymmetric stress on the left and right beams connected to the failed column and cause the potential for beams with larger span-to-depth ratios to be unable to exert effectively, which is disadvantageous for resisting the vertical load in unequal-span frame structures. To address this problem, the structural measure of adding braces to the weak bays of multi-story unequal-span frames was proposed, with the objective of achieving a coordinated stress state in two-bay beams with unequal spans, thereby improving the collapse resistance of unequal-span frame structures. Before conducting the numerical simulation, the modeling methods were verified by previous experimental results of two multi-story planar frames with and without steel braces. Thereafter, the effects of the tensile and compressive braces on the collapse behavior of the frame structures were elucidated. Then, based on the mechanical action laws of the braces throughout the collapse process, a detailed design method for improving the collapse resistance of unequal-span frame structures was proposed. Finally, the proposed design method was verified by using sufficient example models, and the results demonstrated that the design method has good application prospects and high practical value.

Analysis on Hypothetical Multiple Events of mSGTR and SBO at CANDU-6 Plants Using MARS-KS Code (중수로 원전 가상의 mSGTR과 SBO 다중 사건에 대한 MARS-KS 코드 분석)

  • Seon Oh YU;Kyung Won LEE;Kyung Lok BAEK;Manwoong KIM
    • Transactions of the Korean Society of Pressure Vessels and Piping
    • /
    • v.17 no.1
    • /
    • pp.18-27
    • /
    • 2021
  • This study aims to develop an improved evaluation technology for assessing CANDU-6 safety. For this purpose, the multiple steam generator tube rupture (mSGTR) followed by an unmitigated station blackout (SBO) in a CANDU-6 plant was selected as a hypothetical event scenario and the analysis model to evaluate the plant responses was envisioned into the MARS-KS input model. The model includes logic models for controlling the pressure and inventory of the primary heat transport system (PHTS) decreasing due to the u-tubes' rupture, as well as the main features of PHTS with a simplified model for the horizontal fuel channels, the secondary heat transport system including the shell side of steam generators, feedwater and main steam line, and moderator system. A steady state condition was successfully achieved to confirm the stable convergence of the key parameters. Until the turbine trip, the fuel channels were adequately cooled by forced circulation of coolant and supply of main feedwater. However, due to the continuous reduction of PHTS pressure and inventory, the reactor and turbine were shut down and the thermal-hydraulic behaviors between intact and broken loops got asymmetric. Furthermore, as the conditions of low-flow coolant and high void fraction in the broken loop persisted, leading to degradation of decay heat removal, it was evaluated that the peak cladding temperature (PCT) exceeded the limit criteria for ensuring nuclear fuel integrity. This study is expected to provide the technical bases to the accident management strategy for transient conditions with multiple events.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

A 2kβ Algorithm for Euler function 𝜙(n) Decryption of RSA (RSA의 오일러 함수 𝜙(n) 해독 2kβ 알고리즘)

  • Lee, Sang-Un
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.71-76
    • /
    • 2014
  • There is to be virtually impossible to solve the very large digits of prime number p and q from composite number n=pq using integer factorization in typical public-key cryptosystems, RSA. When the public key e and the composite number n are known but the private key d remains unknown in an asymmetric-key RSA, message decryption is carried out by first obtaining ${\phi}(n)=(p-1)(q-1)=n+1-(p+q)$ and then using a reverse function of $d=e^{-1}(mod{\phi}(n))$. Integer factorization from n to p,q is most widely used to produce ${\phi}(n)$, which has been regarded as mathematically hard. Among various integer factorization methods, the most popularly used is the congruence of squares of $a^2{\equiv}b^2(mod\;n)$, a=(p+q)/2,b=(q-p)/2 which is more commonly used then n/p=q trial division. Despite the availability of a number of congruence of scares methods, however, many of the RSA numbers remain unfactorable. This paper thus proposes an algorithm that directly and immediately obtains ${\phi}(n)$. The proposed algorithm computes $2^k{\beta}_j{\equiv}2^i(mod\;n)$, $0{\leq}i{\leq}{\gamma}-1$, $k=1,2,{\ldots}$ or $2^k{\beta}_j=2{\beta}_j$ for $2^j{\equiv}{\beta}_j(mod\;n)$, $2^{{\gamma}-1}$ < n < $2^{\gamma}$, $j={\gamma}-1,{\gamma},{\gamma}+1$ to obtain the solution. It has been found to be capable of finding an arbitrarily located ${\phi}(n)$ in a range of $n-10{\lfloor}{\sqrt{n}}{\rfloor}$ < ${\phi}(n){\leq}n-2{\lfloor}{\sqrt{n}}{\rfloor}$ much more efficiently than conventional algorithms.

The Construction Direction of the ROK NAVY for the Protection of Marine Sovereignty (국가의 해양주권 수호를 위한 한국해군의 전력건설 방향)

  • Shin, In-Kyun
    • Strategy21
    • /
    • s.30
    • /
    • pp.99-142
    • /
    • 2012
  • Withe increased North Korea's security threats, the South Korean navy has been faced with deteriorating security environment. While North Korea has increased asymmetric forces in the maritime and underwater with the development of nuclear weapons, and China and Japan have made a large investment in the buildup of naval forces, the power of the Pacific fleet of the US, a key ally is expected to be weakened. The biggest threat comes from China's intervention in case of full-scale war with North Korea, but low-density conflict issues are also serious problems. North Korea has violated the Armistice Agreement 2,660 times since the end of Korean War, among which the number of marine provocations reaches 1,430 times, and the tension over the NLL issue has been intensifying. With tension mounting between Korea and Japan over the Dokdo issue and conflict escalating with China over Ieo do Islet, the US Navy has confronted situation where it cannot fully concentrate on the security of the Korean peninsula, which leads to need for strengthening of South Korea's naval forces. Let's look at naval forces of neighboring countries. North Korea is threatening South Korean navy with its increased asymmetric forces, including submarines. China has achieved the remarkable development of naval forces since the promotion of 3-step plan to strengthen naval power from 1989, and it now retains highly modernized naval forces. Japan makes an investment in the construction of stat of the art warship every year. Since Japan's warship boasts of its advanced performance, Japan's Maritime Self Defense Force is evaluated the second most powerful behind the US Navy on the assumption that submarine power is not included in the naval forces. In this situation, naval power construction of South Korean navy should be done in phases, focusing on the followings; First, military strength to repel the energy warship quickly without any damage in case of battle with North Korea needs to be secured. Second, it is necessary to develop abilities to discourage the use of nuclear weapons of North Korea and attack its nuclear facilities in case of emergency. Third, construction of military power to suppress armed provocations from China and Japan is required. Based on the above naval power construction methods, the direction of power construction is suggested as follows. The sea fleet needs to build up its war potential to defeat the naval forces of North Korea quickly and participate in anti-submarine operations in response to North Korea's provocations. The task fleet should be composed of 3 task flotilla and retain the power to support the sea fleet and suppress the occurrence of maritime disputes with neighboring countries. In addition, it is necessary to expand submarine power, a high value power asset in preparation for establishment of submarine headquarters in 2015, develop anti-submarine helicopter and load SLAM-ER missile onto P-3C patrol aircraft. In case of maine corps, division class military force should be able to conduct landing operations. It takes more than 10 years to construct a new warship. Accordingly, it is necessary to establish plans for naval power construction carefully in consideration of reality and future. For the naval forces to safeguard maritime sovereignty and contribute to national security, the acquisition of a huge budget and buildup of military power is required. In this regard, enhancement of naval power can be achieved only through national, political and military understanding and agreement. It is necessary to let the nation know that modern naval forces with improved weapon system can serve as comprehensive armed forces to secure the command of the sea, perform defense of territory and territorial sky and attack the enemy's strategic facilities and budget inputted in the naval forces is the essential source for early end of the war and minimization of damage to the people. If the naval power construction is not realized, we can be faced with a national disgrace of usurpation of national sovereignty of 100 years ago. Accordingly, the strengthening of naval forces must be realized.

  • PDF

Enhanced WMAN System based on Region and Time Partitioning D-TDD OFDM Architecture (영역/시간 세분화 D-TDD OFDM 구조에 기반한 새로운 WMAN 시스템 구조 설계)

  • Kim, Mee-Ran;Cheong, Hee-Jeong;Kim, Nak-Myeong
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.11 s.353
    • /
    • pp.68-77
    • /
    • 2006
  • In accommodating the asymmetric traffic for future wireless multimedia services, the dynamic time division duplexing (D-TDD) scheme is considered as one of the key solutions. With the D-TDD mode, however, the inter-BS and inter-MS interference is inevitable during the cross time slot (CTS) period, and this interference seriously degrades the system performance. To mitigate such interference, we propose a region and time partitioning D-TDD architecture for OFDM systems. Each time slot in the CTS period is split into several minislots, and then each cell is divided into as many regions as the number of minislots per time slot. We then assign the minislots only to the users in its predefined corresponding region. On top of such architecture which inherently separates the interfering entities farther from each other, we design a robust time slot allocation scheme so that the inter-cell interference can be minimized. By the computer simulation, it has been verified that the proposed scheme outperforms the conventional time slot allocation methods in both the outage probability and the bandwidth efficiency.