• Title/Summary/Keyword: Information Storage Device

Search Result 458, Processing Time 0.027 seconds

Write Characteristics of Silicon Resistive Probe

  • Jung, Young-Ho;Kim, Jun-Soo;Shin, Hyung-Cheol
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.821-824
    • /
    • 2005
  • Probe storage is one of the strong candidates for future mobile storage device since it has potential of recording density over I $Tb/in^2$ with r/w speed over 100 Mbps. It also uses silicon-processing technology that suits the purpose of small form factor. In this paper, write characteristics of resistive probe that can rotate the field direction of PZT by field-induced resistance changes in a small resistive region at the apex of the tip will be presented. Also, the relationship between the size of tip and the available write width is investigated for different source bias conditions. For this study, two-dimensional computer simulation ($SILVACO^{TM}$) was performed. With optimum design, the width of the writing electric field can be smaller than 50nm

  • PDF

Soft Error Rate Simulator for DRAM (DRAM 소프트 에러율 시뮬레이터)

  • Shin, Hyung-Soon
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.2
    • /
    • pp.55-61
    • /
    • 1999
  • A soft error rate (SER) simulator for DRAM was developed. In comparison to the other SER simulator using device simulator or Monte Carlo simulator, the proposed simulator substantially reduced the CPU time using an analytical model for the alpha-particle-induced charge collection. By analysing the soft error modes in DRAM, the bit-bar mode was identified as the main cause of soft error. Using the new SER simulator, SER of 256M DRAM was investigated and it was found that the storage capacitance had a 5fF margin.

  • PDF

The Structure and Operation of KOMPSAT-II Memory (다목적실용위성 2호 메모리 구조와 운영)

  • 이종태;이상규;이상택;이도경
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.421-424
    • /
    • 2003
  • The KOMPSAT-II has a MSC(Multi-Spectral Camera) payload for earth observatory. The image data acquired during the pass over the Korean Peninsula can be sent to the ground station directly. But the image data out of the contact range should be stored temporally for later transmission. The KOMPSAT-II has a device for this purpose called the DCSU(Data Compression and Storage Unit) and the DCSU also performs compression functions for saving storage space and transmission time to send image data to the ground station. In this paper, we'd like to introduce the DCSU memory structures and operation.

  • PDF

Design of a GIS-based Smart Pipeline Information Management System Combining DGPS RTK and Surround View (DGPS RTK와 서라운드 영상을 융합한 GIS 기반 스마트 관로정보 관리시스템 설계)

  • Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.3
    • /
    • pp.125-129
    • /
    • 2023
  • In this paper, we propose a method to design and implement a smart pipeline information management system that can provide visualization information linked to GIS and roadmap based on the construction of precise pipeline buried information. The smart pipeline information management system consists of a positioning device for high-precision pipeline location measurement and surround view image data recording, a database for data storage and management, and a mobile app for remote monitoring and management. It connects surrounding image data and location data with GIS and roadmap. Convenience and accessibility of management can be improved.

  • PDF

A Study on the Prefetch Method for Multimedia Presentations to play on the Low Bandwidth Mobile Devices (낮은 대역폭을 갖는 이동 단말기에서 멀티미디어 프리젠테이션을 재생하기 위한 프리패치 방법)

  • Hong Maria;Yang Hyuck;Lim Young-Haw
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.65-74
    • /
    • 2003
  • Recently, It is required that multimedia data display on not only PC but also the Mobile device such as cellar phone, PDA. Mobile divieces has not sufficient of storage space or main memory and has slow network speed. So we can't process the multimedia data with the existing way on PC. This paper presents various methods for MultimediaPresentation which are able to display on the mobile device with the low-bandwidth and small storage. There Is an analysis that Is playable on the mobile device using presentation area devision method and replayable analysis method. If the display of multimedia presentation is impossible from this analysis, to apply prefetch techniques a using EPOB apoint and as User QoS of multimedia data through prefetch techniques have keep, do so that playable. Then, it is proposed to playable smooth multimedia presentation as that each of the presentations through prefetch Scheduling techniques point and quantity of data which are prefetch.

  • PDF

Comparator design using high speed Bipolar device (고속 Bipolar 소자를 이용한 comparator 설계)

  • Park Jin-Woo;Cho Jung-Ho;Gu Young Sea;An Chel
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.351-354
    • /
    • 2004
  • This thesis presents Bipolar transistor with SAVEN(Self-Aligned VErtical Nitride) structure as a high-speed device which is essential for high-speed system such as optical storage system or mobile communication system, and proposes 0.8${\mu}m$ BiCMOS Process which integrates LDD nMOS, LDD pMOS and SAVEN bipolar transistor into one-chip. The SPICE parameters of LDD nMOS, LDD pMOS and SAVEN Bipolar transistor are extracted, and comparator operating at 500MHz sampling frequency is designed with them. The small Parasitic capacitances of SAVEN bipolar transistor have a direct effect on decreasing recovery time and regeneration time, which is helpful to improve the speed of the comparator. Therefore the SAVEN bipolar transistor with high cutoff frequency is expected to be used in high-speed system.

  • PDF

Technology of MRAM (Magneto-resistive Random Access Memory) Using MTJ(Magnetic Tunnel Junction) Cell

  • Park, Wanjun;Song, I-Hun;Park, Sangjin;Kim, Teawan
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.2 no.3
    • /
    • pp.197-204
    • /
    • 2002
  • DRAM, SRAM, and FLASH memory are three major memory devices currently used in most electronic applications. But, they have very distinct attributes, therefore, each memory could be used only for limited applications. MRAM (Magneto-resistive Random Access Memory) is a promising candidate for a universal memory that meets all application needs with non-volatile, fast operational speed, and low power consumption. The simplest architecture of MRAM cell is a series of MTJ (Magnetic Tunnel Junction) as a data storage part and MOS transistor as a data selection part. To be a commercially competitive memory device, scalability is an important factor as well. This paper is testing the actual electrical parameters and the scaling factors to limit MRAM technology in the semiconductor based memory device by an actual integration of MRAM core cell. Electrical tuning of MOS/MTJ, and control of resistance are important factors for data sensing, and control of magnetic switching for data writing.

Implementation of Telebiometrics Application System Using Mobile Device

  • Shin, Yong-Nyuo;Kim, Jae-Sung
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.34-40
    • /
    • 2014
  • Today, with the wide use of mobile devices, the amount of business transactions conducted through such devices is increasing drastically. However, there are several limitations in the area of authentication for mobile use, which requires strong authentication mechanisms to satisfy security and convenience requirements. The proposed model and application system provide a framework to ensure the security and reliability of the flow of biometric information for telebiometric applications using mobile devices. We also specify protocols for each model and implement a mobile telebiometric application to improve security vulnerabilities compared to storage in a microSD match on card (MOC) based on the proposed model. As a consequence of this implementation, we propose substantial guidelines for security countermeasures from both technical and managerial perspectives in order to establish a safe mobile environment for the use of telebiometric systems.

Improved Identity-Based Broadcast Encryption (개선된 Identity 기반의 브로드캐스트 암호화 기법)

  • Kim, Ki-Tak;Park, Jong-Hwan;Lee, Dong-Hoon
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.347-349
    • /
    • 2008
  • The primitive of Identity-Based Broadcast Encryption allows a sender to distribute session keys or messages for a dynamically changing set of receivers using the receiver's identity as a public key. We already know that the trade-off exists the efficiency between the public parameter size and the ciphertext size. So, if the ciphertext size is O(1), then the public parameter size may be O(n). Some of IBBE scheme take the public parameters as input in decryption phase. Thus, a decryption device (or client) has to store the public parameters or receive it. This means that a decryption device (or client) has to have the proper size storage. Recently, delerabl$\square$e proposed an IBBE which have the O(1) size ciphertexts and the O(n) size public parameters. In this paper, we present an IBBE scheme. In our construction the ciphertext size and the public parameter size are sub-linear in the total number of receivers, and the private key size is constant.

  • PDF

IoT-based Application of Information Security Triad

  • Mana Saleh Al Reshan
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.9
    • /
    • pp.85-92
    • /
    • 2024
  • Information Security is the foremost concern for IoT (Internet of things) devices and applications. Since the advent of IoT, its applications and devices have experienced an exponential increase in numerous applications which are utilized. Nowadays we people are becoming smart because we started using smart devices like a smartwatch, smart TV, smart home appliances. These devices are part of the IoT devices. The IoT device differs widely in capacity storage, size, computational power, and supply of energy. With the rapid increase of IoT devices in different IoT fields, information security, and privacy are not addressed well. Most IoT devices having constraints in computational and operational capabilities are a threat to security and privacy, also prone to cyber-attacks. This study presents a CIA triad-based information security implementation for the four-layer architecture of the IoT devices. An overview of layer-wise threats to the IoT devices and finally suggest CIA triad-based security techniques for securing the IoT devices..Make sure that the abstract is written as one paragraph.