• Title/Summary/Keyword: Leakage information

Search Result 1,515, Processing Time 0.029 seconds

A study on Design and Performance Evaluation of the BCPFSK Modem (BCPFSK 모뎀 설계 및 성능 평가에 관한 연구)

  • 조형래;김경복
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.5
    • /
    • pp.869-876
    • /
    • 2001
  • In modern wireless communication, it has been regarded as a important problem for the spectrum efficiency to utilize the limited frequency-resource efficiently. In addition, the system architecture has been designed for low cost, low power consumption and ultra-lightweight. In this paper, we directly modulated the BCPFSK with a superior spectrum efficiency using the DDS and applied the direct conversion to the system architecture. Finally, we designed a transceiver which has the 433 MHz BCPFSK output and evaluated the system performance. In the measured result, we know that as for spectrum and the power efficiency, BCPFSK method is better than conventional one. Also, the results of the designed system is 433.92 MHz in center frequency and about 33 dBc in carrier suppression ratio. And we get the better results in local oscillator leakage and the spurious of the ISM out-band the same as -69dBc and under 60dBc.

  • PDF

Study of charge trap flash memory device having Er2O3/SiO2 tunnel barrier (Er2O3/SiO2 터널베리어를 갖는 전하트랩 플래시 메모리 소자에 관한 연구)

  • An, Ho-Myung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.789-790
    • /
    • 2013
  • $Er_2O_3/SiO_2$ double-layer gate dielectric shows low gate leakage current and high capacitance. In this paper, we apply $Er_2O_3/SiO_2$ double-layer gate dielectric as a charge trap layer for the first time. $Er_2O_3/SiO_2$ double-layer thickness is optimized by EDISON Nanophysics simulation tools. Using the simulation results, we fabricated Schottky-barrier silicide source/drain transistor, which has10 um/10um gate length and width, respectively. The nonvolatile device demonstrated very promising characterstics with P/E voltage of 11 V/-11 V, P/E speed of 50 ms/500 ms, data retention of ten years, and endurance of $10^4$ P/E cycles.

  • PDF

Construction of Security Evaluation Criteria for Web Application Firewall (웹방화벽의 보안성 평가 기준의 구축)

  • Lee, Ha-Yong;Yang, Hyo-Sik
    • Journal of Digital Convergence
    • /
    • v.15 no.5
    • /
    • pp.197-205
    • /
    • 2017
  • To achieve web application security goals effectively by providing web security features such as information leakage prevention, web application firewall system must be able to achieve the goal of enhancing web site security and providing secure services. Therefore, it is necessary to study the security evaluation of web application firewall system based on related standards. In this paper, we analyze the requirements of the base technology and security quality of web application firewall, and established the security evaluation criteria based on the international standards for software product evaluation. Through this study, it can be expected that the security quality level of the web application firewall system can be confirmed and the standard for enhancing the quality improvement can be secured. As a future research project, it is necessary to continuously upgrade evaluation standards according to international standards that are continuously changing.

A Fundamental Study on Leak Detection System for Water Supply Valve Using Smart Bolt (상수도 밸브 누수 탐지용 스마트 볼트 적용의 기초 연구)

  • Park, Chul;Kim, Young-seok;Jung, Hae-Wook;Choi, Sang-sik;Lee, Yong-Beom
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.144-154
    • /
    • 2020
  • Purpose: This paper is a fundamental study on the applicability of the smart bolt developed for monitoring system to detect the leakage of water supply valve. Method: A leak detection experiments were conducted using the smart bolt having embedded strain sensors and accelerometer. The smart bolt used in study meets the allowable criteria of torque and tensile stress for water supply system, and it can be applied to a joint of the water supply valve by behaving well within the allowable limits. Result: As a result of the simulated leak tests, a leak signal at the valve leak point was detected in a band of 60Hz, and the main pipe leaking point was observed to produce a leak signal having much higher frequency than that of the valve leak point. This seems to result in a total coupled vibration under unconfined conditions of the pipes. Conclusion: The smart bolts appeared applicable to detecting a leaking signal from the water supply valve.

The characteristics of $(Ba_{0.5},Sr_{0.5})TiO_3$ thin films deposited on ITO glass for TFELD insulating layer (TFELD 절연층을 위해 ITO glass위에 증착시킨 $(Ba_{0.5},Sr_{0.5})TiO_3$ 박막의 특성)

  • Kim, Jeong-Hwan;Bae, Seung-Choon;Park, Sung-Kun;Kwon, Sung-Ryul;Choi, Byung-Jin;Nam, Gi-Hong;Kim, Ki-Wan
    • Journal of Sensor Science and Technology
    • /
    • v.9 no.1
    • /
    • pp.83-89
    • /
    • 2000
  • BST thin films were deposited on the ITO coated glass for using TFELD insulating layer by rf magnetron sputtering method. $O_2/(Ar+O_2)$ mixing ratio was 10%, substrate temperature was changed from R.T. to $500^{\circ}C$, and working pressure was changed from 5 mTorr to 30 mTorr. BST thin films deposited with various conditions were investigated electrical, optical, structural properties, and stoichiometry. The result of investigation was achieved good fabrication condition that substrate temperature of $400^{\circ}C$, and working pressure of 30 mTorr. Relative dielectric constant of 254 at 1 kHz, leakage current density was below $3.3{\times}10^{-7\;}A/cm^2$ at 5\;MV/cm applied electric field, and transmittance was over 82% at visible range.

  • PDF

Hop-by-Hop Dynamic Addressing Based Routing Protocol for Monitoring of long range Underwater Pipeline

  • Abbas, Muhammad Zahid;Bakar, Kamalrulnizam Abu;Ayaz, Muhammad;Mohamed, Mohammad Hafiz;Tariq, Moeenuddin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.2
    • /
    • pp.731-763
    • /
    • 2017
  • In Underwater Linear Sensor Networks (UW-LSN) routing process, nodes without proper address make it difficult to determine relative sensor details specially the position of the node. In addition, it effects to determine the exact leakage position with minimized delay for long range underwater pipeline monitoring. Several studies have been made to overcome the mentioned issues. However, little attention has been given to minimize communication delay using dynamic addressing schemes. This paper presents the novel solution called Hop-by-Hop Dynamic Addressing based Routing Protocol for Pipeline Monitoring (H2-DARP-PM) to deal with nodes addressing and communication delay. H2-DARP-PM assigns a dynamic hop address to every participating node in an efficient manner. Dynamic addressing mechanism employed by H2-DARP-PM differentiates the heterogeneous types of sensor nodes thereby helping to control the traffic flows between the nodes. The proposed dynamic addressing mechanism provides support in the selection of an appropriate next hop neighbour. Simulation results and analytical model illustrate that H2-DARP-PM addressing support distribution of topology into different ranges of heterogeneous sensors and sinks to mitigate the higher delay issue. One of the distinguishing characteristics of H2-DARP-PM has the capability to operate with a fewer number of sensor nodes deployed for long-range underwater pipeline monitoring.

Automatic Segmentation of Femoral Cartilage in Knee MR Images using Multi-atlas-based Locally-weighted Voting (무릎 MR 영상에서 다중 아틀라스 기반 지역적 가중투표를 이용한 대퇴부 연골 자동 분할)

  • Kim, Hyeun A;Kim, Hyeonjin;Lee, Han Sang;Hong, Helen
    • Journal of KIISE
    • /
    • v.43 no.8
    • /
    • pp.869-877
    • /
    • 2016
  • In this paper, we propose an automated segmentation method of femoral cartilage in knee MR images using multi-atlas-based locally-weighted voting. The proposed method involves two steps. First, to utilize the shape information to show that the femoral cartilage is attached to a femur, the femur is segmented via volume and object-based locally-weighted voting and narrow-band region growing. Second, the object-based affine transformation of the femur is applied to the registration of femoral cartilage, and the femoral cartilage is segmented via multi-atlas shape-based locally-weighted voting. To evaluate the performance of the proposed method, we compared the segmentation results of majority voting method, intensity-based locally-weighted voting method, and the proposed method with manual segmentation results defined by expert. In our experimental results, the newly proposed method avoids a leakage into the neighboring regions having similar intensity of femoral cartilage, and shows improved segmentation accuracy.

Design and Implementation of Malicious Application Detection System Using Event Aggregation on Android based Mobile Devices (안드로이드 모바일 단말에서의 이벤트 수집을 통한 악성 앱 탐지 시스템 설계 및 구현)

  • Ham, You Joung;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.35-46
    • /
    • 2013
  • As mobile terminal environment gets matured, the use of Android platform based mobile terminals has been growing high. Recently, the number of attacks by malicious application is also increasing as Android platform is vulnerable to private information leakage in nature. Most of these malicious applications are easily distributed to general users through open market or internet and an attacker inserts malicious code into malicious app which could be harmful tool to steal private data and banking data such as SMS, contacts list, and public key certificate to a remote server. To cope with these security threats more actively, it is necessary to develop countermeasure system that enables to detect security vulnerability existing in mobile device and take an appropriate action to protect the system against malicious attacks. In this sense, this paper aggregates diverse system events from multiple mobile devices and also implements a system to detect attacks by malicious application.

Error Handling and Data Synchronization in Policy and Charging Control Architecture in WiMAX (WiMAX 정책 제어 시스템의 정보 동기화)

  • Seol, Soonuk;Cho, Sungsoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.355-367
    • /
    • 2013
  • In the Policy and Charging Control(PCC) architecture of the 3GPP and WiMAX forum, the Policy and Charging Rule Function(PCRF) controls and configures the policies of quality of services(QoS) and accounting to a Policy and Charging Rule Enforcement Function(PCEF). In this paper, we categorize the errors into three types that include a disconnection with peer entity, a delayed or no response and a response with failure result, and propose a scheme to automatically synchronize the data between the PCRF and the PCEF for each type of error. Also, we conduct a quantitative analysis to see how much it can help to maintain the cell capacity of the mobile VoIP service in a WiBro network, which is implemented in Korea according to the standards of WiMAX. We can see that our proposed scheme improves the performances of PCC by preventing the waste of radio resources, the overload of systems, the memory leakage of servers, the system shutdown, and so on. We have validated the scheme by implementation, and reflected it in WiMAX standard documents.

A Study on the Priority Order Evaluation of the Water Supply Monitoring Technology Development for the Intelligent Underground Facility Management (지능형 지하시설물관리를 위한 상수도 모니터링 기술개발의 우선순위 평가에 관한 연구)

  • Kim, Jung-Hoon;Yi, Mi-Sook;Han, Jay-Il
    • Spatial Information Research
    • /
    • v.16 no.2
    • /
    • pp.263-278
    • /
    • 2008
  • Nowaday, local governments have planned to manage intelligent underground facilities through the u-City project. But, the intelligent underground facilities are in need of the progressive approach because of the required huge financial resources. Therefore, the objectives of this research are (1) to prioritize the monitoring items of sensing technology developments, (2) to study technological feasibilities, and (3) to discover the killer application which expands ripple effects on economy. To achieve these objectives, final monitoring items were derived from the business analysis of the water supply, the local government survey, the hearing expert opinions and so on. The priority order of final monitoring items were technology developments of (1) the flowmeter flux, (2) the water leakage/crack, (3) the pressure of water supply pipes, and (4) the flux of filtration plants. The research significance is obtained from the derivation and the evaluation of the priority order and the actual demand for the water supply facility management. And, the research results will contribute to the strategic planning for the underground facility intelligence.

  • PDF