• Title/Summary/Keyword: Leakage information

Search Result 1,515, Processing Time 0.033 seconds

A Low Leakage SRAM Using Power-Gating and Voltage-Level Control (파워게이팅과 전압레벨조절을 이용하여 누설전류를 줄인 SRAM)

  • Yang, Byung-Do;Cheon, You-So
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.49 no.8
    • /
    • pp.10-15
    • /
    • 2012
  • This letter proposes a low-leakage SRAM using power-gating and voltage-level control. The power-gating scheme significantly reduces leakage power by shutting off the power supply to blank memory cell blocks. The voltage-level control scheme saves leakage power by raising the ground line voltage of SRAM cells and word line decoders in data-stored memory cell blocks. A $4K{\times}8bit$ SRAM chip was fabricated using a 1.2V $0.13{\mu}m$ CMOS process. The leakage powers are $1.23{\sim}9.87{\mu}W$ and $1.23{\sim}3.01{\mu}W$ for 0~100% memory usage in active and sleep modes, respectively. During the sleep mode, the proposed SRAM consumes 12.5~30.5% leakage power compared to the conventional SRAM.

Current Unbalance Improved Half-bridge LLC Resonant Converter using the Two Transformers (두 개의 변압기를 이용한 전류불균형 개선 하프브리지 LLC 공진형 컨버터)

  • Yoo, Doo-Hee;Jeong, Gang-Youl
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.2
    • /
    • pp.497-507
    • /
    • 2010
  • This paper presents current unbalance improved half-bridge LLC resonant converter using the two transformers with different leakage inductances. The proposed converter resonates with the leakage inductance and magnetizing inductance of the transformer and the resonant capacitance. The converter operates in a wide load range and satisfies the zero voltage switching even under the light load. The series-parallel connected two transformers act as the transformers or the resonant inductances according to the operational modes, and the separate output filter inductance in the transformer secondary is not needed using the leakage inductance. The current unbalance of the secondary diode rectifier is improved using the different leakage inductances of the two transformers and the asymmetrical pulse-width modulation (PWM). In this paper, the operational principle of the converter is explained by the modes, and the design example for the prototype is also shown. To validate the performance of the converter, the prototype is implemented as the designed circuit parameters and the good performance of the proposed converter is shown through the experimental results

Analysis of impact of CATV leakage on CDMA Mobile Communication Systems (CDMA 이동통신시스템에 대한 케이블 방송 전송설비 누설전자파 영향 분석)

  • Park, Seong-Gyoon;Han, Chan-Kyu
    • Journal of IKEEE
    • /
    • v.15 no.3
    • /
    • pp.218-226
    • /
    • 2011
  • In this paper, the leaky electric field intensity of outdoor CATV facilities on CDMA mobile service band defined in technical regulation related with CATV is investigated if appropriate or not. From experimental and theoretical analysis results, Maximum allowable power level of CATV leakage should be -110dBm/1.23MHz. Also, the CATV leakage intensity thresholds, which may not nearly give an impact on the uplink performance of CDMA mobile base station for outdoor background noise of -100~-80dBm/1.23MHz to be measured in outdoor environment, couldn't conform to the current CATV technical regulation. Therefore, the leakage intensity in the current CATV technical regulation is rated as a too much low level in view of an overly worst case.

The Efficient Signal Estimation Method for Monitor Electromagnetic Signal (모니터 전자파 신호를 위한 효과적인 신호 추정 기법)

  • Lee, Hyun-So;Kim, Kyung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.9-18
    • /
    • 2008
  • Recently according to the development of an information society the information technology equipments which a clock frequency has the facility over a number giga hertz have been developed much. And we have research which leakage electromagnetic signals can use at the communication security and tapping. In this paper, we restored leakage electromagnetic signals of the monitors. And we proposed efficient recovery technique to restore the screen of the monitor. First of all, we understand a screen characteristic of the monitor. And then we restored a monitor screen from leakage electromagnetic signals from the monitor. For also we tried to use a Wavelet transform and filters to remove the noise for better performance. In the result of the experiment, we used leakage electromagnetic signals and confirmed the possibility of a monitor screen of the recovery. And we improve the performance with Wavelet transform and filters.

  • PDF

Leakage Current Waveforms and Spectrum Analysis on Polymer Insulator of EPDM under Salt fog (SALT FOG시 EPDM고분자애자의 누설전류파형과 스펙트럼분석)

  • 박재준;양태규
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.500-504
    • /
    • 2004
  • This research is about the result of leakage current waveform about the situation of surface leakage current and environmental changes(Salt fog, clean fog and rain) by EPDM polymer insulators' amount of salt. The researcher presents the result of changing about fundamental harmonic, 3rd harmonic and 5th harmonic from starting point of supplying power to flashover. In this study, researched environmental affects (clean fog, salt fog and .am) about surface aging of polymer insulators and used frequency spectrum of leakage current waveform to develop the diagnostic technique of surface aging. When amount of salt contents changed, surface aging stage and the degree of aging (distortion factor) about 3rd and 5th harmonir waveform on low frequency harmonic wave. The distortion factor which is harmonic percentage about basic harmonic is important pointer to evaluate the surface condition of polymer insulators.

  • PDF

A Study on Security Solution for USB Flash Drive (USB 메모리를 위한 보안 솔루션에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.93-101
    • /
    • 2010
  • A USB flash drive is a portable storage device. For its promising moderate price, portability and high capacity USB flash drive users are increasing rapidly. Despite these advantages USB flash drives have critical problems as well. Such as personal information data leakage due to easy loss of the portable device. As these personal information leakage incidents increases various security measure solutions are produced and distributed. Despite these security measures and solutions it is not enough to perfectly protect personal data leakage. Hence the necessity of a more concrete, secure, user-friendly security measure solution is required. In this paper we provide you with portable USB flash drive security solution analysis and provide you with the latest secure, user-friendly security measure solutions.

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

The Effect of Technology Infringement on Consumer's Attitude Change Depending on Brand Reputation: Focusing on the Under-dog Effect of Weak Brand (브랜드 명성에 따른 기술 침해에 대한 소비자의 태도 변화: 약자 브랜드의 언더독 효과를 중심으로)

  • Kim, Keon-Woo;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.167-187
    • /
    • 2018
  • Purpose The purpose of this study is to confirm the factors for explaining the consumer behavior when occur patent litigation and technology infringement of each conditions which are brand reputation gap, technology importance and technology leakage attribution based on the Attribution Theory. Design/methodology/approach This study made a design of the research model by 2x2x2 factorial design deducted and performed 3-way ANOVA then analyzed 2-way AVOVA with brand reputation gap as center from technology importance and technology leakage attribution on the basis of the Attribution Theory. Findings According to the empirical analysis result, this study confirmed that consumer attitude has no difference regardless of technology leakage attribution when top-dog vs. under-dog situation and top-dog vs. top-dog situation. Also, this study confirmed that when under-dog infringe important technology, consumer show more positive attitude than the other. On the other hand, top-dog infringe important technology, consumer show more negative attitude than the other.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.