• Title/Summary/Keyword: Leakage information

Search Result 1,523, Processing Time 0.038 seconds

Effect of electron-beam irradiation on leakage current of AlGaN/GaN HEMTs on sapphire

  • Oh, Seung Kyu;Song, Chi Gyun;Jang, Taehoon;Kwak, Joon Seop
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.6
    • /
    • pp.617-621
    • /
    • 2013
  • This study examined the effect of electron-beam (E-beam) irradiation on the electrical properties of n-GaN, AlGaN and AlGN/GaN structures on sapphire substrates. E-beam irradiation resulted in a significant decrease in the gate leakage current of the n-GaN, AlGaN and HEMT structure from $4.0{\times}10^{-4}A$, $6.5{\times}10^{-5}A$, $2.7{\times}10^{-8}A$ to $7.7{\times}10^{-5}A$, $7.7{\times}10^{-6}A$, $4.7{\times}10^{-9}A$, respectively, at a drain voltage of -10V. Furthermore, we also investigated the effect of E-beam irradiation on the AlGaN surface in AlGaN/GaN heterostructure high electron mobility transistors(HEMTs). The results showed that the maximum drain current density of the AlGaN/GaN HEMTs with E-beam irradiation was greatly improved, when compared to that of the AlGaN/GaN HEMTs without E-beam irradiation. These results strongly suggest that E-beam irradiation is a promising method to reduce leakage current of AlGaN/GaN HEMTs on sapphire through the neutralization the trap.

Mechanism and Application of NMOS Leakage with Intra-Well Isolation Breakdown by Voltage Contrast Detection

  • Chen, Hunglin;Fan, Rongwei;Lou, Hsiaochi;Kuo, Mingsheng;Huang, Yiping
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.13 no.4
    • /
    • pp.402-409
    • /
    • 2013
  • An innovative application of voltage-contrast (VC) inspection allowed inline detection of NMOS leakage in dense SRAM cells is presented. Cell sizes of SRAM are continual to do the shrinkage with bit density promotion as semiconductor technology advanced, but the resulting challenges include not only development of smaller-scale devices, but also intra-devices isolation. The NMOS leakage caused by the underneath n+/P-well shorted to the adjacent PMOS/N-well was inspected by the proposed electron-beam (e-beam) scan in which VC images were compared during the in-line process step of post contact tungsten (W) CMP (Chemical Mechanical Planarization) instead of end-of-line electrical test, which has a long response time. A series of experiments based on the mechanism for improving the intra-well isolation was performed and verified by the inline VC inspection. An optimal process-integration condition involved to the tradeoff between the implant dosage and photo CD was carried out.

Magnetic Flux Leakage (MFL) based Defect Characterization of Steam Generator Tubes using Artificial Neural Networks

  • Daniel, Jackson;Abudhahir, A.;Paulin, J. Janet
    • Journal of Magnetics
    • /
    • v.22 no.1
    • /
    • pp.34-42
    • /
    • 2017
  • Material defects in the Steam Generator Tubes (SGT) of sodium cooled fast breeder reactor (PFBR) can lead to leakage of water into sodium. The water and sodium reaction will lead to major accidents. Therefore, the examination of steam generator tubes for the early detection of defects is an important requirement for safety and economic considerations. In this work, the Magnetic Flux Leakage (MFL) based Non Destructive Testing (NDT) technique is used to perform the defect detection process. The rectangular notch defects on the outer surface of steam generator tubes are modeled using COMSOL multiphysics 4.3a software. The obtained MFL images are de-noised to improve the integrity of flaw related information. Grey Level Co-occurrence Matrix (GLCM) features are extracted from MFL images and taken as input parameter to train the neural network. A comparative study on characterization have been carried out using feed-forward back propagation (FFBP) and cascade-forward back propagation (CFBP) algorithms. The results of both algorithms are evaluated with Mean Square Error (MSE) as a prediction performance measure. The average percentage error for length, depth and width are also computed. The result shows that the feed-forward back propagation network model performs better in characterizing the defects.

Nonlinear Regression on Cold Tolerance Data for Brassica Napus

  • Yang, Woohyeong;Choi, Myeong Seok;Ahn, Sung Jin
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.2721-2731
    • /
    • 2018
  • This study purposes to derive the predictive model for the cold tolerance of Brassica napus, using the data collected in the Tree Breeding Lab of Gyeongsang National University during July and August of 2016. Three Brassica napus samples were treated at each of low temperatures from $4^{\circ}C$ to $-12^{\circ}C$ by decrement of $4^{\circ}C$, step by step, and electrolyte leakage levels were measured at each stage. Electrolyte leakages were observed tangibly from $-4^{\circ}C$. We tried to fit the six nonlinear regression models to the electrolyte leakage data of Brassica napus: 3-parameter logistic model, baseline logistic model, 4-parameter logistic model, (4-1)-parameter logistic model, 3-parameter Gompertz model, and (3-1)-parameter Gompertz model. The baseline levels of the electrolyte leakage estimated by these models were 4.81%, 4.07%, 4.19%, 4.07%, 4.55%, and 0%, respectively. The estimated median lethal temperature, LT50, were $-5.87^{\circ}C$, $-6.31^{\circ}C$, $-6.05^{\circ}C$, $-6.35^{\circ}C$, $-4.98^{\circ}C$, and $-5.15^{\circ}C$, respectively. We compared and discussed the measures of goodness of fit to select the appropriate nonlinear regression model.

DetGas: A Carbon Monoxide Gas Leakage Detector Mobile Application

  • Kamaruddin, Farhan Fikri Mohd;Hadiana, Ana;Lokman, Anitawati Mohd
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.59-66
    • /
    • 2021
  • Many incidents of Carbon Monoxide (CO) poisoning have occurred because of people being unaware of its presence. There are currently available systems on the market, but they are limited to measuring CO in a certain area and lack vital functions. Additionally, little to no evidence-based information on their quality was available. Thus, a mobile application for detecting CO gas leakage in a vehicle and critical features to assist victims was developed. A usability and functionality test were conducted to determine the product's quality utilizing nine usability and six functionality task scenarios (n=5). Then, a System Usability Scale test was performed to obtain system satisfaction, usability, and learnability (n=50). The usability and functionality test shows that all the tasks given for both tests were 100% successful. The overall score obtained for SUS was 71.4, which indicates good acceptance and usability. Around 20% of respondents claimed that they would need the support of a technical person to be able to use the application and that they needed to learn a lot of things before they could use the application, which indicates the overall high learnability of the application. The result provides empirical evidence that the CO gas leakage detection mobile application is successful and receives good usability, functionality, acceptability, learnability, and satisfaction assessments. DetGas could benefit automobile owners and other stakeholders by mitigating the risk and harm associated with gas leaking that exceeds the safe limit.

Integrated Monitoring System using Log Data (로그 데이터를 이용한 통합모니터링 시스템)

  • Jeon, Byung-Jin;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2017
  • In this paper, we propose to implement an integrated monitoring system using log data to reduce the load of analysis task of information security officer and to detect information leak in advance. To do this, we developed a transmission module between different model DBMS that transmits large amount of log data generated by the individual security system (MSSQL) to the integrated monitoring system (ORACLE), and the transmitted log data is digitized by individual and individual and researches about the continuous inspection and measures against malicious users when the information leakage symptom is detected by using the numerical data.

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

A Study on Anomaly Detection Model using Worker Access Log in Manufacturing Terminal PC (제조공정 단말PC 작업자 접속 로그를 통한 이상 징후 탐지 모델 연구)

  • Ahn, Jong-seong;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.321-330
    • /
    • 2019
  • Prevention of corporate confidentiality leakage by insiders in enterprises is an essential task for the survival of enterprises. In order to prevent information leakage by insiders, companies have adopted security solutions, but there is a limit to effectively detect abnormal behavior of insiders with access privileges. In this study, we use the Unsupervised Learning algorithm of the machine learning technique to effectively and efficiently cluster the normal and abnormal access logs of the worker's work screen in the manufacturing information system, which includes the company's product manufacturing history and quality information. We propose an optimal feature selection model for anomaly detection by studying clustering methods.

Safe Web Using Scrapable Headless Browser in Network Separation Environment

  • Jung, Won-chi;Park, Jeonghun;Park, Namje
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.77-85
    • /
    • 2019
  • In this paper, we propose a "Safe Web Using Scrapable Headless Browse" Because in a network separation environment for security, It does not allow the Internet. The reason is to physically block malicious code. Many accidents occurred, including the 3.20 hacking incident, personal information leakage at credit card companies, and the leakage of personal information at "Interpark"(Internet shopping mall). As a result, the separation of the network separate the Internet network from the internal network, that was made mandatory for public institutions, and the policy-introduction institution for network separation was expanded to the government, local governments and the financial sector. In terms of information security, network separation is an effective defense system. Because building a network that is not attacked from the outside, internal information can be kept safe. therefore, "the separation of the network" is inefficient. because it is important to use the Internet's information to search for it and to use it as data directly inside. Using a capture method using a Headless Web browser can solve these conflicting problems. We would like to suggest a way to protect both safety and efficiency.

Cookies (쿠키)

  • Yeon, Jea-Young
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.567-571
    • /
    • 2008
  • As computer technology grows, the risk of personal information leak on the internet is also increasing. A so-called "cookie" is used as one of the ways personal information leaks. A cookie offers convenience on the internet but serves as a major reason for personal information leakage at the same time. In this paper, we discuss risks and potential managements of a cookie.

  • PDF