• Title/Summary/Keyword: Performance of protecting

Search Result 292, Processing Time 0.02 seconds

Novel Punch-through Diode Triggered SCR for Low Voltage ESD Protection Applications

  • Bouangeune, Daoheung;Vilathong, Sengchanh;Cho, Deok-Ho;Shim, Kyu-Hwan;Leem, See-Jong;Choi, Chel-Jong
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.6
    • /
    • pp.797-801
    • /
    • 2014
  • This research presented the concept of employing the punch-through diode triggered SCRs (PTTSCR) for low voltage ESD applications such as transient voltage suppression (TVS) devices. In order to demonstrate the better electrical properties, various traditional ESD protection devices, including a silicon controlled rectifier (SCR) and Zener diode, were simulated and analyzed by using the TCAD simulation software. The simulation result demonstrates that the novel PTTSCR device has better performance in responding to ESD properties, including DC dynamic resistance and capacitance, compared to SCR and Zener diode. Furthermore, the proposed PTTSCR device has a low reverse leakage current that is below $10^{-12}$ A, a low capacitance of $0.07fF/mm^2$, and low triggering voltage of 8.5 V at $5.6{\times}10^{-5}$ A. The typical properties couple with the holding voltage of 4.8 V, while the novel PTTSCR device is compatible for protecting the low voltage, high speed ESD protection applications. It proves to be good candidates as ultra-low capacitance TVS devices.

A Cell-to-Cell Fast Balancing Circuit for Lithium-Ion Battery Module (리튬이온 배터리 모듈을 위한 단일셀간 고속 밸런싱 회로)

  • Pham, Van-Long;Basit, Khan Abdul;Nguyen, Thanh-Tung;Choi, Woojin
    • Proceedings of the KIPE Conference
    • /
    • 2015.11a
    • /
    • pp.7-8
    • /
    • 2015
  • In this paper a cell-to-cell fast charge balancing circuit for the Lithium-Ion battery module is proposed. In the proposed topology the energy in a high voltage cell is transferred directly to a low voltage cell through the operation of the dc-dc converter. Furthermore, the charge balancing can be performed regardless of the battery operation whether it is being charged, discharged or relaxed. The monitoring circuit composed of a DSP and a battery monitoring IC is designed to monitor the cell voltage and detect the inferior cell thereby protecting the battery module from failure. In order to demonstrate the performance of the proposed topology, a prototype circuit was designed and applied to 12 Lithium-Ion battery module. It has been verified with the experiments that the charge equalization time of the proposed method was shorter compared with those of other methods.

  • PDF

A Fast and Secure Scheme for Data Outsourcing in the Cloud

  • Liu, Yanjun;Wu, Hsiao-Ling;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.8
    • /
    • pp.2708-2721
    • /
    • 2014
  • Data outsourcing in the cloud (DOC) is a promising solution for data management at the present time, but it could result in the disclosure of outsourced data to unauthorized users. Therefore, protecting the confidentiality of such data has become a very challenging issue. The conventional way to achieve data confidentiality is to encrypt the data via asymmetric or symmetric encryptions before outsourcing. However, this is computationally inefficient because encryption/decryption operations are time-consuming. In recent years, a few DOC schemes based on secret sharing have emerged due to their low computational complexity. However, Dautrich and Ravishankar pointed out that most of them are insecure against certain kinds of collusion attacks. In this paper, we proposed a novel DOC scheme based on Shamir's secret sharing to overcome the security issues of these schemes. Our scheme can allow an authorized data user to recover all data files in a specified subset at once rather than one file at a time as required by other schemes that are based on secret sharing. Our thorough analyses showed that our proposed scheme is secure and that its performance is satisfactory.

WETLANDS CONSERVATION AND ITS VISION FOR TAIWAN

  • Chiau, Wen-Yan
    • Proceedings of the Korean Environmental Sciences Society Conference
    • /
    • 2002.05a
    • /
    • pp.29-44
    • /
    • 2002
  • Wetlands provide vital habitats for fish and wildlife while offering numerous other benefits. As in some other countries, however, Taiwan has witnessed the loss of a significant portion of its coastal wetlands due to large-scale reclamation projects along the coast. Most of the wetlands that still remain are seriously being threatened by both human activities and natural changes, such as drainage for agricultural production, filling for industrial development, discharge of wastes and drought. The administrative performance of the existing authorities and legislation in Taiwan has mostly been ineffective in protecting these precious, sensitive areas. This paper introduces the distribution of wetlands in Taiwan and highlights their invaluable functions and potential economic value. It also discussed the recent activities, both initiated by the government and the NGOs, to protect wetlands in Taiwan. Based on the above discussion, the paper identifies the wide-range of current problems related to their management and proposes the vision should have to save wetlands for the future. It argues that establishing clear policies and effective institutional mechanisms on wetland protection and conservation, classifying the wetlands for better management, and fully promoting public awareness and consciousness of the importance of the wetlands will not only be beneficial but will also address the urgent need to safeguard the wetlands in Taiwan. Additionally, the paper recognizes that international cooperation and collaboration on wetland restoration is essential and most challenging.

  • PDF

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Development of an Energy Absorbing Mechanism for Car Seat using Magnesium Alloys (마그네슘 소재를 이용한 차량용 시트의 충격 흡수 기구 개발)

  • Shin, Hyun-Woo;Park, June-Gyu;Lee, Kyu-Hung
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.19 no.5
    • /
    • pp.67-75
    • /
    • 2011
  • A new energy absorbing mechanism for car seat was developed to reduce the neck injury in rear impacts. Energy absorbing principle is based on the shear-bolt behavior of thin-walled cast components subjected to static and dynamic loads. Results of shear bolt test using AM60 of Mg alloys showed robust behavior giving an approximately constant mean force during failure processes. Simply designed energy absorbing mechanism was assembled with the recliner between seat backs and seat rails. We have simulated the sled test of seat with dummy under the rear end impact using the finite element method. Results of simulation show that the new seat mechanism reduces thorax acceleration to a considerable extent, but it is not sufficient to mitigate neck injury indices e.g. neck shear force, neck tension force and NIC. With heightened headrest and narrowed backset, the energy absorbing mechanism resulted in good performance of protecting the neck injuries.

Nurses' Organizational Silence in Hospitals: A Grounded Theoretical Approach (병원 간호사의 조직침묵에 관한 근거이론적 접근)

  • Yi, Kyunghee;You, Myoungsoon
    • Korean Journal of Occupational Health Nursing
    • /
    • v.31 no.2
    • /
    • pp.66-76
    • /
    • 2022
  • Purpose: This study aimed to explore the constructs and context of hospital nurses' organizational silence. Methods: In-depth interviews were conducted with 17 nurses in small-middle general hospitals as well as big university hospitals. We then derived the key themes using grounded theory method. Results: Nine themes and 30 sub-themes were derived: "Willing to be recognized for performance rather than saying", "Getting used to the hard-to-speak climate", "Face the reality that does not change when said", "Complicated situation that prevents self-regulating decision-making", "Conflicts that are difficult to confront", "Unfair responsibilities that I want to evade", "Leaders who don't support me", and "Being blocked in communication". Consequently, the nurses learned to adopt a climate of silence and "learned organizational silence" behavior. They experienced that prosocial silence was essential for obtaining approval as a member of the group, and defensive silence for protecting themselves in the hierarchical structure and unfair responsibilities. Acquiescent silence originated from a futile relationship with their supervisors, one-way communications, and the unsupportive management system, in which three types of silence appeared sequentially or in combination with each other. Conclusion: Based on these results, nursing managers should identify the context of nurses' organizational silence and should lessen these silence behaviors.

Crumple Zone Design and Upper Legform Impactor Analysis for Pedestrian Protection (보행자 보호를 위한 크럼플 존 설계 및 상부 다리모형 충격해석)

  • Jeon, Young-Eun;Moon, Hyung-Il;Kim, Yong-Soo;Kim, Heon-Young
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.3
    • /
    • pp.126-132
    • /
    • 2012
  • Recently, pedestrian protection related research topics have been actively studied by automotive designers and engineers due to the enhanced pedestrian protecting regulations. It is required to design an energy absorbing structure, such as crumple zone that can sufficiently absorb the impact energy to reduce the leg injury when accident happens. The structure is designed by reducing the height of front end module, considering the mounting location, and investigating impact characteristics. In this paper, the concept of the crumple zone was introduced and the role of the crumple zone was investigated by analyzing the performance of upper legform impact to a bonnet leading edge test, and the design process was suggested.

A High-Quality Reversible Image Authentication Scheme Based on Adaptive PEE for Digital Images

  • Nguyen, Thai-Son;Chang, Chin-Chen;Shih, Tso-Hsien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.395-413
    • /
    • 2016
  • Image authentication is a technique aiming at protecting the integrity of digital images. Reversible image authentication has attracted much attention of researcher because it allows to authenticate tampered regions in the image and to reconstruct the stego image to its original version losslessly. In this paper, we propose a new, reversible image authentication scheme based on adaptive prediction error expansion (PEE) technique. In the proposed scheme, each image block is classified into smooth or complex regions. Then, according to the characteristic of each block, the authentication code is embedded adaptively to achieve high performance of tamper detection. The experimental results demonstrated that the proposed scheme achieves good quality of stego images. In addition, the proposed scheme has ability to reconstruct the stego image to its original version, if no modification is performed on it. Also demonstrated in the experimental results, the proposed scheme provides higher accuracy of tamper detection than state-of-the-art schemes.

A Design of Call Routing Agent for Multi-Channel (멀티채널 환경에서의 콜 에이전트 설계 및 구현)

  • Jun, Byung-Uk
    • Journal of Internet Computing and Services
    • /
    • v.9 no.2
    • /
    • pp.139-145
    • /
    • 2008
  • CRM(Customer Relationship Management) improves the competitiveness of small companies to large enterprises. E-mail, SMS (Short Message Service), telephony service, DM (Direct Mail) are used for customer response in many companies. In order to improve company's profit, business diversification is in progress with protecting the succession of existing customers, and the only of new customers. Futhermore, BPR (Business Process Re-engineering) and BPM (Business Process Management) of the CRM can be easily found in many companies, because it is the first contact point to the company at the customer's view. This paper discusses the development of CRM, and proposes a call object routing agent that is the main engine of the CRM. Result of performance evaluation of proposed method show that the system is effective and powerful enough to use at the multi-channel environment.

  • PDF