• Title/Summary/Keyword: single coverage

Search Result 291, Processing Time 0.03 seconds

Water vapor permeation properties of $Al_2O_3/TiO_2$ passivation layer on a poly (ether sulfon) substrate

  • Gwon, Tae-Seok;Mun, Yeon-Geon;Kim, Ung-Seon;Mun, Dae-Yong;Kim, Gyeong-Taek;Han, Dong-Seok;Sin, Sae-Yeong;Park, Jong-Wan
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.08a
    • /
    • pp.160-160
    • /
    • 2010
  • Organic electronic devices require a passivation layer to ensure sufficient lifetime. Specifically, flexible organic electronic devices need a barrier layer that transmits less than $10^{-6}\;g/m^2/day$ of water and $10^{-5}\;g/m^2/day$ of oxygen. To increase the lifetime of organic electronic device, therefore, it is indispensable to protect the organic materials from water and oxygen. Severe groups have reported on multi-layerd barriers consisting inorganic thin films deposited by plasma enhenced chemical deposition (PECVD) or sputtering. However, it is difficult to control the formation of granular-type morphology and microscopic pinholes in PECVD and sputtering. On the contrary, atomic layer deoposition (ALD) is free of pinhole, highly uniform, conformal films and show good step coverage. In this study, the passivation layer was deposited using single-process PEALD. The passivation layer, in our case, was a bilayer system consisting of $Al_2O_3$ films and a $TiO_2$ buffer layer on a poly (ether sulfon) (PES) substrate. Because the deposition temperature and plasma power have a significant effect on the properties of the passivation layer, the characteristics of the $Al_2O_3$ films were investigated in terms of density under different deposition temperatures and plasma powers. The effect of the $TiO_2$ buffer layer also was also addressed. In addition, the water vapor transmission rate (WVTR) and organic light-emitting diode (OLEDs) lifetime were measured after forming a bilayer composed of $Al_2O_3/TiO_2$ on a PES substrate.

  • PDF

A simple technique for impression taking of teeth and functionally generated paths

  • Yamamoto, Takatsugu;Sato, Yohei;Watanabe, Hidehiko;Punj, Amit;Abe, Minoru;Momoi, Yasuko;Ohkubo, Chikahiro
    • Restorative Dentistry and Endodontics
    • /
    • v.43 no.1
    • /
    • pp.9.1-9.6
    • /
    • 2018
  • The objective of this case report is to introduce a simple technique for simultaneously taking a closed-mouth impression and functionally generated path (FGP) for a full coverage crown restoration. A monolithic zirconia crown was the restoration of choice. An alginate impression of the abutment tooth was taken to fabricate a custom-made closed-mouth impression tray covering the abutment tooth and the adjacent teeth. The tray had an FGP table and an abutment tray in cameo and intaglio surfaces, respectively. The impression was taken with silicone impression material after adjusting the abutment tray and inscribing the FGP using self-curing acrylic resins. Plaster casts were made from the impression, and a zirconia crown was fabricated. The crown was cemented to the abutment tooth with minimal adjustments. This simple technique resulted in a well-fitting crown that accounted for mandibular movements. Using the custom closed-mouth impression tray incorporating an FGP table simultaneously aids in fabricating an accurately fitting restoration that incorporates harmonious mandibular movements using a single impression capture.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

Fabrication Process of Single Flux Quantum ALU by using Nb Trilayer (Nb Trilayer를 사용한 단자속양자 논리연산자의 제작공정)

  • Kang, J.H.;Hong, H.S.;Kim, J.Y.;Jung, K.R.;Lim, H.R.;Park, J.H.;Hahn, T.S.
    • Progress in Superconductivity
    • /
    • v.8 no.2
    • /
    • pp.181-185
    • /
    • 2007
  • For more than two decades Nb trilayer ($Nb/Al_2O_3/Nb$) process has been serving as the most stable fabrication process of the Josephson junction integrated circuits. Fast development of semiconductor fabrication technology has been possible with the recent advancement of the fabrication equipments. In this work, we took an advantage of advanced fabrication equipments in developing a superconducting Arithmetic Logic Unit (ALU) by using Nb trilayers. The ALU is a core element of a computer processor that performs arithmetic and logic operations on the operands in computer instruction words. We used DC magnetron sputtering technique for metal depositions and RF sputtering technique for $SiO_2$ depositions. Various dry etching techniques were used to define the Josephson junction areas and film pattering processes. Our Nb films were stress free and showed the $T{_c}'s$ of about 9 K. To enhance the step coverage of Nb films we used reverse bias powered DC magnetron sputtering technique. The fabricated 1-bit, 2-bit, and 4-bit ALU circuits were tested at a few kilo-hertz clock frequency as well as a few tens giga-hertz clock frequency, respectively. Our 1-bit ALU operated correctly at up to 40 GHz clock frequency, and the 4-bit ALU operated at up to 5 GHz clock frequency.

  • PDF

A Hierarchical Network Architecture and Handoff framework for Integrating CDMA2000, WiBro and WLAN (CDMA2000, WiBro 및 WLAN 연동을 위한 계층적 네트워크 구조와 핸드오프 프레임워크)

  • Kong, Du-Kyung;Cho, Jin-Sung;Kim, Seung-Hee;Kim, Dae-Sik
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.43-57
    • /
    • 2006
  • Next-generation mobile communication systems evolve in the form of high speed data transmission along with integration of wired-wireless network. Therefore, it needs researches on integrating service to heterogeneous networks to offer high speed data transmission and various services while supporting user mobility. In existing studies, heterogeneous networks are linked to single core network separatively, Since vertical handoff between heterogeneous networks leads to some delay, packets may be lost during vertical handoff. To solve this problem, this paper proposes an hierarchically integrated network architecture considering the characteristics of CDMA2000, WiBro, and WLAN. The hierarchically integrated networks are overlaid according to coverage of each network. Therefore, the proposed architecture can minimize handoff delay and packet loss. In addition, this paper proposes an integrated framework for next generation mobile communication networks.

  • PDF

Application of Local Axial Flaps to Scalp Reconstruction

  • Zayakova, Yolanda;Stanev, Anton;Mihailov, Hristo;Pashaliev, Nicolai
    • Archives of Plastic Surgery
    • /
    • v.40 no.5
    • /
    • pp.564-569
    • /
    • 2013
  • Background Scalp defects may be caused by various etiological factors, and they represent a significant surgical and aesthetic concern. Various surgical techniques can be applied for reconstructive work such as primary closure, skin grafting, pedicled or free flaps. In this article, the authors share their clinical experience with scalp operations using the technique of local flaps and discuss the application of this method from the perspective of not only the size of the defect, but also in relation to the anatomical area, quality of surrounding tissue, and patient's condition. Methods During the period from December 2007 to December 2012, 13 patients with various scalp defects, aged 11 to 86 years, underwent reconstruction with local pedicle flaps. The indications were based on the patients' condition (age, sex, quality of surrounding tissue, and comorbidities) and wound parameters. Depending on the size of the defects, they were classified into three groups as follows: large, 20 to 50 $cm^2$; very large, 50 to 100 $cm^2$; extremely large, 100 $cm^2$. The location was defined as peripheral (frontal, temporal, occipital), central, or combined (more than one area). We performed reconstruction with 11 single transposition flaps and 1 bipedicle with a skin graft on the donor area, and 2 advancement flaps in 1 patient. Results In all of the patients, complete tissue coverage was achieved. The recovery was relatively quick, without hematoma, seroma, or infections. The flaps survived entirely. Conclusions Local flaps are widely used in scalp reconstruction since they provide healthy, stable, hair-bearing tissue and require a short healing time for the patients.

Implementation of Mobile IPv6 Fast Authorization for Real-time Prepaid Service (실시간 선불 서비스를 위한 모바일 IPv6 권한검증 구현)

  • Kim Hyun-Gon
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.121-130
    • /
    • 2006
  • In next generation wireless networks, an application must be capable of rating service information in real-time and prior to initiation of the service it is necessary to check whether the end user's account provides coverage for the requested service. However, to provide prepaid services effectively, credit-control should have minimal latency. In an endeavor to support real-time credit-control for Mobile IPv6 (MIPv6), we design an implementation architecture model of credit-control authorization. The proposed integrated model combines a typical credit-control authorization procedure into the MIPv6 authentication procedure. We implement it on a single server for minimal latency. Thus, the server can perform credit-control authorization and MIPv6 authentication simultaneously. Implementation details are described as software blocks and units. In order to verify the feasibility of the proposed model. latency of credit-control authorization is measured according to various Extensible Authentication Protocol (EAP) authentication mechanisms. The performance results indicate that the proposed approach has considerably low latency compared with the existing separated models, in which credit-control authorization is separated from the MIPv6 authentication.

  • PDF

An Analysis on the News Frame of Game by Korean Media (한국 언론의 게임 보도 프레임 분석)

  • Seo, Seong-Eun;Yeon, Joon-Myeong
    • Journal of Korea Game Society
    • /
    • v.17 no.6
    • /
    • pp.89-102
    • /
    • 2017
  • This study aims at examining our social recognition on and the topographic map of a game through the discourse analysis on games shown from the Korean media coverage. Media don't reflect the reality as a mirror but represent it in certain manner. If so, how Korean media organize and represent the meaning of a game? This study analyzed the game discourse from 479 articles on games by 5 daily newspapers including Chosun, Joongang, Dong-A, Kyunghyang and the Hankyoreh during 4 years' Park Geun-hye administration. Research findings show that as a single issue frames of game addiction, addiction damages and AR games including $Pok\acute{e}mon$ Go counted for much reaching up to nearly half but discourse on the play culture as an essence of a game occupied only 3.8%.

Analysis of Compatibility Strategy between Vertically Differentiated Products under Network Externality (망외부성이 존재하고 수직적으로 차별화된 제품 간의 호환성 전략 분석)

  • Cho, Hyung-Rae;Rhee, Minho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.1
    • /
    • pp.7-15
    • /
    • 2020
  • It is a general phenomenon for manufacturers to provide vertically differentiated product line for more profit through improved market coverage. For such manufacturers, the compatibility between vertically differentiated products is an important decision issue. Some manufacturers provide full compatibility between high and low version products, whereas some provide only downward compatibility for the purpose of recommending high version product. In this study, the two representative compatibility strategies, full or downward, between vertically differentiated products produced by a single manufacturer are analyzed, especially under network externality and in the viewpoint of profit maximization. To do this we used a market model which captures the basic essence of vertical differentiation and network externality. Based on the proposed market model, the profit maximizing solutions are derived and numerically analyzed. The results can be summarized as follows : (1) Regardless of compatibility strategy, under network externality, vertical differentiation is always advantageous in terms of profit. (2) The full compatibility strategy is shown to be the most advantageous in terms of profit. In addition, it is necessary to make quality difference between differentiated products as wide as possible to maximize profit. (3) To gradually drive low version product out of the market and shift the weight pendulum of market to high version product, it is shown that the downward compatibility strategy is essential. Unlike intuition, however, it is also shown that in order to drive low version product out of market, it is necessary to raise the quality of the low version product rather than to lower it.

Multi-protocol Test Method:MPTM (다중계층 프로토콜 시험 방법)

  • Lee, Soo-In;Park, Yong-Bum;Kim, Myung-Chul
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.3
    • /
    • pp.377-388
    • /
    • 2001
  • An approach for testing multi-protocol Implementation Under Test (IUT) with a single test suite has been proposed in[1]. this paper proposes an algorithm called Multi-protocol Test Method (MPTM) for automatic test case generation based on that approach. With the MPTM, a multi-protocol IUT consisting of two protocol layers is modeled as two Finite State Machines (FSMs), and the relationships between the transitions of the two FSMs are defined as a set of transition relationships pre-execution and carried-by. The proposed algorithm is implemented and applied to a simplified TCP/IP and B-ISDN Signaling/SSCOP. MPTM is able to test the multi-protocol IUT even though the interfaces between the protocol layers are not exposed. It results in that the proposed MPTM allows the same test coverage as conventional test methods even with fewer numbers of test cases.

  • PDF