• Title/Summary/Keyword: square law device

Search Result 9, Processing Time 0.021 seconds

Characteristics of Ferroelectric-Gate MFISFET Device Behaving to NDRO Configuration (NDRD 방식의 강유전체-게이트 MFSFET소자의 특성)

  • 이국표;강성준;윤영섭
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.40 no.1
    • /
    • pp.1-10
    • /
    • 2003
  • Device characteristics of the Metal-Ferroclecric-Semiconductor FET(MFSFET) are simulated in this study. The field-dependent polarization model and the square-law FET model are employed in our simulation. C-V$_{G}$ curves generated from our MFSFET simulation exhibit the accumulation, the depletion and the inversion regions clearly. The capacitance, the subthreshold and the drain current characteristics as a function of gate bias exhibit the memory windows are 1 and 2 V, when the coercive voltages of ferroelectric are 0.5 and 1 V respectively. I$_{D}$-V$_{D}$ curves are composed of the triode and the saturation regions. The difference of saturation drain currents of the MFSFET device at the dual threshold voltages in I$_{D}$-V$_{D}$ curve is 1.5, 2.7, 4.0, and 5.7 ㎃, when the gate biases are 0, 0.1, 0.2 and 0.3V respectively. As the drain current is demonstrated after time delay, PLZT(10/30/70) thin film shows excellent reliability as well as the decrease of saturation current is about 18 % after 10 years. Our simulation model is expected to be very useful in the estimation of the behaviour of MFSFET devices.T devices.

Electrical and Retention Properties of MFSFET Device (MFSFET 소자의 전기적 및 리텐션 특성)

  • Chung, Yeun-Gun;Kang, Seong-Jun;Joung, Yang-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.570-576
    • /
    • 2007
  • In this study, the characteristics of metal-ferroelectric-semiconductor FET (MFSFET) device is investigated using field-dependent polarization and square-law FET models. From drain current with the gate voltage variation, when coercive voltages of ferroelectric thin film are 0.5 and 1V, the memory windows are 1 and 2V, respectively. When the gate voltages are 0, 0.1, 0.2 and 0.3V, the difference of saturation drain currents of the MFSFET device at two threshold voltages in ID-VD curve are 1.5, 2.7, 4.0, and 5.7mA, respectively. As a result of the analysis for drain currents after tine lapse, which is based on the simulation for hysteresis loop and the fitting of retention properties of ferroelectric thin films such as PLZT(10/30/70), PLT(10) and PZT(30/70) thin film shows excellent reliability that the decrease of saturation current is about 18% after 10 years.

Optical Image Encryption Based on Characteristics of Square Law Detector (세기검출기를 이용한 광 영상 암호화)

  • Lee, Eung-Dae;Park, Se-Jun;Lee, Ha-Un;Kim, Su-Jung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.3
    • /
    • pp.34-40
    • /
    • 2002
  • In this paper, a new encryption method for a binary image using Phase modulation and Fourier transform is proposed. For decryption we use the characteristics of square law detector. In encryption process, a key image is obtained by phase modulation of 256 level random pattern and its Fourier transformation, and input image is encrypted by Fourier transforming the multiplication of the phase modulated random pattern and phase modulated input image. The encrypted image and key image have only phase information, so they can not be copied or counterfeited and the original image can not be decrypted without the key image. To reconstruct the original image, each phase mask of the key image and the encrypted image must be placed on each path of the Mach-Zehnder interferometry with Fourier transform lens and the output image is obtained in the form of intensity in the CCD(Charge Coupled Device) camera. The real-time decryption is possible in the proposed system by use of a LCD as a phase modulator and a CCD camera as an intensity detector. The proposed method shows a good performance in the computer simulation and optical experiment as an encryption scheme.

Characteristics of Quasi-MFISFET Device with Various Ferroelectric Thin Films (강유전체 박막의 특성에 따른 Quasi-MFISFET 소자의 특성)

  • Lee, Guk-Pyo;Yun, Yeong-Seop;Gang, Seong-Jun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.166-173
    • /
    • 2001
  • Hysteresis loops of the ferroelectric thin films such as PLZT(10/30/70), PLT(10) and PZT(30/70) was simulated using the field-dependent polarization model and compared to the measured loops. In case of PZT(30/70) thin film, as the real saturation or polarization at the applied voltage or larger than 5V appears slack and its value is quite different from the simulated one, it is deduced that the ferroelectric polarization of PZT(30/70) is generated not only by the pure dipoles but also by various electric charges. The drain current of quasi-MFISFET is expressed by using the square-law FET and field-dependent polarization models. The modeling results are analogous to the experimental values. The channel of quasi-MFISFET using PZT(30/70) forms more quickly compared to that of quasi-MFISFET using PLZT(10/30/70) or PLT(10) in the state of 'write' gate voltage of -10V. This may be because the decrease rate of the polarization in the PZT(30/70) thin film is 3~4 times more rapid than that of the polarization in the PLZT(10/30/70) or the PLT(10) thin film in the retention characteristics.

  • PDF

Characteristics of quasi-MFISFET device with various ferroelecric thin films (강유전체 박막의 특성에 따른 Quasi-MFISFET 소자의 특성)

  • Lee, Guk Pyo;Yun, Yeong Seop;Gang, Seong Jun
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.12-12
    • /
    • 2001
  • PLZT(10/30/70), PLT(10) 및 PZT(30/70) 와 같은 강유전체 박막의 이력곡선을 field-dependent polarization 모델을 이용하여 시뮬레이션하고, 측정한 실험적 결과와 비교, 분석하였다. PZT(30/70) 박막의 경우, 5V 이상의 인가전압에서 분극의 포화현상이 둔감하게 나타나고 시뮬레이션 값과의 차이도 심해 강유전체 분극이 순수한 dipole 외에도 다양한 전하의 영향을 받아 형성된다는 사실을 알 수 있다. 또, quasi-MFISFET 소자의 드레인 전류는 field-dependent polarization 모델의 강유전체 이력곡선에서 얻은 파라미터를 square-law FET 모델에 적용시켜 효과적으로 추출하였고, 모델링 결과는 실험값과 유사하였다. 그리고, quasi-MFISFET 소자의 gate 에 -10V의 ′write′ 전압을 인가한 상태에서 PZT(30/70) 박막을 사용한 경우, PLZT(10/30/70), PLT(10) 박막 보다 빨리 채널이 형성되었는데, 그 원인은 강유전체 박막에 따른 retention 특성에서 PZT(30/70) 박막의 분극 감소가 PLZT(10/30/70), PLT(10) 박막의 분극 감소 보다 약 3∼4 배 이상 크다는 점에서 찾을 수 있다.

An optical encryption system for Joint transform correlator (JTC 구조를 이용한 광학적 영상 암호화 시스템)

  • 박세준;서동환;이응대;김종윤;김정우;이하운;김수중
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.63-66
    • /
    • 2001
  • In this paper a binary image encryption technique and decryption system based on a joint transform correlator (JTC) are Proposed. In this method, a Fourier transform of the encrypted image is used as the encrypted data and a Fourier transform of the random phase is used as the key code. The original binary image can be reconstructed on a square law device, such as a CCD camera after the joint input is inverse Fourier transformed. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF

Phase-based virtual image encryption and decryption system using Joint Transform Correlator

  • Seo, Dong-Hoan;Cho, Kyu-Bo;Park, Se-Joon;Cho, Woong-Ho;Noh, Duck-Soo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.450-453
    • /
    • 2002
  • In this paper a Phase-based virtual image encryption and decryption techniques based on a joint transform correlator (JTC) are proposed. In this method, an encrypted image is obtained by multiplying a phase-encoded virtual image that contains no information from the decrypted image with a random phase. Even if this encryption process converts a virtual image into a white-noise-like image, the unauthorized users can permit a counterfeiting of the encrypted image by analyzing the random phase mask using some phase-contrast technique. However, they cannot reconstruct the required image because the virtual image protects the original image from counterfeiting and unauthorized access. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. In addition, the reconstructed data can be directly transmitted to a digital system for real-time processing. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF

Verification of Extended Source-To-Imager Distance (SID) Correction for Portal Dosimetry

  • Son, Jaeman;Kim, Jung-in;Park, Jong Min;Choi, Chang Heon
    • Progress in Medical Physics
    • /
    • v.29 no.4
    • /
    • pp.137-142
    • /
    • 2018
  • This study aimed to evaluate and verify a process for correcting the extended source-to-imager distance (SID) in portal dosimetry (PD). In this study, eight treatment plans (four volumetric modulated arc therapy and four intensity-modulated radiation therapy plans) at different treatment sites and beam energies were selected for measurement. A Varian PD system with portal dose image prediction (PDIP) was used for the measurement and verification. To verify the integrity of the plan, independent measurements were performed with the MapCHECK device. The predicted and measured fluence were evaluated using the gamma passing rate. The output ratio was defined as the ratio of the absolute dose of the reference SID (100 cm) to that of each SID (120 cm or 140 cm). The measured fluence for each SID was absolutely and relatively compared. The average SID output ratios were 0.687 and 0.518 for 120 SID and 140 SID, respectively; the ratio showed less than 1% agreement with the calculation obtained by using the inverse square law. The resolution of the acquired EPIDs were 0.336, 0.280, and 0.240 for 100, 120, and 140 SID, respectively. The gamma passing rates with PD and MapCHECK exceeded 98% for all treatment plans and SIDs. When autoalignment was performed in PD, the X-offset showed no change, and the Y-offset decreased with increasing SID. The PD-generated PDIP can be used for extended SID without additional correction.

Study on the Improvement of Stow Net Fishing Technique and the Enlargement of Fishing Ground to the Distant Waters - 1 . Model Experiment of the Net - (안강망어법의 개량과 어장의 원해로의 확대를 위한 연구 - 1 . 어구의 모형실험 -)

  • Lee, Byoung-Gee;Kim, Jin-Kun;Lee, Ju-Hee
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.24 no.2
    • /
    • pp.55-64
    • /
    • 1988
  • Stow nets have widely been used in the western sea of Korea from the olden age. The original structure of a stow net is a large square-sectional bag net made of 4 netting panels, and the front fringes of top and bottom panels are connected to the top and bottom beams respectively. Wire ropes, which is originated from the holding anchor are gradually forked and biforked, and finally 4 pieces of wire rope (biforked pendants) are jointed to each beam. Much convenience caused by long and heavy beams were problemed, then some studies have been carried out to improve the net since 1930's. The most effective improvement were achieved in 1980 by Mr. Han and his colleagues. The key point of improvement was that the beams were removed and the belt shaped shearing device made by canvas was attached to the side panels, the head rope and ground rope to the front fringe of top and bottom panel, and biforked pendants are joined to the shearing device. Even though this is the epoch-making improvement of a stow net, the further study should be required to find out more effective method. The authors carried out a model experiment on the stow net to determine the vertical and horizontal opening of a net mouth, and also examine the front, top and side-view configuration of the net. The model net was constructed depending on the Similarity Law of Fishing Gear in 1/10 and 1/20 scale and set against to the current at shallow and speedy flowing channel. The vertical and horizontal openings were determined by using scaled bamboo poles, and the configuration was observed by using specially prepared observation platform and underwater observation glass, and also photographed by using specially prepared underwater photographic equipment. The results obtained can be summarized as follows: 1. The opening height and width of the shearing device varied in accordance with the relative length of the biforked pendants. Considering the height and width of shearing device in 6 cases of the arrangement system of biforked pendants, the best result was obtained in the case that the 2nd, 3rd and 4th pendents from the bottom-most was 5%, 9% and 4% longer than that. 2. On the top-view configuration the excessive deformation of head rope and ground rope were observed. In the actual net, 54m long head rope and ground rope were attached to the front fringe of top and bottom panels so that the head rope may be lifted to make the net mouth open highly. But actually the head rope and the ground rope are streamed backward without any lift, and also the netting followed the ropes were deformed until the 2/5 in the whole length of the net. This deformation may be guessed to disturb the entrance of fish school into the net and also caused the net to get caught by obstacles in the sea bed and to be broken largely. 3. Hydrodynamic resistance R of the actual net may be deduced as R(kg)=29.2$\times$103 v1.65. It is also expressed as R(kg)=5.9$\times$d/l$\times$ab v1.65. depending on the formula deduced by Koyama to estimate the resistance of trawl nets, where d/l denote the ratio between diameter of netting twine and length of mesh leg in every part of side panel, a and b, the stretched circumference of the mouth and the stretched length of the net, respectively.

  • PDF