2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
A Temperature Based Automatic Power Controller for Electrical Devices
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.1-8
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, a controller is proposed to design in such a way that it can be able to control the input voltage as well as power to any load or electrical device not only manually i.e. through the computer but also automatically i.e. based on temperature. We propose this design for the reason that a part of the electrical appliances are needed to control the input power for getting the desired output from those which depend on the variation of temperature. Sometimes equipments can be needed manual control. For this purpose, computer controlling is also inserted here rather than supplying manpower. In this design, the voltage control technique is used to control the power to the load. Here, the output of the controller will vary on the sense that the variation of the surrounding temperature selects the relay which is connected to regulating coil to control the output voltage as well as power. The main specialty of this research is to maintain enhanced precision and hysteresis without harmonics in output variation.
Analyze the Tunneling Effect on Gate-All-Around Field Effect Transistor
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.9-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper we describe the tunneling junction model effect on silicon nanowire gate-all-around field effect transistor using CMOS 45 nm technology. Tunneling effects provides better subthreshold slope, excellent drain induced barrier lowering and superior ION-IOFF ratio.This paper demonstrates the gate controlled tunneling at source of Gate-all-around field effect transistor. Low leakage current (off current) is reported of 2.9uA with considerable power reduction Subthreshold Swing SS is achieved of 46.5 mV/dec .Using Y function series resistance RSD is evaluated.Accurate evaluation of RSD of silicon nanowire Gate-all-around FET is shown linear behavior in inversion region using Y function. Silicon nanowire is considered as better aspect for ultra low power application.
On Symbolic Regression for Optimizing Thermostable Lipase Production
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.23-34
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Theromostable lipases have wide range of biotechnological applications in the industry. Therefore, there is always high interest in investigating their features and operating conditions. However, Lipase production is a challenging and complex process due to its nature which is highly dependent on the conditions of the process such as temperature, initial pH, incubation period, time, inoculum size and agitation rate. Efficient optimization of the process is a common goal in order to improve the productivity and reduce the costs. In this paper, we apply a Symbolic Regression Genetic Programming (GP) approach in order to develop a mathematical model which can predict the lipase activities in submerged fermentation (SmF) system. The developed GP model is compared with a neural network model proposed in the literature. The reported evaluation results show superiority of GP in modeling and optimizing the process.
Properties of a Some (Ag-Cu-Sn) Alloys for Shielding Against Gamma Rays
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.35-46
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The study of radiation absorption in material is an important subject to protect living creatures and environment from harmful effect of radiation. The degree to which gamma radiation is attenuated is dependent upon the energy of the incident gamma radiation, the thickness of the shielding, the atomic number and density of the elements in the shielding material. In this respect, this study presents the attenuating properties of some (Ag-Cu-Sn Alloys) by using the Nation Institute of Standards and Technology (NIST) XCOM code in the energy range (0.01 to 10 MeV).
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.47-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, the forward and backward propagating modes in an optical waveguide structure namely the fiber Bragg filter also considered as a one dimensional photonic crystal, is analytically computed as a function of grating length for coupled optical modes. AlxGa1-xN/GaN material composition is considered as a unit block of the periodic organization, and refractive index of AlxGa1-xN/GaN is taken to be dependent on material composition, bandgap and operating wavelength following Adachi’s model. Expressions for propagating wave have been derived using coupled mode theory. Simulated results help us to study the propagation of forward and backward wave propagating modes inside fiber and waveguide devices.
TCLOUD: A Trusted Storage Architecture for Cloud Computing
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.65-72
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The cloud storage provides a least cost means of data storage for the small and large enterprises across the globe. But the main barricade to wide spread adoption of cloud storage is the lake of trust in the technology by its user. The data is stored on multiple servers and the location is concealed from the customers and they are no more in control of the data. This distinctive feature of the cloud storage presents many security and trust challenges. In this paper we present a trusted architecture of cloud data storage. The architecture presents a unique way of secure storage and accessing of data from the cloud data center. It also ensured that only authorized user will be able to access the data. Additionally, if there is any violation of the security parameter at the data center, the data will still be safe i.e. the data will be stored in encrypted form.
Effect of Sawdust as Fine Aggregate in Concrete Mixture for Building Construction
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.73-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This experimental study aimed to develop an acceptable concrete mixture with sawdust particles as substitute to fine aggregate that can be used for building construction particularly in residential class concrete slab and analyze the effect of sawdust concrete mixture in terms of adhesion of aggregates, thermal insulation, workability and surface quality. This also aims to determine the factors affecting the performance of sawdust concrete mixture in terms of humidity and temperature and design a sawdust concrete mixture as an alternative fine aggregates for residential class concrete slab that will meet the (American Society for Testing and Materials (ASTM) requirements in order to help contribute to the industry in saving the environment, to provide new knowledge to the contractors and developers on how to improve the construction industry methods and services by using sawdust concrete mixture, and sustain good product performance. A conventional concrete product was compared to sawdust concrete mixture with recycled bottles of the same proportion in terms of economic performance. Observations from the tests performed were conducted in the laboratory where precise data were gathered and completely attained.
Cyber Warfare : Worms’ Transmission Model
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.63 2014.02 pp.83-94
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The major way of attack in cyber world is cyber war. Cyber war is a form of war which takes places on computers and the Internet, through electronic means rather than physical ones. With an increasing global reliance on technology for everything from managing national electrical grids to ordering supplies for troops the security of cyber world become an important issue worldwide. In this paper, an e-epidemic SEIR (susceptible-Exposed-Infectious-Recovered) model for the transmission of worms in a computer network is developed to have a better understanding of the reason for Cyber war. An analysis of the basic reproduction number has been made. We derive global stability of a worm-free state. Furthermore, initial simulation results show the positive impact of increasing security measures on worm propagation in computer network. Efficiency of antivirus software and crashing of the nodes due to worms attack is critically analyzed.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.