591 research outputs found

    Estimation of background carrier concentration in fully depleted GaN films

    Full text link
    Buffer leakage is an important parasitic loss mechanism in AlGaN/GaN HEMTs and hence various methods are employed to grow semi-insulating buffer layers. Quantification of carrier concentration in such buffers using conventional capacitance based profiling techniques is challenging due to their fully depleted nature even at zero bias voltages. We provide a simple and effective model to extract carrier concentrations in fully depleted GaN films using capacitance-voltage (C-V) measurements. Extensive mercury probe C-V profiling has been performed on GaN films of differing thicknesses and doping levels in order to validate this model. Carrier concentrations as extracted from both the conventional C-V technique for partially depleted films having the same doping concentration, and Hall measurements show excellent agreement with those predicted by the proposed model thus establishing the utility of this technique. This model can be readily extended to estimate background carrier concentrations from the depletion region capacitances of HEMT structures and fully depleted films of any class of semiconductor materials.Comment: 16 pages, 6 figure

    Analyzing, Implementing and Monitoring Critical Security Controls: A Case Implemented in J & B Group

    Get PDF
    The increasing sophistication of information security threats and the ever-growing body of regulation has made information security a critical function in organizations. Software companies and application vendors are unable to keep up with rapidly growing attacks and changing threat patters. The need for information security should be apparent and require substantial research, knowledge, and ability to design and implement an effective security program. Also, requires a great investment of time and resources. Many small and medium businesses may understand the importance of risk, but lack in grasping the severity of the problem and resources to identify it. A well analyzed and implemented information security program can reduce the damage caused by an attack by reducing the mean time to detect, contain and restore. The purpose of this paper is to present a systematic approach to conduct analysis by gathering data, implementing and monitoring the critical security controls. An effective information security process ensuring strong security posture to defend against cyber-attacks with minimum resources and open source software is the key to this research as it reduces the cost to implement and maintain the security operations center. The literature focuses on increasing cyber-attacks on organizations and how to prevent these attacks using technical countermeasures and non-technological side of information security. This research refers to CIS critical security controls (CSC) to classify data, systems and analyze risk using Qualitative and Quantitative data. Research data is collected from J & B Group Information technology team. Importance of security program is not only adopting best security processes and tools but also must be reviewed, updated and maintained on a regular basis. Continuous monitoring of security controls is driven with open source SIEM tool with minimum license and by establishing custom rules for generating offenses and alerts

    A Study on Role of Fintech Services Impact of Business Growth Selected a Public Sector Bank in Punjab

    Get PDF
    Purpose: The aim of this study is to examine the role of Fintech services in the growth of Selected National Bank's business. The study looked at the 3G and 4G eras, from 2008-09 through 2021-22.   Theoretical Framework: The study main focus on banks are offering various services to their customer’s like Mobile banking, Internet banking, ATM and other services using 3G and 4G technology. These banks have heavy competition among themselves in providing latest and user friendly digital services to their customers to make them satisfy.   Design/Methodology/Approach: The study took into account the six Fintech services related to business-to-customer. For the analysis of framed objectives, the study used a quantitative research approach. The study built the Banking Technology Index (BTI) using the six Fintech services and deemed it a proxy for the bank's operations.   Findings: The study looked over the entire time period and discovered that all Fintech services have a beneficial impact on SNB's business growth. The study reveals that bank can improve the customer’s satisfaction that ultimately have the positive ripple effect on the business growth.   Research, Practical & Social Implications: The study used bivariate correlation to measure the relationship of chosen Fintech services with the BTI and discovered that the majority of the services have a substantial positive link during the 3G and 4G periods. The OLS was employed to assess how Fintech services might affect BTI and it was discovered that in the 3G time, ATM influence was greater, while in the 4G period, credit cards played a critical part in SNB business growth.   Originality/Value:  The study provides the Fintech services during 3G and 4G period to the customer services Banking Technology Index, there is no literature that discusses the use of 3G and 4G services on modal to evaluate fintech banking services in the research area. As a result, the purpose of this paper is to make up for this void

    Optical Phonon Limited High Field Transport in Layered Materials

    Full text link
    An optical phonon limited velocity model has been employed to investigate high-field transport in a selection of layered 2D materials for both, low-power logic switches with scaled supply voltages, and high-power, high-frequency transistors. Drain currents, effective electron velocities and intrinsic cut-off frequencies as a function of carrier density have been predicted thus providing a benchmark for the optical phonon limited high-field performance limits of these materials. The optical phonon limited carrier velocities of a selection of transition metal dichalcogenides and black phosphorus are found to be modest as compared to their n-channel silicon counterparts, questioning the utility of these devices in the source-injection dominated regime. h-BN, at the other end of the spectrum, is shown to be a very promising material for high-frequency high-power devices, subject to experimental realization of high carrier densities, primarily due to its large optical phonon energy. Experimentally extracted saturation velocities from few-layer MoS2 devices show reasonable qualitative and quantitative agreement with predicted values. Temperature dependence of measured vsat is discussed and found to fit a velocity saturation model with a single material dependent fit parameter.Comment: 8 pages, 6 figure

    Interaction Between Intellectual Disability and Cerebral Palsy on the Co-Occurrence of Autism Spectrum Disorder and Epilepsy

    Get PDF
    Intellectual disability (ID) is possibly a reason for the higher co-occurrence of Autism Spectrum Disorder (ASD) in children with epilepsy. Cerebral Palsy (CP) has also been found to co-occur with ASD (6.9%-hypotonic, 18.4%-spastic subtype) and with epilepsy (41%), but it is unclear if the co-occurrence of ASD and epilepsy varies by the presence of both, ID and CP. The purpose of this study to evaluate effect modification of CP and ID on ASD-epilepsy co-occurrence
    corecore