http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Poreddy Chaitanya Akshara,M. Ghanashyam Krishna,G. Rajaram,Y. Rajesh,Nilanjan Basu,Jayeeta Lahiri 대한금속·재료학회 2020 ELECTRONIC MATERIALS LETTERS Vol.16 No.3
Thin flm Au–SiC–Cu and Au–SiC–Pt crossbar structures of 40μmx40μm size where all three layers are 100 nm thicknesswere fabricated by lithography. Decomposition of the SiC flm is observed under the infuence of an electric feld (104–106 V/cm) applied between the Au bottom electrode and the top metal electrode (Cu or Pt) for a few cycles during the course oftesting as a resistive switching structure. This is evidenced using Raman mapping and Raman spectroscopy techniques. TheRaman spectra reveal peaks corresponding to the D and G bands of nanocrystalline graphite. Raman mapping at diferentlocations indicates that most of the graphite forms at the interface between the metal electrode and SiC. Raman mappingimages reveal the formation of graphite on the surface. This technique is simple and enables site-selective localized growthof nanocrystalline graphite which is expected to impact many nanoscale applications. It could also be extended to formgraphene at the nanoscale.
An Applicative Approach for Collecting and Fortifying History of Data in Cloud Environment
Divya Vadlamudi,M. Krishna Chaitanya,T. Srikanth,V. Bala Venu,U.Joseph,Tai-hoon Kim 보안공학연구지원센터 2015 International Journal of Software Engineering and Vol.9 No.5
Today cloud computing has been the buzzword among many communities. Many users are using the cloud to ensure cost effectiveness towards their hardware resources. As cloud may seem tempting there are many security issues relating to the cloud. One the issue is the activities performed on the data, which are monitored by logs. These logs are used as evidence to the forensic investigators. But due to the emerging technologies the hackers are able to modify the log data. When the hackers modify the data, it is a painful task for the forensic investigators to rebuild the evidence. So to address this issue we are developing a mechanism to generate the log files, ensure security to log files and making the log files interoperable to the Cloud Service Provider (CSP).