• Title/Summary/Keyword: 호스트 시스템

Search Result 678, Processing Time 0.022 seconds

Fabrication and Characterization of Yellow OLED using GDI602:Rubrene(10%) Material (GDI 602/Rubrene을 이용한 황색 OLED의 제작과 특성 분석)

  • Jang, Ji-Geun;Kim, Hee-Won
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.13 no.4
    • /
    • pp.71-75
    • /
    • 2006
  • The yellow emitting OLED using GDI602:Rubrene(10%) material has been fabricated and characterized. In the device fabrication, 2-TNATA [4,4',4'-tris(2-naphthylphenyl-phenylamino)-triphenyl-amine] as a hole injection material and NPB[N,N'-bis(1-naphthyl)-N,N'-diphenyl-1,1'-biphenyl -4,4'-diamine] as a hole transport material were deposited on the ITO(indium thin oxide)/glass substrate by vacuum evaporation. And then, yellow emission material was deposited using GDI602 as a host material and Rubrene(10%) as a dopant. Finally, small molecular OLED with the structure of $ITO/2-TNATA/NPB/GDI602:Rubrene(10%)/Alq_{3}/LiF/Al$ was obtained by in-situ successive deposition of $Alq_{3}$, LiF and Al as the electron transport material, electron injection material and cathode. The yellow OLED fabricated in our experiments showed the color coordinate of CIE(0.50, 0.49), the luminance of $2300\;Cd/m^{2}$ and the power efficiency of 0.7 lm/W at 10 V with the peak emission wavelength of 562 nm.

  • PDF

Network Overhead Improvement for MHT-based Content Authentication Scheme (MHT 기반 콘텐츠 인증 기술의 전송량 개선)

  • KIM, DAEYOUB
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.271-279
    • /
    • 2018
  • Various technologies have been developed to more efficiently share content such as P2P and CDN. These technologies take a common approach that request packets are responded by distributed network nodes, not by a single distributor. Such approaches not only resolve network congestion around content distributors, but also make it possible to distribute content regardless of the system and network status of content distributors. However, when receiving content from distributed nodes/hosts, not from authenticated distributors, users cannot practically identify which node/host sent content to them. Due to this characteristic, various hacking caused by the malicious modification of content is possible. Therefore, to make such approaches more secure, a content authentication technique is required. In this paper, we propose a improved operation of MHT used in CCN for authenticating distributed content. Then we evaluate the proposed method by comparing its performance with the existing technology.

Design and Implementation of the Extended DNS Security Mechanism (확장된 DNS 보안 메커니즘의 설계 및 구현)

  • Sim, Hui-Won;Kim, Jin-Seong;Sim, Yeong-Cheol;Im, Chan-Sun;Byeon, Ok-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.1
    • /
    • pp.134-147
    • /
    • 1999
  • The DNS provides naming services which are the basis for the application of the Internet and the security of the DNS should be provided for the security of the Internet. Recently IETF proposed a method which guarantees the integrity of DNS database contents and DNS queries/replies and distributes host public keys. In this paper we describe the design and implementation of the secure DNS which is built based on the IETF proposal and extended to facilitate its sue and management. In the extended secure DNS, DNS servers are used ad the directory system in a public key infrastructure and stores/distributes user public key certificates. The Web-based management interface and security log functions are added and the extended secure DNS is being built so that new cryptographic algorithms can be easily added.

  • PDF

Implementation of MPOA for Supporting Various Protocols over ATM (ATM 상에서 다양한 프로토콜을 지원하기 위한 MPOA의 구현)

  • Lim, Ji-Young;Kim, Mi-Hee;Choi, Jeong-Hyun;Lee, Mee-Jeong;Chae, Ki-Joon;Choi, Kil-Young;Kang, Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.181-199
    • /
    • 2000
  • In this paper, we implemented and tested MPOA(MutiProtocol Over ATM) standardized in ATM Forum, which provides service for various layer 3 protocols as well as legacy LAN applications over ATM networks. The functions of MPCs(MPOA Clients) and MPSs(MPOA Servers) which are the components in MPOA systems are implemented. MPCs are located at the edge device and MPOA hosts and MPSs exist in routers. The implemented MPCs have the functions such as exchances of primitives between an LEC(LAN Emulation Client) and an MPC, management and maintenance of Egress/Ingress cache, default transmission through LECs and shortcut transmission. Assuming that routing, convergence and NHRP(Next Hop Resolution Protocol) functions exist in routers, the implemented MPSs have the functions such as exchanges of primitives between an LEC and an MPC, conversion and exchanges of frames between MPOA and NHRP, and management and maintenance of Egress/Ingress cache. All of the possible scenarios are made up to test whether they run correctly. The implemented system is tested by simulation according to the scenarios.

  • PDF

Migration Mechanism Supporting Eficient Fault-Tolerance on Agent Platform (에이전트 플랫폼에서의 효율적인 결함-허용을 제공하는 이주 기법)

  • Seo, Dong-Min;Yun, Jong-Hyeon;Yeo, Myung-Ho;Yoo, Jae-Soo;Cho, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.9
    • /
    • pp.89-99
    • /
    • 2007
  • With the development of the internet technology, network application services based on a large number of network nodes have been focused. However, such application services require much larger network size and traffic than current network. In order to develop them, efficient solutions as well as a simple improvement of network infra processing time are required. In this paper, to contribute a improvement of network computing technology, we design and implement the agent platform software based on the agent technology that performs works independently and asynchronously on a network and platform. The proposed agent platform software supports the scalability to accommodate the number of network hosts with rapid growth, the adaptability on a variable environments, and the availability for a fault-tolerance.

A study on Simple and Complex Algorithm of Self Controlled Mobile Robot for the Obstacle Avoidance and Path Plan (자율 이동로봇의 장애물 회피 및 경로계획에 대한 간략화 알고리즘과 복합 알고리즘에 관한 연구)

  • 류한성;최중경;구본민;박무열;권정혁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.115-123
    • /
    • 2002
  • In this paper, we present two types of vision algorithm that mobile robot has CCD camera. for obstacle avoidance and path plan. One is simple algorithm that compare with grey level from input images. Also, The mobile robot depend on image processing and move command from PC host. we has been studied self controlled mobile robot system with CCD camera. This system consists of TMS320F240 digital signal processor, step motor, RF module and CCD camera. we used wireless RF module for movable command transmitting between robot and host PC. This robot go straight until 95 percent filled screen from input image. And the robot recognizes obstacle about 95 percent filled something, so it could avoid the obstacle and conclude new path plan. Another is complex algorithm that image preprocessing by edge detection, converting, thresholding and image processing by labeling, segmentation, pixel density calculation.

uPC player : An OS Virtualization-based Technique to Support Stateless Computing Execution Environment on Windows (uPC player : 윈도우 운영체제에서의 OS가상화 기반 무상태 컴퓨팅 실행환경 지원 기술)

  • Sung, Baek-Jae;Park, Chan-Ik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.1
    • /
    • pp.125-129
    • /
    • 2010
  • Stateless computing supports a mobility of computing environment easily. It is becoming a major technology for securing personal user's information on shared computing environment. With the advance of virtualization technology and cloud computing, stateless computing is an essential part of personal computing environment connectivity (user's setting and data is stored in remote server or some storage, and it can be restored at any computing environment) In this paper, we propose uPC player that supports stateless computing execution environment on Windows. uPC player provides Windows operating system to user by using an uPC OS virtualization module. In this paper, we leverage how uPC player is designed and implemented for supporting a stateless computing execution environment. uPC player provides a desktop switch between host-system execution environment and uPC virtual execution environment. And it needs just one second for loading uPC virtual execution environment by using OS virtualization-based technique.

Nuclear Knowledge Management and the Activities of IAEA/INIS (원자력지식경영과 IAEA/INIS 활동)

  • Yi, Ji-Ho
    • Journal of Information Management
    • /
    • v.37 no.4
    • /
    • pp.105-124
    • /
    • 2006
  • The nuclear knowledge management is now being operated in the KAERI and also actively practiced in other member states of the IAEA. The INIS secretariat leads the knowledge management. As the traditional service areas of librarians are decreasing, the knowledge management is considered as a promising service area replacing the traditional librarian's role. This new area is in Blue Ocean and needs to great concern and understanding. INIS is the world's leading information system on the peaceful uses of nuclear energy. INIS is operated by the IAEA in collaboration with its member states and cooperating international organizations. INIS has more than 2.7 million items and provides users a comprehensive information reference service for literature in nuclear science and technology. The input amount ranks fifth in the world and it operates the INIS 2 host site. INIS in Korea is playing a leading role in the IAEA.

A Design of Authentication/Security Processor IP for Wireless USB (무선 USB 인증/보안용 프로세서 IP 설계)

  • Yang, Hyun-Chang;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.11
    • /
    • pp.2031-2038
    • /
    • 2008
  • A small-area and high-speed authentication/security processor (WUSB_Sec) IP is designed, which performs the 4-way handshake protocol for authentication between host and device, and data encryption/decryption of wireless USB system. The PRF-256 and PRF-64 are implemented by CCM (Counter mode with CBC-MAC) operation, and the CCM is designed with two AES (Advanced Encryption Standard) encryption coles working concurrently for parallel processing of CBC mode and CTR mode operations. The AES core that is an essential block of the WUSB_Sec processor is designed by applying composite field arithmetic on AF$(((2^2)^2)^2)$. Also, S-Box sharing between SubByte block and key scheduler block reduces the gate count by 10%. The designed WUSB_Sec processor has 25,000 gates and the estimated throughput rate is about 480Mbps at 120MHz clock frequency.

Protecting Mobile Agent with VPN (VPN을 이용한 이동 에이전트의 보호)

  • 박재경;원유헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.3
    • /
    • pp.3-12
    • /
    • 2001
  • In this course of Internet proliferation, many network-related technologies are examined for possible growth and evolution. The use of Internet-based technologies is private networks has further fuelled the demand for network-based applications. The most promising among the new paradigms is the use of mobile agents. The mobile agent is capable of migrating autonomously form node to node in the network, to perform some computations on behalf of the user. The mobile agent paradigm is attractive alternative to traditional client-server programming for a significant class of network-centric applications. It does however, suffer. from a major drawback namely, the potential for malicious attacks, abuse of resources, pilfering of information, and other security issues. These issues are significantly hampering the acceptance of the mobile-agent paradigm. This paper describes the design of a secure mobile agent gateway 7hat can split and merge the agent code with security policy database on the VPN. This mechanism will promote security in the mobile agent systems.