• 제목/요약/키워드: Engineering information

검색결과 82,725건 처리시간 0.1초

Enhancement mechanisms of luminance efficiency in red organic light-emitting devices fabricated utilizing a double electron transport layer consisting of an Al-doped layer and an undoped layer

  • Choo, D.C.;Bang, H.S.;Ahn, S.D.;Lee, K.S.;Seo, S.Y.;Yang, J.S.;Kim, T.W.;Seo, J.H.;Kim, Y.K.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 한국정보디스플레이학회 2008년도 International Meeting on Information Display
    • /
    • pp.513-516
    • /
    • 2008
  • The luminance efficiency of the red organic light-emitting devices fabricated utilizing a double electron transport layer (ETL) consisting of an Al-doped and an undoped layer was investigated. The Al atoms existing in the ETL acted as hole blocking sites, resulting in an increase in the luminance efficiency.

  • PDF

MEMS packaging을 위한 Micro PDMS pad 제작 (Fabrication of PDMS micro-pads for vibration absorber in MEMS packaging)

  • 김한형;심세환;김성기;양승국;오범환;이승걸;이일항;박세근;이종근
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2008년도 하계종합학술대회
    • /
    • pp.511-512
    • /
    • 2008
  • Micro-pads made of PDMS(polydimethylsiloane) can be mechanical shock or vibration absorber because of its contractibility. Fabrication of micro-pads and techniques of separation from substrate and attachment to new substrate are developed. Three micron thick PDMS pads were fabricated by imprinting lithography.

  • PDF

A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field

  • Liu, Qian;Zhang, Hao;Yu, Peidong;Wang, Gang;Qiu, Zhaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3458-3481
    • /
    • 2021
  • Existing methods for blind identification of linear block codes without a candidate set are mainly built on the Gauss elimination process. However, the fault tolerance will fall short when the intercepted bit error rate (BER) is too high. To address this issue, we apply the reverse algebra approach and propose a novel "two-step-screening" algorithm by solving the linear error equations on the binary Galois field, or GF(2). In the first step, a recursive matrix partition is implemented to solve the system linear error equations where the coefficient matrix is constructed by the full codewords which come from the intercepted noisy bitstream. This process is repeated to derive all those possible parity-checks. In the second step, a check matrix constructed by the intercepted codewords is applied to find the correct parity-checks out of all possible parity-checks solutions. This novel "two-step-screening" algorithm can be used in different codes like Hamming codes, BCH codes, LDPC codes, and quasi-cyclic LDPC codes. The simulation results have shown that it can highly improve the fault tolerance ability compared to the existing Gauss elimination process-based algorithms.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권11호
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

Discharge Characteristics of a Flat Plasma Backlight with Long Electrode Gap

  • Li, Q.;Luo, Y.;Zheng, Y.;Yang, L.;Cui, Y.;Liu, J.;Zhang, Z.;Tolner, H.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 한국정보디스플레이학회 2008년도 International Meeting on Information Display
    • /
    • pp.795-798
    • /
    • 2008
  • The discharge characteristics of a flat plasma backlight with long electrode gap are investigated. The effect of operating voltage and repetition rate on brightness and luminance efficiency is investigated. A new high efficacy mode is found at low frequencies around 15-40 KHz; a lumen efficacy of 15.3 lm/W is achieved at a luminance of $2400\;cd/m^2$. In the high brightness mode, present at high voltage, we find a maximum luminance of $5900\;cd/m^2$ at 30KHz.

  • PDF

Contrast Enhanced MR Angiography

  • Lee, M.W.;Kim, S.S.;Kim, I.Y.;Na, K.E.;Yi, Y.;Jung, K.J.
    • 한국자기공명학회:학술대회논문집
    • /
    • 한국자기공명학회 2000년도 제17회 학술발표회
    • /
    • pp.33-37
    • /
    • 2000
  • PDF