• Title/Summary/Keyword: Id

Search Result 2,855, Processing Time 0.035 seconds

Solution processed organic photodetector utilizing an interdiffused polymer/fullerene bilayer

  • Shafian, Shafidah;Jang, Yoonhee;Kim, Kyungkon
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2016.02a
    • /
    • pp.348-348
    • /
    • 2016
  • Low dark current (off-current) and high photo current are both essential for a solution processed organic photodetector (OPD) to achieve high photo-responsivity. Currently, most OPDs utilize a bulk heterojunction (BHJ) photo-active layer that is prepared by the one-step deposition of a polymer:fullerene blend solution. However, the BHJ structure is the main cause of the high dark current in solution processed OPDs. It is revealed that the detectivity and spectral responsivity of the OPD can be improved by utilizing a photo-active layer consisting of an interdiffused polymer/fullerene bilayer (ID-BL). This ID-BL is prepared by the sequential solution deposition (SqD) of poly(3-hexylthiophene) (P3HT) and [6,6] phenyl C61 butyric acid methyl ester (PCBM) solutions. The ID-BL OPD is found to prevent undesirable electron injection from the hole collecting electrode to the ID-BL photo-active layer resulting in a reduced dark current in the ID-BL OPD. Based on dark current and external quantum efficiency (EQE) analysis, the detectivity of the ID-BL OPD is determined to be $7.60{\times}1011$ Jones at 620 nm. This value is 3.4 times higher than that of BHJ OPDs. Furthermore, compared to BHJ OPDs, the ID-BL OPD exhibited a more consistent spectral response in the range of 400 - 660 nm.

  • PDF

A Study on Pattern Analysis of Sustainability Management Using Fuzzy ID3 (퍼지 ID3를 이용한 지속가능경영의 패턴분석에 관한 연구)

  • Kim, Hong-Jin;Hwang, Seung-Gook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.700-705
    • /
    • 2008
  • In this paper, a model to evaluate the sustainability management for small and middle enterprises was suggested. Also, the if-then rules and its decision tree for pattern analysis which is obtained by fuzzy ID3 from the data of sustainability management were shown. The suggested model can be used for the evaluation tool of competition increasement of enterprises. If the enterprise can recognize that the evaluation rule can be taken advantage of the sustainability management pattern analysis using fuzzy ID3, it is expected that they can use the rule effectively for self evaluation.

LATERAL CEPHALOMETRIC ANALYSIS OF ASYMPTOMATIC VOLUNTEERS AND SYMPTOMATIC PATIENTS WITH TEMPOROMANDIBULAR INTERNAL DERANGEMENT (악관절 내장증 환자와 정상인의 두부방사선규격사진의 분석비교)

  • Shin, Sang-Hun;Park, Sung-Jin
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.25 no.4
    • /
    • pp.330-336
    • /
    • 1999
  • Study of dentofacial structure relationships relative to TMJ internal derangement is required to increase the predictability of TMJ internal derangement. But few studies have been reported. The purpose of this study is to reveal any correlation of dentofacial characteristics with TMJ internal derangement by lateral cephalometric analysis. Patients were devided into two groups. (1) Symptomatic patients with TMJ internal derangement (2) Asymptomatic volunteers with no TMJ internal derangement. Twenty symptomatic patients with TMJ internal derangement(7male, 13female) were selected from our clinic and had undergone a standarized clinical examination, panorama, transcranical view, TMJ tomography. Twenty asymptomatic volunteers(9male, 11female) were selected from our clinic with no pain, no limitation of motion. All subjects had undergone lateral cephalometric analysis. The results were obtained as follows. 1. No significant difference between ID and normal group is detected in cranial base. 2. Maxilla position of ID group is located more posterioly than normal group. 3. Mandible position of ID group is located more posteriorly than normal group and facial profile is hyperdivergent. 4. Posterior facial height of ID group is less than normal group thus facial profile is hyperdivergent. The patients, as mentioned, have a high prevalance of ID thus it should be careful in TMJ ID diagnosis and treatment.

  • PDF

Iron Status in Female College Students in the Gyeongnam Area (경남 일부지역 여대생의 철 영양상태에 관한 연구)

  • Park, Mi-Young;Kim, Sung-Hee
    • Journal of Nutrition and Health
    • /
    • v.44 no.3
    • /
    • pp.222-230
    • /
    • 2011
  • This study was undertaken to investigate iron status and related factors in female college students residing in Gyeongnam. The subjects were divided into normal (40.8%) and iron deficiency (ID) groups (59.2%) by iron status. Mean height, weight, lean body mass, percent body fat, body mass index, and wrist to hip ratio were not significantly different between the groups, but basic metabolic rate was significantly higher in the normal group than that in the ID group. The levels of hemoglobin, hematocrit, serum ferritin, transferrin saturation, mean corpuscular volume, mean corpuscular hemoglobin, and mean corpuscular hemoglobin concentration were significantly higher in the normal group than those in the ID group. However, total iron binding capacity was significantly lower in the normal group than that in the ID group. Daily intake of protein, heme-Fe, niacin, and vitamin C were significantly higher in the normal group than those in the ID group. The mean intake of protein, Fe, niacin, vitamin $B_{12}$, and vitamin C based on the Korean recommended intake (RI) were significantly higher in the normal group than those in the ID group. The mean intakes of Ca, vitamin $B_{12}$, and folate in both groups were < 75% of the Korean RI. In conclusion, increasing dietary heme-Fe and vitamin C may be helpful for preventing ID anemia in female college students.

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

Two Factor Authentication System base on Software type of Secure Card For Secure Login (안전한 로그인을 위한 보안카드 기반 이중 인증 시스템에 대한 연구)

  • Jo, Je-Gyeong;Seo, Jong-Won;Lee, Hyung-Woo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.977-980
    • /
    • 2007
  • 로그인 과정은 사용자의 ID와 Password를 기반으로 시스템에 대한 사용권한을 부여한다. 로그인 과정에서 입력된 ID와 Password 정보는 패킷 스니핑 또는 Keylogger 프로그램 등을 이용하여 악의적인 공격자에 의해 노출될 수 있다는 취약점이 있다. 웹서버 또는 웹메일 시스템 등에 등록된 ID와 Password가 노출된다면 이는 개인 프라이버시 문제와도 연결되어 매우 심각한 문제이기도 하다. 현재 대부분의 시스템에서는 ID와 Password 만을 가지고 사용자에 대한 인증 및 로그인 과정을 수행하기 때문에 더욱더 강력한 복합 로그인 메카니즘이 제시되어야 한다. 본 연구에서는 기존의 ID/Password 기반 로그인 기법과 더불어 소프트웨어 형태의 보안카드를 핸드폰에 설치하여 유무선망을 통한 이중 인증(Two factor authentication) 기법을 제시한다. 제안한 소프트웨어 형태의 보안카드 기반 로그인 기법은 ID/Password와 함께 부가적 정보로써 사용자의 핸드폰에 발급받은 보안카드내 난수 형태로 생성된 번호를 사용한다. 따라서 제안한 시스템을 사용할 경우 기존의 ID와 Password와 연계되어 일회용 패스워드 형태로 제공되는 보안카드 정보를 사용하여 로그인 과정을 수행하기 때문에 보다 안전한 인증 시스템을 구축할 수 있다.

  • PDF

Performance of LED-ID System for Home Networking Applicaion (홈 네트워킹을 위한 LED-ID 시스템 성능분석)

  • Choi, Jae-Hyuck;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.169-176
    • /
    • 2010
  • We propose a Z-HBT line coding for a LED-ID system. Z-HBT line coding is defined as follows. First, we apply half bit transition to one bit. Second, we decode encoded bits using difference of bit transition level in one bit duration. As a result, we obtain advantages about synchronization problem and noise effect mitigation at the receiver. We set up outdoor the LED-ID simulation environment. At simulation results, we show 2-3dB gain as compared with existing line coding schemes. The results of the paper can be applied to design and implementation of LED-ID systems for indoor wireless multimedia services.

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Physical Layer Security Method with CAN Bus Node ID Auto-Setting (CAN 버스에서 노드 ID 자동 설정을 통한 물리 계층 보안 기법)

  • Kang, Tae-Wook;Lee, Jong-Bae;Lee, Seongsoo
    • Journal of IKEEE
    • /
    • v.24 no.2
    • /
    • pp.665-668
    • /
    • 2020
  • When a node in automotive CAN bus is hacked, such node should be blocked to prevent severe danger in the car. In order to do that, such node should be uniquely identified. However, there is no way to identify individual nodes in a CAN bus. In this paper, a physical layer security method is proposed where individual nodes are identified by assigning unique ID to the nodes during booting process. The proposed method was implemented in a CAN controller using Verilog HDL, and it is verified that the node ID auto-setting and internal attack defense are successfully performed.

The Case Report of Tinea Pedis with Id Reaction (이드반응이 동반된 족부백선 환자 치험 1례)

  • Kwon, Kang;Kim, Chul-Yun;Lee, Dong-Jin;Kim, Nam-Kwen;Seo, Hyung-Sik
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.28 no.1
    • /
    • pp.134-142
    • /
    • 2015
  • Objective : This study was carried out to find out the effect of Korean medical treatments on tinea pedis with id reaction. Method : We treated a 33-year-old man was afflicted with tinea pedis complicating id reaction with herbal medicine, acupuncture, ointment, wet-dressing and steam treatment. After treatments, we measured the status of scales, fissures and the degree of pruritus. We followed up symptom changes by taking pictures and compared before and after. Result & Conclusion : Three days after admission, erythema occurred at upper and lower limbs and the degree of pruritus increased by id reaction. As tinea pedis improved, id reaction decreased, too. Consequently, both sites of primary lesions of tinea pedis and secondary id reactions were significantly improved, and accompanied symptoms were resolved simultaneously.