• Title/Summary/Keyword: Laptop Computer

Search Result 91, Processing Time 0.03 seconds

Fatigue Life Estimation of Solid-state Drive due to the Effect of Dummy Solder Ball under Forced Vibration (Solid-state drive 강제진동시 dummy solder ball 효과에 의한 피로수명 예측)

  • Lee, Juyub;Jang, Gunhee;Jang, Jinwoo
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2014.10a
    • /
    • pp.978-983
    • /
    • 2014
  • This research proposes a method to estimate the fatigue life of solid-state drive(SSD) due to the effect of dummy solder ball under forced vibration. Mechanical jig is developed to describe the SSD in laptop computer. The jig with SSD is mounted on a shaker, and excited by a sinusoidal sweep vibration within the narrow frequency band around the first resonant frequency until the SSD fails. A finite element model of SSD is also developed to simulate the forced vibration. It shows that the solder joints at the corners of controller package are most vulnerable components and that placing dummy solder balls at those area is effective method to increase fatigue life of SSD.

  • PDF

Steady-state Characteristics of the Piezoelectric Transformer and the Design of the Piezoelectric Inverter for Cold Cathode Fluorescent Lamp (압전 변압기의 정상상태 특성과 고효율 냉 음극 방전램프용 인버터 설계)

  • Gwon, Gi-Hyeon;Im, Yeong-Cheol;Yang, Seung-Hak;Jeong, Yeong-Guk
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.49 no.4
    • /
    • pp.175-182
    • /
    • 2000
  • The back-light inverter used in the laptop computer is designed in this paper. It has been difficult for electromagnetic transformer to enhance the efficiency and compact profile of the inverter. In this paper, (1) the piezoelectric transformer (PT) is used for reducing the loss; (2) the volumes of core and winding coil are used in electromagnetic transformer, and (3) the half-bridge series parallel resonant circuit is used in the driver of the inverter. The modified PT for this paper and the equivalent circuit are supported by the simulation program. The result of the experiment shows more than 91% improvement in terms of the efficiency.

  • PDF

NUMERICAL ANALYSIS FOR CONDUCTION HEAT TRANSFER AND APPRAISAL OF PERFORMANCE INDICES IN LED MONITOR FOR LAPTOP COMPUTER (노트북 LED 영상장치 내부의 전도열전달 해석과 성능 지수 평가)

  • Park, I.S.;Sohn, C.H.;Son, D.H.;Baik, S.M.;Park, C.
    • Journal of computational fluids engineering
    • /
    • v.16 no.3
    • /
    • pp.47-51
    • /
    • 2011
  • Dark Mura phenomena which can happen at the region with high temperature gradient in a Notebook LCD Monitor using LED light source has numerically been studied. The calculation was conducted under the nearly realistic conditions by considering the anisotropic thermal properties of materials and the real dimensions of each component. The two performance indices of LED monitor, i.e., the maximum temperature and the spacial gradient of temperature were examined for the various shapes, lengths and thickness of heat sink plate. Calculated results give more reasonable temperature distribution comparing with experimental results.

Thermal Performance of Cooling System for a Laptop Computer Using a Boiling Enhancement Microstructure (비등 촉진 마이크로 구조물을 이용한 휴대용 컴퓨터 냉각시스템의 열성능에 관한 연구)

  • Cho, N.H.;Jeong, W.Y.;Park, S.H.
    • Proceedings of the KSME Conference
    • /
    • 2008.11b
    • /
    • pp.2043-2052
    • /
    • 2008
  • The increasing heat generation rates in CPU of notebook computers motivate a research on cooling technologies with low thermal resistance. This paper develops a closed-loop two-phase cooling system using a micropump to circulate a dielectric liquid(PF5060). The cooling system consists of an evaporator containing a boiling enhancement microstructure connected to a condenser with mini fans providing external forced convection. The cooling system is characterized by a parametric study which determines the effects of volume fill ratio of coolant, existence of a boiling enhancement microstructure and pump flow rates on thermal performance of the closed loop. Experimental data shows the optimal parametric values which can dissipate 33.9W with a film heater maintained at $95^{\circ}C$.

  • PDF

Design and Development of Automatic Maneuvering Controller Using DGPS (DGPS를 이용한 자동 운항 제어기 설계 및 개발)

  • Kim, Ki-Young;Lee, Myoung-Il;Heo, Seok;Kwak, Moon-Kyu
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.9
    • /
    • pp.850-855
    • /
    • 2006
  • This is concerned with the development and design of automatic maneuvering system using Differential Global Positioning System(DGPS). To achievement of autonomous maneuvering controller for giant ship, first, we investigated automatic maneuvering controller using DGPS in motor car. The sensors are configured with DGPS and digital compass. We calculated velocity and steering angle of motor car based on sensor signal. To design the controller, we derived the bicycle model and developed critically damped controller. The critically damped controller can be tracing previously appointed position in the fastest time. We are used a laptop computer to realize and the control algorithm is programmed by visual basic software. The obtained experimental results from developed system show unmanned motor car is good tracing planed positions. Hence, the system is looking forward to use the autonomous maneuvering control fur giant ship.

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

An Approach to Control of Dispersed or Centralized Digital Contents (분산 또는 집중화된 디지털콘텐츠의 효과적인 통제방안: 구현사례를 중심으로)

  • Yoon, Han Seong
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.21-31
    • /
    • 2013
  • It is not easy to control the unstructured digital contents efficiently which are usually created while carrying out the wide scope of managerial activities. Moreover, besides the existing EDMS method, new methodologies including new-type servers and clients like SBC, VDI, thin client, zero client, etc are said to be more efficient for managing digital contents. Usually, digital contents has been created and stored in the dispersed individual computers like laptop or desktop. Today, due to the advent of new technologies and devices for computer systems and network capacity, it's possible to store whole digital contents within centralized storage like EDMS. In this paper, it is shown how digital contents can be controled through selection of which approaches are used for individual users and storage servers. For alternatives, we explained implementation, merits and demerits, selection criteria, etc. And a case of the implementation of digital contents control is shown for the reference of related systems.

Data Firewall: A TPM-based Security Framework for Protecting Data in Thick Client Mobile Environment

  • Park, Woo-Ram;Park, Chan-Ik
    • Journal of Computing Science and Engineering
    • /
    • v.5 no.4
    • /
    • pp.331-337
    • /
    • 2011
  • Recently, Virtual Desktop Infrastructure (VDI) has been widely adopted to ensure secure protection of enterprise data and provide users with a centrally managed execution environment. However, user experiences may be restricted due to the limited functionalities of thin clients in VDI. If thick client devices like laptops are used, then data leakage may be possible due to malicious software installed in thick client mobile devices. In this paper, we present Data Firewall, a security framework to manage and protect security-sensitive data in thick client mobile devices. Data Firewall consists of three components: Virtual Machine (VM) image management, client VM integrity attestation, and key management for Protected Storage. There are two types of execution VMs managed by Data Firewall: Normal VM and Secure VM. In Normal VM, a user can execute any applications installed in the laptop in the same manner as before. A user can access security-sensitive data only in the Secure VM, for which the integrity should be checked prior to access being granted. All the security-sensitive data are stored in the space called Protected Storage for which the access keys are managed by Data Firewall. Key management and exchange between client and server are handled via Trusted Platform Module (TPM) in the framework. We have analyzed the security characteristics and built a prototype to show the performance overhead of the proposed framework.

Improved Tracking System and Realistic Drawing for Real-Time Water-Based Sign Pen (향상된 트래킹 시스템과 실시간 수성 사인펜을 위한 사실적 드로잉)

  • Hur, Hyejung;Lee, Ju-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.125-132
    • /
    • 2014
  • In this paper, we present marker-less fingertip and brush tracking system with inexpensive web camera. Parallel computation using CUDA is applied to the tracking system. This tracking system can run on inexpensive environment such as a laptop or a desktop and support for real-time application. We also present realistic water-based sign pen drawing model and implementation. The realistic drawing application with our inexpensive real-time fingertip and brush tracking system shows us the art class of the future. The realistic drawing application, along with our inexpensive real-time fingertip and brush tracking system, would be utilized in test-bed for the future high-technology education environment.

Hacking Countermeasures for Wireless Internet Service (무선 인터넷 서비스를 위한 해킹 대응 방안)

  • Kook, Jung Gak;Kim, Hee Wan
    • Journal of Service Research and Studies
    • /
    • v.6 no.3
    • /
    • pp.79-90
    • /
    • 2016
  • Wireless internet service is an important factor to support all industries. In order to connect and use the smart phones or the laptop via a wireless Internet connection, it has been increasing the hacking risks associated with it. As information spills through the DNS address modulation of the Internet router, hacking threats through a wireless router is present. In this paper, we are dealing with the hacking technique utilizing the overall vulnerability of a wireless LAN. We analyzed the need for the wireless LAN security through WEP encryption algorithm and the improved encryption algorithm. In addition, we presented a countermeasure against these hacking technologies which is WEP Crack using wireless vulnerability hacking technology, DDoS attacks, DNS Spoofing.