• Title/Summary/Keyword: Information Engineering

Search Result 83,274, Processing Time 0.082 seconds

Enhancement mechanisms of luminance efficiency in red organic light-emitting devices fabricated utilizing a double electron transport layer consisting of an Al-doped layer and an undoped layer

  • Choo, D.C.;Bang, H.S.;Ahn, S.D.;Lee, K.S.;Seo, S.Y.;Yang, J.S.;Kim, T.W.;Seo, J.H.;Kim, Y.K.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.513-516
    • /
    • 2008
  • The luminance efficiency of the red organic light-emitting devices fabricated utilizing a double electron transport layer (ETL) consisting of an Al-doped and an undoped layer was investigated. The Al atoms existing in the ETL acted as hole blocking sites, resulting in an increase in the luminance efficiency.

  • PDF

Fabrication of PDMS micro-pads for vibration absorber in MEMS packaging (MEMS packaging을 위한 Micro PDMS pad 제작)

  • Kim, Han-Hyoung;Sim, Se-Hwan;Kim, Sung-Gi;Yang, Seung-Kook;O, Beom-Hoan;Lee, Seung-Gol;Lee, El-Hang;Park, Se-Geun;Lee, Jong-Geun
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.511-512
    • /
    • 2008
  • Micro-pads made of PDMS(polydimethylsiloane) can be mechanical shock or vibration absorber because of its contractibility. Fabrication of micro-pads and techniques of separation from substrate and attachment to new substrate are developed. Three micron thick PDMS pads were fabricated by imprinting lithography.

  • PDF

A Two-Step Screening Algorithm to Solve Linear Error Equations for Blind Identification of Block Codes Based on Binary Galois Field

  • Liu, Qian;Zhang, Hao;Yu, Peidong;Wang, Gang;Qiu, Zhaoyang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3458-3481
    • /
    • 2021
  • Existing methods for blind identification of linear block codes without a candidate set are mainly built on the Gauss elimination process. However, the fault tolerance will fall short when the intercepted bit error rate (BER) is too high. To address this issue, we apply the reverse algebra approach and propose a novel "two-step-screening" algorithm by solving the linear error equations on the binary Galois field, or GF(2). In the first step, a recursive matrix partition is implemented to solve the system linear error equations where the coefficient matrix is constructed by the full codewords which come from the intercepted noisy bitstream. This process is repeated to derive all those possible parity-checks. In the second step, a check matrix constructed by the intercepted codewords is applied to find the correct parity-checks out of all possible parity-checks solutions. This novel "two-step-screening" algorithm can be used in different codes like Hamming codes, BCH codes, LDPC codes, and quasi-cyclic LDPC codes. The simulation results have shown that it can highly improve the fault tolerance ability compared to the existing Gauss elimination process-based algorithms.

Social Engineering Attack Graph for Security Risk Assessment: Social Engineering Attack Graph framework(SEAG)

  • Kim, Jun Seok;Kang, Hyunjae;Kim, Jinsoo;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.75-84
    • /
    • 2018
  • Social engineering attack means to get information of Social engineering attack means to get information of opponent without technical attack or to induce opponent to provide information directly. In particular, social engineering does not approach opponents through technical attacks, so it is difficult to prevent all attacks with high-tech security equipment. Each company plans employee education and social training as a countermeasure to prevent social engineering. However, it is difficult for a security officer to obtain a practical education(training) effect, and it is also difficult to measure it visually. Therefore, to measure the social engineering threat, we use the results of social engineering training result to calculate the risk by system asset and propose a attack graph based probability. The security officer uses the results of social engineering training to analyze the security threats by asset and suggests a framework for quick security response. Through the framework presented in this paper, we measure the qualitative social engineering threats, collect system asset information, and calculate the asset risk to generate probability based attack graphs. As a result, the security officer can graphically monitor the degree of vulnerability of the asset's authority system, asset information and preferences along with social engineering training results. It aims to make it practical for companies to utilize as a key indicator for establishing a systematic security strategy in the enterprise.

Discharge Characteristics of a Flat Plasma Backlight with Long Electrode Gap

  • Li, Q.;Luo, Y.;Zheng, Y.;Yang, L.;Cui, Y.;Liu, J.;Zhang, Z.;Tolner, H.
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2008.10a
    • /
    • pp.795-798
    • /
    • 2008
  • The discharge characteristics of a flat plasma backlight with long electrode gap are investigated. The effect of operating voltage and repetition rate on brightness and luminance efficiency is investigated. A new high efficacy mode is found at low frequencies around 15-40 KHz; a lumen efficacy of 15.3 lm/W is achieved at a luminance of $2400\;cd/m^2$. In the high brightness mode, present at high voltage, we find a maximum luminance of $5900\;cd/m^2$ at 30KHz.

  • PDF

Contrast Enhanced MR Angiography

  • Lee, M.W.;Kim, S.S.;Kim, I.Y.;Na, K.E.;Yi, Y.;Jung, K.J.
    • Proceedings of the Korean Magnetic Resonance Society Conference
    • /
    • 2000.08a
    • /
    • pp.33-37
    • /
    • 2000
  • PDF