排序方式: 共有80条查询结果,搜索用时 117 毫秒
1.
Food Science and Biotechnology - Aluminum based reflective nanolens arrays were developed via a series of aluminum electropolishing and anodization steps with subsequent selective dissolution of... 相似文献
2.
A timing controller embedded driver IC with 3.24‐Gbps eDP interface for chip‐on‐glass TFT‐LCD applications
下载免费PDF全文
![点击此处可从《Journal of the Society for Information Display》网站下载免费的PDF全文](/ch/ext_images/free.gif)
Tae‐Jin Kim Changhoon Baek Sengsub Chun Kil‐Hoon Lee Jong‐Il Hwang Kyeonghwan Kwon Yong‐Hun Kim Hyun‐Sang Park Youngmin Shin Seong‐young Ryu Jae‐Youl Lee Gyoocheol Hwang Gyeongnam Kim 《Journal of the Society for Information Display》2016,24(5):299-306
This paper presents a timing controller embedded driver (TED) IC with 3.24‐Gbps embedded display port (eDP), which is implemented using a 45‐nm high‐voltage CMOS process for the chip‐on‐glass (COG) TFT‐LCD applications. The proposed TED‐IC employs the input offset calibration scheme, the zero‐adjustable equalizer, and the phase locked loop‐based bang‐bang clock and data recovery to enhance the maximum data rate. Also, the proposed TED‐IC provides efficient power management by supporting advanced link power management feature of eDP standard v1.4. Additionally, the smart charge sharing is proposed to reduce the dynamic power consumption of output buffers. Measured result demonstrates the maximum data rate of 3.24 Gbps from a 1.1 V supply voltage with a 7.9‐inch QXGA 60‐Hz COG‐LCD prototype panel and 44% power saving from the display system. 相似文献
3.
4.
Sudip Misra P. Venkata Krishna Akhil Bhiwal Amardeep Singh Chawla Bernd E. Wolfinger Changhoon Lee 《The Journal of supercomputing》2012,62(1):4-23
Reliable routing of packets in a Mobile Ad Hoc Network (MANET) has always been a major concern. The open medium and the susceptibility of the nodes of being fault-prone make the design of protocols for these networks a challenging task. The faults in these networks, which occur either due to the failure of nodes or due to reorganization, can eventuate to packet loss. Such losses degrade the performance of the routing protocols running on them. In this paper, we propose a routing algorithm, named as learning automata based fault-tolerant routing algorithm (LAFTRA), which is capable of routing in the presence of faulty nodes in MANETs using multipath routing. We have used the theory of Learning Automata (LA) for optimizing the selection of paths, reducing the overhead in the network, and for learning about the faulty nodes present in the network. The proposed algorithm can be juxtaposed to any existing routing protocol in a MANET. The results of simulation of our protocol using network simulator 2 (ns-2) shows the increase in packet delivery ratio and decrease in overhead compared to the existing protocols. The proposed protocol gains an edge over FTAR, E2FT by nearly 2% and by more than 10% when compared with AODV in terms of packet delivery ratio with nearly 30% faulty nodes in the network. The overhead generated by our protocol is lesser by 1% as compared to FTAR and by nearly 17% as compared to E2FT when there are nearly 30% faulty nodes. 相似文献
5.
Lee So-Yeon Kwon Ki-Hyun Chai Changhoon Oh Se-Wook 《Food science and biotechnology》2018,27(2):599-605
Food Science and Biotechnology - This study was conducted to compare the growth parameters of Listeria monocytogenes between beef isolates and Type strains in raw beef. Beef was artificially... 相似文献
6.
Keungi Lee Changhoon Lee Sangjin Lee 《Computers & Mathematics with Applications》2013,65(9):1413-1420
In recent years, various computers have been compromised through several paths. In particular, the attack patterns and paths are becoming more various than in the past. Furthermore, systems damaged by hackers are used as zombie systems to attack other web servers or personal computers, so there is a high probability to spread secondary damage such as DDoS. Also, previously, hacking and malicious code were carried out for self-display or simple curiosity, but recently they are related to monetary extortion. In order to respond to incidents correctly, it is important to measure the damage to a system rapidly and determine the attack paths. This paper will discuss an on-site investigation methodology for incident response and also describe the limitations of this methodology. 相似文献
7.
Changhoon Lee Author Vitae Jongsung Kim Author Vitae Jaechul Sung Author Vitae 《Journal of Systems and Software》2008,81(12):2328-2335
DDO-64 is a 64-bit Feistel-like block cipher based on data-dependent operations (DDOs). It is composed of 8 rounds and uses a 128-bit key. There are two versions of DDO-64, named DDO-64V1 and DDO-64V2, according to the key schedule. They were designed under an attempt for improving the security and performance of DDP-based ciphers. In this paper, however, we show that like most of the existing DDP-based ciphers, DDO-64V1 and DDO-64V2 are also vulnerable to related-key attacks. The attack on DDO-64V1 requires 235.5 related-key chosen plaintexts and 263.5 encryptions while the attack on DDO-64V2 only needs 8 related-key chosen plaintexts and 231 encryptions; our attacks are both mainly due to their simple key schedules and structural weaknesses. These works are the first known cryptanalytic results on DDO-64V1 and DDO-64V2 so far. 相似文献
8.
9.
Changhoon Lee Sangjin Lee Jong Hyuk Park Sajid Hussain Jun Hwan Song 《Telecommunication Systems》2010,44(3-4):267-279
DDP-64, based on various controlled operations, is a 64-bit Feistel-like block cipher consisting of 10 rounds with a 128-bit key. It was designed to attempt to have a high security level and a high speed performance in hardware on ubiquitous computing systems and multimedia. In this paper, however, we show that DDP-64 doesn’t have a high security level, more precisely, we show that it is vulnerable to related-key differential attack. This attack, which is much faster than the key exhaustive search, requires about 254 data and 254 time complexities. This work is the first known cryptanalytic result on DDP-64 so far. 相似文献
10.