Abstract:
Provided is a buffer amplifier. The buffer amplifier includes: a replica bias unit dividing an internal power voltage received from an internal power node to generate a bias voltage; an input unit including a first differential amplifier comparing a first differential input signal with the bias voltage to output a first internal signal and a second differential amplifier comparing a second differential input signal with the bias voltage to output a second internal signal; and an output unit including a third differential amplifier comparing the first internal signal with the second internal signal to output a first differential output signal and a second differential output signal.
Abstract:
A peak detector using a charge pump is provided. The peak detector includes a differential amplifier configured to receive an input signal to be detected through an input node and amplify the received signal; a current control logic configured to create two or more current control signals by comparing a signal output from the differential amplifier with two or more reference voltages; a mirror current source portion comprising two or more mirror current sources configured to be driven respectively by the current control signals from the current control logic; a capacitor configured to be charged or discharged by currents output from the mirror current sources; and a reset circuit configured to reset a voltage of the capacitor.
Abstract:
A method and apparatus provides a concealed software execution environment based on virtualization. The method and apparatus constructs a concealed domain that is exclusively executed without being exposed to the outside using a virtualization-based domain separating technology and executes security information such as key information provided by a secure element within the concealed domain.
Abstract:
A Regulated Cascode (RGC)-type burst mode optic pre-amplifier having an extended linear input range. The burst mode optic pre-amplifier comprises an RGC-type Trans Impedance Amplifier (TIA), wherein a current path is added in the circuit of the RGC-type TIA to control a linearity state of the RGC-type TIA, and a main voltage gain is controlled in other circuit blocks after the RGC-type TIA.
Abstract:
Disclosed is an antenna-sub harmonic mixer block, which includes a dielectric block disposed on a PCB substrate having a ground surface, an antenna including first antenna patch provided on the dielectric block and having a metal patch and a slot, and a second antenna patch provided on the dielectric block, spaced apart from the first antenna patch to surround the first antenna patch, and that receives a ground voltage at the same potential as the ground surface of the PCB substrate, an RF ground wire disposed on the dielectric block and connected from the first antenna patch to a surface having the same potential as the ground surface, an RF switching stage disposed on the dielectric block, connected to the first antenna patch, and that provides a switching ON/OFF operation in conjunction with the RF ground wire depending on a magnitude of a local signal LO.
Abstract:
An operation method of a first communication node performing access control in a multi-hop based communication network may comprise receiving a first message requesting authentication for a third communication node from a second communication node included in the communication network; transmitting a second message requesting authentication for the third communication node to a fourth communication node performing an authentication procedure in the communication network; receiving a third message from the fourth communication node, the third message including information on a result of the authentication procedure for the third communication node; and transmitting a fourth message including the information on the result of the authentication procedure to the second communication node.
Abstract:
A signal level detector comprising and a Burst-Mode Trans Impedance Amplifier (BM-TIA) using the same. The signal level detector includes a level detector configured to detect peak voltage of an input voltage signal, a reference voltage generator configured to generate second reference voltage by receiving first reference voltage, a comparator configured to compare the peak voltage and the second reference voltage and output a discrimination value according to a comparison result, and a latch configured to store the differential output from the comparator, wherein the level detector and the reference voltage generator have differential amplifier in the same structure.
Abstract:
The present invention relates to technology for providing a remote memory, and more particularly, to a system for providing a remote memory which may enable an application in a high performance computing system to use a physical memory of a remote computing node like a local memory of a computing node in which the corresponding application is executed, and a temporary page pool operating method for providing a remote memory.
Abstract:
A user authentication apparatus safely uses resources by forming a communication channel between a plurality of execution environments through user authentication in a portable terminal providing the plurality of execution environments based on a virtualization solution, and prevents private information from being illegally leaked by hacking by not directly exposing a PIN number or a password a user inputs using a virtual keyboard and a keyboard coordinate when authenticating the user.
Abstract:
A method and an apparatus for predicting cyber threats using natural language processing are disclosed. According to an embodiment of a present disclosure, a method for predicting cyber threats includes calculating similarity using a first embedding vector for cyber threat identification information and a second embedding vector for asset information when security event information is received, wherein the security event information includes the cyber threat identification information. The method also includes measuring correlation between the cyber threat identification information and the asset information based on the similarity. The method also includes determining an asset vulnerable to cyber threats based on the correlation.