摘要:
Provided are a nanocomposite composition having barrier properties and an article manufactured therefrom. The compositon is prepared by dry-blending a polyolefin resin, a melt blend of a resin having barrier properties and a nanocomposite having barrier properties, and a compatibilizer. The compositon has superior barrier properties and moldability, and thus is useful for manufacturing a sheet or film having barrier properties.
摘要:
The application disclose a method of preventing immune cells from binding to other cells, which includes contacting the immune cells and the other cells with a composition comprising Bst2 antagonist.
摘要:
Disclosed herein is a system for providing lyrics for a plurality of digital audio files. The system includes at least one terminal, a server, and a database server. The terminal selects a digital audio file among the digital audio files, and transmits tag information to receive lyrical data assigned to the selected digital audio file. The server retrieves the lyrical data, which is assigned to the selected digital audio file, using the tag information on the digital audio file transmitted from the terminal, and transmits the lyrical data to the terminal. The database server transmits the lyrical data in response to a request from the server and previously stores lyrical data in which lyrics are synchronized with digital audio files.
摘要:
An oil pump for a compressor includes a driving shaft having an oil passage, a gear driving unit coupled to the drive shaft, a pump body having a driving shaft insertion groove, a friction reducing member assembled on the driving shaft insertion groove to reduce friction between the driving shaft and pump body, and a a gear unit coupled to the pump body and rotating with rotation of the driving shaft. The pump may further include a pump cover coupled to the pump body and having an intake for inhaling oil.
摘要:
A file management method in a file system and a metadata server therefor are provided. The file management method in a file system includes: generating first metadata and a first object having an identical first identifier with respect to a first file; and finding second metadata and a second object corresponding to a second file desired to be found among a plurality of generated files, by using a second identifier, and if the second metadata and the second object are found, opening the second file.
摘要:
The present invention relates to an earring comprising a body in the form of a hollow pipe ring, with both ends of the body scaled to form scaling parts; a joint having a pin pivotable therein and coupled to the sealing part formed at one end of the body; and a catch coupled to the sealing part formed at the other end of the body to receive the pin therein. Further, a method of manufacturing the earring comprises cutting off both ends of a hollow pipe of a predetermined length; pressing the ends of the hollow pipe to form sealing parts and curving the pipe to form a ring-shaped body; plating the body with a predetermined material; and fitting the sealing parts to the joint and the catch respectively to be coupled therewith.
摘要:
Provided are a system and method for coping with encrypted harmful traffic in hybrid IPv4/IPv6 networks. The system includes: an encryption key manager collecting encryption key information from a user terminal connected to the hybrid IPv4/IPv6 networks, and storing and managing the information in an encryption key database; an encryption traffic collector collecting encrypted traffic from traffic in the hybrid IPv4/IPv6 networks; an encryption key searcher searching for an encryption key used to decrypt the encrypted traffic from the encryption key database using a source IP address and a destination IP address of the encrypted traffic; a harmful traffic determiner decrypting the encrypted traffic using the encryption key and determining whether the decrypted traffic is harmful traffic; and an encryption traffic processor, if the decrypted traffic is determined to be harmful traffic, blocking the harmful traffic and, if the decrypted traffic is determined to be normal traffic, encrypting the normal traffic, and transferring the encrypted traffic to a user terminal corresponding to the destination IP address, thereby detecting and blocking an attack pattern using the encrypted harmful traffic in hybrid IPv4/IPv6 networks which cannot be detected by a conventional firewall system and more effectively protecting the networks.
摘要:
An internal voltage generating apparatus for a semiconductor integrated circuit includes a detecting circuit configured to detect levels of a plurality of internal voltages, to generate a plurality of voltage enable signals and a pump enable signal. A pump circuit performs a voltage pumping operation in response to the pump enable signal and outputs the plurality of internal voltages in response to the plurality of voltage enable signals.
摘要:
Provided is a contents providing system. The system includes a storing unit, a plurality of server nodes, a dispatcher node, and a storing/deleting management node. The storing unit stores synchronization data according to a service state of each contents data that can be provided. The plurality of server nodes change synchronization data of contents, and provides the contents service in response to a contents service request input via a network. The dispatcher node checks a service state of contents to select a server node that is to provide the corresponding contents service, and changes synchronization data to transmit address data of the selected server node and a corresponding contents file data to a client that has requested the contents service. The storing/deleting management node manages storing and deleting of contents data stored in a contents storing unit with reference to the synchronization data stored in the storing unit.
摘要:
An apparatus for generating intrusion alert data and a method thereof are provided. The apparatus for generating and transmitting alert data in relation to intrusion includes: an input unit receiving inputs of an alert data type in preparation against an intrusion, and a transmission amount per unit time for transmitting the alert data; an intrusion alert data generation unit generating intrusion alert data according to the alert data type and the transmission amount per unit time; and an intrusion alert data transmission unit transmitting the generated intrusion alert data to a security management system at the rate of the transmission amount per unit time. By generating a large amount of intrusion alert data by using a variety of intrusion alert transfer protocols, and transmitting the data, the performance test of a function for processing intrusion alert data of a security management system can be performed efficiently.