Abstract:
There are provided a thin film transistor substrate for transflective liquid crystal display device (LCD) and a manufacturing method thereof, which can reduce manufacturing cost and simplifying manufacturing processes. In the method, a thin film transistor is formed on a reflection region of a device substrate defined by the reflection region and a transmission region. A passivation layer is formed on the thin film transistor so as to expose a drain electrode of the thin film transistor and to cover the thin film transistor. A pixel electrode is formed on the transmission and reflection regions. The pixel electrode has a structure of a first pixel electrode electrically connected to the drain electrode and a second pixel electrode formed to have an embossed pattern on the first pixel electrode. A reflective layer is formed on the second electrode pixel having the embossed pattern on the reflection region.
Abstract:
A semiconductor device includes capacitors connected in parallel. Electrode active portions and a discharge active portion are defined on a semiconductor substrate, and capping electrodes are disposed respectively on the electrode active portions. A capacitor-dielectric layer is disposed between each of the capping electrodes and each of the electrode active portions that overlap each other. A counter doped region is disposed in the discharge active portion. A lower interlayer dielectric covers the entire surface of the semiconductor substrate. Electrode contact plugs respectively contact the capping electrodes through the lower interlayer dielectric, and a discharge contact plug contacts the counter doped region through the lower interlayer dielectric. A lower interconnection is disposed on the lower interlayer dielectric and contacts the electrode contact plugs and the discharge contact plug.
Abstract:
An apparatus and method for detecting anomalous traffic are provided. More particularly, an apparatus and method for detecting anomalous traffic based on entropy of network traffic are provided. The apparatus of detecting anomalous traffic includes: an entropy extraction module for extracting entropy from network traffic; a visualization module for generating an entropy graph based on the entropy; a graph model experience module for updating a graph model for each network attack based on the entropy graph; and an anomalous traffic detection module for detecting anomalous traffic based on the entropy graph and the graph model for each network attack and outputting the detection results to a user. In the apparatus and method, anomalous traffic is detected based on network entropy rather than simple statistics based on the amount of traffic, so that a false alarm rate of the apparatus for detecting anomalous traffic can be reduced.
Abstract:
A mobile communication terminal having a multiparty video call function and a method for converting a mode of a multiparty video call are disclosed. The terminal includes an input unit that receives a command for selecting one of phone call modes and a controller that displays a menu for selecting a phone call mode on the display, when a request for a video call or video chatting with the third terminal is wirelessly transmitted or received while the mobile communication terminal is performing video call communication or video chatting, and maintains an established call mode or converts the established call mode to a different phone call mode according to a phone call mode selected through the input unit to perform multiparty video call communication.
Abstract:
A multistep integrated security management system and method using an intrusion detection log collection engine and a traffic statistic generation engine is disclosed. An intrusion detection log collection engine capable of collecting logs generated from diverse intrusion detection engines and a traffic statistic generation engine collect and transmit analyzed data to a control intermediate management server. The control intermediate management server performs more accurate intrusion detection by relationally analyzing the intrusion detection log information and the traffic statistic information. A control uppermost management server performs an integrated security management on a large-scale group subject to control by performing an integrated analysis on a large-scale group subject to control, and thus can support the large-scale integrated security management efficiently.
Abstract:
The present invention relates to ester compounds derived from 3,4,5-trimethoxy phenyl acetate, 3,4,5-trimethoxy cinnamate or 3,4,5-trimethoxy hydrocinnamate that are represented by Formula (I), wherein R1 is CH2—, —CH═CH— or CH2—CH2, R2 is thymyl or carvacryl, to methods for preparing them, and to a whitening cosmetic composition containing the ester compounds. Because the ester compounds of the present invention inhibit the generation of melanin, the cosmetic composition can improve the skin pigmentation and can be used for whitening cosmetics.
Abstract:
The present invention relates to a novel 4′-methanesulfonyl-biphenyl derivative having a structure of formula 1 and its pharmaceutically acceptable salts as a highly selective cyclooxygenase-2 inhibitor. Wherein, R1 and R2 are defined in this specification respectively.