• Title/Summary/Keyword: 도어

Search Result 692, Processing Time 0.029 seconds

Car Theft Protection System using CAN Communication and Smart Devicenment (CAN 통신과 Smart Device를 이용한 차량 도난 방지 System)

  • Kim, Jae-Kyung;Hwang, Man-Tae;Kim, Young-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.10
    • /
    • pp.2136-2142
    • /
    • 2011
  • Smart Device Communications using the development of anti-theft system for vehicles have been investigated. because Progress of Smart Device If someone get the Key for Vehicle theft, he can be easily stolen vehicle. We thought about the concept of dual security devices. Using vehicle's identifier ID of CAN, when Comparing Smat phone identifier ID value and identifier ID received from the Can in the Head, If the same ID is compared. At this point after the activity of the vehicle's ACC On/Off the system allows the vehicle's ignition.

A Study of Smoke Exhaust Facility Operation of Subway Platform with Installation of Platform Screen Door (승강장 스크린도어 설치에 따른 배연설비운영에 대한 연구)

  • Rie, Dong-Ho;Ko, Jae-Woong;Kim, Ha-Young
    • Journal of the Korean Society of Safety
    • /
    • v.21 no.1 s.73
    • /
    • pp.35-40
    • /
    • 2006
  • A study on fire phenomena in a subway transit mass station has been carried out as a part of disaster prevention plan at the subway station. The ventilation facilities installed in both the platform and the trackway are designed to convert into a smoke exhaust system in emergency situation, creating such an environment as necessary for evacuation. 3 dimensional Numerical Simulations based on the CFD are carried out using a simulation tool, Fire Dynamic Simulator. Additionally, four different vent modes are made and performances are compared with the original design mode and each other to find better operation of vents at both the platform and the trackway in case of fire. From the result, an vent operational characteristics under the condition of installed PSD is clarified for the effective smoke and heat removal from the platform area compared with non installed PSD.

The Structure of an lsolated Evodia daniellii Community (고립된 쉬나무 군락의 구조)

  • 이종운
    • Journal of Life Science
    • /
    • v.7 no.1
    • /
    • pp.24-29
    • /
    • 1997
  • The actual vegetation map, community composition and vegetation structure of an isolated Evodia daniellii community due to the urbanization were investigated. At the habitat of Evodia daniellii, east cliff of Mt. Sudo, I made 30 plots of 100m$^{2}$ and adjusted 15 times the aspect of vegetation in whole growing season. On the base of these data, synoptic vegetation table was constructed. The constellation diagram by the calculation of ${\chi}$$^{2}$-value based on the vegetation data shown three vegetation groups pf Albizzia julibrissin with 10 species, Zanthoxylum shinifolium with 12 species and Ulmus parvifolia with 6 species. Through the DBH measurement of 5 major tress, we found that Ailanthus altissima, Paulownia tomentosa and Zelkova serrata are dominant in present, but it will be change by Evodia daniellii.

  • PDF

ESP model for predictions Trojan (Trojan 예측을 위한 ESP 모델 구현)

  • Kim, JongMin;Kim, MinSu;Kim, Kuinam J.
    • Convergence Security Journal
    • /
    • v.14 no.5
    • /
    • pp.37-47
    • /
    • 2014
  • A Trojan malicious code is one of largest malicious codes and has been known as a virus that causes damage to a system as itself. However, it has been changed as a type that picks user information out stealthily through a backdoor method, and worms or viruses, which represent a characteristic of the Trojan malicious code, have recently been increased. Although several modeling methods for analyzing the diffusion characteristics of worms have proposed, it allows a macroscopic analysis only and shows limitations in estimating specific viruses and malicious codes. Thus, in this study an ESP model that can estimate future occurrences of Trojan malicious codes using the previous Trojan data is proposed. It is verified that the estimated value obtained using the proposed model is similar to the existing actual frequency in causes of the comparison between the obtained value and the result obtained by the Markov chain.

Down jumpers using Ultra-light Fiber Materials about to Product Evaluation (초경량 섬유 소재를 사용한 다운점퍼에 대한 제품 평가)

  • Ryu, Sin A;Park, Kil Soon
    • Korean Journal of Human Ecology
    • /
    • v.24 no.5
    • /
    • pp.677-686
    • /
    • 2015
  • This study is to survey the concept of ultralight down jumpers examine customers' knowledge about ultralight down jumpers, factor effect when purchasing them, and satisfaction level. The research method is to examine a survey of consumer evaluation about ultralight down jumpers using a questionnaire targeting 240 men and women in their 30s and 40s. The results of the study are as follows. The knowledge Customers have about ultralight down jumpers appeared low scores in most items; 62.1%9(2.28)) answered 'does not know' in the item of 'knows about the mixed composition rate of filler', 54.6%(2.49) answered 'does not know' in the item of 'knows about ultralight materials', and 52.5%(2.56) answered 'does not know' in the item of 'knows about filling rate'. The important factors to consider when purchasing were 'size and pattern'(4.34), 'color'(4.32), 'design and price'(4.30). About satisfaction, 66.7%(3.69) answered 'most satisfied' in the item of 'well-fitting(wearing) sensation' and 60.0%(3.63) answers 'satisfied' in the item of 'activity and easy-to-wear'.

Design and Implementation of a 13.56 MHz RFID System (13.56 MHz RFID 시스템 설계 및 구현)

  • Lee, Sang-Hoon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.9 no.1
    • /
    • pp.46-53
    • /
    • 2008
  • This paper presents a 13.56 MHz RFID reader that can be used as a door-lock system for smart home security. The RFID reader consists of a transmitter, a receiver, and a data processing block. To verify the operation of the developed RFID reader, we present both a PSPICE simulation for transmitter/receiver and a digital simulation for data processing block. In particular, a CRC block for error detection of received data and a Manchester decoding block for position detection of collided data are designed using VHDL. In addition, we applied a binary search algorithm for multi-tag anti-collision. The anti-collision procedure is carried out by PIC microcontroller on software. The experimental results show that the developed reader can provide the right multi-tag recognition.

  • PDF

Design of Throttle Orifices for an Aircraft Door Damper (항공기의 도어 댐퍼용 교축 오리피스의 설계)

  • Kwon, Y.C.;Kim, C.H.;Hong, Y.S.;Kim, S.B.
    • Journal of Drive and Control
    • /
    • v.9 no.3
    • /
    • pp.23-28
    • /
    • 2012
  • In this study the flow rate-to-pressure difference characteristics of short-tube type damping orifices for an aircraft door damper were investigated by CFD analyses and experiments. As the design parameters of the damping orifice its diameter, inlet and outlet angle, tube length and the viscosity of the working fluid were taken into consideration. The results showed that the discharge coefficient of the orifices are dependant on the inlet and outlet angle and the oil viscosity, while their length plays an little significant role. Although the short-tube type damping orifice was employed to induce a turbulent flow, their discharge coefficient decreases rapidly as the oil viscosity gets higher than 50mm2/s. Therefore, in order to determine the orifice size, satisfying the working temperature range of the door damper, the oil viscosity as well as the friction force on the damper piston should be kept within proper values. For the verification of the CFD analysis results the actual performance of a door damper was measured and compared with them.

Design an Algorithm Matching TCP Connection Pairs for Intruder Traceback (침입자 역추적을 위한 TCP 연결 매칭 알고리즘 설계)

  • Kang Hyung-Woo;Hong Soon-Jwa;Lee Dong-Hoon
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.11-18
    • /
    • 2006
  • In the field of network defense, a lot of researches are directed toward locating the source of network attacks. When an intruder launches attack not from their own computer but from intermediate hosts that they previously compromised, and these intermediate hosts are called stepping-stones. There we two kinds of traceback technologies : IP packet traceback and connection traceback. We focused on connection traceback in this paper This paper classifies process structures of detoured attack type in stepping stone, designs an algorithm for traceback agent, and implements the traceback system based on the agent

PCI Express NTB based Interconnection Network Technology Trends (PCI Express NTB 기반 상호연결망 기술 동향)

  • Choi, Min;Oh, Sechang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.51-54
    • /
    • 2016
  • NTB는 transparent bridge와 공통적으로 독립적인 PCI bus(PCI 또는 PCI Express bus)에 대해서 데이터 전송 경로(path)를 제공한다는 점에서 기능적으로 유사하다. 그러나, NTB와 transparent bridge 간의 가장 큰 차이점은 NTB가 사용될 경우에 bridge의 하향부분(downstream side)에 위치한 장치들은 상향부분(upstream side)에서는 보이지 않는다는 점이다. 이는 bridge의 하향부분(downstream side)에 위치한 인텔리전트(intelligent)한 제어기(예를들면 CPU를 포함하는 컴퓨터)가 자신의 downstream side에 위치하는 서브시스템 내 각종 장치들을 독립적으로 관리할 수 있다는 점이다. NTB는 또한 첫 번째 호스트(primary host)의 PCI bus로 구성된 서브시스템(subsystem) 계층구조(hierarchy)에 두 번째 호스트(secondary host)를 연결하는 데 사용될 수 있다. 이는 두 시스템간 통신을 가능하도록 하는 반면, 두 시스템을 서로 격리시키는 효과도 발생한다. 즉, NTB는 일반적으로 도어벨(doorbell)을 통해서 bridge의 다른 편에 위치한 장치에 대해서 인터럽트를 보낼 수 있으며, 또한, scratchpad 레지스터를 보유하고 있어 bridge의 양측에서 데이터를 상호 공유함으로써 interprocessor communication 할 수 있다.

Development of Vehicle Door Side Impact Beam with High Tensile Steel using Roll Forming Process (고장력 소재로 롤-포밍 공법에 의한 자동차 도어 사이드 임팩트 빔 개발)

  • Son, Hee-Jin;Kim, Sung-Yuk;Oh, Beom-Seok;Kim, Key-Sun
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.11 no.6
    • /
    • pp.82-87
    • /
    • 2012
  • The purpose of this study is to produce a side impact beam with high tensile steel using a roll forming process. The door side impact beam plays an important roll in a car because it protects passengers from external crash. The roll forming process is a continuous bending process wherein a long metal sheet is bended as it continuously passes several rolls. The characteristic of this study is that an impact beam is produced by a continuous process using a ultra high strength steel without a hardening heat treatment. A model was determined by analysing plasticity of a cross section shape considering high strength. Design parameters of the impact beam was determined by crash-analysing the model. Workpiece products were manufactured by designing dies for roll forming and setting them up in a following process line. Results of a bending test and a FEM analysis was considered and reviewed.