• Title/Summary/Keyword: 자가감지

Search Result 68, Processing Time 0.038 seconds

An Underwater Acoustic Transducer Responding to Frequency Shift by Doppler Effect (도플러효과에 의한 주파수 변화에 대응하는 수중 초음파변환자의 제안)

  • Kim, Jung-Whan;Kim, Moo-Joon;Ha, Kang-Lyeol
    • Journal of Sensor Science and Technology
    • /
    • v.8 no.1
    • /
    • pp.16-23
    • /
    • 1999
  • When a moving piezoelectric transducer detects an object in water, its receiving sensitivity is attenuated by Doppler effect. In this paper, a method for compensating the effect is suggested by using a newly designed condenser of which capacitance is varied according to the moving speed of the transducer. Using the method, the receiving resonant frequency of the transducer can be changed automatically. As a result, there is good agreement between the results of experiment and those of calculation. It is confirmed that the response sensitivity degradation of transducers due to Doppler effect can be compensated in the range of $1{\sim}10^m/_s$ moving speed.

  • PDF

A Study on the Improvement of Anti-Fire System of Temples (사찰 화재예방시스템의 개선방안에 관한 연구)

  • Kong, Ha-Sung
    • Journal of the Korean Society of Hazard Mitigation
    • /
    • v.8 no.4
    • /
    • pp.87-90
    • /
    • 2008
  • This research is to study and analyze our country's management of disasters, the present condition of cultural heritages bases on the examples of temples, and Japan's safety management prevention of buddhist temple. As a result, this research aims to how to improve the temple fire prevention system. To improve the anti-fire system of temples, it is important to make new laws about fire lose to minimize cultural property lose. Secondly, to protect self-contained type fire alarm device, with aerosol type hand propelled fire extinguishers to prevent fire lose. Lastly, construction work of electric engineer is necessary to prevent temple fire loses.

Machine-Learning Anti-Virus Program Based on TensorFlow (텐서플로우 기반의 기계학습 보안 프로그램)

  • Yoon, Seong-kwon;Park, Tae-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.441-444
    • /
    • 2016
  • Peace on the Korean Peninsula is threatened by physical aggressions and cyber terrors such as nuclear tests, missile launchings, senior government officials' smart phone hackings and DDos attacks to banking systems. Cyber attacks such as vulnerability for the hackings, malware distributions are generally defended by passive defense through the detecting signs of first invasion and attack, data analysis, adding library and updating vaccine programs. In this paper the concept of security program based on Google TensorFlow machine learning ability to perform adding libraries and solving security vulnerabilities by itself is researched and proposed.

  • PDF

Change Patterns on Subjective Distress Level in Gynecological Postoperative Patients with Different Levels of State Anxiety (불안수준에 따른 부인과 수술환자의 불편감지각의 변화 - 통증 자가 조절기 사용 중인 환자를 중심으로 -)

  • Suh, Young-Sook
    • Women's Health Nursing
    • /
    • v.11 no.4
    • /
    • pp.307-315
    • /
    • 2005
  • Purpose: A descriptive study was conducted to identify the change patterns on the level of perceived distress during the early postoperative period with regard to state anxiety in patients using patient controlled analgesia. Method: One hundred women who underwent elective hysterectomy procedures or other gynecologic surgeries completed a series of questionnaires measuring state anxiety, and subjective distress assessed by visual analog scales at 8, 24, & 48 hours postoperatively. Data were analyzed with frequencies, percentages, means, ANOVA, Repeated Measures ANCOVA, and Scheff'e post test utilizing SPSS WIN 11.0. Result: There was a gradual decrease in levels of total distress and pain over the three points in time after surgery regardless the levels of state anxiety. However, women with higher levels of anxiety their pain curve rose at 48 hours post-op. In addition, over the first two points in time, women in the higher anxiety group showed higher levels of distress than those in the lower anxiety group, but no such group differences were observed in the levels of pain, revealing higher pain levels only at 8 hours post-op in both groups. Conclusion: Irrespective of effective pain management modality, most postoperatively experienced distress in gynecological patients was derived from anxiety and pain. These findings have implications for pain management, especially in patients with emotionally charged surgeries like hysterectomy.

  • PDF

The Implement of Medium Access Control Protocol with Energy Efficiency in Multi-hop Sensor network (에너지 효율을 고려한 다중홉 센서망에서의 MAC 프로토콜 구현)

  • 김동일;송창안
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.4
    • /
    • pp.793-797
    • /
    • 2004
  • Wireless sensor networks use battery-operated computing and sensing devices. And It can be expected to be deployed in an ad hoc networs. MAC is different from traditional wireless MACs such as IEEE 802.11 in almost every way. so self-configuration and power saving in sensor network are very important goals, while per-node fairness and latency are less important. In this paper, so we use a given prototype for efficient energy conservation to reduce power consumtion that is one of the important character in sensor network and compare energy consumption and collision with IEEE 802.11 MAC. finally we conclude the paper and analyze it.

Development of Device Management System in Wire and Wireless Internet Environments (유무선 인터넷 환경에서의 장비관리시스템 개발)

  • 박상국;문상호;김문환
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.7
    • /
    • pp.1483-1490
    • /
    • 2003
  • In existent industry spot, device administrators should be ever-ready for monitor and control of devices. Thus, it is inefficient because there are much human strength waste and time loss. To solve these problem, we develop a real time device management system based on wire and wireless internet. If any device brutes down, this system senses breakdown automatically and notify it to device administrators via mobile phones. Then the administrator does emergency measures for breakdown device though wire and wireless internet. For the purpose, we develop each local device control system. device management system, mobile system, and web system.

The Implement of Medium Access Control Protocol with Energy Efficiency in Multi-hop Sensor network (에너지 효율을 고려한 다중홉 센서망에서의 MAC 프로토콜 구현)

  • 송창안;이우철;김동일
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.182-185
    • /
    • 2004
  • Wireless sensor networks use battery-operated computing and sensing devices. And It can be expected to be deployed in an ad hoc networs. MAC is different from traditional wireless MACs such as IEEE 802.11 in almost every way. so self-configuration and power saving in sensor network are very important goals, while per-node fairness and latency are less important. In this paper, so we use a given prototype for efficient energy conservation to reduce power consumtion that is one of the important character in sensor network and compare energy consumption and collision with IEEE 802.11 MAC. Finally we conclude the paper and analyze it.

  • PDF

An efficient security protocol for group in 3GPP MTC (3GPP MTC 환경에서 그룹에 효율적인 보안 및 인증 기법)

  • Hong, Sung-Dae;Kang, Seong-Yong;Choi, Dae-Sung;Kim, Seung-Ryong;Choi, Hyoung-Kee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.05a
    • /
    • pp.603-606
    • /
    • 2013
  • Machine to Machine (M2M) 통신은 수 많은 장비들이 우리 주변환경의 정보를 감지하여 상호간에 주고받는 방법을 활용한다. Third generation partnership project (3GPP)는 이러한 M2M 통신을 활용하여 유비쿼터스 환경과 자가인식형 서비스를 제공하려 하고 있다. 본 논문은 이러한 추세에 맞추어 새로운 개념의 통신인 3GPP M2M 통신의 시스템 구조, 특징들과 이에 대한 3GPP의 연구방향 등에 대한 튜토리얼로 사용될 수 있도록 하기 위해 작성되었다. 특히 M2M 통신에서의 특징들을 구체화하는 과정에서의 보안상 위협과 이에 대처하기 위한 요구사항들에 대해서 강조하였다. 이러한 보안상 위협을 제거하는 요구사항을 만족하면서 네트워크에 과부하를 가하지 않도록 하기 위한 그룹 기반의 최적화된 인증 프로토콜을 제안한다. 본 논문에서는 그룹을 기반으로 bilinear pairing을 사용하여 인증을 진행하며, 통신 딜레이를 줄이고 네트워크의 중심 장비에 과부하를 줄이기 위해 HSS(Home Subscriber Server)의 참여를 제한한 인증 및 키 동의 프로토콜을 제안하고, 이에 따른 연산 및 통신 오버헤드를 분석한다.

Policy Direction for Fire Products Life Expectancy Legislation (소방용품 내용연수 제도화 정책방안)

  • Baek, Chang Sun;Park, In-Seon
    • Fire Science and Engineering
    • /
    • v.30 no.1
    • /
    • pp.111-120
    • /
    • 2016
  • This study is intended to provide legislative direction for fire products life expectancy. Domestic and international laws relating to fire products life expectancy have been reviewed, and the results of a Fire Safety Manager Consciousness (FSMC) survey were analyzed. The FSMC survey has been designed in order to assist with the establishment of appropriate fire safety policy. A questionnaire survey was conducted with 660 fire safety administrators from 17 municipal and provincial districts, with the intention of gaining expertise on the extension of life-span for 32 fire products. The survey also asked for candidates opinions on future policy direction. Based on the survey results and the review of policies within other nations, we have devised a set of policy issues with the intention of extending the life-span of fire-safety items. The survey result revealed that 79.3% of Fire Safety Managers (FSMs) concurred with the establishment of legislation regarding the maintenance and correct care of fire-safety products. Overall, over 30% of FSMs were in favor of regulations regarding Ddry chemical fire extinguishers (77.3%), fire detectors (44.6%), fire hoses (44.4%), gaseous agent fire extinguisher (40.6%), automatic descending life lines (36.2%), exit lights (35.9%), air respirators (35.9%), extinguishing systems for residential cooking facilities (33.9%), automatic spray-type extinguishing units (33.9%), emergency lights (31.2%), and gas leakage detectors (30.7%). Especially, among these, dry chemical fire extinguishers (60.0%), detectors (20.0%), and fire hose (18.8%) were identified as the fire products primarily in need of maintenance legislation. The general consensus is that fire products older than 10 years need to be replaced. Based on the survey results, there was general agreement that fire product life expectancy is in need of legislation. This study recommends the introduction of fire product life expectancy legislation in phases.

Pipeline Structural Damage Detection Using Self-Sensing Technology and PNN-Based Pattern Recognition (자율 감지 및 확률론적 신경망 기반 패턴 인식을 이용한 배관 구조물 손상 진단 기법)

  • Lee, Chang-Gil;Park, Woong-Ki;Park, Seung-Hee
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.31 no.4
    • /
    • pp.351-359
    • /
    • 2011
  • In a structure, damage can occur at several scales from micro-cracking to corrosion or loose bolts. This makes the identification of damage difficult with one mode of sensing. Hence, a multi-mode actuated sensing system is proposed based on a self-sensing circuit using a piezoelectric sensor. In the self sensing-based multi-mode actuated sensing, one mode provides a wide frequency-band structural response from the self-sensed impedance measurement and the other mode provides a specific frequency-induced structural wavelet response from the self-sensed guided wave measurement. In this study, an experimental study on the pipeline system is carried out to verify the effectiveness and the robustness of the proposed structural health monitoring approach. Different types of structural damage are artificially inflicted on the pipeline system. To classify the multiple types of structural damage, a supervised learning-based statistical pattern recognition is implemented by composing a two-dimensional space using the damage indices extracted from the impedance and guided wave features. For more systematic damage classification, several control parameters to determine an optimal decision boundary for the supervised learning-based pattern recognition are optimized. Finally, further research issues will be discussed for real-world implementation of the proposed approach.