• Title/Summary/Keyword: 전자해도시스템

Search Result 88, Processing Time 0.025 seconds

Microshear bond strength of a flowable resin to enamel according to the different adhesive systems (접착시스템의 종류에 따른 유동성 레진과 법랑질의 미세전단 결합강도)

  • Kim, Jeong-Ho;Cho, Young-Gon
    • Restorative Dentistry and Endodontics
    • /
    • v.36 no.1
    • /
    • pp.50-58
    • /
    • 2011
  • Objectives: The purpose of this study was to compare the microshear bond strength (uSBS) of two totaletch and four self-etch adhesive systems and a flowable resin to enamel. Materials and Methods: Enamels of sixty human molars were used. They were divided into one of six equal groups (n = 10) by adhesives used; OS group (One-Step Plus), SB group (Single Bond), CE group (Clearfil SE Bond), TY group (Tyrian SPE/One-Step Plus), AP group (Adper Prompt L-Pop) and GB group (G-Bond). After enamel surfaces were treated with six adhesive systems, a flowable composite resin (Filek Z 350) was bonded to enamel surface using Tygon tubes. the bonded specimens were subjected to uSBS testing and the failure modes of each group were observed under FE-SEM. Results: 1. The uSBS of SB group was statistically higher than that of all other groups, and the uSBS of OS, SE and AP group was statistically higher than that of TY and GB group (p < 0.05). 2. The uSBS for TY group was statistically higher than that for GB group (p < 0.05). 3. Adhesive failures in TY and GB group and mixed failures in SB group and SE group were often analysed. One cohesive failure was observed in OS, SB, SE and AP group, respectively. Conclusions: Although adhesives using the same step were applied the enamel surface, the uSBS of a flowable resin to enamel was different.

The Vessels Traffic Measurement and Real-time Track Assessment using Computer Vision (컴퓨터 비젼을 이용한 선박 교통량 측정 및 항적 평가)

  • Joo, Ki-Se;Jeong, Jung-Sik;Kim, Chol-Seong;Jeong, Jae-Yong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.17 no.2
    • /
    • pp.131-136
    • /
    • 2011
  • The furrow calculation and traffic measurement of sailing ship using computer vision are useful methods to prevent maritime accident by predicting the possibility of an accident occurrence in advance. In this paper, sailing ships are recognized using image erosion, differential operator and minimax value, which can be verified directly because the calculated coordinates are displayed on electronic navigation chart. The developed algorithm based on area information of this paper has the advantage which is compared to the conventional radar system focused on point information.

Basic Study on the MSI service prototype for preparation of e-Navigation era (e-Navigation 준비를 위한 MSI 서비스 프로토타입 기초 연구)

  • Oh, Se-Woong;Jung, Min;Park, Jin-Hyung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2014.10a
    • /
    • pp.42-43
    • /
    • 2014
  • As MSI(Maritime Safety Information), navigational, meteorological warnings and forecasts, was included as one of service in the MSP(Maritime Service Portfolio), which is lists of shore based service in the e-Navigation driven by IMO for safety navigation and marine protection, and was tested in the european test bed project on e-Navigation, it's considered as one of important e-Navigation service. This paper developed a prototype of MSI service to prepare e-navigation era, which is very important in a navigation environment. Current status on MSI and NAVTEX was surveyed, and several points on limitations and improvements in the NAVTEX operations were summarized. Basic study on the MSI service prototype was developed based on S-100, which is recognized as baseline to develop CMDS(Common Maritime Data Structure) of e-Navigation.

  • PDF

Speed Limit Violation Warning Function in Trade Ports and Fairways - GPS Plotter and ECDIS Enhancements (항만과 진입수로에서 속력제한 위반 경고기능에 관한 연구 - GPS 플로터 및 ECDIS 기능개선을 중점으로 -)

  • Kim, Do-Hoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.7
    • /
    • pp.841-850
    • /
    • 2019
  • The Korean government has designated speed-limit zones and speed limits in 19 ports and 3 routes to ensure safe navigation and transportation. However, the speed limit differs from port to port, no practical means of management exist. This often leads to violation of the speed limit. Additionally, ship collisions due to human error continue to occur. First, the study analyzed marine accidents that occurred at trade ports and fairways. The result of the analysis revealed the occurrence of 1344 accidents (average 269 cases per year) from 2014 to 2018. Five hundred sixty three accidents involved fishing boats, whereas, merchant vessels were involved in 508 cases. Second, the efficacy of the application of voice and message warnings to GPS plotters and electronic chart display and information system (ECDIS) was reviewed, and these were proposed as measures to inform vessel operators of the hazards of speed limit violation. Third, experts' opinions from relevant agencies and navigation system manufacturers were consulted and it was found that the proposed warning function was technically implementable. The findings are expected to help reduce human error among ship operators and establish a Korean e-navigation system.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Development of Industrial Embedded System Platform (산업용 임베디드 시스템 플랫폼 개발)

  • Kim, Dae-Nam;Kim, Kyo-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.5
    • /
    • pp.50-60
    • /
    • 2010
  • For the last half a century, the personal computer and software industries have been prosperous due to the incessant evolution of computer systems. In the 21st century, the embedded system market has greatly increased as the market shifted to the mobile gadget field. While a lot of multimedia gadgets such as mobile phone, navigation system, PMP, etc. are pouring into the market, most industrial control systems still rely on 8-bit micro-controllers and simple application software techniques. Unfortunately, the technological barrier which requires additional investment and higher quality manpower to overcome, and the business risks which come from the uncertainty of the market growth and the competitiveness of the resulting products have prevented the companies in the industry from taking advantage of such fancy technologies. However, high performance, low-power and low-cost hardware and software platforms will enable their high-technology products to be developed and recognized by potential clients in the future. This paper presents such a platform for industrial embedded systems. The platform was designed based on Telechips TCC8300 multimedia processor which embedded a variety of parallel hardware for the implementation of multimedia functions. And open-source Embedded Linux, TinyX and GTK+ are used for implementation of GUI to minimize technology costs. In order to estimate the expected performance and power consumption, the performance improvement and the power consumption due to each of enabled hardware sub-systems including YUV2RGB frame converter are measured. An analytic model was devised to check the feasibility of a new application and trade off its performance and power consumption. The validity of the model has been confirmed by implementing a real target system. The cost can be further mitigated by using the hardware parts which are being used for mass production products mostly in the cell-phone market.

A Study on User Preference Test for Development of Guidelines on Standardized Modes (항해장비 표준화모드 지침 개발을 위한 사용자 선호도 조사에 관한 연구)

  • Ahn, Young-Joong;Jeon, Gye-Jeong;Jung, Jae-Hoon;Kang, Nam-Seon
    • Journal of Navigation and Port Research
    • /
    • v.42 no.6
    • /
    • pp.371-377
    • /
    • 2018
  • Navigational equipment standardization mode is a function which is used to standardize key functions, screen display and operation method of major navigation equipment. This is aimed towards to quickly and accurately checking information relevant for safe navigation. Currently, the International Maritime Organization is working on the development of guidelines for the application of navigational equipment in the standardized mode to the task of NCSR Sub-Committee. This study was conducted to investigate users' opinions and preferences in the application of standardization modes and to reflect them in the development of guidelines. In addition, the test program was designed to investigate user preferences for ECDIS among the navigational equipment, such as the types of information and functions that are necessary or preferentially required to perform navigational duties, and the screen configuration. In the study, 333 preference surveys were conducted in 35 countries using a web - based test program. ECDIS users confirmed the content and screen layout of their preferred ECDIS information when conducting navigation duty. The results of the study are significant as they contribute to the development of effective guidelines by presenting user requirements to be considered in the standardization mode.

An Attack Origin Detection Mechanism in IP Traceback Using Marking Algorithm (마킹 알고리듬 기반 IP 역추적에서의 공격 근원지 발견 기법)

  • 김병룡;김수덕;김유성;김기창
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.19-26
    • /
    • 2003
  • Recently, the number of internet service companies is increasing and so is the number of malicious attackers. Damage such as distrust about credit and instability of the service by these attacks may influence us fatally as it makes companies image failing down. One of the frequent and fatal attacks is DoS(Denial-of-Service). Because the attacker performs IP spoofing for hiding his location in DoS attack it is hard to get an exact location of the attacker from source IP address only. and even if the system recovers from the attack successfully, if attack origin has not been identified, we have to consider the possibility that there may be another attack again in near future by the same attacker. This study suggests to find the attack origin through MAC address marking of the attack origin. It is based on an IP trace algorithm, called Marking Algorithm. It modifies the Martins Algorithm so that we can convey the MAC address of the intervening routers, and as a result it can trace the exact IP address of the original attacker. To improve the detection time, our algorithm also contains a technique to improve the packet arrival rate. By adjusting marking probability according to the distance from the packet origin we were able to decrease the number of needed packets to traceback the IP address.