• Title/Summary/Keyword: 차단 시스템

Search Result 1,389, Processing Time 0.027 seconds

A Study on the Surface Wind Characteristics in Suwon City Using a GIS Data and a CFD Model (GIS 자료와 CFD 모델을 이용한 수원시 지표 바람 특성 연구)

  • Kang, Geon;Kim, Min-Ji;Kang, Jung-Eun;Yang, Minjune;Choi, Seok-Hwan;Kang, Eunha;Kim, Jae-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.6_2
    • /
    • pp.1837-1847
    • /
    • 2021
  • This study investigated wind corridors for the entire Suwon-city area using a geographic information system and a computational fluid dynamics model. We conducted numerical simulations for 16 inflow wind directions using the average wind speeds measured at the Suwon automated synoptic observation system (ASOS) for recent ten years. We analyzed the westerly (dominant wind direction) and easterly cases (not dominant but strong wind speed) in detail and investigated the characteristics of a wind speed distribution averaged using the frequencies of 16 wind directions as weighting factors. The characteristics of the wind corridors in Suwon city can be summarized as; (1) In the northern part of Suwon, complicated flows were formed by the high mountainous terrain, and strong (weak) winds and updrafts (downdrafts) were simulated on the windward (leeward) mountain slope. (2) On the leeward mountain slope, a wind corridor was formed along a valley, and relatively strong airflow flowed into the residential area. (3) The strong winds were simulated in a wide and flat area in the west and south part of Suwon city. (4) Due to the friction and flow blocking by buildings, wind speeds decreased, and airflows became complicated in the downtown area. (5) Wind corridors in residential areas were formed along wide roads and areas with few obstacles, such as rivers, lakes, and reservoirs.

A Study to Hierarchical Visualization of Firewall Access Control Policies (방화벽 접근정책의 계층적 가시화 방법에 대한 연구)

  • Kim, Tae-yong;Kwon, Tae-woong;Lee, Jun;Lee, Youn-su;Song, Jung-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1087-1101
    • /
    • 2020
  • Various security devices are used to protect internal networks and valuable information from rapidly evolving cyber attacks. Firewall, which is the most commonly used security device, tries to prevent malicious attacks based on a text-based filtering rule (i.e., access control policy), by allowing or blocking access to communicate between inside and outside environments. However, in order to protect a valuable internal network from large networks, it has no choice but to increase the number of access control policy. Moreover, the text-based policy requires time-consuming and labor cost to analyze various types of vulnerabilities in firewall. To solve these problems, this paper proposes a 3D-based hierarchical visualization method, for intuitive analysis and management of access control policy. In particular, by providing a drill-down user interface through hierarchical architecture, Can support the access policy analysis for not only comprehensive understanding of large-scale networks, but also sophisticated investigation of anomalies. Finally, we implement the proposed system architecture's to verify the practicality and validity of the hierarchical visualization methodology, and then attempt to identify the applicability of firewall data analysis in the real-world network environment.

Effects of Initial Responses in Steps for the Release Accidents of Hydrofluoric Acid (불산수용액 누출사고에 대한 초기대응 단계별 영향)

  • Choi, Jae Sik;Choi, Jae U;Shim, Ju Yong;Lee, Mu Chul
    • Korean Chemical Engineering Research
    • /
    • v.59 no.1
    • /
    • pp.68-76
    • /
    • 2021
  • As hazardous chemicals are releasing in process industries such as chemical & petro-chemical plants, the importance of initial responses has been always emphasized. However, little attention of quantitative analysis of the consequence by different initial responses during releasing of the chemicals has been done. The main objective of current paper is to investigate the effects of initial responses for the release accidents of hydrofluoric acid. For this, a simplified equation that can easily calculate the effect distance by varying concentrations of hydrofluoric acid was firstly deduced. In addition, a causal loops for the initial response steps using the system dynamics technique was constructed during release of 50% hydrofluoric acid. The effect distances according to different scenarios of the initial actions were also quantitatively analyzed by applying the simplified equation to the causal map. As a result, the highest reduction rate on the maximum effect distance was obtained with 'start time of action after leak detection' being about 87% while the lowest was 'arrival time of professional response team' being about 50%, as expected. It is expected that the results gained from the current study can be helpful as of basics of the initial response to the workplace, dealing with the hydrofluoric acid.

A study for Information Security Risk Assessment Methodology Improvement by blockade and security system level assessment (봉쇄와 보안장비 수준평가를 통한 정보보호 위험평가 개선 연구)

  • Han, Choong-Hee;Han, ChangHee
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.187-196
    • /
    • 2020
  • In order to manage information security risk, various information security level evaluation and information security management system certification have been conducted on a larger scale than ever. However, there are continuous cases of infringement of information protection for companies with excellent information security evaluation and companies with excellent information security management system certification. The existing information security risk management methodology identifies and analyzes risks by identifying information assets inside the information system. Existing information security risk management methodology lacks a review of where cyber threats come from and whether security devices are properly operated for each route. In order to improve the current risk management plan, it is necessary to look at where cyber threats come from and improve the containment level for each inflow section to absolutely reduce unnecessary cyber threats. In addition, it is essential to measure and improve the appropriate configuration and operational level of security equipment that is currently overlooked in the risk management methodology. It is necessary to block and enter cyber threats as much as possible, and to detect and respond to cyber threats that inevitably pass through open niches and use security devices. Therefore, this paper proposes additional evaluation items for evaluating the containment level against cyber threats in the ISMS-P authentication items and vulnerability analysis and evaluation items for major information and communication infrastructures, and evaluates the level of security equipment configuration for each inflow.

Design of an Visitor Identification system for the Front Door of an Apartment using Deep learning (딥러닝 기반 이용한 공동주택현관문의 출입자 식별 시스템 설계)

  • Lee, Min-Hye;Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.45-51
    • /
    • 2022
  • Fear of contact exists due to the prevention of the spread of infectious diseases such as COVID-19. When using the common entrance door of an apartment, access is possible only if the resident enters a password or obtains the resident's permission. There is the inconvenience of having to manually enter the number and password for the common entrance door to enter. Also, contactless entry is required due to COVID-19. Due to the development of ICT, users can be easily identified through the development of face recognition and voice recognition technology. The proposed method detects a visitor's face through a CCTV or camera attached to the common entrance door, recognizes the face, and identifies it as a registered resident. Then, based on the registered information of the resident, it is possible to operate without contact by interworking with the elevator on the server. In particular, if face recognition fails with a hat or mask, the visitor is identified by voice or additional authentication of the visitor is performed based on the voice message. It is possible to block the spread of contagiousness without leaving any contactless function and fingerprint information when entering and exiting the front door of an apartment house, and without the inconvenience of access.

A Study of Electro-Optical Properties of Polyester Acrylate-Based Polymer-Dispersed Liquid Crystals Using TIZO/Ag/TIZO Multilayer Transparent Electrodes (TIZO/Ag/TIZO 다층막 투명전극을 이용한 폴리에스터 아크릴레이트 기반 고분자분산액정의 전기광학적 특성 연구)

  • Cho, Jung-Dae;Heo, Gi-Seok;Hong, Jin-Who
    • Applied Chemistry for Engineering
    • /
    • v.33 no.1
    • /
    • pp.50-57
    • /
    • 2022
  • Ti-In-Zn-O (TIZO)/Ag/TIZO multilayer transparent electrodes were prepared on glass substrates at room temperature using RF/DC magnetron sputtering. Obtained multilayer structure comprising TIZO/Ag/TIZO (10 nm/10 nm/40 nm) with the total thickness of 60 nm showed a transmittance of 86.5% at 650 nm and a sheet resistance of 8.1 Ω/□. The multilayer films were expected to be applicable for use in energy-saving smart window based on polymer-dispersed liquid crystal (PDLC) because of their transmittance properties to effectively block infrared rays (heat rays). We investigated the effects of the content ratio of prepolymer, the thickness of the PDLC coating layer, and the ultraviolet (UV) light intensity on electro-optical properties, and the surface morphology of polyester acrylate-based PDLC systems using new TIZO/Ag/TIZO transparent conducting electrodes. A PDLC cell with a thickness of 15 ㎛ PDLC layer photocured at an UV intensity of 1.5 mW/cm2 exhibited good driving voltage, favorable on-state transmittance, and excellent off-haze. The LC droplets formed on the surface of the polymer matrix of the PDLC composite had a size range of 1 to 3 ㎛ capable of efficiently scattering incident light. Also, the PDLC-based smart window manufactured using TIZO/Ag/TIZO multi-layered transparent electrodes in this study exhibited a light brown, which will have an advantage in terms of aesthetics.

A Study on the Development of Feasibility Evaluation Model for Establishment of Public Libraries (공공도서관 설립 사전 타당성 평가모형 개발 연구)

  • Sin-Young, Kim;Hee-Yoon, Yoon
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.4
    • /
    • pp.101-127
    • /
    • 2022
  • Article 31(1) of the Libraries Act(Act No. 18547), which was completely revised on December 7, 2021, stipulates that "the head of a local government or the superintendent of a city/provincial office of education must formulate a plan for the establishment and operation of a public library in advance and obtain the pre-evaluation of the feasibility of establishing a public library from the Minister of Culture, Sports and Tourism." Through the preliminary feasibility evaluation at the construction stage of the public library, it is possible to adjust distribution to improve the adequacy of scale and resolve regional imbalances and gaps. In addition, it is expected to increase service satisfaction and operational enhancement by inducing faithful securing of core infrastructure (librarians, collection, facilities, systems, etc.) in terms of balanced regional development and public library construction. The purpose of this study is to develop and present the basic direction and feasibility evaluation model for establishment of public libraries. The proposed evaluation model is expected to secure the legal basis and institutional legitimacy of the pre-evaluation system for public library establishment and to prevent waste of tax due to poor construction and operation of public libraries.

Gene Chip을 이용한 돼지의 퇴행성 관절염의 활막세포 기작 연구

  • Lee, Jeong-Su;O, Baatartsogt;Im, Hui-Gyeong;Jo, In-Hui;So, Hyeon-Gyeong;;Kim, Eun-Guk;Lee, Jong-Ha;Hwang, Su-Yeong;Choe, Gang-Deok
    • Proceedings of the Korean Society for Food Science of Animal Resources Conference
    • /
    • 2006.05a
    • /
    • pp.128-132
    • /
    • 2006
  • 관절염이 일어나는 정확한 기전은 아직까지 잘 규명되어 있지 않으나 일반적으로 cytokine, chemokine을 비롯한 여러 가지 조절 물질들 사이의 미묘한 균형이 깨어지는 일이 주된 요인으로 추정되고 있다. 사람의 경우 염증이 일어난 관절 조직에서 활막 세포(synovial fibroblast)는 여러 염증성 사이토카인들을 분비하기도 하며 또 한편 이들 cytokine의 target 세포로 이들의 자극에 대하여 정상인의 그것과 다른 증식 및 활성화 반응을 보이는 등, 다양한 측면에서 관절염증의 유발에 기여하는 것으로 보여진다. 따라서 활막세포 활성화 경로를 DNA Microarray chip을 이용하여 세포 및 분자 수준에서 밝혀 이를 차단할 수 있는 자연물질(natural product)를 선별함으로써 항생제나 스테로이드를 사용하지 않고 돼지의 관절염을 효과적으로 치료 또는 예방할 수 있는 방법을 모색하고자 한다. 6.6kg의 암컷 Yorkshire와 수컷 Landrace의 교배잡으로 왼쪽 뒷다리 슬관절에 십자인대를 파열하여 관절염을 유발하고 8주간 성장을 시킨 후 정상 슬관절과 관절염이 유발된 슬관절의 활막세포로부터 total RNA를 추출한 후 affymetrix Gene chip을 제작하여 Geneplex소프트웨어를 이용하여 데이터를 분석하였다. 분석 결과 unknown 유전자 962개를 포함하여 유전자 발현이 증가된 유전자는 총 1,059개 였으며, unknown 유전자 564개를 포함하여 유전자 발현이 증가된 유전자는 총 639개를 얻었다. 이러한 돼지 관절염에서의 활막세포에 의한 유전적 발현 양상으로부터 molecular function, biological process, pathway등을 이용하여 관절염 지표를 작성할 수 있다.분별을 성공적으로 수행하였다.(p<0.05), 맛, 연도, 다즙성 및 전체적인 기호성은 유의한 차이가 없었다.자체를 악하다고 볼 수 없고 더구나 구원을 이 세상에서의 이탈로 볼 수 없다. 진정한 구원이란 원래 하나님이 보시기에 아름다웠던 그 세상으로의 회복을 포함한다. 이런 면에서 하나님 주권 신앙 하에서 구원이란 전 인격적인 구원, 전 우주적인 구원이 된다. 그렇기 때문에 성도는 세상의 삶과 학문, 예술, 정치, 경제, 사회를 포함한 모든 분야를 하나님의 뜻 가운데서 그 원래의 목적에 부합할 수 있도록 회복시키는 일에 적극 참여해야 한다.자체가 이를 주도하기는 사실 어려움이 있다. 그리고 대형유통점이 영업행위를 영업시간제한에서부터 출점제한에 이르기까지 규제하는 건은 심사숙고하여야 한다. 대형유통점이 국가경제 및 지역사회에 미치는 영향이 부정적인가 긍정적인가에 대해 국내외 학계와 업계에서 여전히 많은 논란이 있기 때문이다. 정부와 지자체에 의한 시장개입은 반드시 필요한 경우에 한해 합당한 방법에 의해 이루어져야 한다. 대형유통점에 대한 규제는 지역사회에 미치는 영향을 다면적으로 평가한 결과에 근거하여 이루어져야 할 것이다. 대부분의 지자체는 체계적인 평가시스템과 객관적인 통계 자료를 갖고 있지 못한 실정이다. 향후 가장 시급한 과제는 시장개방 이후 지난 10년간 대형유통점이 지역사회에 미친 영향에 관한 광범위한 통계자료를 수집하고 이를 체계적으로 분석하여 정책방향을 올바르게 설정하는 것이라 할 수 있다.i와 K. pneumoniae가 존재하며 확산 중임을 시사한다. 앞으로 CTX-M형 ESBL의 만연과 변종 CTX-M형 ESBL의 출연을 감시하기 위한 정기적인 연구와 조사가 필요한 것으로 생각한다., A2-1, B1-1, B2-1의 경우, 강우 일수 감소 이전과

  • PDF

Study of Imaging of Submarine Bubble Plume with Reverse Time Migration (역시간 구조보정을 활용한 해저 기포플룸 영상화 연구)

  • Dawoon Lee;Wookeen Chung;Won-Ki Kim;Ho Seuk Bae
    • Geophysics and Geophysical Exploration
    • /
    • v.26 no.1
    • /
    • pp.8-17
    • /
    • 2023
  • Various sources, such as wind, waves, ships, and gas leaks from the seafloor, forms bubbles in the ocean. Underwater bubbles cause signal scattering, considerably affecting acoustic measurements. This characteristic of bubbles is used to block underwater noise by attenuating the intensity of the propagated signal. Recently, researchers have been studying the large-scale release of methane gas as bubble plumes from the seabed. Understanding the physical properties and distribution of bubble plumes is crucial for studying the relation between leaked methane gas and climate change. Therefore, a water tank experiment was conducted to estimate the distribution of bubble plumes using seismic imaging techniques and acoustic signals obtained from artificially generated bubbles using a bubble generator. Reverse time migration was applied to image the bubble plumes while the acquired acoustic envelope signal was used to effectively estimate bubble distribution. Imaging results were compared with optical camera images to verify the estimated bubble distribution. The water tank experiment confirmed that the proposed system could successfully image the distribution of bubble plumes using reverse time migration and the envelope signal. The experiment showed that the scattering signal of artificial bubble plumes can be used for seismic imaging.

Physical Model Experiment for Estimating Wave Overtopping on a Vertical Seawall under Regular Wave Conditions for On-Site Measurements (현장 월파계측을 위한 규칙파 조건에서 직립식 호안의 월파량 추정에 관한 모형실험)

  • Dong-Hoon Yoo;Young-Chan Lee;Do-Sam Kim;Kwang-Ho Lee
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.35 no.4
    • /
    • pp.75-83
    • /
    • 2023
  • Apart from implementing hardware solutions like raising the crest freeboard of coastal structures to efficiently counter wave-overtopping, there is a simultaneous requirement for software-driven disaster mitigation strategies. These tactics involve the swift and accurate dissemination of wave-overtopping information to the inland regions of coastal zones, enabling the regulation of evacuation procedures and movement. In this study, a method was proposed to estimate wave-overtopping by utilizing the temporal variation of wave heights exceeding the structure's crown level, with the aim of developing an on-site wave measurement system for providing wave-overtopping information in the field. Laboratory model experiments were conducted on vertical seawall structures to measure wave-overtopping volumes and wave runup heights under different wave conditions and structural freeboard variations. By assuming that the velocity of water inundation on the top of the structure during wave-overtopping events is equivalent to the long-wave velocity, an overtopping discharge coefficient was introduced. This coefficient was utilized to estimate the rate of wave-overtopping based on the temporal changes in wave runup heights measured at the top of the structure. Upon reasonably calculating the overtopping discharge coefficient, it was verified that the estimation of wave-overtopping could be achieved solely based on the wave runup heights.