• Title/Summary/Keyword: 한남

Search Result 766, Processing Time 0.024 seconds

Real-time Water Supply Facilities Monitoring System based on the USN (USN 기반의 실시간 수도설비 모니터링 시스템)

  • Kim, Yong-Tae;Yoo, Neung-Hwan;Park, Gil-Cheol;Kim, Seok-Soo;Kim, Tai-Hoon;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.6
    • /
    • pp.1207-1213
    • /
    • 2007
  • This paper has researched water supply facilities management using real-time water utility monitoring system based on USN(Ubiquitous Sensor Network) which is consisted of wireless sensors transferring waterworks facilities md treatment information about a valve-room and flowmeter-room of water supply installation. In the manholes, it was installed with flowmeter, pressure sensors, vibration sensors, Co-sensors, and hydro-thermograph sensors. These measurement values which are received by PDA are used for facilities operation on the spot safely and conveniently. It has also provided safe installation management via CDMA(Code Division Multiple Access) network which transfers data to remote servers to monitoring at a distance place. With safety management system of water supply facilities on USN technology convenience and safety is increased in real situation, and it is expected that we can supply clean water to people as much safer and more effective water supply installation management.

Active Security System using IP Traceback Technology (IP 역추적 기술을 이용한 능동형 보안 시스템)

  • Kim, Jae-Dong;Chae, Cheol-Joo;Lee, Jae-Kwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.933-939
    • /
    • 2007
  • There is a tremendous increase in the growth of Internet making people's life easy. The rapid growth in technology has caused misuse of the Internet like cyber Crime. There are several vulnerabilities in current firewall and Intrusion Detection Systems (IDS) of the Network Computing resources. Automatic real time station chase techniques can track the internet invader and reduce the probability of hacking Due to the recent trends the station chase technique has become inevitable. In this paper, we design and implement Active Security system using ICMP Traceback message. In this design no need to modify the router structure and we can deploy this technique in larger network. Our Implementation shows that ICMP Traceback system is safe to deploy and protect data in Internet from hackers and others.

Deep Learning-based Approach for Classification of Tribological Time Series Data for Hand Creams (딥러닝을 이용한 핸드크림의 마찰 시계열 데이터 분류)

  • Kim, Ji Won;Lee, You Min;Han, Shawn;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.3
    • /
    • pp.98-105
    • /
    • 2021
  • The sensory stimulation of a cosmetic product has been deemed to be an ancillary aspect until a decade ago. That point of view has drastically changed on different levels in just a decade. Nowadays cosmetic formulators should unavoidably meet the needs of consumers who want sensory satisfaction, although they do not have much time for new product development. The selection of new products from candidate products largely depend on the panel of human sensory experts. As new product development cycle time decreases, the formulators wanted to find systematic tools that are required to filter candidate products into a short list. Traditional statistical analysis on most physical property tests for the products including tribology tests and rheology tests, do not give any sound foundation for filtering candidate products. In this paper, we suggest a deep learning-based analysis method to identify hand cream products by raw electric signals from tribological sliding test. We compare the result of the deep learning-based method using raw data as input with the results of several machine learning-based analysis methods using manually extracted features as input. Among them, ResNet that is a deep learning model proved to be the best method to identify hand cream used in the test. According to our search in the scientific reported papers, this is the first attempt for predicting test cosmetic product with only raw time-series friction data without any manual feature extraction. Automatic product identification capability without manually extracted features can be used to narrow down the list of the newly developed candidate products.

Restoration of Membrane Performance for Damaged Reverse Osmosis Membranes through in-situ Healing (손상된 역삼투막의 in-situ 힐링을 통한 막 성능 복원)

  • Yun, Won Seob;Rhim, Ji Won;Cho, Young Ju
    • Membrane Journal
    • /
    • v.29 no.2
    • /
    • pp.96-104
    • /
    • 2019
  • The purpose of this paper is whether or not the in-situ restoration of the reverse osmosis (RO) membranes which its membrane function is lost is possible. The damaged RO membranes are double coated through the salting-out method by the poly(styrene sulfonic acid) sodium salt as the cationic exchange polymer and the polyethyleneimine as the anionic exchange polymer and also conducted the opposite order of the coating materials. And according to the concentration, time and ionic strength, the flux and rejection are measured for the coated membranes. Then the best coating condition is to apply for the RO membrane module of the household water purifier to know the possibility of the in-situ restoration for the commercial module. When the condition of the PEI 30,000 ppm (IS = 0.1)/PSSA 20,000 ppm (IS = 0.7) is applied, the rejection was enhance from 69% for the damaged module to 86% (90% for the pristine module).

Design of Mobile-based Security Agent for Contents Networking in Mixed Reality (융합현실에서 콘텐츠 네트워킹을 위한 모바일 기반 보안 중계 설계)

  • Kim, Donghyun;Lim, Jaehyun;Kim, Seoksoo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.22-29
    • /
    • 2019
  • Due to the development of ICT technology, convergence reality contents are utilized as technology for providing services in various industrial fields by visualizing various information such as sensor information and shared information in a service platform showing only simple three-dimensional contents. Research is underway to reduce the weight of applications by transmitting the resources of the object to be enhanced to the network as the information and the contents to be provided increase. In order to provide resources through the network, servers for processing various information such as pattern information, content information, and sensor information must be constructed in a cloud environment. However, in order to authenticate data transmitted and received in real-time in a cloud environment, there is a problem in that the processing is delayed and a delay phenomenon occurs in the rendering process and QoS is lowered. In this paper, we propose a system to distribute cloud server which provides augmented contents of convergent reality service that provides various contents such as sensor information and three - dimensional model, and shorten the processing time of reliable data through distributed relay between servers Respectively.

Economical & Technological Ripple Effects in Acquiring New Weapon System : Focused on Ground·Sea·Air Weapon System (국방무기체계 연구개발 기반 경제적·기술적 파급효과 : 지상·해상·공중 무기체계를 중심으로)

  • Shin, Sang-Wook;Oh, Cheon-Kyun;Yim, Dong-Soon;Choi, Bong-Wan
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.4
    • /
    • pp.111-122
    • /
    • 2018
  • The private sector is currently reviewing the feasibility of the project or deciding economic policies by analyzing the economic ripple effects. However, the arms acquisition project focuses on the need for the national defense weapons system by analyzing the costs and the effectiveness of the analysis and reviewing the necessity and feasibility of the project. In order to analyze the economic ripple effects, KB (the Bank of Korea) prepares and publishes an analysis table of industrial associations in a given unit. IAAR (the industrial association analysis report) is difficult to apply directly to the defense weapons system. Therefore, research on the economic ripple effects applicable to the defense arms procurement project was needed. In this study, we propose the generic methodology for estimating economical and technical ripple effects resulted in acquiring new weapon systems. Based on the analysis of inter-industrial relations, economical ripple effects are estimated with production inducing effects, value-induced effects, employment-induced effects and export-induced effects. Also, the technological ripple effects are estimated with technological intensity represented by investment cost in research and development. To show the validity of proposed methodology, a case study of acquiring new weapon systems such as GR (guided rocket), destroyer, and helicopter is accomplished. From the case study, it is concluded that these economical & technological ripple effects can be used as a reference to decision making in the course of acquiring major future defense weapons systems.

Carbonation Behavior of GGBFS-based Concrete with Cold Joint Considering Curing Period (재령 변화에 따른 콜드조인트를 가진 GGBFS 콘크리트의 탄산화 거동)

  • Cho, Sung-Jun;Yoon, Yong-Sik;Kwon, Seung-Jun
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.6 no.4
    • /
    • pp.259-266
    • /
    • 2018
  • In the work, the carbonation behavior and strength characteristics in cold-joint concrete are evaluated for OPC(Ordinary Portland Cement) and GGBFS(Ground Granulated Blast Furnace Slag)concrete considering three levels of curing age (28, 91 and 365 days). The compressive strength in GGBFS concrete is level of 86% of OPC concrete at the 91 days of curing period, but is level of 107% at 365 curing days due to hydration reaction. Carbonation velocities in both OPC and GGBFS concrete significantly decease after 91 curing days. The effect of cold joint on carbonation is evaluated to be small in GGBFS concrete. The increasing ratios of carbonation velocity in cold joint are 1.06 and 1.33 for 28-day and 365-day curing condition, respectively. However they decreases to 1.08 and 1.04 for GGBFS concrete for the same curing conditions.

Evaluation of Mechanical Properties of Early-age Concrete Containing Electric Arc Furnace Oxidizing Slag (전기로 산화슬래그를 혼입한 초기재령 콘크리트의 역학적 특성 평가)

  • Kwon, Seung-Jun;Hwang, Sang-Hyeon;Lim, Hee-Seob
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.7 no.2
    • /
    • pp.93-100
    • /
    • 2019
  • In this study, the mechanical properties of early-age concrete were evaluated by mixing the electric arc furnace oxidizing slag fine aggregate with 30% and 50% replacement ratio. Slump test, air content test and unit volume weight test were performed for fresh concrete, and compressive strength test and chloride penetration experiments were carried out in hardened concrete. The compressive strength increased up to 7 days of curing age with increasing replacement ratio of the electric furnace oxidizing slag, but the strength decreased to 90% level of OPC concrete at 28 days of age. Regarding the result of chloride penetration test, no significant differences from OPC concrete were evaluated, which shows a feasibility of application to concrete aggregate.

VPN technology analysis: How to protect against network attacks in a Linux environment (리눅스 서버 환경에서 네트워크 침해 대비를 위한 VPN 기술 분석)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Lee, Kwang-Yong;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.326-328
    • /
    • 2016
  • While hackers in early days intended to disable and devastate the system, these days people hack and attack the network in order to steal customer's private information from the big corporate, which changes the nature of the crime to cyber attack for money, eventually causing a lot of damages. One of the most efficient ways to protect this kind of network attack is VPN, referring to Virtual Private Network. VPN is a private networking technology that makes the public network available for only those who are concerned. This paper will suggest the VPN technology that can be applied to Linux server and related protocols and figure the applicable VPN out.

  • PDF

App Store security policy trends (앱스토어 보안정책 동향)

  • Bae, Jung-Min;Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.587-590
    • /
    • 2014
  • Spread of smart devices increases, the App Store market is formed so huge, even at this point, every day the scale is increasing now. As a result, for the benefit of companies and private individuals, malicious apps that threaten the security of smart devices, have appeared occasionally in the App Store. Security of the terminal, has issued various solutions through research at many universities and companies, and country. However, solutions for research and policy approaches that are blocking the procedure to register the application malicious app, so that it is not registered in the App Store, Only company that operates the app store is doing it. And the reference is also insufficient, various problems have occurred. In this study, after analyzing the problem of the security policy of the current App Store, presenting the breaking point.

  • PDF