• 제목/요약/키워드: 한남

Search Result 779, Processing Time 0.025 seconds

Evaluation of Mechanical Properties of Early-age Concrete Containing Electric Arc Furnace Oxidizing Slag (전기로 산화슬래그를 혼입한 초기재령 콘크리트의 역학적 특성 평가)

  • Kwon, Seung-Jun;Hwang, Sang-Hyeon;Lim, Hee-Seob
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.7 no.2
    • /
    • pp.93-100
    • /
    • 2019
  • In this study, the mechanical properties of early-age concrete were evaluated by mixing the electric arc furnace oxidizing slag fine aggregate with 30% and 50% replacement ratio. Slump test, air content test and unit volume weight test were performed for fresh concrete, and compressive strength test and chloride penetration experiments were carried out in hardened concrete. The compressive strength increased up to 7 days of curing age with increasing replacement ratio of the electric furnace oxidizing slag, but the strength decreased to 90% level of OPC concrete at 28 days of age. Regarding the result of chloride penetration test, no significant differences from OPC concrete were evaluated, which shows a feasibility of application to concrete aggregate.

VPN technology analysis: How to protect against network attacks in a Linux environment (리눅스 서버 환경에서 네트워크 침해 대비를 위한 VPN 기술 분석)

  • Lee, Jae-Ung;Jung, Sung-Jae;Bae, Yu-Mi;Lee, Kwang-Yong;Jang, Rae-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.326-328
    • /
    • 2016
  • While hackers in early days intended to disable and devastate the system, these days people hack and attack the network in order to steal customer's private information from the big corporate, which changes the nature of the crime to cyber attack for money, eventually causing a lot of damages. One of the most efficient ways to protect this kind of network attack is VPN, referring to Virtual Private Network. VPN is a private networking technology that makes the public network available for only those who are concerned. This paper will suggest the VPN technology that can be applied to Linux server and related protocols and figure the applicable VPN out.

  • PDF

App Store security policy trends (앱스토어 보안정책 동향)

  • Bae, Jung-Min;Bae, Yu-Mi;Jung, Sung-Jae;Jang, Rea-Young;Soh, Woo-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.587-590
    • /
    • 2014
  • Spread of smart devices increases, the App Store market is formed so huge, even at this point, every day the scale is increasing now. As a result, for the benefit of companies and private individuals, malicious apps that threaten the security of smart devices, have appeared occasionally in the App Store. Security of the terminal, has issued various solutions through research at many universities and companies, and country. However, solutions for research and policy approaches that are blocking the procedure to register the application malicious app, so that it is not registered in the App Store, Only company that operates the app store is doing it. And the reference is also insufficient, various problems have occurred. In this study, after analyzing the problem of the security policy of the current App Store, presenting the breaking point.

  • PDF

Theoretical Study for Thermally Activated Delayed Fluorescence (TADF) Property in Organic Light-Emitting Diode (OLED) Candidates (유기발광소재(OLED) 후보물질의 지연형광(TADF) 성질에 대한 이론적 연구)

  • Seo, Hyun-il;Jeong, Hyeon Jin;Yoon, Byung Jin;Kim, Seung-Joon
    • Journal of the Korean Chemical Society
    • /
    • v.63 no.3
    • /
    • pp.151-159
    • /
    • 2019
  • The TADF properties for carbazol-dicyanobenzene, carbazol-diphenyl sulfone, carbazol-benzonitrile derivatives as OLED candidate materials are theoretically investigated using density functional theory (DFT) with $6-31G^{**}$, cc-pVDZ, and cc-pVTZ basis sets. The optimized geometries, harmonic vibrational frequencies, and HOMO-LUMO energy separations are predicted at the B3LYP/$6-31G^{**}$ level of theory. The harmonic vibrational frequencies of the molecules considered in this study show all real numbers implying true minima. The time dependent density functional theory (TD-DFT) calculations have been also applied to investigate the absorption and emission wavelength (${\lambda}_{max}$), energy differences (${\Delta}E_{ST}$) between excited singlet ($S_1$) and triplet ($T_1$) states of candidate materials.

Analysis of U.S. Supply Chain Security Management System (미국 공급망 보안 관리 체계 분석)

  • Son, Hyo-hyun;Kim, Kwang-jun;Lee, Man-hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1089-1097
    • /
    • 2019
  • An era of smart manufacturing is coming through the rapid development of information and communication technology. As a result, many companies have begun to utilize a variety of hardware and software for the efficient business of the manufacturing process. At this time, the hardware and software used are supplied through manufacturing and distribution processes. These supply processes are exposed to a variety of security threats. As the recent cases of supply chain attacks have increased, foreign countries are establishing supply chain management systems and managing supply chain risks. In Korea, on the other hand, there was research on supply chain risk management in some fields. In this paper, we emphasizes the necessity of supply chain risk management through supply chain attack cases. In addition, we analyze trends of foreign supply chain management system and explains the necessity of domestic supply chain security strategy.

Detection of Abnormal Vessel Trajectories with Convolutional Autoencoder (합성곱 오토인코더를 이용한 이상거동 선박 식별)

  • Son, June-Hyoung;Jang, Jun-Gun;Choi, Bongwan;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.43 no.4
    • /
    • pp.190-197
    • /
    • 2020
  • Recently there was an incident that military radars, coastal CCTVs and other surveillance equipment captured a small rubber boat smuggling a group of illegal immigrants into South Korea, but guards on duty failed to notice it until after they reached the shore and fled. After that, the detection of such vessels before it reach to the Korean shore has emerged as an important issue to be solved. In the fields of marine navigation, Automatic Identification System (AIS) is widely equipped in vessels, and the vessels incessantly transmits its position information. In this paper, we propose a method of automatically identifying abnormally behaving vessels with AIS using convolutional autoencoder (CAE). Vessel anomaly detection can be referred to as the process of detecting its trajectory that significantly deviated from the majority of the trajectories. In this method, the normal vessel trajectory is gridded as an image, and CAE are trained with images from historical normal vessel trajectories to reconstruct the input image. Features of normal trajectories are captured into weights in CAE. As a result, images of the trajectories of abnormal behaving vessels are poorly reconstructed and end up with large reconstruction errors. We show how correctly the model detects simulated abnormal trajectories shifted a few pixel from normal trajectories. Since the proposed model identifies abnormally behaving ships using actual AIS data, it is expected to contribute to the strengthening of security level when it is applied to various maritime surveillance systems.

Design and Implementation of the Semi-automated Evaluation Workflow Management System(Sa-EWMS) (반자동화 평가워크플로우 관리 시스템 설계 및 구현)

  • Kang Yeon-hee;Kim Jung-dae;Lee Gang-soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.4
    • /
    • pp.39-50
    • /
    • 2005
  • An evaluation demand and a market growth regarding evaluation and certification are increasing because the importance of information Security is gradually rising to solve the information disfunction. Therefore, it is necessary the cost-effect evaluation management of the Information Security System(ISS). In this paper, we propose the Semi-automated Evaluation Workflow Management System(Sa-EWMS) based on the Common Criteria(CC) which performs and manages evaluation work through the procedure when evaluator evaluates the Information Security System(ISS). The Sa-EWMS is solving a problem of consumption of time and effort and performing efficient evaluation, it is playing a significant role that traces workflow process of each work of the Engines and controls performance. It will be able to use useful the private evaluation enterprise which confront in an evaluation demand and a market growth.

Estimation of relative evaluation effort ratios for each EALs in CC 2.3 and CC 3.1 (CC 2.3과 CC 3.1의 보증수준별 상대적 평가업무량 배율 추정)

  • Kou, Kab-Seung;Kim, Young-Soo;Lee, Gang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.4
    • /
    • pp.61-74
    • /
    • 2007
  • In Common Criteria evaluation scheme, sponsor and evaluator should estimate evaluation cost and duration of IT security system evaluation in contracting the evaluation project. In this paper, We analyzed study result that achieve at 2003 and 2005, and utilized part of study result. And we empirically estimate relative evaluation effort ratios among evaluation assurance levels($EAL1{\sim}EAL7$) in CC v2.3 and CC v3.1. Also, we estimate the ratios from 'developer action elements', adjusted 'content and presentation of evidence elements', and 'evaluator action elements 'for each assurance component. We, especially, use ratio of amount of effort for each 'evaluator action elements', that was obtained from real evaluators in KISA in 2003. Our result will useful for TOE sponsor as well as evaluation project manager who should estimate evaluation cost and duration for a specific EAL and type of TOE, in a new CC v3.1 based evaluation schem.

UML 2.0 Statechart based Modeling and Analysis of Finite State Model for Cryptographic Module Validation (암호모듈 검증을 위한 UML 2.0 상태도 기반의 유한상태모델 명세 및 분석)

  • Lee, Gang-soo;Jeong, Jae-Goo;Kou, Kab-seung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.91-103
    • /
    • 2009
  • A cryptographic module (CM) is an implementation of various cryptographic algorithms and functions by means of hardware or software, When a CM is validated or certified under the CM validation program(CMVP), a finite state model(FSM) of the CM should be developed and provided, However, guides or methods of modeling and analysis of a FSM is not well-known, because the guide is occasionally regarded as a proprietary know-how by developers as well as verifiers of the CM. In this paper, we propose a set of guides on modeling and analysis of a FSM, which is needed for validation of a CM under CMVP, and a transition test path generation algorithm, as well as implement a simple modeling tool (CM-Statecharter). A FSM of a CM is modeled by using the Statechart of UML 2.0, Statechart, overcoming weakness of a FSM, is a formal and easy specification model for finite state modeling of a CM.

Separation of Dynamic RCS using Hough Transform in Multi-target Environment (허프 변환을 이용한 다표적 환경에서 동적 RCS 분리)

  • Kim, Yu-Jin;Choi, Young-Jae;Choi, In-Sik
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.9
    • /
    • pp.91-97
    • /
    • 2019
  • When a radar tracks the warhead of a ballistic missile, decoys of a ballistic missile put a heavy burden on the radar resource management tracking the targets. To reduce this burden, it is necessary to be able to separate the signal of the warhead from the received dynamic radar cross section (RCS) signal on the radar. In this paper, we propose the method of separating the dynamic RCS of each target from the received signal by the Hough transform which extracts straight lines from the image. The micro motion of the targets was implemented using a 3D CAD model of the warhead and decoys. Then, we calculated the dynamic RCS from the 3D CAD model having micromotion and verified the performance by applying the proposed algorithm. Simulation results show that the proposed method can separate the signals of the warhead and decoys at the signal-to-noise ratio (SNR) of 10dB.